974 resultados para Control-flow Analysis


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Purpose: To evaluate the clinical features, treatment, and outcomes of a cohort of patients with ocular adnexal lymphoproliferative disease classified according to the World Health Organization modification of the Revised European-American Classification of Lymphoid neoplasms and to perform a robust statistical analysis of these data. Methods: Sixty-nine cases of ocular adnexal lymphoproliferative disease, seen in a tertiary referral center from 1992 to 2003, were included in the study. Lesions were classified by using the World Health Organization modification of the Revised European-American Classification of Lymphoid neoplasms classification. Outcome variables included disease-specific Survival, relapse-free survival, local control, and distant control. Results: Stage IV disease at presentation, aggressive lymphoma histology, the presence of prior or concurrent systemic lymphoma at presentation, and bilateral adnexal disease were significant predictors for reduced disease-specific survival, local control, and distant control. Multivariate analysis found that aggressive histology and bilateral adnexal disease had significantly reduced disease-specific Survival. Conclusions: The typical presentation of adnexal lymphoproliferative disease is with a painless mass, swelling, or proptosis; however, pain and inflammation occurred in 20% and 30% of patients, respectively. Stage at presentation, tumor histology, primary or secondary status, and whether the process was unilateral or bilateral were significant variables for disease outcome. In this study, distant spread of lymphoma was lower in patients who received greater than 20 Gy of orbital radiotherapy.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A key component of the venom of many Australian snakes belonging to the elapid family is a toxin that is structurally and functionally similar to that of the mammalian prothrombinase complex. In mammals, this complex is responsible for the cleavage of prothrombin to thrombin and is composed of factor Xa in association with its cofactors calcium, phospholipids, and factor Va. The snake prothrombin activators have been classified on the basis of their requirement for cofactors for activity. The two major subgroups described in Australian elapid snakes, groups C and D, are differentiated by their requirement for mammalian coagulation factor Va. In this study, we describe the cloning, characterization, and comparative analysis of the factor X- and factor V-like components of the prothrombin activators from the venom glands of snakes possessing either group C or D prothrombin activators. The overall domain arrangement in these proteins was highly conserved between all elapids and with the corresponding mammalian clotting factors. The deduced protein sequence for the factor X-like protease precursor, identified in elapids containing either group C or D prothrombin activators, demonstrated a remarkable degree of relatedness to each other (80%-97%). The factor V-like component of the prothrombin activator, present only in snakes containing group C complexes, also showed a very high degree of homology (96%-98%). Expression of both the factor X- and factor V-like proteins determined by immunoblotting provided an additional means of separating these two groups at the molecular level. The molecular phylogenetic analysis described here represents a new approach for distinguishing group C and D snake prothrombin activators and correlates well with previous classifications.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The thesis describes an investigation into methods for the design of flexible high-speed product processing machinery, consisting of independent electromechanically actuated machine functions which operate under software coordination and control. An analysis is made of the elements of traditionally designed cam-actuated, mechanically coupled machinery, so that the operational functions and principal performance limitations of the separate machine elements may be identified. These are then used to define the requirements for independent actuators machinery, with a discussion of how this type of design approach is more suited to modern manufacturing trends. A distributed machine controller topology is developed which is a hybrid of hierarchical and pipeline control. An analysis is made, with the aid of dynamic simulation modelling, which confirms the suitability of the controller for flexible machinery control. The simulations include complex models of multiple independent actuators systems, which enable product flow and failure analyses to be performed. An analysis is made of high performance brushless d.c. servomotors and their suitability for actuating machine motions is assessed. Procedures are developed for the selection of brushless servomotors for intermittent machine motions. An experimental rig is described which has enabled the actuation and control methods developed to be implemented. With reference to this, an evaluation is made of the suitability of the machine design method and a discussion is given of the developments which are necessary for operational independent actuators machinery to be attained.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis describes an investigation into methods for controlling the mode distribution in multimode optical fibres. The major contributions presented in this thesis are summarised below. Emerging standards for Gigabit Ethernet transmission over multimode optical fibre have led to a resurgence of interest in the precise control, and specification, of modal launch conditions. In particular, commercial LED and OTDR test equipment does not, in general, comply with these standards. There is therefore a need for mode control devices, which can ensure compliance with the standards. A novel device consisting of a point-load mode-scrambler in tandem with a mode-filter is described in this thesis. The device, which has been patented, may be tuned to achieve a wide range of mode distributions and has been implemented in a ruggedised package for field use. Various other techniques for mode control have been described in this work, including the use of Long Period Gratings and air-gap mode-filters. Some of the methods have been applied to other applications, such as speckle suppression and in sensor technology. A novel, self-referencing, sensor comprising two modal groups in the Mode Power Distribution has been designed and tested. The feasibility of a two-channel Mode Group Diversity Multiplexed system has been demonstrated over 985m. A test apparatus for measuring mode distribution has been designed and constructed. The apparatus consists of a purpose-built video microscope, and comprehensive control and analysis software written in Visual Basic. The system may be fitted with a Silicon camera or an InGaAs camera, for measurement in the 850nm and 130nm transmission windows respectively. A limitation of the measurement method, when applied to well-filled fibres, has been identified and an improvement to the method has been proposed, based on modelled Laguerre Gauss field solutions.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Software product line modeling aims at capturing a set of software products in an economic yet meaningful way. We introduce a class of variability models that capture the sharing between the software artifacts forming the products of a software product line (SPL) in a hierarchical fashion, in terms of commonalities and orthogonalities. Such models are useful when analyzing and verifying all products of an SPL, since they provide a scheme for divide-and-conquer-style decomposition of the analysis or verification problem at hand. We define an abstract class of SPLs for which variability models can be constructed that are optimal w.r.t. the chosen representation of sharing. We show how the constructed models can be fed into a previously developed algorithmic technique for compositional verification of control-flow temporal safety properties, so that the properties to be verified are iteratively decomposed into simpler ones over orthogonal parts of the SPL, and are not re-verified over the shared parts. We provide tool support for our technique, and evaluate our tool on a small but realistic SPL of cash desks.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The aim of the paper is to investigate the well-known bullwhip effect of supply chains. Control theoretic analysis of bullwhip effect is extensively analyzed in the literature with the Laplace transform. This paper tries to examine the effect for an extended Holt–Modigliani–Muth–Simon model. A two-stage supply chain (supplier–manufacturer) is studied with quadratic costs functional. It is assumed that both firms minimize the relevant costs. The order of the manufacturer is delayed with a known constant. Two cases are examined: supplier and manufacturer minimize the relevant costs decentralized, and a centralized decision rule. The question is answered, how to decrease the bullwhip effect.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The aim of the paper is to investigate the well-known bullwhip effect of supply chains. Control theoretic analysis of bullwhip effect is extensively analyzed in the literature with Laplace transform. This paper tries to examine the effect for an extended Holt-Modigliani-Muth-Simon model. A two-stage supply chain (supplier-manufacturer) is studied with quadratic costs functional. It is assumed that both firms minimize the relevant costs. The order of the manufacturer is delayed with a known constant. Two cases are examined: supplier and manufacturer minimize the relevant costs decentralized, and a centralized decision rule. The question is answered, how to decrease the bullwhip effect.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This project is funded by European Research Council in FP7; grant no 259328, 2010 and EPSRC grant no EP/K006428/1, 2013.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This project is funded by European Research Council in FP7; grant no 259328, 2010 and EPSRC grant no EP/K006428/1, 2013.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Les logiciels actuels sont de grandes tailles, complexes et critiques. Le besoin de qualité exige beaucoup de tests, ce qui consomme de grandes quantités de ressources durant le développement et la maintenance de ces systèmes. Différentes techniques permettent de réduire les coûts liés aux activités de test. Notre travail s’inscrit dans ce cadre, est a pour objectif d’orienter l’effort de test vers les composants logiciels les plus à risque à l’aide de certains attributs du code source. À travers plusieurs démarches empiriques menées sur de grands logiciels open source, développés avec la technologie orientée objet, nous avons identifié et étudié les métriques qui caractérisent l’effort de test unitaire sous certains angles. Nous avons aussi étudié les liens entre cet effort de test et les métriques des classes logicielles en incluant les indicateurs de qualité. Les indicateurs de qualité sont une métrique synthétique, que nous avons introduite dans nos travaux antérieurs, qui capture le flux de contrôle ainsi que différentes caractéristiques du logiciel. Nous avons exploré plusieurs techniques permettant d’orienter l’effort de test vers des composants à risque à partir de ces attributs de code source, en utilisant des algorithmes d’apprentissage automatique. En regroupant les métriques logicielles en familles, nous avons proposé une approche basée sur l’analyse du risque des classes logicielles. Les résultats que nous avons obtenus montrent les liens entre l’effort de test unitaire et les attributs de code source incluant les indicateurs de qualité, et suggèrent la possibilité d’orienter l’effort de test à l’aide des métriques.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Experiments were conducted at the GALCIT supersonic shear-layer facility to investigate aspects of reacting transverse jets in supersonic crossflow using chemiluminescence and schlieren image-correlation velocimetry. In particular, experiments were designed to examine mixing-delay length dependencies on jet-fluid molar mass, jet diameter, and jet inclination.

The experimental results show that mixing-delay length depends on jet Reynolds number, when appropriately normalized, up to a jet Reynolds number of 500,000. Jet inclination increases the mixing-delay length, but causes less disturbance to the crossflow when compared to normal jet injection. This can be explained, in part, in terms of a control-volume analysis that relates jet inclination to flow conditions downstream of injection.

In the second part of this thesis, a combustion-modeling framework is proposed and developed that is tailored to large-eddy simulations of turbulent combustion in high-speed flows. Scaling arguments place supersonic hydrocarbon combustion in a regime of autoignition-dominated distributed reaction zones (DRZ). The proposed evolution-variable manifold (EVM) framework incorporates an ignition-delay data-driven induction model with a post-ignition manifold that uses a Lagrangian convected 'balloon' reactor model for chemistry tabulation. A large-eddy simulation incorporating the EVM framework captures several important reacting-flow features of a transverse hydrogen jet in heated-air crossflow experiment.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Embedded systems are increasingly integral to daily life, improving and facilitating the efficiency of modern Cyber-Physical Systems which provide access to sensor data, and actuators. As modern architectures become increasingly complex and heterogeneous, their optimization becomes a challenging task. Additionally, ensuring platform security is important to avoid harm to individuals and assets. This study primarily addresses challenges in contemporary Embedded Systems, focusing on platform optimization and security enforcement. The initial section of this study delves into the application of machine learning methods to efficiently determine the optimal number of cores for a parallel RISC-V cluster to minimize energy consumption using static source code analysis. Results demonstrate that automated platform configuration is not only viable but also that there is a moderate performance trade-off when relying solely on static features. The second part focuses on addressing the problem of heterogeneous device mapping, which involves assigning tasks to the most suitable computational device in a heterogeneous platform for optimal runtime. The contribution of this section lies in the introduction of novel pre-processing techniques, along with a training framework called Siamese Networks, that enhances the classification performance of DeepLLVM, an advanced approach for task mapping. Importantly, these proposed approaches are independent from the specific deep-learning model used. Finally, this research work focuses on addressing issues concerning the binary exploitation of software running in modern Embedded Systems. It proposes an architecture to implement Control-Flow Integrity in embedded platforms with a Root-of-Trust, aiming to enhance security guarantees with limited hardware modifications. The approach involves enhancing the architecture of a modern RISC-V platform for autonomous vehicles by implementing a side-channel communication mechanism that relays control-flow changes executed by the process running on the host core to the Root-of-Trust. This approach has limited impact on performance and it is effective in enhancing the security of embedded platforms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The behaviour of Nafion® polymeric membranes containing acid-base dyes, bromothymol blue (BB) and methyl violet (MV), were studied aiming at constructing an optical sensor for pH measurement. BB revealed to be inadequate for developing sensing phases due to the electrostatic repulsion between negative groups of their molecules and the negative charge of the sulfonate group of the Nafion®, which causes leaching of the dye from the membrane. On the other hand, MV showed to be suitable due to the presence of positive groups in its structure. The membrane prepared from a methanolic solution whose Nafion®/dye molar ratio was 20 presented the best analytical properties, changing its color from green to violet in the pH range from 0.6 to 3.0. The membrane can be prepared with good reproducibility, presenting durability of ca. 6 months and response time of 22 s, making possible its use for pH determination in flow analysis systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

OBJETIVO: Avaliar o efeito da estimulação tátil-cinestésica na evolução do padrão comportamental e clínico de recém-nascidos pré-termos (RNPT) durante o período de internação hospitalar. MÉTODOS: Trinta e dois RNPT, com peso ao nascimento inferior a 2.500 gramas, clinicamente estáveis e destituídos de asfixia perinatal importante foram divididos em 16 bebês do grupo controle (GC) e 16 do experimental (GE). Foram coletados dados da evolução clínica a partir dos registros hospitalares e da avaliação comportamental por meio de filmagens semanais de oito minutos, desde a inclusão do RNPT na amostra até a alta hospitalar. RESULTADOS: Tendência a redução do tempo de internação hospitalar, aumento do ganho de peso diário e predominância de comportamentos auto-organizados (respiração regular, estado de alerta, tônus equilibrado, posturas mistas, movimentação coordenada, movimentos de mão na face, sucção, preensão, apoio) para os RNPT do GE. A análise comparativa das idades pós-conceptuais divididas em intervalos (I - 31 a 33 semanas 6/7; II - 34 a 36 semanas 6/7; e III - 37 a 39 semanas 6/7) ressaltou, no aspecto motor, um tônus equilibrado e movimentação voluntária coordenada para os três períodos, maior permanência em posturas mistas (intervalo I) ou em flexão (intervalo II) e a obtenção de respiração mais regular na faixa etária I do GE. CONCLUSÃO: Destaque da estimulação tátil-cinestésica como método de intervenção durante o período de internação hospitalar, contribuindo para a auto-organização e regulação comportamental de RNPT. Artigo registrado no Australian New Zealand Clinical Trials Registry (ANZCTR) sob o número ACTRN12610000133033.