• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 42
  • 12
  • 10
  • 9
  • 8
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 219
  • 22
  • 20
  • 17
  • 16
  • 16
  • 15
  • 15
  • 14
  • 13
  • 12
  • 12
  • 12
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Rekonstrukce repetitivních elementů DNA / Reconstruction of Repetitive Elements in DNA

Hypský, Jan January 2018 (has links)
Eukaryotic genomes contain a large number of repetitive structures. Their detection and assembly today are the main challenges of bioinformatics. This work includes a classification of repetitive DNA and represents an implementation of a novel de novo assembler focusing on searching and constructing LTR retrotransposons and satellite DNA. Assembler accepts on his input short reads (single or pair-end), obtained from next-generation sequencing machines (NGS). This assembler is based on Overlap Layout Consensus approach.
152

Návrh konstrukčních úprav pro zmírnění následků předního nárazu automobilu do nedeformovatelné bariéry / Design of the structural modifications for mitigating the consequences of the car frontal crash into the rigid barrier

Hošek, Štěpán January 2019 (has links)
There are many collisions on the roads every day. Automotive companies do number of different types of crash-tests to reduce the consequences of these collisions. Crash-tests are supposed to uncover problems of tested vehicles. Then it is possible to propose constructional changes to reduce the consequences of different types of collisions. Indipendent organisations then test productional vehicles according to their standarts and evaluate safety of these vehicles. One of these crash-tests is the small overlap test which is being done by Insurance Institute for Highway Safety. The small overlap test will be the subject of this thesis. Computational modelling of small overlap test is realised for basic variant and for variants with changes. There is also comparison of basic variant and variants with changes.
153

Větrná elektrárna se Savoniovým rotorem pro výrobu elektrické energie / Wind power station with Savonius rotor for production of electric power

Klečka, Jiří January 2009 (has links)
Using of wind energy belongs to one of the fastest developing segments in the power production from renewable resources, which also relates to new studies and development of different types of power stations and brings new ideas to small wind sources spheres too. Savonius rotor is included in these spheres as well. This thesis deals with a complete design, realization and trial measurement of single-step Savonius rotor model. Introduction part treats of basic division and rotor utilization. Design part includes the design as well rotor graphical documentation. In the following part there is data evaluation, which leads to comparison with theoretical calculations. The final part includes an examination of possible utilization of Savonius rotor for generation of electricity.
154

Untersuchungen zur Bestimmung der Übergreifungslängen textiler Bewehrungen aus Carbon in Textilbeton (TRC)

Lorenz, Enrico, Ortlepp, Regine January 2011 (has links)
Für das Funktionieren von Verstärkungsschichten aus Textilbeton ist eine sichere Kraftübertragung zwischen den einzelnen Verbundbaustoffen sicherzustellen. Aufgrund der sehr hohen Garnzugfestigkeiten sind besonders bei Verwendung textiler Bewehrungen aus Carbon sehr effektive Verstärkungen herstellbar. In Textilbetonbauteilen sind hierbei im Regelfall Übergreifungsstöße der textilen Bewehrungslagen nicht zu vermeiden. Der vorliegende Beitrag befasst sich daher mit der experimentellen und analytischen Bestimmung der Übergreifungslängen textiler Bewehrungsstrukturen innerhalb von Textilbetonverstärkungsschichten. / A safe introduction and transmission of the acting forces is crucial for the functioning of composite materials. Because of the very high yarn tensile strengths of textile reinforcements made of carbon, the manufacturing of very effective TRC strengthening layers is possible. In TRC members, overlap joints within the textile layers usually cannot be avoided. This contribution deals with the experimental and analytical determination of the lap lengths of textile fabrics within a textile reinforced concrete strengthening layer.
155

Nu är det din tur att tala - Designförslag för smidigare turtagning i digitala konferensverktyg

Börjesson, Erika, Heikkilä Svensson, Sofia January 2021 (has links)
Användningen av digitala konferensverktyg (DKV) har ökat under pandemin Covid-19 ochanvändare har rapporterat att de upplever kommunikationen mer ansträngande än öga-mot-öga. En utmaning i DKV är att det inte går att rikta uppmärksamhet mot specifika samtalsdeltagare för att det inte går att skapa ögonkontakt vilket försvårar turtagning eftersom det är på så vis turen fördelas mellan samtalsdeltagare. Tidigare forskning visar att turtagning stöds av icke-verbala signaler och främst ögonkontakt och att stöd för turtagning i DKV kan designas utifrån att en ögonscanner som läser av var samtalsdeltagare tittar implementeras. Studien syftar till att undersöka hur olika designval vid design av DKV kan användas för att förbättra användaresupplevelser av turtagning vid samtal mellan flera parter i DKV. För att undersöka nya sätt att designa DKV har en designorienterad studie genomförts där designförslag formats baserade på ögonkontakt och dessa har utvärderats tillsammans med användare. Studiens resultat påvisar att turtagning kan stödjas i flerpartssamtal i DKV genom att addera rörliga visuella element som visar vem som talar nu och vem denne etablerar ögonkontakt med för att lämna över turen. Tre designförslag presenteras för hur detta kan göras. / The use of Digital conference tools (DKV) has increased because of the pandemic Covid-19 and DKV users has reported that the communication is more exhausting than communication face-to-face. A challenge in DKV is the inability to direct attention towards specific conversational participants because of absence of eye contact which makes turn-taking difficult since that is how the turn is allocated between conversational participants. Related work shows that turn-taking is supported by non-verbal signals, primarily eye-contact, and that turntaking can be supported by implementing an eyescanner that interpret where conversational participants direct their gaze. The aim of the study is to investigate how different design choices when designing DKV can be used to improve users’ experiences of turn-taking in multi-party conversations in DKV. In order to explore new ways of designing DKV design research has been used to empirically evaluate suggestions for design based on eyecontact. The result of the study shows that turn-taking can be supported in multi-party conversations in DKV by adding moving visual elements that shows who is the current speaker and who this person is establishing eye contact with to allocate the turn. Three suggestions for design are presented for how this could be done.
156

Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs / Stafettlöpning med X.509-dagsländor : En Analys av Certifikatutbyten och Giltighetsperioder i HTTPS-certifikatloggar

Bruhner, Carl Magnus, Linnarsson, Oscar January 2020 (has links)
Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. However, this limits the certificate lifetime and gives less flexibility in the timing of certificate replacements. In this thesis, we use publicly available network logs from Rapid7's Project Sonar to provide an overview of the current state of certificate usage behavior. Specifically, we look at the Let's Encrypt mass revocation event in March 2020, where millions of certificates were revoked with just five days notice. In general, we show how this kind of datasets can be used, and as a deeper exploration we analyze certificate validity, lifetime and use of certificates with overlapping validity periods, as well as discuss how our findings relate to industry standard and current security trends. Specifically, we isolate automated certificate services such as Let's Encrypt and cPanel to see how their certificates differ in characteristics from other certificates in general. Based on our findings, we propose a set of rules to help improve the trust in certificate usage and strengthen security online, introducing an Always secure policy aligning certificate validity with revocation time limits in order to replace revocation requirements and overcoming the fact that mobile devices today ignore this very important security feature. To round things off, we provide some ideas for further research based on our findings and what we see possible with datasets such as the one researched in this thesis.
157

Vermeidung von Interferenzen bei der Konsolidierung von Diensten auf zeitlich geteilten Ressourcen

Hähnel, Markus 09 July 2019 (has links)
Der steigende Bedarf an Internettraffic, Speicher und Verarbeitung benötigt immer mehr Hardwareressourcen. Zusätzlich überdimensionieren Datenzentrumbetreiber ihre Infrastruktur, um auch bei Bedarfsspitzen hinreichend Leistung zur Verfügung stellen zu können. Das führt zu einer geringen Ressourcenauslastung und damit zu einem erhöhten Energieverbrauch. Durch Konsolidierung der aktiven Dienste auf einer Teilmenge der physischen Server zu Zeiten geringer Auslastung können zum einen nicht benötigte Server ausgeschaltet werden und zum anderen sind die verbleibenden Server besser ausgelastet. Jedoch müssen sich Dienste nach der Konsolidierung die physischen Ressourcen mit anderen Diensten teilen. Durch Wechselwirkungen auf gemeinsam genutzten Ressourcen, sogenannten Interferenzen, verschlechtert sich die Performanz der Dienste. In dieser Arbeit wird auf Interferenzen eingegangen, die aufgrund des zeitlich variierenden Ressourcenverbrauchs von Diensten entstehen. Am Beispiel von der Rechenzeit einzelner Prozessorkerne wird mit Hilfe des Cutting Stock Problems mit nichtdeterministischen Längen (ND-CSP) der Energieverbrauch durch die Zahl der benötigten Ressourcen um bis zu 64,1% gesenkt. Durch Berücksichtigung der zeitlichen Variation des Ressourcenverbrauchs verbessert sich die Performanz um bis zu 59,6% gegenüber anderen Konsolidierungsstrategien. Außerdem wird das Konzept des Überlappungskoeffizienten eingeführt. Dieser beschreibt die probabilistische Beziehung zweier parallel laufender Dienste, inwiefern sie gleichzeitig aktiv sind. Sind Dienste nicht gleichzeitig aktiv, können sie ohne zu erwartende Interferenzen konsolidiert werden. Umgekehrt sollte die Konsolidierung gleichzeitig aktiver Dienste vermieden werden. Die Analyse eines Datenzentrums von Google zeigt, dass beide Szenarien einen signifikanten Anteil darstellen. Zur Berücksichtigung des Überlappungskoeffizienten wird das ND-CSP erweitert und näherungsweise gelöst. Hier zeigt sich jedoch weder eine Verbesserung noch eine Verschlechterung der Performanz der Dienste bei gleichem Energieverbrauch. Perspektivisch, bei der exakten Lösung und weiterer Optimierung, können aber damit Dienste eventuell so allokiert werden, dass ihre Interferenzen reduziert oder im Idealfall sogar weitgehend ausgeschlossen werden können. / An increasing portion of IP traffic is processed and stored in data centers. However, data center providers tend to over-provision their resources. Therefore, underutilized resources unnecessarily waste energy. Consolidating services allows them to be executed within a subset of the entire data center and to turn off the unnecessary, idling machines. Additionally, the remaining machines are properly utilized and, hence, more energy-efficient. Nevertheless, this has to be balanced against degrading the quality of service due to the shared resources of the physical machines after the consolidation. This thesis focuses on the above mentioned interferences due to fluctuating workloads. These are treated in the framework of the Cutting Stock Problem, where items with non-deterministic length are introduced. This reduces the power consumption by minimizing the necessary, active resources by up to 64.1% for the exemplary CPU time of individual cores. Thanks to the awareness of workload fluctuations, it improves the performance of services by up to 59.6% compared to other allocation schemes. Additionally, the concept of 'overlap coefficients' is introduced, which describes the probabilistic relation between two services which run in parallel. The more often these services are active at the same time the higher the overlap coefficient and vice versa. Services which are not active at the same time can be consolidated without any expected interference effects, while these with common activity periods should not be consolidated. The analysis of one of Google's data centers unveils that most of the services can be mapped onto one of the two patterns, while few with undetermined relation remain. The ND-CSP is extended by the 'overlap coefficient' and approximatively solved. In contrast to the former ND-CSP, neither an improvement nor a deterioration of the consolidation results is obtained. In the future, the services can be allocated with reduced or even without interference effects if an exact solution or a multi-objective optimization is applied.
158

Introduction to Salivary Gland Lesions Cytology

Al-Abbadi, Mousa A. 09 March 2011 (has links)
No description available.
159

Trajectoires de numérisation adaptatives en contexte in-situ / Adaptive scanning strategies for on-machine part inspection

Phan, Nguyen Duy Minh 20 March 2019 (has links)
Dans le contexte d'inspection du procédé d'usinage, l'intégration des opérations de mesure au processus de fabrication permet de réaliser les actions correctives à appliquer aux opérations de fabrication et ainsi de diminuer le temps de cycle de fabrication. Nous nous sommes intéressés dans ces travaux à la réalisation de la mesure on-machine par capteur laser plan dans une MOCN 5 axes. La problématique liée à la mesure on-machine concerne la proposition d'une méthode de planification de trajectoires qui résulte d'un compromis entre le temps de mesure et la qualité des données acquises.Nous proposons dans un premier temps un format de description des paramètres de la trajectoire du capteur permettant d'intégrer l'orientation de la broche dans la machine. Comme la détermination de point de vue dans notre contexte est adoptée pour le capteur laser plan, les contraintes de visibilité et de qualité sont appliquées à la position de ligne laser sur la surface. Nous proposons de réaliser d'un simulateur de trajectoires de numérisation. Ce simulateur nous permet d'identifier les zones de la pièce correctement numérisées en termes des critères de visibilité et de qualité. Il permet à la fois de valider la trajectoire avant l'exécution de la numérisation sur le système physique et d'aider à la génération de trajectoire de numérisation.Pour contrôler le temps et la qualité de numérisation, une méthode de planification de la trajectoire de numérisation pour une structure 6 axes, ISOvScan, est proposée. Dans cette méthode, la zone de recouvrement entre deux passes consécutives est constante, l'orientation du capteur en chaque point piloté est gérée afin d'assurer la qualité de numérisation et de maximiser le taux de couverture du laser. La méthode repose sur l'utilisation de la transformation conforme au sens des moindres carrés (Least Squares Conformal Maps-LSCM) pour transformer la surface 3D en un espace 2D. Le calcul de la trajectoire de numérisation peut alors être effectué plus simplement dans cet espace 2D.Comme la cinématique de la machine-outil 5 axes ne permet pas d'appliquer directement la trajectoire 6 axes créée par ISOvScan, les méthodes pour générer une trajectoire du capteur laser adaptée à la machine-outil 5-axes sont proposées dans ces travaux. Une application de numérisation sur la machine-outil 5-axes est réalisé pour vérifier la validité de la trajectoire de numérisation 5 axes. / In the context of the inspection of the machining process, the integration of the measurement operations into the manufacturing process allows to realize the corrective actions applied to the manufacturing operations and thus to reduce the manufacturing cycle time. Our objective in this work is to realize an on-machine measurement (OMM) by laser plane sensor in a 5-axis machine-tool. The problem related to OMM concerns the proposition of a scan path planning method that results from a compromise between the measurement time and the quality of the data acquired.First of all, we propose a description format of the parameters of the sensor path allowing to integrate the orientation of the spindle in the machine. As the determination of view point in our context is adopted for the laser plane sensor, the visibility and quality constraints are applied to the digitizing laser line position on the surface. We propose to realize a simulator of digitizing path. This simulator allows us to identify correctly the areas of the digitized part in terms of the scanning visibility and quality. It allows to validate the scan path before executing the scan on the physical system and to help the scan path generation.To control the scan time and quality, a scan path planning method for a 6-axis structure, ISOvScan, is proposed. In this method, the overlap zone between two consecutive passes is constant, the orientation of the sensor at each driven point is managed in order to ensure the scanning quality and to maximize the coverage rate of the laser. The method relies on the use of the Least Squares Conformal Maps (LSCM) to transform the 3D surface into a 2D space. The calculation of the scan path can then be done more simply in this 2D space.Since the kinematics of the machine tool does not enable to directly apply the 6 axes scan path created by ISOvScan, the methods for generating a laser scan path adapted to 5-axis machine-tool are proposed in this work. An application on the 5-axis machine-tool is performed to validate this adapted scan path.
160

Exploring Faculty Responses to Student Plagiarism

McCorkle, Sarah 02 June 2020 (has links)
No description available.

Page generated in 0.0331 seconds