838 resultados para End-to-side neurorrhaphy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A theoretical solution has been obtained for the state of stress in a rectangular plate under a pair of symmetrically placed rigid indenters. The stress distributions along the two central axes have been calculated for a square plate assuming the pressure distribution under the indenters as uniform, parabolic and one resulting from 'constant displacement' on a semiinfinite boundary, for different ratios of indenter-width to side of square. The results are compared with those of photoelastic analysis of Berenbaum and Brodie and the validity of the solution is discussed. The solution has been extended to orthotropic materials and numerical results for one type of coal are given.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The move towards IT outsourcing is the first step towards an environment where compute infrastructure is treated as a service. In utility computing this IT service has to honor Service Level Agreements (SLA) in order to meet the desired Quality of Service (QoS) guarantees. Such an environment requires reliable services in order to maximize the utilization of the resources and to decrease the Total Cost of Ownership (TCO). Such reliability cannot come at the cost of resource duplication, since it increases the TCO of the data center and hence the cost per compute unit. We, in this paper, look into aspects of projecting impact of hardware failures on the SLAs and techniques required to take proactive recovery steps in case of a predicted failure. By maintaining health vectors of all hardware and system resources, we predict the failure probability of resources based on observed hardware errors/failure events, at runtime. This inturn influences an availability aware middleware to take proactive action (even before the application is affected in case the system and the application have low recoverability). The proposed framework has been prototyped on a system running HP-UX. Our offline analysis of the prediction system on hardware error logs indicate no more than 10% false positives. This work to the best of our knowledge is the first of its kind to perform an end-to-end analysis of the impact of a hardware fault on application SLAs, in a live system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An experimental study for transient temperature response and pressure drop in a randomly packed bed at high Reynolds numbers is presented.The packed bed is used as a compact heat exchanger along with a solid-propellant gas generator, to generate room-temperature gases for use in control actuation, air bottle pressurization, etc. Packed beds of lengths 200 and 300 mm were characterized for packing-sphere-based Reynolds numbers ranging from 0.8 x 10(4) to 8.5 x 10(4).The solid packing used in the bed consisted of phi 9.5 mm steel spheres. The bed-to-particle diameter ratio was with the average packed-bed porosity around 0.43. The inlet flow temperature was unsteady and a mesh of spheres was used at either end to eliminate flow entrance and exit effects. Gas temperature and pressure were measured at the entry, exit,and at three axial locations along centerline in the packed beds. The solid packing temperature was measured at three axial locations in the packed bed. A correlation based on the ratio of pressure drop and inlet-flow momentum (Euler number) exhibited an asymptotically decreasing trend with increasing Reynolds number. Axial conduction across the packed bed was found to he negligible in the investigated Reynolds number range. The enthalpy absorption rate to solid packing from hot gases is plotted as a function of a nondimensional time constant for different Reynolds numbers. A longer packed bed had high enthalpy absorption rate at Reynolds number similar to 10(4), which decreased at Reynolds number similar to 10(5). The enthalpy absorption plots can be used for estimating enthalpy drop across packed bed with different material, but for a geometrically similar packing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The reaction of pyrimidine-2-carbonitrile, NaN3 in the presence of Co(NO3)(2)center dot 6H(2)O or MnCl2 center dot 4H(2)O leads to the formation of complexes Co(pmtz)(mu(1,3)-N-3)(H2O)](n) (1) and Mn(pmtz)(mu(1,3)-N-3)(H2O)](n) (2) respectively, under hydrothermal condition pmtz =5-(pyrimidyl)tetrazolate]. These two complexes have been fully characterized by single crystal X-ray diffraction. Complex 1 crystallizes in a non-centrosymmetric space group Aba2 in the orthorhombic system and is found to exhibit ferroelectric behavior, whereas complex 2 crystallizes in the P2(1)/c space group in the monoclinic system. Variable temperature magnetic characterizations in the temperature range of 2-300 K indicate that complex 1 is a canted antiferromagnet (weak ferromagnet) with T-c = 15.9 K. Complex 1 represents a unique example of a multiferroic coordination polymer containing tetrazole as a co-ligand. Complex 2 is a one-dimensional chain of Mn(II) bridged by a well-known antiferromagnetic coupler end-to-end azido ligand. In contrast to the role played by the end-to-end azido pathway in most of the transition metal complexes, complex 2 showed unusual ferromagnetic behavior below 40 K because of spin canting.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation is an onomastic study of variation in women s name phrases in official documents in Finland during the period 1780−1930. The aim is to discuss from a socio-onomastic perspective both the changeover from patronymics to inherited family names and the use of surnames after marriage (i.e. whether women adopted their husbands family names or retained their maiden names), before new laws in this area entered into force in Finland in the early 20th century. In 1920, a law on family names that required fixed names put an end to the use of the patronymic as a person s only surname. After 1929, it was no longer possible for a married woman to retain her maiden name. Methodologically, to explain this development from a socio-onomastic perspective, I have based my study on a syntactic-semantic analysis of the actual name phrases. To be able to demonstrate the extensive material, I have elaborated a scheme to divide the 115 different types of name phrases into 13 main categories. The analysis of the material for Helsinki is based on frequency calculations of the different types of name phrases every thirtieth year, as well as on describing variation in the structure and semantic content of the name phrases, e.g. social variation in the use of titles and epithets. In addition to this, by applying a biographic-genealogical method, I have conducted two case studies of the usage of women s name phrases in the two chosen families. The study is based on parish registers from the period 1780−1929, estate inventory documents from the period 1780−1928, registration forms for liberty of trade from the period 1880−1908, family announcements on newspapers from the period 1829−1888, gravestones from the period 1796−1929 and diaries from the periods 1799−1801 and 1818−1820 providing a corpus of 5 950 name phrases. The syntactic-semantic analysis has revealed the overall picture of various ways of denoting women in official documents. In Helsinki, towards the end of the 19th century, the use of inherited family names seems to be almost fully developed in official contexts. At the late 19th century, a patronymic still appears as the only surname of some working-class women whereas in the early 20th century patronymics were only entered in the parish register as a kind of middle name. In the beginning of the 19th century, most married women were still registered under their maiden names, with a few exceptions among the bourgeoisie and upper class. The comparative analysis of name phrases in diaries, however, indicates that the use of the husband s family name by married women was a much earlier phenomenon in private contexts than in official documents. Keywords: socio-onomastics, syntactic-semantic analysis, name phrase, patronymic, maiden name, husband s family name

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have analyzed the set of inter and intra base pair parameters for each dinucleotide step in single crystal structures of dodecamers, solved at high and medium resolution and all crystallized in P2(1)2(1)2(1) space group. The objective was to identify whether all the structures which have either the Drew-Dickerson (DD) sequence d[CGCGAATTCGCG] with some base modification or related sequence (non-DD), would display the same sequence dependent structural variability about its palindromic sequence, despite the molecule being bent at one end because of similar crystal lattice packing effect. Most of the local doublet parameters for base pairs steps G2-C3 and G10-C11 positions, symmetrically situated about the lateral twofold, were significantly correlated between themselves. In non-DD sequences, significant correlations between these positional parameters were absent. The different range of local step parameter values at each sequence position contributed to the gross feature of smooth helix axis bending in all structures. The base pair parameters in some of the positions, for medium resolution DD sequence, were quite unlike the high-resolution set and encompassed a higher range of values. Twist and slide are the two main parameters that show wider conformational range for the middle region of non-DD sequence structures in comparison to DD sequence structures. On the contrary, the minor and major groove features bear good resemblance between DD and non-DD sequence crystal structure datasets. The sugar-phosphate backbone torsion angles are similar in all structures, in sharp contrast to base pair parameter variation for high and low resolution DD and non-DD sequence structures, consisting of unusual (epsilon =g(-), xi =t) B-II conformation at the 10(th) position of the dodecamer sequence. Thus examining DD and non-DD sequence structures packed in the same crystal lattice arrangement, we infer that inter and intra base pair parameters are as symmetrically equivalent in its value as the symmetry related step for the palindromic DD sequence about lateral two-fold axis. This feature would lead us to agree with the conclusion that DNA conformation is not substantially affected by end-to-end or lateral inter-molecular interaction due to crystal lattice packing effect. Non-DD sequence structures acquire step parameter values which reflect the altered sequence at each of the dodecamer sequence position in the orthorhombic lattice while showing similar gross features of DD sequence structures

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A series of isomeric cationic surfactants (S1-S5) bearing a long alkyl chain that carries a 1,4-phenylene unit and a trimethyl ammonium headgroup was synthesized; the location of the phenyl ring within the alkyl tail was varied in an effort to understand its influence on the amphiphilic properties of the surfactants. The cmc's of the surfactants were estimated using ionic conductivity measurements and isothermal calorimetric titrations (ITC); the values obtained by the two methods were found to be in excellent agreement. The ITC measurements provided additional insight into the various thermodynamic parameters associated with the micellization process. Although all five surfactants have exactly the same molecular formula, their micellar properties were seen to vary dramatically depending on the location of the phenyl ring; the cmc was seen to decrease by almost an order of magnitude when the phenyl ring was moved from the tail end (cmc of S1 is 23 mM) to the headgroup region (cmc of S5 is 3 mM). In all cases, the enthalpy of micellization was negative but the entropy of micellization was positive, suggesting that in all of these systems the formation of micelles is both enthalpically and entropically favored. As expected, the decrease in cmc values upon moving the phenyl ring from the tail end to he headgroup region is accompanied by an increase in the thermodynamic driving force (Delta G) for micellization. To understand further the differences in the micellar structure of these surfactants, small-angle neutron scattering (SANS) measurements were carried out; these measurements reveal that the aggregation number of the micelles increases as the cmc decreases. This increase in the aggregation number is also accompanied by an increase in the asphericity of the micellar aggregate and a decrease in the fractional charge. Geometric packing arguments are presented to account for these changes in aggregation behavior as a function of phenyl ring location.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The self-complementary DNA fragment CCGGCGCCGG crystallizes in the rhombohedral space group R3 with unit cell parameters a = 54.07 angstrom and c = 44.59 angstrom. The structure has been determined by X-ray diffraction methods at 2.2 angstrom resolution and refined to an R value of 16.7%. In the crystal, the decamer forms B-DNA double helices with characteristic groove dimensions: compared with B-DNA of random sequence, the minor groove is wide and deep and the major groove is rather shallow. Local base pair geometries and stacking patterns are within the range commonly observed in B-DNA crystal structures. The duplex bears no resemblance to A-form DNA as might have been expected for a sequence with only GC base pairs. The shallow major groove permits an unusual crystal packing pattern with several direct intermolecular hydrogen bonds between phosphate oxygens and cytosine amino groups. In addition, decameric duplexes form quasi-infinite double helices in the crystal by end-to-end stacking. The groove geometries and accessibilities of this molecule as observed in the crystal may be important for the mode of binding of both proteins and drug molecules to G/C stretches in DNA.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The statistical properties of fractional Brownian walks are used to construct a path integral representation of the conformations of polymers with different degrees of bond correlation. We specifically derive an expression for the distribution function of the chains’ end‐to‐end distance, and evaluate it by several independent methods, including direct evaluation of the discrete limit of the path integral, decomposition into normal modes, and solution of a partial differential equation. The distribution function is found to be Gaussian in the spatial coordinates of the monomer positions, as in the random walk description of the chain, but the contour variables, which specify the location of the monomer along the chain backbone, now depend on an index h, the degree of correlation of the fractional Brownian walk. The special case of h=1/2 corresponds to the random walk. In constructing the normal mode picture of the chain, we conjecture the existence of a theorem regarding the zeros of the Bessel function.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider a wireless sensor network whose main function is to detect certain infrequent alarm events, and to forward alarm packets to a base station, using geographical forwarding. The nodes know their locations, and they sleep-wake cycle, waking up periodically but not synchronously. In this situation, when a node has a packet to forward to the sink, there is a trade-off between how long this node waits for a suitable neighbor to wake up and the progress the packet makes towards the sink once it is forwarded to this neighbor. Hence, in choosing a relay node, we consider the problem of minimizing average delay subject to a constraint on the average progress. By constraint relaxation, we formulate this next hop relay selection problem as a Markov decision process (MDP). The exact optimal solution (BF (Best Forward)) can be found, but is computationally intensive. Next, we consider a mathematically simplified model for which the optimal policy (SF (Simplified Forward)) turns out to be a simple one-step-look-ahead rule. Simulations show that SF is very close in performance to BF, even for reasonably small node density. We then study the end-to-end performance of SF in comparison with two extremal policies: Max Forward (MF) and First Forward (FF), and an end-to-end delay minimising policy proposed by Kim et al. 1]. We find that, with appropriate choice of one hop average progress constraint, SF can be tuned to provide a favorable trade-off between end-to-end packet delay and the number of hops in the forwarding path.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Four new neutral copper azido polymers, Cu-4(N-3)(8)(L-1)(2)](n) (1), Cu-4(N-3)(8)(L-2)(2)](n) (2), Cu-4(N-3)(8)(L-3)(2)](n) (3), and Cu-9(N-3)(18)(L-4)(4)](n) (4) L1-4 are formed in situ by reacting pyridine-2-carboxaldehyde with 22-(methylamino)ethyl]pyridine (mapy, L-1), N,N-dimethylethylenediamine (N,N-dmen, L-2), N,N-diethylethylenediamine (N,N-deen, L-3), and N,N,2,2-tetramethylpropanediamine (N,N,2,2-tmpn, L-4)], have been synthesized by using 0.5 mol equiv of the chelating tridentate ligands with Cu-(NO3)(2)center dot 3H(2)O and an excess of NaN3. Single-crystal X-ray structures show that the basic unit of these complexes, especially 1-3, contains very similar Cu-4(II) building blocks. The overall structure of 3 is two-dimensional, while the other three complexes are one-dimensional in nature. Complex 1 represents a unique example containing hemiaminal ether arrested by copper(R). Complexes 1 and 2 have a rare bridging azido pathway: both end-on and end-to-end bridging azides between a pair of Cu-II centers. Cryomagnetic susceptibility measurements over a wide range of temperature exhibit dominant ferromagnetic behavior in all four complexes. Density functional theory calculations (B3LYP functional) have been performed on complexes 1-3 to provide a qualitative theoretical interpretation of their overall ferromagnetic behavior.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Relay selection combined with buffering of packets of relays can substantially increase the throughput of a cooperative network that uses rateless codes. However, buffering also increases the end-to-end delays due to the additional queuing delays at the relay nodes. In this paper we propose a novel method that exploits a unique property of rateless codes that enables a receiver to decode a packet from non-contiguous and unordered portions of the received signal. In it, each relay, depending on its queue length, ignores its received coded bits with a given probability. We show that this substantially reduces the end-to-end delays while retaining almost all of the throughput gain achieved by buffering. In effect, the method increases the odds that the packet is first decoded by a relay with a smaller queue. Thus, the queuing load is balanced across the relays and traded off with transmission times. We derive explicit necessary and sufficient conditions for the stability of this system when the various channels undergo fading. Despite encountering analytically intractable G/GI/1 queues in our system, we also gain insights about the method by analyzing a similar system with a simpler model for the relay-to-destination transmission times.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web services are now a key ingredient of software services offered by software enterprises. Many standardized web services are now available as commodity offerings from web service providers. An important problem for a web service requester is the web service composition problem which involves selecting the right mix of web service offerings to execute an end-to-end business process. Web service offerings are now available in bundled form as composite web services and more recently, volume discounts are also on offer, based on the number of executions of web services requested. In this paper, we develop efficient algorithms for the web service composition problem in the presence of composite web service offerings and volume discounts. We model this problem as a combinatorial auction with volume discounts. We first develop efficient polynomial time algorithms when the end-to-end service involves a linear workflow of web services. Next we develop efficient polynomial time algorithms when the end-to-end service involves a tree workflow of web services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current standard security practices do not provide substantial assurance about information flow security: the end-to-end behavior of a computing system. Noninterference is the basic semantical condition used to account for information flow security. In the literature, there are many definitions of noninterference: Non-inference, Separability and so on. Mantel presented a framework of Basic Security Predicates (BSPs) for characterizing the definitions of noninterference in the literature. Model-checking these BSPs for finite state systems was shown to be decidable in [8]. In this paper, we show that verifying these BSPs for the more expressive system model of pushdown systems is undecidable. We also give an example of a simple security property which is undecidable even for finite-state systems: the property is a weak form of non-inference called WNI, which is not expressible in Mantel’s BSP framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider a dense ad hoc wireless network comprising n nodes confined to a given two dimensional region of fixed area. For the Gupta-Kumar random traffic model and a realistic interference and path loss model (i.e., the channel power gains are bounded above, and are bounded below by a strictly positive number), we study the scaling of the aggregate end-to-end throughput with respect to the network average power constraint, P macr, and the number of nodes, n. The network power constraint P macr is related to the per node power constraint, P macr, as P macr = np. For large P, we show that the throughput saturates as Theta(log(P macr)), irrespective of the number of nodes in the network. For moderate P, which can accommodate spatial reuse to improve end-to-end throughput, we observe that the amount of spatial reuse feasible in the network is limited by the diameter of the network. In fact, we observe that the end-to-end path loss in the network and the amount of spatial reuse feasible in the network are inversely proportional. This puts a restriction on the gains achievable using the cooperative communication techniques studied in and, as these rely on direct long distance communication over the network.