• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 15
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 90
  • 19
  • 16
  • 14
  • 12
  • 9
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Rekonstrukce polyfunkčního domu v Prostějově / Revitalization of multifunctional house in Prostejov

Fixelová, Veronika January 2019 (has links)
The subject of this final thesis is elaboration of revitalization of multifunctional building in Prostějov. The main building has one basement and five floors and two extensions in closed yard. Load bearing system of building is partly from rainforced concrete frame and partly from brickwork. Floor structures are made from rainfroced concrete constructions, main building has a pitched roof and extensions has a flat roofs.
82

Entwicklung und Implementierung eines Software-tools zur Einzelzellverfolgung: Programm „CellTracker“

Kunze, Michael 13 February 2018 (has links)
Mittels Zeitrafferaufnahmen ist es möglich, einzelne Zellen und deren Nachkommenschaft innerhalb bestimmter Zellkulturen zu verfolgen. Fortgeschrittene Bilderverarbeitungsmethoden gestatten es, diesen Prozess der Zellverfolgung über Hunderte von aufeinanderfolgenden Bildern weitgehend zu automatisieren und baumartige Zelltrajektorien zu erzeugen. Allerdings kommt es dabei häufig zu Situationen, in denen die entsprechenden Algorithmen zu ungenau werden und ein Benutzereingriff erforderlich ist. Ziel dieser Arbeit war ein entsprechendes Softwaretool zu entwickeln, dass diesen Benutzereingriff gewährleistet und damit die automatische Zellverfolgung komplementiert. Die entsprechende Software ist in der Lage , die zu Grunde liegenden Bildstapel zu laden und als Bildsequenz darzustellen. Darüber hinaus werden zusätzliche Informationen zu den erkannten Zellobjekten und den automatisch generierten Zelltrajektoren (vor-prozessierte Metadaten aus Mathematica) geladen und repräsentiert. Zentrale Aufgabe der Software ist es, eine Plattform zu schaffen, auf der ein geschulter Nutzer die erkannten Trajektorienabschnitte effizient und benutzerfreundlich erkennen und gegebenenfalls miteinander verknüpfen kann. Die entsprechend ergänzten Trajektorien können anschliessend als Metadaten für die weitere Verarbeitung und Auswertung zur Verfügung gestellt werden. Das Softwaretool stellt einen wichtigen Bestandteil einer Auswertepipline für zeitlich ausgedehnte Videoaufnahmen von Zellkulturen dar und leistet damit einen Beitrag zum Verständnis von Zellorganisation und zellulärer Migration.
83

The Effects of Nicotine Conditioned Place Preference in D2 Primed Adolescent Rats: Age-Related and Gender Effects.

Ogawa, Yoko Emily 14 August 2007 (has links) (PDF)
This study investigated nicotine conditioned place preference (CPP) in two different ages of adolescence using a rodent model of schizophrenia. Both 2- and 3-chambered CPP apparatuses were used to test whether the CPP was due to an aversion to the white chamber. Animals were neontally treated with the dopamine D2/D3 agonist, quinpirole, or saline and raised to either early postweanling age (P 22) or adolescence (P 29). Rats were conditioned to prefer the white chamber using nicotine. Results showed that nicotine induced CPP and appeared to alleviate an increased stress response in D2 primed animals, which appeared to diminish over time. Additionally, adult D2 and non-D2 primed rats were tested on the elevated T-maze. Results revealed that D2 primed rats demonstrated a significant increase in unconditioned fear. This study showed that nicotine induced CPP in D2 and non-D2 primed rats regardless of age, and D2 primed rats appear to demonstrate an increase in stress levels that was alleviated by nicotine.
84

Performance Analysis of Virtualisation in a Cloud Computing Platform. An application driven investigation into modelling and analysis of performance vs security trade-offs for virtualisation in OpenStack infrastructure as a service (IaaS) cloud computing platform architectures.

Maiyama, Kabiru M. January 2019 (has links)
Virtualisation is one of the underlying technologies that led to the success of cloud computing platforms (CCPs). The technology, along with other features such as multitenancy allows delivering of computing resources in the form of service through efficient sharing of physical resources. As these resources are provided through virtualisation, a robust agreement is outlined for both the quantity and quality-of-service (QoS) in a service level agreement (SLA) documents. QoS is one of the essential components of SLA, where performance is one of its primary aspects. As the technology is progressively maturing and receiving massive acceptance, researchers from industry and academia continue to carry out novel theoretical and practical studies of various essential aspects of CCPs with significant levels of success. This thesis starts with the assessment of the current level of knowledge in the literature of cloud computing in general and CCPs in particular. In this context, a substantive literature review was carried out focusing on performance modelling, testing, analysis and evaluation of Infrastructure as a Service (IaaS), methodologies. To this end, a systematic mapping study (SMSs) of the literature was conducted. SMS guided the choice and direction of this research. The SMS was followed by the development of a novel open queueing network model (QNM) at equilibrium for the performance modelling and analysis of an OpenStack IaaS CCP. Moreover, it was assumed that an external arrival pattern is Poisson while the queueing stations provided exponentially distributed service times. Based on Jackson’s theorem, the model was exactly decomposed into individual M/M/c (c ≥ 1) stations. Each of these queueing stations was analysed in isolation, and closed-form expressions for key performance metrics, such as mean response time, throughput, server (resource) utilisation as well as bottleneck device were determined. Moreover, the research was extended with a proposed open QNM with a bursty external arrival pattern represented by a Compound Poisson Process (CPP) with geometrically distributed batches, or equivalently, variable Generalised Exponential (GE) interarrival and service times. Each queueing station had c (c ≥ 1) GE-type servers. Based on a generic maximum entropy (ME) product form approximation, the proposed open GE-type QNM was decomposed into individual GE/GE/c queueing stations with GE-type interarrival and service times. The evaluation of the performance metrics and bottleneck analysis of the QNM were determined, which provided vital insights for the capacity planning of existing CCP architectures as well as the design and development of new ones. The results also revealed, due to a significant impact on the burstiness of interarrival and service time processes, resulted in worst-case performance bounds scenarios, as appropriate. Finally, an investigation was carried out into modelling and analysis of performance and security trade-offs for a CCP architecture, based on a proposed generalised stochastic Petri net (GSPN) model with security-detection control model (SDCM). In this context, ‘optimal’ combined performance and security metrics were defined with both M-type or GE-type arrival and service times and the impact of security incidents on performance was assessed. Typical numerical experiments on the GSPN model were conducted and implemented using the Möbius package, and an ‘optimal’ trade-offs were determined between performance and security, which are crucial in the SLA of the cloud computing services. / Petroleum technology development fund (PTDF) of the government of Nigeria Usmanu Danfodiyo University, Sokoto
85

Desenvolvimento de cateter implantável de monitorização de pressão intracraniana

Rosario, Jeferson Cardoso do 18 January 2019 (has links)
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2019-03-25T11:56:58Z No. of bitstreams: 1 Jeferson Cardoso do Rosario_.pdf: 3523684 bytes, checksum: 6d033c623e7ef74a93692efd6ca37e8e (MD5) / Made available in DSpace on 2019-03-25T11:56:58Z (GMT). No. of bitstreams: 1 Jeferson Cardoso do Rosario_.pdf: 3523684 bytes, checksum: 6d033c623e7ef74a93692efd6ca37e8e (MD5) Previous issue date: 2019-01-18 / Nenhuma / O traumatismo cranioencefálico (TCE) é atualmente a terceira maior causa de óbitos no âmbito mundial. Estudos recentes têm demonstrado que a monitorização de pressão intracraniana (PIC), como forma de cálculo da pressão de perfusão cerebral (PPC) é uma ferramenta importante para avaliação do fluxo sanguíneo cerebral (FSC), provocando sensível redução nas taxas de mortalidade. Além do TCE, outras patologias ou situações neurocirúrgicas tem utilizado a técnica de monitorização de PIC. A monitorização desse parâmetro foi proposta já na década de 50, onde um tubo com fluido em contato com o líquido cefalorraquidiano (LCR) era introduzido no espaço intracraniano e conectado a um transdutor de pressão externo. Com a evolução da indústria microeletrônica e dos sistemas microeletromecânicos, foi possível colocar os transdutores na ponta do cateter, permitindo uma monitorização menos invasiva, com menos riscos de infecções. Os cateteres atuais com micro transdutor na ponta podem ser divididos em três grupo: straingauge, fibra óptica e pneumático. Cada grupo possui suas características, entretanto o primeiro tem se demonstrado como solução mais robusta e confiável, com boa relação custo benefício. No presente trabalho foi proposto o desenvolvimento de um cateter implantável de monitorização de pressão intracraniana do tipo micro transdutor strain-gauge. Foram construídos protótipos funcionais e submetidos a ensaios de desempenho, especificados em norma técnica para monitorização de pressão sanguínea, a influência da temperatura na medição de pressão, bem como a exatidão das medições. Os processos empregados no trabalho são utilizados comumente na indústria de encapsulamento de semicondutores, porém foram levadas em consideração as especificidades da aplicação, adequando as técnicas disponíveis às geometrias e materiais empregados, considerando a necessidade de utilização de materiais biocompatíveis. / The traumatic brain injury (TBI) is nowadays the third cause of death in the world. Recent studies have shown the intracranial pressure (ICP) monitoring as an important tool for cerebral perfusion pressure (CPP) calculation and cerebral blood flow (CBF) assestment, reducing significantly the mortality statistics. Besides TBI, several others pathologies and neurosurgery conditions have been using the ICP monitoring technique. The proposal of ICP monitoring first appeared on the 50’s, where a tube fulfilled with fluid in contact with cerebrospinal fluid (CSF) was introduced into the intracranial space and connected to an external pressure transducer. With the waves of the microelectronics and microelectromechanical systems (MEMS) industry evolution, it was possible to put the transducer and all the electronics inside the catheter tip, allowing a less invasive monitoring, decreasing the risk of infection. The state of art catheters with micro transducer on the tip can be divided into three groups: strain-gauge, optical fiber and pneumatic. Each group has it’s own characteristics, however the first has been demonstrated as the rugged solution, being reliable, cost effective and with good accuracy. In the present work, it was proposed the development of an strain-gauge micro transducer implantable catheter for intracranial pressure monitoring. Functional prototypes were built and submitted to performance tests, according to the technical standards in the medical equipment area, the temperature influence over the pressure measurements was evaluated, as well as the accuracy. The adopted processes are commonly used in the semiconductor packaging industry, however it was considered the application special requirements, adapting the processes to the geometry and materials used, considering the needs of biocompatible materials.
86

Efectos conductuales y neuroquímicos del consumo de éxtasis y cocaína en ratones adolescentes.

Daza Losada, Manuel 16 June 2009 (has links)
La 3,4-metilendioximetanfetamina (MDMA), una sustancia popularmente conocida como éxtasis, es una droga ilícita consumida habitualmente por adolescentes y adultos jóvenes. Además, el policonsumo es una práctica habitual entre los usuarios de la MDMA, siendo la cocaína una de las drogas más frecuentemente asociadas a esta sustancia. El objetivo del presente trabajo fue evaluar los efectos a corto y largo plazo que se producen tras la administración de la MDMA (5, 10, o 20 mg/kg) sola o en combinación con cocaína (25 mg/kg) en ratones adolescentes. En el estudio sobre el efecto agudo, observamos que ambas drogas administradas individual o simultáneamente incrementan la actividad motora. La dosis alta de MDMA disminuye de los contactos sociales en la prueba de la interacción social afectando igualmente el test de retención de la evitación pasiva. Sin embargo, sólo la co-administración de MDMA en combinación con cocaína produjo un efecto ansiolítico caracterizado por un aumento del tiempo de permanencia en los brazos abiertos del laberinto elevado en cruz. Igualmente, el análisis neuroquímico reveló que los ratones que recibieron MDMA en combinación con cocaína mostraron un incremento en el turnover de DA en el estriado, pero una disminución del de serotonina en la corteza. Los estudios de los efectos a largo plazo, realizados tres semanas después de haber finalizado un tratamiento con MDMA sola o en combinación con cocaína (2 administraciones por día durante 3 días consecutivos), mostraron que los ratones expuestos a la MDMA, sola o más cocaína, incrementaron el tiempo dedicado a las conductas sociales, aunque los que también habían recibido cocaína presentaban además conductas de amenaza. Observamos un efecto neurotóxico en los ratones tratados únicamente con 20 mg/kg de MDMA que mostraron un decremento de la concentración de DA en el estriado, no observándose este deterioro en los tratados además con cocaína. Por otra parte, mediante el condicionamiento de la preferencia de lugar (CPL) confirmamos que la MDMA posee efectos reforzantes y que esta sustancia es capaz de reinstaurar la preferencia de lugar una vez que esta se ha extinguido. La expresión y la reinstauración del CPL inducido por la MDMA dependen de la pauta de condicionamiento que condiciona los efectos neurotóxicos producidos por esta droga. Para finalizar, el tratamiento con MDMA sola o en combinación con cocaína durante la adolescencia favorece los efectos reforzantes de la MDMA durante el periodo adulto. Además, la exposición previa a la cocaína aumenta el tiempo necesario para extinguir la preferencia de lugar inducida por la MDMA. / 3,4-methylene-dioxy-methamphetamine (MDMA), commonly known as ecstasy, is an illicit recreational drug consumed by teenagers and young adults. The poly-drug pattern is the most common among those observed in MDMA users, with cocaine being a frequently associated drug. The aim of the present study was to evaluate the short- and long-term effects of exposure to MDMA (5, 10, or 20 mg/kg), alone or plus cocaine (25 mg/kg), on adolescent mice. In the acute phase, both drugs produced hyperactivity whether administered alone or concurrently. The highest MDMA dose decreased social contacts and affected the passive avoidance task. However, an anxiolytic effect, studied by means of the elevated plus maze and expressed as an increase in the time spent on the open arms, was observed only in animals treated with both cocaine and MDMA. Neurochemical analyses revealed an increase in striatal DA turnover and a decrease in serotonin cortical turnover in mice treated with MDMA plus cocaine. The studies conducted to establish long-term effects, which were performed 3 weeks after a 3-day treatment of two daily injections of MDMA alone or plus cocaine (6 administrations) during the adolescent period, showed that mice treated with MDMA alone and plus cocaine spent more time engaged in social contact, although those also treated with cocaine exhibited threat behaviors. Furthermore, we observed a neurotoxic effect in mice exposed to 20 mg/kg of MDMA, evident in a decrease in DA levels in the striatum, but this effect was not detected in mice additionally treated with cocaine. On the other hand, using the conditioned place preference (CPP), we have confirmed the rewarding effects of MDMA. In addition, we also show that MDMA can produce reinstatement of place preference after the extinction of this response. The expression and reinstatement of MDMA-induced CPP depend on the conditioning protocol, which conditions the neurotoxic effects produced by this drug. Finally, exposure during adolescence to MDMA alone or plus cocaine facilitates the rewarding effects of MDMA in adulthood. Moreover, previous experience of cocaine increases the time required to extinguish the MDMA-induced CPP.
87

Rekonstrukce polyfunkčního domu v Uherském Brodě / Revitalization of multifunctional house in Uhersky Brod

Žajdlík, Tomáš January 2019 (has links)
The subject of this diploma thesis is the elaboration of the revitalization of a multifunctional building in Uherský Brod. The assignment was the elaboration of the project documentation for the issue of the building permit. This building has four floors and one basement. The supporting system of the building is reinforced concrete frame with brickwork. Ceiling structures are from reinforced concrete primary and secondary beams with slabs. Roofs of the building are designed as pitched roof, warm flat roof and double–skinned roof.
88

Entropy Maximisation and Open Queueing Networks with Priority and Blocking.

Kouvatsos, Demetres D., Awan, Irfan U. January 2003 (has links)
No / A review is carried out on the characterisation and algorithmic implementation of an extended product-form approximation, based on the principle of maximum entropy (ME), for a wide class of arbitrary finite capacity open queueing network models (QNMs) with service and space priorities. A single server finite capacity GE/GE/1/N queue with R (R>1) distinct priority classes, compound Poisson arrival processes (CPPs) with geometrically distributed batches and generalised exponential (GE) service times is analysed via entropy maximisation, subject to suitable GE-type queueing theoretic constraints, under preemptive resume (PR) and head-of-line (HOL) scheduling rules combined with complete buffer sharing (CBS) and partial buffer sharing (PBS) management schemes stipulating a sequence of buffer thresholds {N=(N1,¿,NR),0<Ni¿Ni¿1,i=2,¿,R}. The GE/GE/1/N queue is utilised, in conjunction with GE-type first two moment flow approximation formulae, as a cost-effective building block towards the establishment of a generic ME queue-by-queue decomposition algorithm for arbitrary open QNMs with space and service priorities under repetitive service blocking with random destination (RS-RD). Typical numerical results are included to illustrate the credibility of the ME algorithm against simulation for various network topologies and define experimentally pessimistic GE-type performance bounds. Remarks on the extensions of the ME algorithm to other types of blocking mechanisms, such as repetitive service blocking with fixed destination (RS-FD) and blocking-after-service (BAS), are included.
89

Well-Formed and Scalable Invasive Software Composition / Wohlgeformte und Skalierbare Invasive Softwarekomposition

Karol, Sven 26 June 2015 (has links) (PDF)
Software components provide essential means to structure and organize software effectively. However, frequently, required component abstractions are not available in a programming language or system, or are not adequately combinable with each other. Invasive software composition (ISC) is a general approach to software composition that unifies component-like abstractions such as templates, aspects and macros. ISC is based on fragment composition, and composes programs and other software artifacts at the level of syntax trees. Therefore, a unifying fragment component model is related to the context-free grammar of a language to identify extension and variation points in syntax trees as well as valid component types. By doing so, fragment components can be composed by transformations at respective extension and variation points so that always valid composition results regarding the underlying context-free grammar are yielded. However, given a language’s context-free grammar, the composition result may still be incorrect. Context-sensitive constraints such as type constraints may be violated so that the program cannot be compiled and/or interpreted correctly. While a compiler can detect such errors after composition, it is difficult to relate them back to the original transformation step in the composition system, especially in the case of complex compositions with several hundreds of such steps. To tackle this problem, this thesis proposes well-formed ISC—an extension to ISC that uses reference attribute grammars (RAGs) to specify fragment component models and fragment contracts to guard compositions with context-sensitive constraints. Additionally, well-formed ISC provides composition strategies as a means to configure composition algorithms and handle interferences between composition steps. Developing ISC systems for complex languages such as programming languages is a complex undertaking. Composition-system developers need to supply or develop adequate language and parser specifications that can be processed by an ISC composition engine. Moreover, the specifications may need to be extended with rules for the intended composition abstractions. Current approaches to ISC require complete grammars to be able to compose fragments in the respective languages. Hence, the specifications need to be developed exhaustively before any component model can be supplied. To tackle this problem, this thesis introduces scalable ISC—a variant of ISC that uses island component models as a means to define component models for partially specified languages while still the whole language is supported. Additionally, a scalable workflow for agile composition-system development is proposed which supports a development of ISC systems in small increments using modular extensions. All theoretical concepts introduced in this thesis are implemented in the Skeletons and Application Templates framework SkAT. It supports “classic”, well-formed and scalable ISC by leveraging RAGs as its main specification and implementation language. Moreover, several composition systems based on SkAT are discussed, e.g., a well-formed composition system for Java and a C preprocessor-like macro language. In turn, those composition systems are used as composers in several example applications such as a library of parallel algorithmic skeletons.
90

Well-Formed and Scalable Invasive Software Composition

Karol, Sven 18 May 2015 (has links)
Software components provide essential means to structure and organize software effectively. However, frequently, required component abstractions are not available in a programming language or system, or are not adequately combinable with each other. Invasive software composition (ISC) is a general approach to software composition that unifies component-like abstractions such as templates, aspects and macros. ISC is based on fragment composition, and composes programs and other software artifacts at the level of syntax trees. Therefore, a unifying fragment component model is related to the context-free grammar of a language to identify extension and variation points in syntax trees as well as valid component types. By doing so, fragment components can be composed by transformations at respective extension and variation points so that always valid composition results regarding the underlying context-free grammar are yielded. However, given a language’s context-free grammar, the composition result may still be incorrect. Context-sensitive constraints such as type constraints may be violated so that the program cannot be compiled and/or interpreted correctly. While a compiler can detect such errors after composition, it is difficult to relate them back to the original transformation step in the composition system, especially in the case of complex compositions with several hundreds of such steps. To tackle this problem, this thesis proposes well-formed ISC—an extension to ISC that uses reference attribute grammars (RAGs) to specify fragment component models and fragment contracts to guard compositions with context-sensitive constraints. Additionally, well-formed ISC provides composition strategies as a means to configure composition algorithms and handle interferences between composition steps. Developing ISC systems for complex languages such as programming languages is a complex undertaking. Composition-system developers need to supply or develop adequate language and parser specifications that can be processed by an ISC composition engine. Moreover, the specifications may need to be extended with rules for the intended composition abstractions. Current approaches to ISC require complete grammars to be able to compose fragments in the respective languages. Hence, the specifications need to be developed exhaustively before any component model can be supplied. To tackle this problem, this thesis introduces scalable ISC—a variant of ISC that uses island component models as a means to define component models for partially specified languages while still the whole language is supported. Additionally, a scalable workflow for agile composition-system development is proposed which supports a development of ISC systems in small increments using modular extensions. All theoretical concepts introduced in this thesis are implemented in the Skeletons and Application Templates framework SkAT. It supports “classic”, well-formed and scalable ISC by leveraging RAGs as its main specification and implementation language. Moreover, several composition systems based on SkAT are discussed, e.g., a well-formed composition system for Java and a C preprocessor-like macro language. In turn, those composition systems are used as composers in several example applications such as a library of parallel algorithmic skeletons.

Page generated in 0.071 seconds