973 resultados para Prototype Verification System


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Habil.-Schr., 2006

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays a huge attention of the academia and research teams is attracted to the potential of the usage of the 60 GHz frequency band in the wireless communications. The use of the 60GHz frequency band offers great possibilities for wide variety of applications that are yet to be implemented. These applications also imply huge implementation challenges. Such example is building a high data rate transceiver which at the same time would have very low power consumption. In this paper we present a prototype of Single Carrier -SC transceiver system, illustrating a brief overview of the baseband design, emphasizing the most important decisions that need to be done. A brief overview of the possible approaches when implementing the equalizer, as the most complex module in the SC transceiver, is also presented. The main focus of this paper is to suggest a parallel architecture for the receiver in a Single Carrier communication system. This would provide higher data rates that the communication system canachieve, for a price of higher power consumption. The suggested architecture of such receiver is illustrated in this paper,giving the results of its implementation in comparison with its corresponding serial implementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2015

Relevância:

30.00% 30.00%

Publicador:

Resumo:

...In dieser Arbeit untersuche ich den ”Fluch der Dimensionen” mittels dem Begriff der Distanzkonzentration. Ich zeige, dass dieser Effekt im Datenmodell mittels der paarweisen Kovarianzkoeffizienten der Randverteilungen beschrieben werden kann. Zusätzlich vergleiche ich 10 prototypbasierte Clusteralgorithmen mittels 800.000 Clusterergebnissen von künstlich erzeugten Datensätzen. Ich erforsche, wie und warum Clusteralgorithmen von der Anzahl der Merkmale beeinflusst werden. Mit den Clusterergebnissen untersuche ich außerdem, wie gut 5 der populärsten Clusterqualitätsmaße die tatsächliche Clusterqualität schätzen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we consider a representative a priori unstable Hamiltonian system with 2+1/2 degrees of freedom, to which we apply the geometric mechanism for diffusion introduced in the paper Delshams et al., Mem.Amer.Math. Soc. 2006, and generalized in Delshams and Huguet, Nonlinearity 2009, and provide explicit, concrete and easily verifiable conditions for the existence of diffusing orbits. The simplification of the hypotheses allows us to perform explicitly the computations along the proof, which contribute to present in an easily understandable way the geometric mechanism of diffusion. In particular, we fully describe the construction of the scattering map and the combination of two types of dynamics on a normally hyperbolic invariant manifold.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This final year project presents the design principles and prototype implementation of BIMS (Biomedical Information Management System), a flexible software system which provides an infrastructure to manage all information required by biomedical research projects.The BIMS project was initiated with the motivation to solve several limitations in medical data acquisition of some research projects, in which Universitat Pompeu Fabra takes part. These limitations,based on the lack of control mechanisms to constraint information submitted by clinicians, impact on the data quality, decreasing it.BIMS can easily be adapted to manage information of a wide variety of clinical studies, not being limited to a given clinical specialty. The software can manage both, textual information, like clinical data (measurements, demographics, diagnostics, etc ...), as well as several kinds of medical images (magnetic resonance imaging, computed tomography, etc ...). Moreover, BIMS provides a web - based graphical user interface and is designed to be deployed in a distributed andmultiuser environment. It is built on top of open source software products and frameworks.Specifically, BIMS has been used to represent all clinical data being currently used within the CardioLab platform (an ongoing project managed by Universitat Pompeu Fabra), demonstratingthat it is a solid software system, which could fulfill requirements of a real production environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Résumé : Le virus de la maladie de Carré (en anglais: canine distemper virus, CDV) qui est pathogène pour les chiens et autres carnivores, est très semblable au virus de la rougeole humaine (en anglais MV). Ces deux virus font partie du genre des Morbillivirus qui appartient à la famille des Paramyxoviridae. Ils induisent des complications dans le système nerveux central (SNC). Au stade précoce et aigu de l'infection du SNC, le CDV induit une démyélinisation (1). Ce stade évolue dans certains cas vers une infection chronique avec progression de la démyélinisation. Pendant le stade précoce, qui suit en général de trois semaines les premiers symptômes, le processus de démyélinisation est associé à la réplication du virus et n'est pas considéré comme inflammatoire (1). Par contre, au stade chronique, la progression des plaques de démyélinisation semble être plutôt liée à des processus immunogènes caractéristiques (2), retrouvés également dans la sclérose en plaques (SEP) chez les humains. Pour cette raison, le CDV est considéré comme un modèle pour la SEP humaine et aussi pour l'étude des maladies et complications induites par les Morbillivirus en général (3). Dans notre laboratoire, nous avons utilisé la souche A75/17-CDV, qui est considérée comme le modèle des souches neurovirulentes de CDV. Nous avons cherché en premier lieu à établir un système robuste pour infecter des cultures neuronales avec le CDV. Nous avons choisi les cultures primaires de l'hippocampe du nouveau-né de rat (4), que nous avons ensuite infecté avec une version modifiée du A75/17, appelée rgA75/17-V (5). Dans ces cultures, nous avons prouvé que le CDV infecte des neurones et des astrocytes. Malgré une infection qui se diffuse lentement entre les cellules, cette infection cause une mort massive aussi bien des neurones infectés que non infectés. En parallèle, les astrocytes perdent leur morphologie de type étoilé pour un type polygonal. Finalment, nous avons trouvé une augmentation importante de la concentration en glutamate dans le milieu de culture, qui laisse présumer une sécrétion de glutamate par les cultures infectées (6). Nous avons ensuite étudié le mécanisme des effets cytopathiques induits par le CDV. Nous avons d'abord démontré que les glycoprotéines de surface F et H du CDV s'accumulent massivement dans le réticulum endoplasmique (RE). Cette accumulation déclenche un stress du RE, qui est caractérisé par une forte expression du facteur de transcription proapoptotique CHOP/GADD 153 et de le la calreticuline (CRT). La CRT est une protéine chaperonne localisée dans le RE et impliquée dans l'homéostasie du calcium (Ca2+) et dans le repliement des protéines. En transfectant des cellules de Vero avec des plasmides codant pour plusieurs mutants de la glycoprotéine F de CDV, nous avons démontré une corrélation entre l'accumulation des protéines virales dans le RE et l'augmentation de l'expression de CRT, le stress du RE et la perte de l'homéostasie du Ca2+. Nous avons obtenu des résultats semblables avec des cultures de cellules primaires de cerveau de rat. Ces résultats suggèrent que la CRT joue un rôle crucial dans les phénomènes neurodégénératifs pendant l'infection du SNC, notamment par le relazgage du glutamate via le Ca2+. De manière intéressante, nous démontrons également que l'infection de CDV induit une fragmentation atypique de la CRT. Cette fragmentation induit une re-localisation et une exposition sélective de fragments amino-terminaux de la CRT, connus pour êtres fortement immunogènes à la surface des cellules infectées et non infectées. A partir de ce résultat et des résultats précédents, nous proposons le mécanisme suivant: après l'infection par le CDV, la rétention dans le RE des protéines F et H provoque un stress du RE et une perte de l'homéostasie du Ca2+. Ceci induit la libération du glutamate, qui cause une dégénération rapide du SNC (sur plusieurs jours ou semaines) correspondant à la phase aiguë de la maladie chez le chien. En revanche, les fragments amino-terminaux de la CRT libérés à la surface des cellules infectées peuvent avoir un rôle important dans l'établissement d'une démyélinisation d'origine immunogène, typique de la phase chronique de l'infection de CDV. Summary : The dog pathogen canine distemper virus (CDV), closely related to the human pathogen measles virus (MV), belongs to the Morbillivirus genus of the Paramyxoviridae family. Both CDV and NIV induce complications in the central nervous system (CNS). In the acute early stage of the infection in CNS, the CDV infection induces demyelination. This stage is sometimes followed by a late persistent stage of infection with a progression of the demyelinating lesions (1). The acute early stage occurs around three weeks after the infection and demyelinating processes are associated with active virus replication and are not associated to inflammation (1). In contrast during late persistent stage, the demyelination plaque progression seems to be mainly due to an immunopathological process (2), which characteristics are shared in many aspects with the human disease multiple sclerosis (MS). For these reasons, CDV is considered as a model for human multiple sclerosis, as well as for the study of Morbillivirus-mediated pathogenesis (3). In our laboratory, we used the A75/17-CDV strain that is considered to be the prototype of neurovirulent CDV strain. We first sought to establish a well characterized and robust model for CDV infection of a neuronal culture. We chose primary cultures from newborn rat hippocampes (4) that we infected with a modified version of A75/17, called rgA75/17-V (5). In these cultures, we showed that CDV infects both neurons and astrocytes. While the infection spreads only slowly to neighbouring cells, it causes a massive death of neurons, which includes also non-infected neurons. In parallel, astrocytes undergo morphological changes from the stellate type to the polygonal type. The pharmacological blocking of the glutamate receptors revealed an implication of glutamatergic signalling in the virus-mediated cytopathic effect. Finally, we found a drastic increase concentration of glutamate in the culture medium, suggesting that glutamate was released from the cultured cells (6). We further studied the mechanism of the CDV-induced cytopathic effects. We first demonstrated that the CDV surface glycoprotein F and H markedly accumulate in the endoplasmic reticulum (ER). This accumulation triggers an ER stress, which is characterized by increased expression of the proapoptotic transcription factor CHOP/GADD 153 and calreticulin (CRT). CRT is an ER resident chaperon involved in the Ca2+ homeostasis and in the response to misfolded proteins. Transfections of Vero cells with plasmids encoding various CDV glycoprotein mutants reveal a correlation between accumulation of viral proteins in the ER, CRT overexpression, ER stress and alteration of ER Ca2+ homeostasis. Importantly, similar results are also obtained in primary cell cultures from rat brain. These results suggest that CRT plays a crucial role in CNS infection, particularly due to CRT involvement in Ca2+ mediated glutamate releases, and subsequent neurodegenerative disorders. Very intriguingly, we also demonstrated that CDV infection induces an atypical CRT fragmentation, with relocalisation and selective exposure of the highly immunogenic CRT N-terminal fragments at the surface of infected and neighbouring non-infected cells. Altogether our results combined with previous findings suggest the following scenario. After CDV infection, F and H retention alter Ca2+ homeostasis, and induce glutamate release, which in turn causes rapid CNS degeneration (within days or a week) corresponding to the acute phase of the disease in dogs. In contrast, the CRT N-terminal fragments released at the surface of infected cells may rather have an important role in the establishment of the autoimmune demyelination in the late stage of CDV infection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Currently, many drivers experience some difficulty in viewing the road ahead of them during times of reduced visibility, such as rain, snow, fog, or the darkness of night- Recent studies done by the National Safety Council provide a detailed contrast between fatal accidents occurring during the day and night. Revealed was that the motor vehicle night death rate (4.41 deaths per 100 million miles driven) was sharply higher than the corresponding death rate during daylight hours (1.21). By providing a delineating system powered by the natural resource of solar power, a constant source of visibility may be maintained throughout the evening. Along with providing enough light to trace the outline of the road, other major goals defined in producing this delineator system are as follows: 1. A strong and durable design that would protect the internal components and survive extreme weather conditions. 2. A low maintenance system where components need few repairs or replacements. 3. A design which makes all components accessible in the event that maintenance is needed, but also prevents vandalism. 4. A design that provides greater visibility to drivers and will not harm a vehicle or its passengers in the event of a collision. This solar powered highway delineator consists of an adjustable solar array, a light fixture, and a standard delineator pole. The solar array houses and protects the solar panels, and can be easily adjusted to obtain a maximum amount of sunlight. The light fixture primarily houses the battery, the circuit and the light assembly. Both components allow for easy accessibility and reduce vandalism using internal connections for bolts and wires. The delineator mounting pole is designed to extensively deform in the event of a collision, therefore reducing any harm caused to the vehicle and/or the passengers. The cost of a single prototype to be produced is approximately $70.00 excluding labor costs. However, these material and labor costs will be greatly reduced if a large number of delineators are produced. It is recommended that the Iowa Department of Transportation take full advantage of the research and development put into this delineator design. The principles used in creating this delineator can be used to provide an outline for drivers to follow, or on a larger scale, provide actual roadway lighting in areas where it was never before possible or economically feasible. In either event, the number of fatal accidents will be decreased due to the improved driver visibility in the evening.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Polynomial constraint solving plays a prominent role in several areas of hardware and software analysis and verification, e.g., termination proving, program invariant generation and hybrid system verification, to name a few. In this paper we propose a new method for solving non-linear constraints based on encoding the problem into an SMT problem considering only linear arithmetic. Unlike other existing methods, our method focuses on proving satisfiability of the constraints rather than on proving unsatisfiability, which is more relevant in several applications as we illustrate with several examples. Nevertheless, we also present new techniques based on the analysis of unsatisfiable cores that allow one to efficiently prove unsatisfiability too for a broad class of problems. The power of our approach is demonstrated by means of extensive experiments comparing our prototype with state-of-the-art tools on benchmarks taken both from the academic and the industrial world.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With an annual pavement marking program of approximately $2 million and another $750 thousand invested in maintenance of durable markings each year, the Iowa DOT is seeking every opportunity to provide all-year markings staying in acceptable condition under all weather conditions. The goal of this study is to analyze existing pavement marking practices and to develop a prototype Pavement Marking Management System (PMMS). This report documents the first two phases of a three-phase research project. Phase I includes an overview of the Iowa DOT’s existing practices and a literature review regarding pavement marking practices in other states. Based on this information, a work plan was developed for Phases II and III of this study. Phase II organized the key components necessary to develop a prototype PMMS for the Iowa DOT. The two primary components are (1) performance/life cycle curves for pavement marking products, and (2) an application matrix tailored to the pavement marking products and roadway and environmental conditions faced by the Iowa DOT. Both components will continue to be refined and tailored to Iowa materials and conditions as more performance data becomes available.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tässä diplomityössä esitellään ohjelmistotestauksen ja verifioinnin yleisiä periaatteita sekä käsitellään tarkemmin älypuhelinohjelmistojen verifiointia. Työssä esitellään myös älypuhelimissa käytettävä Symbian-käyttöjärjestelmä. Työn käytännön osuudessa suunniteltiin ja toteutettiin Symbian-käyttöjärjestelmässä toimiva palvelin, joka tarkkailee ja tallentaa järjestelmäresurssien käyttöä. Verifiointi on tärkeä ja kuluja aiheuttava tehtävä älypuhelinohjelmistojen kehityssyklissä. Kuluja voidaan vähentää automatisoimalla osa verifiointiprosessista. Toteutettu palvelin automatisoijärjestelmäresurssien tarkkailun tallentamalla tietoja niistä tiedostoon testien ajon aikana. Kun testit ajetaan uudestaan, uusia tuloksia vertaillaan lähdetallenteeseen. Jos tulokset eivät ole käyttäjän asettamien virherajojen sisällä, siitä ilmoitetaan käyttäjälle. Virherajojen ja lähdetallenteen määrittäminen saattaa osoittautua vaikeaksi. Kuitenkin, jos ne määritetään sopivasti, palvelin tuottaa hyödyllistä tietoa poikkeamista järjestelmäresurssien kulutuksessa testaajille.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work had two primary objectives: 1) to produce a working prototype for automated printability assessment and 2) to perform a study of available machine vision and other necessary hardware solutions. The three printability testing methods, IGT Picking,He¬liotest, and mottling, considered in this work have several different requirements and the task was to produce a single automated testing system suitable for all methods. A system was designed and built and its performance was tested using the Heliotest. Working proto¬types are important tools for implementing theoretical methods into practical systems and testing and demonstrating the methodsin real life conditions. The system was found to be sufficient for the Heliotest method. Further testing and possible modifications related to other two test methods were left for future works. A short study of available systems and solutions concerning image acquisition of machine vision was performed. The theoretical part of this study includes lighting systems, optical systems and image acquisition tools, mainly cameras and the underlying physical aspects for each portion.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Työssä kehitettin läpinäkyvä Internet Small Computer Systems Interface-verkkolevyä (iSCSI) käyttävä varmistusjärjestelmä. Verkkolevyn sisältö suojattiin asiakaspään salauskerroksella (dm-crypt). Järjestely mahdollisti sen, että verkkolevylle tallennetut varmuuskopiot pysyivät luottamuksellisina, vaikka levypalvelinta tarjoava taho oli joko epäluotettava tai suorastaan vihamielinen. Järjestelmän hyötykäyttöä varten kehitettiin helppokäyttöinen prototyyppisovellus. Järjestelmän riskit ja haavoittuvuudet käytiin läpi ja analysoitiin. Järjestelmälle tehtiin myös karkea kryptoanalyysi sen teknistenominaisuuksien pohjalta. Suorituskykymittaukset tehtiin sekä salatulle että salaamattomalle iSCSI-liikenteelle. Näistä todettiin, että salauksen vaikutus suorituskykyyn oli häviävän pieni jopa 100 megabittiä sekunnissa siirtävillä verkkonopeuksilla. Lisäksi pohdittiin teknologian muita sovelluskohteita ja tulevia tutkimusalueita.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Laboratoriomittakaavainen formeri on välttämätön, jotta paperinvalmistusprosessin jäljitteleminen olisi mahdollista. Vaikka erilaisia formereita löytyykin paperiteollisuudesta, tilaa on kuitenkin laboratoriomittakaavaiselle paperinvalmistusmenetelmälle, joka sijoittuisipilottikoneen ja perinteisen laboratorioarkkimuotin välille. Formeri, jolla saadaan aikaiseksi oikean paperinvalmistuksen kaltaiset olosuhteet ja ilmiöt on kehitetty, ja sen toiminta on testattu Nalcon Papermaking Centreof Excellence:ssä Espoossa. Formeri on yhdistetty Nalcon lähestymisjärjetelmäsimulaattoriin ja simulaattorilla aikaansaadut hydro-kemialliset ilmiöt voidaan testata nyt myös arkeista. Laitteessa on perälaatikko ja viiraosa. Perälaatikosta massa virtaa viiralle, joka liikkuu eteenpäin hihnakuljettimen hihnojen päällä. Suihku-viira -suhdetta voidaan muuttaa joko muuttamalla virtausnopeutta tai viiran nopeutta tai säätämällä perälaatikon huuliaukkoa. Formerintoiminnan testaus osoitti, että se toimii teknisesti hyvin ja tulokset ovat toistettavia ja loogisia. Arkeissa kuidut ovat orientoituneet, formaatio ja vetolujuussuhde KS/PS riippuvat voimakkaasti suihku-viira -suhteesta, kuten oikeillakinpaperikoneilla.