• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 66
  • 21
  • 14
  • 12
  • 7
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 142
  • 40
  • 38
  • 34
  • 31
  • 18
  • 17
  • 16
  • 15
  • 15
  • 13
  • 12
  • 12
  • 12
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

3D-modellering av byggnader med indata från UAV och terrester laserskanner / 3D-modeling of buildings with data from UAV and terrestrial laser scanner

Lindberg Schlegel, Julius, Trogen Hedin, Erik January 2024 (has links)
3D-models/maps are great to use for visualization of the real world and are easy to understand for the average person. The use of this data is becoming increasingly common. Karlstad municipality offers a web-based product with a 3D-map to show the city's residents what is happening in the city. Today, the models are produced using laser data and orthophotos collected by airplanes. Karlstad municipality has the ambition to maintain the 3D-map themselves. Due to practical and economic reasons, aerial photographing with airplanes is not suitable. This study examines the method of creating 3D-models using two data collection methods, UAV and TLS, in order to smoothly create models with higher quality LOD 3. The 3Dmodel created in this study should be able to be used for Karlstad municipality's 3D-map to realistically visualize one of the city's older known heritage sites, which is Karlstad's theatre. The method used in the study proves to be effective and creates a 3D-model with a LOD quality of 3. The method required planning, field collection, preprocessing of collected data, and data processing. Programs primarily used for the study were Agisoft Metashape, TBC, and Cloud Compare. The study showed that the method is time-consuming for conducting 3D-models of UAV and TLS data. Collection and 3D-modelling are much smoother with only UAV data as it is faster, but the quality is slightly lower. The method may be suitable for individual buildings with cultural historical values or socially important ones where detail richness and the quality of the 3D-model are more important and interesting. / 3D-modeller/kartor är bra för att visualisera verkligheten och är lätta att förstå för gemene man, användningen av denna typ blir allt vanligare. Karlstads kommun erbjuder en webbaserad produkt med 3D-karta som ett sätt att visa kommunens invånare vad som händer i staden. Idag tas modellerna fram med hjälp av laserdata och ortofoto insamlat med flygplan. Karlstads kommun har som ambition att själva underhålla 3D-kartan. På grund av praktiska och ekonomiska skäl lämpar sig ej insamling med flygplan.I denna studie undersöks metoden att skapa 3D-modeller med två datainsamlingsmetoder, UAV och TLS, detta för att smidigt kunna skapa modeller med högre kvalitet LOD 3. 3D-modellen som skapas i denna studie ska kunna användas till Karlstads kommuns 3D-karta för att realistiskt visualisera ett av stadens äldre kända stads arv som är Karlstads teater. Metoden som används i studien visar sig vara effektiv och skapar en 3D-modell med en LOD-kvalitet på 3. Metoden krävde en planering, fältinsamling, förarbete av insamlad data och bearbetning av data. Program som framför allt användes för studien var Agisoft Metashape, TBC och CloudCompare. Studien visade att metoden är tidskrävande för att genomföra 3D-modeller av UAV och TLS data. Insamling och 3D-modellering görs mycket smidigare med endast UAV data då det är snabbare men kvaliteten blir lite sämre. Metoden kan lämpa sig för enstaka byggnader med kulturhistoriska värden eller samhällsviktiga där detaljrikedom och där kvaliteten på 3D-modellen är viktigare och intressantare.
12

Integrating Remote Sensing Techniques into Forest Monitoring: Selected Topics with a Focus on Thermal Remote Sensing

Nölke, Nils 05 April 2016 (has links)
No description available.
13

Immune response in breast cancer

Solinas, Cinzia 24 January 2019 (has links) (PDF)
The immunogenicity of breast cancer (BC) is quite heterogeneous among the clinical subtypes, with immune responses identified most frequently in triple negative (TNBC) and HER2-positive tumors. The extent, spatial localization, distribution patterns, organization and phenotype of the BC immune infiltrate are currently being widely investigated but require standardization before they can be used clinically. One highly relevant unmet clinical need is to understand how immune features are linked to prognosis and potential benefit from treatments, particularly immunotherapy. The present work investigated tumor-infiltrating lymphocytes (TIL), tertiary lymphoid structures (TLS), the expression of multiple targetable inhibitory immune checkpoint molecules (PD-1, PD-L1 and PD-L2, CTLA-4, LAG3 and TIM3) and their clinical relevance in primary BC. Different technical approaches were employed including: flow cytometry (FC) on fresh tissue homogenates; immunohistochemistry (IHC) and immunofluorescence (IF) on formalin-fixed paraffin embedded (FFPE) tissue blocks from untreated primary tumors; and gene expression on a large dataset of BC patients with available long-term survival data. Flow cytometric analysis of PD-1 expression and its principal ligands PD-L1 and PD-L2 together with CTLA-4, LAG3 and TIM3 on TIL in fresh untreated primary tumors revealed that PD-1 and CTLA-4 are most highly expressed on BC TIL and PD-L1 is the principal PD-1 ligand in BC. Immune checkpoint molecule expression parallels the extent of TIL infiltration and TLS presence and number, with the patterns detected similar to that observed in secondary lymphoid organs. Significantly improved disease-specific survival (DSS) has been associated with PD-1hi HER2-enriched and PD-L1hi, PD-L2hi and CTLA-4hi basal-like BC; however there is significant heterogeneity between individual tumors even within the same subtype. These observations suggest that determining expression levels of multiple targetable inhibitory immune checkpoint molecules in patients might help to successfully target them in BC patients most likely to respond.We examined the concordance between two experienced immuno-pathologists who read 800 IHC-stained slides from five independent series over a period of four years to determine the reproducibility of assessing multiple immune biomarkers. This included scoring TIL, TLS, PD-1 and PD-L1 together with detailed information on the spatial localization and cell types expressing these molecules in the tumor microenvironment (TME). The interobserver reproducibility for the assessment of TIL and TLS was consistently good to excellent overtime, while the concordance for PD-L1 evaluation ranged from fair to excellent when it was only expressed on tumor cells (TC); and the concordance for PD-1 evaluation was fair to excellent when it was expressed in TLS and evaluated in primary tumors. Neither PD-L1 expression by TC, nor PD-1 expression within a TLS was significantly associated with prognosis in our datasets.The extent of TIL, TLS and PD-1 and PD-L1 expression were studied in a cohort of TNBC patients who underwent genetic counseling for their personal/familial history of BC or ovarian cancer (OC). This study revealed a remarkable similarity in patterns of immune infiltration between the two cohorts. Interestingly, a higher prevalence of TIL intermediate cases (≥10% and <50% TIL) was detected in the BRCA-mutated cohort, suggesting that this group may be more immunogenic.We next investigated whether the extent and presence of these immune parameters were associated with prognosis in the most highly infiltrated, aggressive BC subtypes (TNBC and HER2-positive). We determined the ideal cut-off for each subtype (TNBC and HER2-positive) to use TIL as a categorical variable. This study found a consistent prognostic impact from TIL (in any tumor compartment including stromal, intratumoral and global areas) and a novel association between PD-L1 expression within TLS and better survival in TNBC. This last effect was driven by baseline stromal TIL, strengthening the importance of reliably quantifying the levels of TIL in BC. Overall, our analyses show that among the targetable inhibitory immune checkpoint molecules investigated in BC, PD-1 and CTLA-4 are most highly expressed by BC TIL and are associated with higher infiltration of TIL; PD-L1 is the principal ligand for PD-1; TIL and TLS are reproducibly scored on IHC-stained tissues; and TIL levels are associated with a better prognosis in TNBC independent of their location in the TME at optimal cut-offs. Our data also provide new insight on targetable inhibitory immune checkpoint molecule expression and location as well as showing a prognostic role for TIL assessed by IHC in primary BC, which identifies these biomarkers as ideal candidates for further investigation. / Doctorat en Sciences médicales (Médecine) / info:eu-repo/semantics/nonPublished
14

Security Certificate Renewal Management

Boinapally, Kashyap January 2019 (has links)
Context. An SSL encrypted client-server communication is necessary to maintain the security and privacy of the communication. For an SSL encryption to work, there should be a security certificate which has a certain expiry period. Periodic renewal of the certificate after its expiry is a waste of time and an effort on part of the company. Objectives. In this study, a new system has been developed and implemented, which sends a certificate during prior communication and does not wait for the certificate to expire. Automating the process to a certain extent was done to not compromise the security of the system and to speed up the process and reduce the downtime. Methods. Experiments have been conducted to test the new system and compare it to the old system. The experiments were conducted to analyze the packets and the downtime occurring from certificate renewal. Results. The results of the experiments show that there is a significant reduction in downtime. This was achieved due to the implementation of the new system and semi-automation Conclusions. The system has been implemented, and it greatly reduces the downtime occurring due to the expiry of the security certificates. Semi-Automation has been done to not hamper the security and make the system robust.
15

Přibližný polynomiální největší společný dělitel / Approximate Polynomial Greatest Common Divisor

Eliaš, Ján January 2012 (has links)
Title: Approximate Polynomial Greatest Common Divisor Author: Ján Eliaš Department: Department of Numerical Mathematics, MFF UK Supervisor: Doc. RNDr. Jan Zítko, CSc., Department of Numerical Mathematics, MFF UK Abstract: The computation of polynomial greatest common divisor (GCD) ranks among basic algebraic problems with many applications. The Euclidean algorithm is the oldest and usual technique for computing GCD. However, the GCD computation problem is ill-posed, particularly when some unknown noise is applied to the polyno- mial coefficients. Since the Euclidean algorithm is unstable, new methods have been extensively studied in recent years. Methods based on the numerical rank estimation represent one group of current meth- ods. Their disadvantage is that the numerical rank cannot be computed reliably due to the sensitivity of singular values on noise. The aim of the work is to overcome the ill-posed sensitivity of GCD computation in the presence of noise. Keywords: AGCD, Sylvester matrix, numerical rank, TLS
16

Jämförelse av autentisering i SIP och H.323

Thunström, Robert January 2008 (has links)
<p>H.323 och Session Initiation Protocol är två olika protokoll som kan användas t ex för att koppla upp röstsamtal eller videosamtal via Internet. Det är ofta önskvärt i en uppkoppling mellan två personer att personerna kan autentisera sig för varandra. Denna autentisering är avsedd att garantera identiteten på deltagarna i kommunikationen. Den här undersökningen jämför protokollens struktur vid autentiseringen och visar skillnader i säkerhetssynpunkt. Autentisering finns i 3 skikt i de båda protokollen. I applikationsskiktet skiljer sig protokollen åt då SIP använder sig av lösenord för autentisering medan H.323 både kan använda lösenord och en PKI-baserad lösning med utbyte av nyckelcertifikat. I transportskiktet och nätverksskiktet kan båda protokollen använda TLS och IPSec för autentisering och därmed är det ingen större skillnad på protokollen i dessa skikt.</p>
17

Terrester laserskanning för inmätning av spåranläggningar

Kadric, Zuhret, Forsmark, Örjan January 2010 (has links)
Järnvägarna är i dag hårt belastade med trafik och är känsliga för störningar. Banverksarbeten är därför något som måste noggrant planeras och genomföras så att det medför så lite störningar som möjligt på järnvägstrafiken. Även säkerheten vid allt arbete som berör spårområden är en viktig faktor att ta hänsyn till. Allt arbete inom spårområdet måste därför uppfylla särskilda krav. Detta får även konsekvenser för detaljmätningar inom spårområden då spåret måste vara avstängt. Ett alternativ är att använda en terrester laserskanner som får sin placering utanför spårområdet, vilket skulle kunna vara ett mer flexibelt sätt att mäta spårmitt.Syftet med denna studie är att visa hur mätningar med terrester laserskanning (TLS) kan utföras i spårmiljö, jämföra dem mot traditionella mätningar med totalstation, samt bestämma om Trafikverkets toleranskrav kan uppnås vid TLS-mätningar i spåranläggningar.Bansträckan som var aktuell för inmätningar var ca 100 m lång. Spårinmätning utfördes med totalstation med ett intervall på 1-2 m. Det totala antalet linjepunkter som mättes in var 85 stycken, som sedan skulle jämföras med laserskanningsmätningarna. Mätningarna av samma bansträcka som utfördes med laserskanner utgick från fem olika uppställningar med ca 10 m avstånd vinkelrätt till närmaste rälen. Resultatet av jämförelsen av linjedata från de två mätningar visar på en radiell differens i plan med ett medelvärde på 3 mm och differensen i höjd visar ett medelvärde på 5 mm. För att visa på hur man kan identifiera olika objekt i punktmoln togs ett antal bilder fram, som på ett lättöverskådligt sätt visar hur mycket information som finns i form av punkter. För att ett fordon ska kunna trafikera spåret måste järnvägsnätet uppfylla kraven för s.k. lastprofiler. I punktmolnen med några enkla kommandon skapades en lastprofil. Därefter kunde den flyttas längs spårmittslinjen och ställas in i relation till alla omkringliggande objekt.TLS har under vårt arbete visat sig ha en stor potential för bestämning av spårmitten och detaljmätning inom spårområdet. Under relativt kort tid genererades stora datamängder i form av punktmoln från vilket enskilda objekt enkelt kunde urskiljas. Mätningsarbeten i ett högtrafikerat spår är omgärdat med restriktioner, men mätning med laserskanner som utförs utanför säkerhetszonen kräver i stort sett bara närvaro av en instrumentoperatör. De stora säkerhetskraven som ställs i fokus vid arbetet inom spårområden uppfylls fullständigt genom att ingen mätningspersonal behöver vistas i säkerhetszonen vid mätning med TLS.Slutsatser som kan dras av vår studie är att noggrannheten vid mätning av spårmittslinjen med TLS är jämförbar med mätning med totalstation. Kvaliten på mätningarna uppfyller de krav som ställs för mätning med totalstation av Trafikverket. Tack vare den snabba insamlingen av stora datamängder kan TLS bidra mycket vid mätning av spårområden där koncentrationen av spårobjekten är stor. Insamlad data kan sparas och eventuella missade kontroller, mätningar och visualiseringar kan utföras genom att nödvändig data extraheras ur sparade punktmolnen utan att nya mätningar behöver genomföras. Detta kan även underlätta framtida arbeten med planering och projektering då information av ett spårområde behövs i efterhand. / The railways are nowadays congested with traffic and are sensitive to disturbance. Rail infrastructure works are something that must be carefully planned and executed when it involves as little disruption as possible for rail traffic. In addition safety of all activities related to railway environment should be considered. All work within the track area must therefore meet certain requirements. This may also influence detail measurements within the track areas where the track must be closed. An alternative is to use a terrestrial laser scanner that can be placed outside the track area, which could be a more flexible way to measure the centre line of the track. The aim of this study is to show how measurements with terrestrial laser scanning (TLS) can be performed in track environment, compare them to traditional measurements with total station and determine whether the Swedish Transport Administrations tolerance requirements can be achieved with TLS measurements.The section of the railway that was surveyed was about 100 m long. Track surveying was carried out with total station with an interval of 1-2 m. In total, 85 points on the track centre line were measured, which could then be compared with laser scanning measurements. The measurements with laser scanner were made from five different set ups at the distance of about 10 m at orthogonally to the nearest rail. The results of comparison of the line data from the two measurements shows a mean radial difference in a horizontal plane of 3 mm. and difference in height shows a mean of 5 mm. To demonstrate how to identify different objects in point clouds, a range of images are presented, which in an easily comprehensible format showing how much information is available in the form of points. For a vehicle, to be able to travel on rail track, must meet the requirements for so called loading-gauges. In the point clouds, a load profile was created with a few simple commands. Then it can be moved along the track center line and set in relation to all surrounding objects. In our work, TLS has proved to have great potential for determination of the track center line and detail measurements within the track area. During the relatively short time, large amounts of data in the form of point clouds were generated from which individual items could be easily distinguished. Surveying work on a busy railway is surrounded by restrictions, but TLS measurements, which can be carried out outside the security zone, require only the presence of an instrument operator. The major safety requirements that should be adhered to in surveys of track areas are satisfied completely, since no surveying staff should work in the security zone during TLS measurements. Conclusions that can be drawn from our study are that accuracy in measuring the track center line with TLS is comparable to the measurement with the total station. The quality of the measurements meets the requirements for the measurement with total station of Swedish Transport Administrations. Thanks to the rapid collection of large amounts of data TLS can contribute much in the surveys of railway areas where the concentration of objects is large. Data can be saved and any missed checks can be performed trough extraction of necessary data from the point clouds without the need for new measurements. This may also facilitate future work with the planning and design when information about a track environment is needed.
18

Upgrading the SSL protocol to TLS in the Roxen WebServer

Svensson, Pär January 2002 (has links)
<p>The company Roxen Internet Software have an implementation of the secure network protocol SSL (Secure Sockets Layer) which is used in their web server product. This report describes the upgrading of that implementation to the TLS1.0 (Transport Layer Security) standard. It also describes a performance investigation of the SSL/TLS support in the Roxen WebServer and compares it with other common web servers. The initial setup time for the secure SSL/TLS connection was found to be very long in the Roxen Webserver compared to its competitors. The main bottleneck, in the Roxen implementation, was found to be the modular exponentiation that is the core of the RSA decryption algorithm. One suggested improvement is to upgrade the bignumber numerical package used in Roxen WebServer, GMP (The GNU Multiple Precision arithmetic library) from version 2.0 to version 4.0. The newer version of the bignumber package have been measured to have considerably better performance in its modular exponentation operation.</p>
19

Putting checkpoints to work in thread level speculative execution

Khan, Salman January 2010 (has links)
With the advent of Chip Multi Processors (CMPs), improving performance relies on the programmers/compilers to expose thread level parallelism to the underlying hardware. Unfortunately, this is a difficult and error-prone process for the programmers, while state of the art compiler techniques are unable to provide significant benefits for many classes of applications. An interesting alternative is offered by systems that support Thread Level Speculation (TLS), which relieve the programmer and compiler from checking for thread dependencies and instead use the hardware to enforce them. Unfortunately, data misspeculation results in a high cost since all the intermediate results have to be discarded and threads have to roll back to the beginning of the speculative task. For this reason intermediate checkpointing of the state of the TLS threads has been proposed. When the violation does occur, we now have to roll back to a checkpoint before the violating instruction and not to the start of the task. However, previous work omits study of the microarchitectural details and implementation issues that are essential for effective checkpointing. Further, checkpoints have only been proposed and evaluated for a narrow class of benchmarks. This thesis studies checkpoints on a state of the art TLS system running a variety of benchmarks. The mechanisms required for checkpointing and the costs associated are described. Hardware modifications required for making checkpointed execution efficient in time and power are proposed and evaluated. Further, the need for accurately identifying suitable points for placing checkpoints is established. Various techniques for identifying these points are analysed in terms of both effectiveness and viability. This includes an extensive evaluation of data dependence prediction techniques. The results show that checkpointing thread level speculative execution results in consistent power savings, and for many benchmarks leads to speedups as well.
20

Punktmolnshantering i anläggningsprojekt : Utvärdering av programvaror för framtagande av markmodell / Point cloud management in civil engineering projects : Evaluation of software for the development of land model

Edbor, Simon, Modin, Stefan January 2015 (has links)
An increased number of participants in the construction industry is asking for accompanying terrain models to the project in order to get a better understanding of the field. When the desire to create buildings that fit together nicely with the surrounding area is increasing, it becomes more and more important to have a broad base of knowledge about the ground on which the building is to be erected. Terrain models are also very useful in the planning of logistics, documentation for landscape architecture projects, and billings for mass calculations.Surveys for creating terrain models can be performed with laser scanning. The advantage of laser scanning is the time-effective surveying, the detailed information as well as the ability of application in complex environments resulting in a cost-efficient project. With this in mind our thesis was defined in collaboration with the company Bjerking AB in Uppsala in order to investigate if there were any softwares suitable for terrain modeling. The idea was created by the company after a previous existing thesis about modeling of buildings from point clouds.The purpose of this study is to examine the possibility of filtering a point cloud and generating of terrain model by surveying with terrestrial laser scanning. The study was conducted in the form of a comparison between six different softwares and the ability to filter noise, and then create a model of the filtered data. The softwares has also been compared between several rate points. In this thesis, a chosen lane at Studenternas idrottsplats, located in central Uppsala, has been scanned containing noise such as cars, light towers, containers, etc. The scanned area resulted in a point cloud and has later on been used in the comparison of software. All six softwares investigated have got different focuses within the field of use of land and construction.The study has shown that the results between the softwares differ significantly. From manual methods to fully automatical, these softwares have been proving their own abilities to perform more or less successful calculations for selecting points and building terrain models. Our terrain models show that all softwares are capable of creating flat surfaces with equal heights, but only a few succeeded in generating slopes. The study also show that a more expensive software does not always guarantee a better result.

Page generated in 0.0287 seconds