• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 37
  • 31
  • 6
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 140
  • 22
  • 20
  • 20
  • 18
  • 16
  • 16
  • 15
  • 14
  • 13
  • 13
  • 12
  • 11
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Calibracao de uma linha de emanacao para determinacao de sup(222) Rn em amostras de agua do mar

FARIAS, LUCIANA A. 09 October 2014 (has links)
Made available in DSpace on 2014-10-09T12:47:01Z (GMT). No. of bitstreams: 0 / Made available in DSpace on 2014-10-09T14:08:36Z (GMT). No. of bitstreams: 1 08290.pdf: 1216858 bytes, checksum: 06f9803f0f94d1535cd74d6f3549a749 (MD5) / Dissertacao (Mestrado) / IPEN/D / Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
62

Informatização e unificação dos programas de proteção radiológica: monitoramento das radiações ionizantes e sua otimização / Web-based system to unify the radiological protection programs: ionizing radiation monitoring and optimization

LEVY, DENISE S. 12 November 2015 (has links)
Submitted by Claudinei Pracidelli (cpracide@ipen.br) on 2015-11-12T10:44:49Z No. of bitstreams: 0 / Made available in DSpace on 2015-11-12T10:44:49Z (GMT). No. of bitstreams: 0 / Um programa de monitoramento para fins de proteção radiológica deve mostrar como ele auxilia na obtenção e demonstração de um grau de proteção adequado e comprovar que as condições de trabalho continuam satisfatórias com o transcorrer do tempo. Para o controle operacional das exposições à radiação ionizante em qualquer local de trabalho, a Comissão Internacional de Proteção Radiológica (CIPR) recomenda um programa de proteção radiológica operacional, proporcional ao grau de risco, para garantir o gerenciamento efetivo das medidas necessárias para se satisfazer o principio da otimização. O presente trabalho de pesquisa tem como premissa o potencial das Tecnologias da Informação e Comunicação (TIC) como ferramenta para a comunicação e disseminação do conhecimento em Proteção Radiológica. O trabalho inclui a informatização da filosofia e técnica do monitoramento e sua otimização, unificando e inter-relacionando informações advindas de diversas publicações nacionais e internacionais, oferecendo às instalações radiativas brasileiras um veículo completo para informação e pesquisa, que permite dimensionar os esforços de otimização tornando-os eficazes e justificados. O sistema oferece ainda tópicos de discussões no intuito de ampliar o repertório dos profissionais do campo da proteção radiológica, suscitando novas reflexões a favor da segurança. Trata-se dos temas desenvolvidos nesta tese, a saber: a necessidade de um monitoramento auditor e discussões mais aprofundadas sobre as exposições potenciais. As reflexões propostas na presente tese vêm ao encontro das novas exigências internacionais, propondo ações passíveis de serem incorporadas na prática laboral. Dentro dos princípios da proteção radiológica, a implementação de um programa de monitoramento auditor permite avaliar se os critérios e ações previamente estabelecidas pelo Serviço de Proteção Radiológica são ou não atendidos, se foram implementados com eficácia e se permanecem adequados. Os fatos resultantes dos procedimentos de auditoria auxiliam a detectar deficiências no processo, possibilitando conclusões e recomendações diante de possíveis fatores desencadeadores de exposições indevidas. Por meio de exames sistemáticos das atividades realizadas em cada tipo de monitoramento, a auditoria infere segurança ao processo, respaldando o trabalhador na realização do monitoramento relacionado com a tarefa e respaldando a instalação, que empreende ações responsáveis a favor da segurança. Em relação às exposições potenciais, somente duas publicações da CIPR são expressivas e desenvolvem o assunto. Entretanto, ainda que forneçam a fundamentação teórica, são incompletas em seus exemplos. Há uma grande falta de conhecimento das probabilidades de falhas, o que atualmente constitui um vasto campo de pesquisa da proteção radiológica. A presente tese propõe, a partir de árvores de falhas, caminhos que auxiliam a quantificar probabilisticamente a ocorrência das exposições potenciais e a probabilidade de se atingir um determinado valor da dose. Acreditamos que o potencial das TIC contribuirá largamente para a disseminação da informação para as instalações radiativas, estimulando o desenvolvimento neste país de grandes extensões territoriais, onde permanece um desafio oferecer o acesso à informação ao maior número de pessoas possível, minimizando custos e maximizando resultados. / Tese (Doutorado em Tecnologia Nuclear) / IPEN/T / Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP
63

Detecting central-venous oxygen desaturation without a central-venous catheter: utility of the difference between invasively and non-invasively measured blood pressure / 観血的動脈圧と非観血的動脈圧の差を利用した中心静脈血酸素飽和度の推定

Kumasawa, Junji 23 September 2016 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(社会健康医学) / 甲第19969号 / 社医博第74号 / 新制||社医||9(附属図書館) / 33065 / 京都大学大学院医学研究科社会健康医学系専攻 / (主査)教授 小池 薫, 教授 福田 和彦, 教授 木村 剛 / 学位規則第4条第1項該当 / Doctor of Public Health / Kyoto University / DFAM
64

MNoC : A Network on Chip for Monitors

Madduri, Sailaja 01 January 2008 (has links) (PDF)
As silicon processes scale, system-on-chips (SoCs) will require numerous hardware monitors that perform assessment of physical characteristics that change during the operation of a device. To address the need for high-speed and coordinated transport of monitor data in a SoC, we develop a new interconnection network for monitors - the monitor network on chip (MNoC). Data collected from the monitors via MNoC is collated by a monitor executive processor (MEP) that controls the operation of the SoC in response to monitor data. In this thesis, we developed the architecture of MNoC and the infrastructure to evaluate its performance and overhead for various network parameters. A system level architectural simulation can then be performed to ensure that the latency and bandwidth provided by MNoC are sufficient to allow the MEP to react in a timely fashion. This typically translates to a system level benefit that can be assessed using architectural simulation. We demonstrate in this thesis, the employment of MNoC for two specific monitoring systems that involve thermal and delay monitors. Results show that MNoC facilitates employment of a thermal-aware dynamic frequency scaling scheme in a multicore processor resulting in improved performance. It also facilitates power and performance savings in a delay -monitored multicore system by enabling a better than worst case voltage and frequency settings for the processor.
65

Protecting Network Processors with High Performance Logic Based Monitors

Kumarapillai Chandrikakutty, Harikrishnan 01 January 2013 (has links) (PDF)
Technological advancements have transformed the way people interact with the world. The Internet now forms a critical infrastructure that links different aspects of our life like personal communication, business transactions, social networking, and advertising. In order to cater to this ever increasing communication overhead there has been a fundamental shift in the network infrastructure. Modern network routers often employ software programmable network processors instead of ASIC-based technology for higher throughput performance and adaptability to changing resource requirements. This programmability makes networking infrastructure vulnerable to new class of network attacks by compromising the software on network processors. This issue has resulted in the need for security systems which can monitor the behavior of network processors at run time. This thesis describes an FPGA-based security monitoring system for multi-core network processors. The implemented security monitor improves upon previous hardware monitoring schemes. We demonstrate a state machine based hardware programmable monitor which can track program execution flow at run time. Applications are analyzed offline and a hash of the instructions is generated to form a state machine sequence. If the state machine deviates from expected behavior, an error flag is raised, forcing a network processor reset. For testing purposes, the monitoring logic along with the multi-core network processor system is implemented in FPGA logic. In this research, we modify the network processor memory architecture to improve security monitor functionality. The efficiency of this approach is validated using a diverse set of network benchmarks. Experiments are performed on the prototype system using known network attacks to test the performance of the monitoring subsystem. Experimental results demonstrate that out security monitor approach provides an efficient monitoring system in detecting and recovering from network attacks with minimum overhead while maintaining line rate packet forwarding. Additionally, our monitor is capable of defending against attacks on processor with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop packets without otherwise affecting regular network traffic when an attack occurs.
66

Security Architecture and Dynamic Signal Selection for Post-Silicon Validation

Raja, Subashree 05 October 2021 (has links)
No description available.
67

Distraction, Enjoyment, and Motivation During an Indoor Cycling Unit of High School Physical Education

Higginson, Kelsey 01 March 2016 (has links) (PDF)
With the increased rate of overweight and obese youth in the United States many people began looking for ways to increase youth exercise quality and habits; one such way was by using an external distraction during exercise to increase personal motives toward exercise. This study involved 81 high school aged students enrolled in a required physical education class. Students rode an indoor cycling bike for 20 minutes while wearing a heart rate monitor. They were told to maintain a heart rate between their 70 and 79% maximum heart rate. Every 5 minutes students were asked to rate how hard they thought they were working, using a modified rating of perceived exertion scale, and how much they were enjoying the activity. At the end of each day, students were asked if they would continue to cycle if given the option. The first two days had no distraction, days 3 and 4 had class selected music playing, and days 5 and 6 had a class selected movie showing at the front of the room. There is no significant difference in heart rate or rating of perceived exertion between no distraction and adding music, but when a movie is played, both heart rate and rating of perceived exertion decrease significantly. However, a similar decrease in heart rate and rating of perceived exertion is also seen in the control group on the same days of data collection. Including a distraction while exercising has no significant effect on enjoyment of the activity or intention to persist in the activity. Females have significantly higher intrinsic motivation levels throughout the course of data collection, and males' intrinsic motivation significantly declines with each progressive condition. As the decline in heart rate and rating of perceived exertion is seen in both control and treatment groups the decline is possibly influenced by unaccounted for factors such as hard bike seats, boredom, or teacher pedagogy. These factors could potentially account for the decrease in intrinsic motivation during the last two days of data collection.
68

The Difference in HR Response between Track and Treadmill Running at a Pre-determined, Self-selected Pace

Corey, Marisha 22 March 2005 (has links) (PDF)
The purpose of this study was to determine whether or not differences exist in heart rate (HR) between jogging on the track and jogging on the treadmill at the same speed. Twenty-four college-age (19-31 years old) male (n = 12) and female (n = 12) recreational runners volunteered to participate in this study. Each participant performed a maximal graded exercise test (GXT) and four exercise sessions. During the first exercise session, participants completed a 1-mile steady-state jog on either the track or treadmill at a self-selected submaximal pace that could be maintained for 30 minutes. The following three exercise sessions were completed at the same pace as the first exercise session. Two of the exercise sessions were performed on the treadmill and two were performed on an indoor track. The order of the four sessions were counterbalanced. Participants were randomly assigned to an order of sessions. Heart rate was recorded every minute and the participants were asked to give an RPE at the end of every session. Statistical analysis revealed no significant differences in pace (mph) between the trials within the two track or two treadmill trials (p = 0.5812), in the HR response. Therefore, gender and trials were excluded from the final model, and the final model included only the treatment effect (track, treadmill). There was a significant treatment effect (F 1,94 = 39.126, p < 0.0001) indicating that significant differences in the HR responses between track and treadmill jogging at the same pace. Jogging on the treadmill elicited an average HR of 5.16 bpm (S.E. = 0.82) less than that observed while jogging on an indoor track at the same pace. We conclude that jogging on the treadmill and track at the same, self-selected speed results in HR values that differ significantly by 5 bpm. Differences in air resistance, biomechanics, and muscle activity most likely contributed to the observed differences in HR. The results of this study are applicable to various individuals who often train or exercise on the treadmill or overground. Use of a HR monitor is recommended to determine personal responses to exercise on a treadmill and overground.
69

Trusted Unmanned Aerial System Operations

Theyyar Maalolan, Lakshman 03 June 2020 (has links)
Proving the correctness of autonomous systems is challenged by the use of non-deterministic artificial intelligence algorithms and ever-increasing lines of code. While correctness is conventionally determined through analysis and testing, it is impossible to train and test the system for all possible scenarios or formally analyze millions of lines of code. This thesis describes an alternative method that monitors system behavior during runtime and executes a recovery action if any formally specified property is violated. Multiple parallel safety monitors synthesized from linear temporal logic (LTL) formulas capturing the correctness and liveness properties are implemented in isolated configurable hardware to avoid negative impacts on the system performance. Model checking applied to the final implementation establishes the correctness of the last line of defense against malicious attacks and software bugs. The first part of this thesis illustrates the monitor synthesis flow with rules defining a three-dimensional cage for a commercial-off-the-shelf drone and demonstrates the effectiveness of the monitoring system in enforcing strict behaviors. The second part of this work defines safety monitors to provide assurances for a virtual autonomous flight beyond visual line of sight. Distinct sets of monitors are called into action during different flight phases to monitor flight plan conformance, stability, and airborne collision avoidance. A wireless interface supported by the proposed architecture enables the configuration of monitors, thereby eliminating the need to reprogram the FPGA for every flight. Overall, the goal is to increase trust in autonomous systems as demonstrated with two common drone operations. / Master of Science / Software code in autonomous systems, like cars, drones, and robots, keeps growing not just in length, but also in complexity. The use of machine learning and artificial intelligence algorithms to make decisions could result in unexpected behaviors when encountering completely new situations. Traditional methods of verifying software encounter difficulties while establishing the absolute correctness of autonomous systems. An alternative to proving correctness is to enforce correct behaviors during execution. The system's inputs and outputs are monitored to ensure adherence to formally stated rules. These monitors, automatically generated from rules specified as mathematical formulas, are isolated from the rest of the system and do not affect the system performance. The first part of this work demonstrates the feasibility of the approach by adding monitors to impose a virtual cage on a commercially available drone. The second phase of this work extends the idea to a simulated autonomous flight with a predefined set of points that the drone must pass through. These points along with the necessary parameters for the monitors can be uploaded over Bluetooth. The position, speed, and distance to nearby obstacles are independently monitored and a recovery action is executed if any rule is violated. Since the monitors do not assume anything about the source of the violations, they are effective against malicious attacks, software bugs, and sensor failures. Overall, the goal is to increase confidence in autonomous systems operations.
70

A Development Platform to Evaluate UAV Runtime Verification Through Hardware-in-the-loop Simulation

Rafeeq, Akhil Ahmed 17 June 2020 (has links)
The popularity and demand for safe autonomous vehicles are on the rise. Advances in semiconductor technology have led to the integration of a wide range of sensors with high-performance computers, all onboard the autonomous vehicles. The complexity of the software controlling the vehicles has also seen steady growth in recent years. Verifying the control software using traditional verification techniques is difficult and thus increases their safety concerns. Runtime verification is an efficient technique to ensure the autonomous vehicle's actions are limited to a set of acceptable behaviors that are deemed safe. The acceptable behaviors are formally described in linear temporal logic (LTL) specifications. The sensor data is actively monitored to verify its adherence to the LTL specifications using monitors. Corrective action is taken if a violation of a specification is found. An unmanned aerial vehicle (UAV) development platform is proposed for the validation of monitors on configurable hardware. A high-fidelity simulator is used to emulate the UAV and the virtual environment, thereby eliminating the need for a real UAV. The platform interfaces the emulated UAV with monitors implemented on configurable hardware and autopilot software running on a flight controller. The proposed platform allows the implementation of monitors in an isolated and scalable manner. Scenarios violating the LTL specifications can be generated in the simulator to validate the functioning of the monitors. / Master of Science / Safety is one of the most crucial factors considered when designing an autonomous vehicle. Modern vehicles that use a machine learning-based control algorithm can have unpredictable behavior in real-world scenarios that were not anticipated while training the algorithm. Verifying the underlying software code with all possible scenarios is a difficult task. Runtime verification is an efficient solution where a relatively simple set of monitors validate the decisions made by the sophisticated control software against a set of predefined rules. If the monitors detect an erroneous behavior, they initiate a predetermined corrective action. Unmanned aerial vehicles (UAVs), like drones, are a class of autonomous vehicles that use complex software to control their flight. This thesis proposes a platform that allows the development and validation of monitors for UAVs using configurable hardware. The UAV is emulated on a high-fidelity simulator, thereby eliminating the time-consuming process of flying and validating monitors on a real UAV. The platform supports the implementation of multiple monitors that can execute in parallel. Scenarios to violate rules and cause the monitors to trigger corrective actions can easily be generated on the simulator.

Page generated in 0.0496 seconds