964 resultados para Static analysis


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The eardrum separates the external ear from the middle ear and it is responsible to convert the acoustical energy into mechanical energy. It is divided by pars tensa and pars flaccida. The aim of this work is to analyze the susceptibility of the four quadrants of the pars tensa under negative pressure, to different lamina propria fibers distribution. The development of associated ear pathology, in particular the formation of retraction pockets, is also evaluated. To analyze these effects, a computational biomechanical model of the tympano-ossicular chain was constructed using computerized tomography images and based on the finite element method. Three fibers distributions in the eardrum middle layer were compared: case 1 (eardrum with a circular band of fibers surrounding all quadrants equally), case 2 (eardrum with a circular band of fibers that decreases in thickness in posterior quadrants), case 3 (eardrum without circular fibers in the posterior/superior quadrant). A static analysis was performed by applying approximately 3000Pa in the eardrum. The pars tensa of the eardrum was divided in four quadrants and the displacement of a central point of each quadrant analyzed. The largest displacements of the eardrum were obtained for the eardrum without circular fibers in the posterior/superior quadrant.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The eardrum separates the external ear from the middle ear and it is responsible to convert the acoustical energy into mechanical energy. It is divided by pars tensa and pars flaccida. The aim of this work is to analyze the susceptibility of the four quadrants of the pars tensa under negative pressure, to different lamina propria fibers distribution. The development of associated ear pathology, in particular the formation of retraction pockets, is also evaluated. To analyze these effects, a computational biomechanical model of the tympano-ossicular chain was constructed using computerized tomography images and based on the finite element method. Three fibers distributions in the eardrum middle layer were compared: case 1 (eardrum with a circular band of fibers surrounding all quadrants equally), case 2 (eardrum with a circular band of fibers that decreases in thickness in posterior quadrants), case 3 (eardrum without circular fibers in the posterior/superior quadrant). A static analysis was performed by applying approximately 3000Pa in the eardrum. The pars tensa of the eardrum was divided in four quadrants and the displacement of a central point of each quadrant analyzed. The largest displacements of the eardrum were obtained for the eardrum without circular fibers in the posterior/superior quadrant.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Projet de recherche réalisé en 2014-2015 avec l'appui du Fonds de recherche du Québec – Société et culture.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Summary form only given. The Java programming language supports concurrency. Concurrent programs are harder to verify than their sequential counterparts due to their inherent nondeterminism and a number of specific concurrency problems such as interference and deadlock. In previous work, we proposed a method for verifying concurrent Java components based on a mix of code inspection, static analysis tools, and the ConAn testing tool. The method was derived from an analysis of concurrency failures in Java components, but was not applied in practice. In this paper, we explore the method by applying it to an implementation of the well-known readers-writers problem and a number of mutants of that implementation. We only apply it to a single, well-known example, and so we do not attempt to draw any general conclusions about the applicability or effectiveness of the method. However, the exploration does point out several strengths and weaknesses in the method, which enable us to fine-tune the method before we carry out a more formal evaluation on other, more realistic components.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Linear typing schemes can be used to guarantee non-interference and so the soundness of in-place update with respect to a functional semantics. But linear schemes are restrictive in practice, and more restrictive than necessary to guarantee soundness of in-place update. This limitation has prompted research into static analysis and more sophisticated typing disciplines to determine when in-place update may be safely used, or to combine linear and non-linear schemes. Here we contribute to this direction by defining a new typing scheme that better approximates the semantic property of soundness of in-place update for a functional semantics. We begin from the observation that some data are used only in a read-only context, after which it may be safely re-used before being destroyed. Formalising the in-place update interpretation in a machine model semantics allows us to refine this observation, motivating three usage aspects apparent from the semantics that are used to annotate function argument types. The aspects are (1) used destructively, (2), used read-only but shared with result, and (3) used read-only and not shared with the result. The main novelty is aspect (2), which allows a linear value to be safely read and even aliased with a result of a function without being consumed. This novelty makes our type system more expressive than previous systems for functional languages in the literature. The system remains simple and intuitive, but it enjoys a strong soundness property whose proof is non-trivial. Moreover, our analysis features principal types and feasible type reconstruction, as shown in M. Konen'y (In TYPES 2002 workshop, Nijmegen, Proceedings, Springer-Verlag, 2003).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Kutatásunk alapvetése, hogy egy ország versenyképessége az értékteremtő munkamegosztást támogató teljes közösségi intézményrendszer sikeres működésén múlik. Munkánkkal arra kerestük a választ, milyen értékek és motivációk alakítják a magyar gazdaság intézményrendszerét. Nem a hivatalos magatartási szabályok statikus elemzésére koncentráltunk, hanem a normák, konvenciók és innovációk világára, az intézményrendszer jövőjét befolyásoló dinamikus elemekre. Elemzésünk fókuszában a társadalmi és vállalkozói értékek, a gazdaságpolitika formálók versenyképességi narratívái, a helyi gazdaságok versenyképességi tényezői, a versenyképesség javítását szolgáló magánkezdeményezések és a nonprofit szektor működése álltak. Fő eredményünk, hogy a Magyarország jövőbeli versenyképességét befolyásoló tudati elemek - a gazdasági döntéshozók motivációi és normái – megfelelő alapot teremtenek a gazdaságunk versenyképességét megerősítő üzleti, civil és kormányzati kezdeményezések számára. Magas közösségi és morális elvárások jellemzik a lakosság és a vállalkozók értékrendjét. A gazdaságpolitika-alkotók nyitottak az intézményi problémákra, a magyar véleményformálók körében egyetértés van a fő versenyképességi kihívásokat illetően. Jól azonosíthatóak a szervezők erőfeszítéseit kompenzálni képes versenyképességi összefogások keretei. A helyi gazdaságfejlesztés intézményei alakulóban vannak. A nonprofit szektor működési viszonyainak bizonytalansága ellenére a közcélúság és a versenyképesség közös területein (mint az atipikus foglalkoztatás) jól teljesít. Ezek az eredmények egyszerre nyitnak perspektívát a tudományos vizsgálódás és a gyakorlati cselekvés számára. Az önérdek és a közösségi értékteremtő képesség javításának motivációja közötti kapcsolat tudományos vizsgálata, a társadalmi innovációk kutatása a versenyképesség javíthatóságának kereteit tárhatja fel. Az üzleti, civil vagy kormányzati szereplők pedig akkor tudják a fogyasztói, közösségi elvárásokat sikeresen összeegyeztetni stratégiai céljaikkal, ha a gazdasági és társadalmi szereplők normáihoz, konvencióihoz igazítva alakítják ki intézményformáló stratégiáikat. __________ The competitiveness of nations is based on the successful function of the institutions that support the division of labor on value creation – this is the basic principle of this research. Our project investigates what values and motivations shape the institutional setting of Hungarian economy. We study the world of norms, conventions and innovations – the elements that shape the institutions. The static analysis of official rules has only a minor role in this approach. Research focuses (1) on the value system of entrepreneurs (2), on the mind setting of public managers and executives of economic policy (3) on the factors of local economic competitiveness, (4) on the actions of private and non-profit sector in order to enhance competitiveness. The main finding of this research is that the cognitive factors that shape the competitiveness of Hungary – the norms and motivations of decision makers in the economy – give a positive support for the competitiveness strengthening initiatives of business, non-profit and public sectors. The studies on the values system of entrepreneurs and citizens show that expectations and moral values connected to competitiveness are strong. The public managers of economic policy are open-minded and there is a general consensus of experts, business and politics on the key competitiveness challenges of Hungary. There are well defined frameworks to conceptualize the schemes that make organizers’ efforts affordable in private initiatives for competitiveness. There are various developments on the field of institutions for local economic development. The nonprofit sector has good results on the common fields of competiveness and equity (like atypical forms of employment) despite the uncertainties in the background of the sector. These results open perspectives both for scientific research and practical applications. The research on connection between individual goals and motivation to improve value creating ability of the society and the study of social innovation reveal new aspects of competitiveness. Business, non-profit or public leaders can better synchronize their strategies with the expectation of consumers, communities and constituencies if their intentions to shape institutional settings fit better to the norms and conventions of the social and economic stakeholders.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis studies the static and seismic behavior of simple structures made with gabion box walls. The analysis was performed considering a one-story building with standard dimensions in plan (6m x 5m) and a lightweight timber roof. The main focus of the present investigation is to find the principals aspects of the seismic behavior of a one story building made with gabion box walls, in order to prevent a failure due to seismic actions and in this way help to reduce the seismic risk of developing countries where this natural disaster have a significant intensity. Regarding the gabion box wall, it has been performed some calculations and analysis in order to understand the static and dynamic behavior. From the static point of view, it has been performed a verification of the normal stress computing the normal stress that arrives at the base of the gabion wall and the corresponding capacity of the ground. Moreover, regarding the seismic analysis, it has been studied the in-plane and out-of-plane behavior. The most critical aspect was discovered to be the out-of-plane behavior, for which have been developed models considering the “rigid- no tension model” for masonry, finding a kinematically admissible multiplier that will create a collapse mechanism for the structure. Furthermore, it has been performed a FEM and DEM models to find the maximum displacement at the center of the wall, maximum tension stresses needed for calculating the steel connectors for joining consecutive gabions and the dimensions (length of the wall and distance between orthogonal walls or buttresses) of a geometrical configuration for the standard modulus of the structure, in order to ensure an adequate safety margin for earthquakes with a PGA around 0.4-0.5g. Using the results obtained before, it has been created some rules of thumb, that have to be satisfy in order to ensure a good behavior of these structure.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia Civil na Área de Especialização de Estruturas

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Graphical User Interface (GUI) is an integral component of contemporary computer software. A stable and reliable GUI is necessary for correct functioning of software applications. Comprehensive verification of the GUI is a routine part of most software development life-cycles. The input space of a GUI is typically large, making exhaustive verification difficult. GUI defects are often revealed by exercising parts of the GUI that interact with each other. It is challenging for a verification method to drive the GUI into states that might contain defects. In recent years, model-based methods, that target specific GUI interactions, have been developed. These methods create a formal model of the GUI’s input space from specification of the GUI, visible GUI behaviors and static analysis of the GUI’s program-code. GUIs are typically dynamic in nature, whose user-visible state is guided by underlying program-code and dynamic program-state. This research extends existing model-based GUI testing techniques by modelling interactions between the visible GUI of a GUI-based software and its underlying program-code. The new model is able to, efficiently and effectively, test the GUI in ways that were not possible using existing methods. The thesis is this: Long, useful GUI testcases can be created by examining the interactions between the GUI, of a GUI-based application, and its program-code. To explore this thesis, a model-based GUI testing approach is formulated and evaluated. In this approach, program-code level interactions between GUI event handlers will be examined, modelled and deployed for constructing long GUI testcases. These testcases are able to drive the GUI into states that were not possible using existing models. Implementation and evaluation has been conducted using GUITAR, a fully-automated, open-source GUI testing framework.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Hoy día, se presta la atención a los derivados de furano y a los procesos catalíticos alrededor de éstos para la conversión de los azúcares contenidos en la biomasa lignocelulósica. En este sentido, el furfural también recibe una especial atención como potencial químico para la producción de bioproductos y biocombustibles. Debido a las dificultades presentadas en la separación del furfural en el proceso convencional, en este trabajo se presenta el análisis de la separación para obtener furfural de alta pureza a partir de xilosa deshidratada por destilación reactiva como proceso no convencional, aplicando la teoría básica de análisis estático para obtener la mejor información del proceso de destilación reactiva, obteniendo un esquema tecnológico que permite alcanzar una fracción molar de furfural de aproximadamente 0.9.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Aim: To investigate the effect of implant-abutment angulation and crown material on stress distribution of central incisors. Finite element method was used to simulate the clinical situation of a maxillary right central incisor restored by two different implant-abutment angulations, 15° and 25°, using two different crown materials (IPS E-Max CAD and zirconia). Methods: Two 3D finite element models were specially prepared for this research simulating the abutment angulations. Commercial engineering CAD/CAM package was used to model crown, implant abutment complex and bone (cortical and spongy) in 3D. Linear static analysis was performed by applying a 178 N oblique load. The obtained results were compared with former experimental results. Results: Implant Von Mises stress level was negligibly changed with increasing abutment angulation. The abutment with higher angulation is mechanically weaker and expected to fail at lower loading in comparison with the steeper one. Similarly, screw used with abutment angulation of 25° will fail at lower (about one-third) load value the failure load of similar screw used with abutment angulated by 15°. Conclusions: Bone (cortical and spongy) is insensitive to crown material. Increasing abutment angulation from 15° to 25°, increases stress on cortical bone by about 20% and reduces it by about 12% on spongy bone. Crown fracture resistance is dramatically reduced by increasing abutment angulation. Zirconia crown showed better performance than E-Max one.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente trabajo muestra el avance que se tiene en el proyecto denominado “Diseño y Construcción de un Nano-Satélite”, que se lleva a cabo en la ESIME U.P.-Ticoman del Instituto Politécnico Nacional. Este proyecto tiene como objetivo principal introducir a los alumnos en el que hacer espacial, se trata de un satélite con un peso de un kilogramo y es un cubo de 10 cm de lado y cuya carga útil tiene MEMS (sistema de micro-electromecánicos) que harán las veces de péndulo electrónico, lo anterior y los armónicos gravitacionales permitirán determinar la forma de la tierra. Se presenta el fundamento matemático, los componentes del satélite, el diseño preliminar de la estructura, la manufactura de la estructura, los resultados de un ensaye estructural destructivo y el análisis estático por elementos finitos.