• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 6
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 46
  • 7
  • 7
  • 7
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Avaliação da manutenção da dimensão de rebordo alveolar após enxerto aloplástico de composto ósseo de rícino pós-extração dental em rato, estudo radiográfico e histológico / Evaluation of ridge preservation after castor bean alloplastic polymer bone graft post-extraction sockets of rats – a radiographical and histological study

Castro, Fernando Silva de 22 February 2006 (has links)
O objetivo deste trabalho é o estudo do comportamento do enxerto de composto ósseo de rícino e sua eficácia na manutenção do rebordo alveolar. Através de avaliações histológicas e radiológicas. A cicatrização após as extrações dentárias faz com que o osso da região entre em um processo de atrofia. Existem técnicas preventivas para manutenção das dimensões do sitio de extração. As técnicas podem ser: implantes dentários, regeneração óssea guiada, enxertos ósseos e estas técnicas combinadas. A técnica de enxerto ósseo se baseia na ocupação do espaço, pelo biomaterial. O composto ósseo de rícino se destaca entre os aloplásticos, pois é de origem vegetal e tem se mostrado eficiente biomaterial na área odontológica. Foram utilizados neste trabalho 19 ratos Wistar. Dezoito ratos tiveram o incisivo lateral esquerdo extraídos e quatorze deles receberam o implante de composto ósseo de rícino, formando o grupo experimental, estes foram divididos em dois períodos de sacrifício, 30 e 45 dias, assim como o grupo de controle que não recebeu nenhum tipo de tratamento. O último animal é o animal padrão ouro que serviu de exemplo de estrutura íntegra. Os animais foram mortos humanitariamente e tiveram os fragmentos teciduais removidos a fim de serem analisados histologicamente sob microscopia óptica. Foram feitas tomadas radiográficas em filme odontológico de perfil e ântero-posterior imediatamente após a extração e imediatamente após a morte. As peças anatômicas foram retiradas e processadas para confecção de lâminas. Foi comparado radiograficamente e histologicamente o reparo do alvéolo preenchido por composto ósseo de rícino de uso odontológico com reparo fisiológico de outro alvéolo de extração dentária preenchido apenas com o coágulo formado nos dois grupos experimentais. O resultado evidenciou a manutenção dimensão alveolar pós-extração dentária nos grupos que receberam o composto ósseo de rícino. A técnica de preenchimento mostrou ser eficiente, tendo como resultado uma diminuição mínima das dimensões do alvéolo pós-extração dentária. Neste presente trabalho a técnica de preenchimento de alvéolo com o enxerto de composto ósseo de rícino se apresentou eficaz na manutenção das dimensões do osso alveolar / The aim of this work is to study the behavior of the castor bean alloplastic polymer bone graft on ridge preservation. The dental extraction cicatrization process is an atrophy process. There are preventive techniques for maintenance of the dimensions of the alveolar ridge. These techniques are: dental implant, guided bone regeneration, bone graft and the combination of these techniques. The technique of bone graft is based on filling the space with the biomaterial. The castor bean alloplastic polymer bone graft surpasses the alloplastic because it is of vegetable origin and shown efficient biomaterial in the odontological area. Eighteen rats had the left lateral incisor extracted and fourteen of them received castor bean alloplastic polymer bone graft in the extraction socket, forming the experimental group. These were divided in two groups with different sacrifice time, 30 and 45 days. The control group that did not receive any treatment. The last animal is the standard gold group that served as example of complete structure. The animals were killed and they had the tissue fragments removed in order to have histological analysis under optical microscopy. It was taken occlusal radiographs and lateral cefalometric radiographs in odontological films profile immediately after the extraction and after the death. The anatomical pieces were removed and processed for making of slices. It was evaluate histologically and radiographically the wound of the extraction sockets with the graft compared to physiologic repair. The result evidenced the maintenance dimension alveolar dental sockets in the groups that received castor bean alloplastic polymer bone graft. The graft technique showed to be efficient, resulting in a minimum decrease of the dimensions of the extraction sockets. In this present work the graft technique with castor bean alloplastic polymer bone graft came effective in the maintenance of the dimensions of the alveolar bone
32

Avaliação da manutenção da dimensão de rebordo alveolar após enxerto aloplástico de composto ósseo de rícino pós-extração dental em rato, estudo radiográfico e histológico / Evaluation of ridge preservation after castor bean alloplastic polymer bone graft post-extraction sockets of rats – a radiographical and histological study

Fernando Silva de Castro 22 February 2006 (has links)
O objetivo deste trabalho é o estudo do comportamento do enxerto de composto ósseo de rícino e sua eficácia na manutenção do rebordo alveolar. Através de avaliações histológicas e radiológicas. A cicatrização após as extrações dentárias faz com que o osso da região entre em um processo de atrofia. Existem técnicas preventivas para manutenção das dimensões do sitio de extração. As técnicas podem ser: implantes dentários, regeneração óssea guiada, enxertos ósseos e estas técnicas combinadas. A técnica de enxerto ósseo se baseia na ocupação do espaço, pelo biomaterial. O composto ósseo de rícino se destaca entre os aloplásticos, pois é de origem vegetal e tem se mostrado eficiente biomaterial na área odontológica. Foram utilizados neste trabalho 19 ratos Wistar. Dezoito ratos tiveram o incisivo lateral esquerdo extraídos e quatorze deles receberam o implante de composto ósseo de rícino, formando o grupo experimental, estes foram divididos em dois períodos de sacrifício, 30 e 45 dias, assim como o grupo de controle que não recebeu nenhum tipo de tratamento. O último animal é o animal padrão ouro que serviu de exemplo de estrutura íntegra. Os animais foram mortos humanitariamente e tiveram os fragmentos teciduais removidos a fim de serem analisados histologicamente sob microscopia óptica. Foram feitas tomadas radiográficas em filme odontológico de perfil e ântero-posterior imediatamente após a extração e imediatamente após a morte. As peças anatômicas foram retiradas e processadas para confecção de lâminas. Foi comparado radiograficamente e histologicamente o reparo do alvéolo preenchido por composto ósseo de rícino de uso odontológico com reparo fisiológico de outro alvéolo de extração dentária preenchido apenas com o coágulo formado nos dois grupos experimentais. O resultado evidenciou a manutenção dimensão alveolar pós-extração dentária nos grupos que receberam o composto ósseo de rícino. A técnica de preenchimento mostrou ser eficiente, tendo como resultado uma diminuição mínima das dimensões do alvéolo pós-extração dentária. Neste presente trabalho a técnica de preenchimento de alvéolo com o enxerto de composto ósseo de rícino se apresentou eficaz na manutenção das dimensões do osso alveolar / The aim of this work is to study the behavior of the castor bean alloplastic polymer bone graft on ridge preservation. The dental extraction cicatrization process is an atrophy process. There are preventive techniques for maintenance of the dimensions of the alveolar ridge. These techniques are: dental implant, guided bone regeneration, bone graft and the combination of these techniques. The technique of bone graft is based on filling the space with the biomaterial. The castor bean alloplastic polymer bone graft surpasses the alloplastic because it is of vegetable origin and shown efficient biomaterial in the odontological area. Eighteen rats had the left lateral incisor extracted and fourteen of them received castor bean alloplastic polymer bone graft in the extraction socket, forming the experimental group. These were divided in two groups with different sacrifice time, 30 and 45 days. The control group that did not receive any treatment. The last animal is the standard gold group that served as example of complete structure. The animals were killed and they had the tissue fragments removed in order to have histological analysis under optical microscopy. It was taken occlusal radiographs and lateral cefalometric radiographs in odontological films profile immediately after the extraction and after the death. The anatomical pieces were removed and processed for making of slices. It was evaluate histologically and radiographically the wound of the extraction sockets with the graft compared to physiologic repair. The result evidenced the maintenance dimension alveolar dental sockets in the groups that received castor bean alloplastic polymer bone graft. The graft technique showed to be efficient, resulting in a minimum decrease of the dimensions of the extraction sockets. In this present work the graft technique with castor bean alloplastic polymer bone graft came effective in the maintenance of the dimensions of the alveolar bone
33

Smart metering / Smart metering

Lahodný, Libor January 2016 (has links)
Semester paper describes the design of smart sockets and their management. Sockets are wirelessly controlled by a central unit. The socket has an integrated sensor, designed to measure current consumption of the device. If necessary, it can remotely disconnect the unit plugged in socket from AC network. Work includes analysis of individual system elements, design of electrical schematics and PCB. In the construction is included ethernet module, which is used to display data using a computer.. The device has been constructed and tested.
34

An intelligent automatic vehicle traffic flow monitoring and control system

Marie, Theko Emmanuel 01 1900 (has links)
M. Tech. (Information Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology / Traffic congestion is a concern within the main arteries that link Johannesburg to Pretoria. In this study Matlab function Randperm is used to generate random vehicle speeds on a simulated highway. Randperm is used to mimic vehicle speed sensors capturing vehicle traffic on the highway. Java sockets are used to send vehicle speed to the Road Traffic Control Centre (RTCC)-database server through a wireless medium. The RTCC-database server uses MySQL to store vehicle speed data. The domain controller with active directory together with a certificate server is used to manage and provide security access control to network resources. The wireless link used by speed sensors to transmit vehicle speed data is protected using PEAP with EAP-TLS which employs the use of digital certificates during authentication. A java database connectivity driver is used to retrieve data from MySQL and a multilayer perceptron (MLP) model is used to predict future traffic status on the highway being monitored i.e. next 5 minutes from previous 5 minutes captured data. A dataset of 402 instances was divided as follows: 66 percent training data was used to train the MLP model, 15 percent data used during validation and the remaining 19 percent was used to test the trained MLP model. An excel spreadsheet was used to introduce novel (19 percent data not used during training) data to the trained MLP model to predict. Assuming that the spreadsheet data represent captured highway vehicle data for the last 5 minutes, the model showed 100 percent accuracy in predicting the four classes: congested, out congested, into congested and normal traffic flow. Predicted traffic status is displayed for the motorist on the highway to know. Ability of the proposed model to continuously capture the traffic pattern on the highway (monitor) helps in redirecting (controlling) the highway traffic during periods of congestion. Implementation of this project will definitely decrease traffic congestion across main arteries of Johannesburg. Pollution normally experienced when cars idle for a long time during congestion will be reduced by free highway traffic flow. Frequent servicing of motor vehicles will no longer be required by the motorists. Furthermore the economy of Gauteng and South Africa as a whole will benefit due to increase in production. Consumers will also benefit in obtaining competitive prices from organizations that depend on haulage services.
35

Gestion de la mobilité dans les réseaux ambiants

Paun, Laurentiu Sorin 22 November 2005 (has links) (PDF)
Cette thèse a été motivée par le nouveau contexte ubiquitaire des réseaux ambiants sans-fil. Les protocoles Internet ont été conçus il y a 30 ans sans prendre en considération l'usage nomade des réseaux et ne répondent pas aux nouvelles contraintes de la mobilité. Notre but a été de concevoir des mécanismes pour rendre la mobilité transparente aux applications et utilisateurs. Une partie de notre travail a été axé sur l'amélioration du délai du handoff au niveau physique 802.11 à quelques dizaines de millisecondes. Le déplacement des hôtes et le changement de réseau demandent souvent une reconfiguration des plusieurs paramètres au niveau IP. Dans le cas d'une mobilité locale, l'approche que nous avons choisi est de permettre aux hôtes de garder inchangées leurs adresses et de mettre en place des routes d'hôte dans le domaine local. Au contraire, pour la mobilité globale, le routage optimal à travers l'Internet nous oblige de concevoir une solution dans laquelle les hôtes mobiles changent leurs adresses IP, en conformité avec le réseau ou ils s'y trouvent. Notre solution est basée sur le principe général « de bout en bout » dans laquelle les deux hôtes impliquées dans une connexion sont les seuls à assurer le transfert de cette connexion aux nouveaux points d'attachement. Elle utilise l'interception des appels de la bibliothèque socket et des requêtes DNS ainsi que la translation locale d'adresses pour virtualiser les adresses IP réelles dans des identificateurs d'hôte stables présentés aux niveaux supérieurs.
36

Multi-View Video Transmission over the Internet

Abdullah Jan, Mirza, Ahsan, Mahmododfateh January 2010 (has links)
<p>3D television using multiple views rendering is receiving increasing interest. In this technology a number of video sequences are transmitted simultaneously and provides a larger view of the scene or stereoscopic viewing experience. With two views stereoscopic rendition is possible. Nowadays 3D displays are available that are capable of displaying several views simultaneously and the user is able to see different views by moving his head.</p><p>The thesis work aims at implementing a demonstration system with a number of simultaneous views. The system will include two cameras, computers at both the transmitting and receiving end and a multi-view display. Besides setting up the hardware, the main task is to implement software so that the transmission can be done over an IP-network.</p><p>This thesis report includes an overview and experiences of similar published systems, the implementation of real time video, its compression, encoding, and transmission over the internet with the help of socket programming and finally the multi-view display in 3D format.  This report also describes the design considerations more precisely regarding the video coding and network protocols.</p>
37

An agent-based Bayesian method for network intrusion detection

Pikoulas, John January 2003 (has links)
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It is obviously impossible to make a network totally secure, as there are so many areas that must be protected. This thesis includes an evaluation of current techniques for internal misuse of computer systems, and tries to propose a new way of dealing with this problem. This thesis proposes that it is impossible to fully protect a computer network from intrusion, and shows how different methods are applied at differing levels of the OSI model. Most systems are now protected at the network and transport layer, with systems such as firewalls and secure sockets. A weakness, though, exists in the session layer that is responsible for user logon and their associated password. It is thus important for any highly secure system to be able to continually monitor a user, even after they have successfully logged into the system. This is because once an intruder has successfully logged into a system, they can use it as a stepping-stone to gain full access (often right up to the system administrator level). This type of login identifies another weakness of current intrusion detection systems, in that they are mainly focused on detecting external intrusion, whereas a great deal of research identifies that one of the main problems is from internal intruders, and from staff within an organisation. Fraudulent activities can often he identified by changes in user behaviour. While this type of behaviour monitoring might not be suited to most networks, it could be applied to high secure installations, such as in government, and military organisations. Computer networks are now one of the most rapidly changing and vulnerable systems, where security is now a major issue. A dynamic approach, with the capacity to deal with and adapt to abrupt changes, and be simple, will provide an effective modelling toolkit. Analysts must be able to understand how it works and be able to apply it without the aid of an expert. Such models do exist in the statistical world, and it is the purpose of this thesis to introduce them and to explain their basic notions and structure. One weakness identified is the centralisation and complex implementation of intrusion detection. The thesis proposes an agent-based approach to monitor the user behaviour of each user. It also proposes that many intrusion detection systems cannot cope with new types of intrusion. It thus applies Bayesian statistics to evaluate user behaviour, and predict the future behaviour of the user. The model developed is a unique application of Bayesian statistics, and the results show that it can improve future behaviour prediction than existing ARIMA models. The thesis argues that the accuracy of long-term forecasting questionable, especially in systems that have a rapid and often unexpected evolution and behaviour. Many of the existing models for prediction use long-term forecasting, which may not be the optimal type for intrusion detection systems. The experiments conducted have varied the number of users and the time interval used for monitoring user behaviour. These results have been compared with ARIMA, and an increased accuracy has been observed. The thesis also shows that the new model can better predict changes in user behaviour, which is a key factor in identifying intrusion detection. The thesis concludes with recommendations for future work, including how the statistical model could be improved. This includes research into changing the specification of the design vector for Bayesian. Another interesting area is the integration of standard agent communication agents, which will make the security agents more social in their approach and be able to gather information from other agents
38

Inter-Process Communication in a Virtualized Environment

Johansson, Filip, Lindström, Christoffer January 2018 (has links)
Selecting the correct inter-process communication method isan important aspect of ensuring effective inter-vm and inter-container process communication. We will conduct a study ofIPC methods which might be useful and fits the Qemu/KVMvirtual machine and Docker container environments, and se-lect those that fit our criteria. After implementing our chosenmethods we will benchmark them in a test suite to find theones with highest performance in terms of speed. Our resultsshow that, at the most common message sizes, Unix DomainSockets work best for containers and Transparent Inter Pro-cess Communication has the best performance between vir-tual machines out of the chosen methods.
39

Multi-View Video Transmission over the Internet

Abdullah Jan, Mirza, Ahsan, Mahmododfateh January 2010 (has links)
3D television using multiple views rendering is receiving increasing interest. In this technology a number of video sequences are transmitted simultaneously and provides a larger view of the scene or stereoscopic viewing experience. With two views stereoscopic rendition is possible. Nowadays 3D displays are available that are capable of displaying several views simultaneously and the user is able to see different views by moving his head. The thesis work aims at implementing a demonstration system with a number of simultaneous views. The system will include two cameras, computers at both the transmitting and receiving end and a multi-view display. Besides setting up the hardware, the main task is to implement software so that the transmission can be done over an IP-network. This thesis report includes an overview and experiences of similar published systems, the implementation of real time video, its compression, encoding, and transmission over the internet with the help of socket programming and finally the multi-view display in 3D format.  This report also describes the design considerations more precisely regarding the video coding and network protocols.
40

Serverový framework pro hromadné testování Android aplikací / Server Framework For Batch Android Applications Testing

Čtvrtníček, Dušan January 2015 (has links)
This master's thesis is dedicated to the remote control of Android devices using the Android Debug bridge tool. Another essential part of the work is automated batch testing of Android applications. It focuses on individual tools (Android Debug Bridge, MonkeyRunner, logcat, Appium) needed to resolve this issue. It also describes a web framework Nette and other technologies that were used for the final design and implementation of information system.

Page generated in 0.0575 seconds