962 resultados para Intrusion errors


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As condições de ambiente térmico e aéreo, no interior de instalações para animais, alteram-se durante o dia, devido à influência do ambiente externo. Para que análises estatísticas e geoestatísticas sejam representativas, uma grande quantidade de pontos distribuídos espacialmente na área da instalação deve ser monitorada. Este trabalho propõe que a variação no tempo das variáveis ambientais de interesse para a produção animal, monitoradas no interior de instalações para animais, pode ser modelada com precisão a partir de registros discretos no tempo. O objetivo deste trabalho foi desenvolver um método numérico para corrigir as variações temporais dessas variáveis ambientais, transformando os dados para que tais observações independam do tempo gasto durante a aferição. O método proposto aproximou os valores registrados com retardos de tempo aos esperados no exato momento de interesse, caso os dados fossem medidos simultaneamente neste momento em todos os pontos distribuídos espacialmente. O modelo de correção numérica para variáveis ambientais foi validado para o parâmetro ambiental temperatura do ar, sendo que os valores corrigidos pelo método não diferiram pelo teste Tukey, a 5% de probabilidade dos valores reais registrados por meio de dataloggers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Systems based on artificial neural networks have high computational rates due to the use of a massive number of simple processing elements and the high degree of connectivity between these elements. This paper presents a novel approach to solve robust parameter estimation problem for nonlinear model with unknown-but-bounded errors and uncertainties. More specifically, a modified Hopfield network is developed and its internal parameters are computed using the valid-subspace technique. These parameters guarantee the network convergence to the equilibrium points. A solution for the robust estimation problem with unknown-but-bounded error corresponds to an equilibrium point of the network. Simulation results are presented as an illustration of the proposed approach. Copyright (C) 2000 IFAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aims of this study were to analyze the histomorphology of developing permanent teeth whose primary teeth had suffered traumatic intrusion, as well as to compare the influence of immediate extraction of the intruded tooth to passive re-eruption. Nine dogs from 45 to 50 days old were submitted to the intrusion of the maxillary central and lateral primary incisors using a force applicator adapted to the teeth incisal cuspids. The right side intruded teeth were kept in their sockets and the ones on the left side were extracted 30 min later. After a postoperatory periods of 30 and 60 days, four (group 1) and five (group 2) dogs, respectively, were killed by perfusion. The histological evaluations showed that, in group 1, alterations had occurred in the odontoblastic layer and deposition of the enamel matrix had taken place in some specimens while in group 2, a portion of non-mineralized matrix was observed. We concluded that the morphological changes were because of the immediate trauma of intrusion. No differences were found between the groups where the primary tooth was immediately extracted or left to passively re-erupt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To assess orthodontic intrusion effects on periodontal tissues in dogs' pre-molars with class III furcations treated with open flap debridement (OFD) or with guided tissue regeneration (GTR) associated to bone autograft (BA).Material and Methods: Class III furcations were created in the pre-molars of seven mongrel dogs. After 75 days, teeth were randomly treated with OFD or GTR/BA. After 1 month, metallic crowns were assembled on pre-molars and connected apically to mini-implants by nickel-titanium springs. Teeth were randomly assigned to orthodontic intrusion (OFD+I and GTR/BA+I) groups or no movement (OFD and GTR/BA) groups. Dogs were sacrificed after 3 months of movement and 1 month retention.Results: All class III furcations were closed or reduced to class II or I in the intrusion groups, while 50% of the lesions in non-moved teeth remained unchanged. Intruded teeth presented higher probing depth and lower gingival marginal level than non-moved teeth (p < 0.01). Clinical attachment gain was reduced in the intrusion groups by the end of retention (p < 0.05). OFD+I presented smaller soft tissue area and larger bone tissue area than other groups (p < 0.05).Conclusion: Orthodontic intrusion with anchorage via mini-implants improved the healing of class III furcation defects after OFD in dogs. GTR/BA impaired those results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several factors render carotenoid determination inherently difficult. Thus, in spite of advances in analytical instrumentation, discrepancies in quantitative results on carotenoids can be encountered in the international literature. A good part of the errors comes from the pre-chromatographic steps such as sampling scheme that does not yield samples representative of the food lots under investigation; sample preparation which does not maintain representativity and guarantee homogeneity of the analytical sample; incomplete extraction; physical losses of carotenoids during the various steps, especially during partition or washing and by adsorption to glass walls of containers; isomerization and oxidation of carotenoids during analysis. on the otherhand, although currently considered the method of choice for carotenoids, high performance liquid chromatography (HPLC) is subject to various sources of errors, such as: incompatibility of the injection solvent and the mobile phase, resulting in distorted or split peaks; erroneous identification; unavailability, impurity and instability of carotenoid standards; quantification of highly overlapping peaks; low recovery from the HPLC column; errors in the preparation of standard solutions and in the calibration procedure; calculation errors. Illustrations of the possible errors in the quantification of carotenoids by HPLC are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

According to the working memory model, the phonological loop is the component of working memory specialized in processing and manipulating limited amounts of speech-based information. The Children's Test of Nonword Repetition (CNRep) is a suitable measure of phonological short-term memory for English-speaking children, which was validated by the Brazilian Children's Test of Pseudoword Repetition (BCPR) as a Portuguese-language version. The objectives of the present study were: i) to investigate developmental aspects of the phonological memory processing by error analysis in the nonword repetition task, and ii) to examine phoneme (substitution, omission and addition) and order (migration) errors made in the BCPR by 180 normal Brazilian children of both sexes aged 4-10, from preschool to 4th grade. The dominant error was substitution [F(3,525) = 180.47; P < 0.0001]. The performance was age-related [F(4,175) = 14.53; P < 0.0001]. The length effect, i.e., more errors in long than in short items, was observed [F(3,519) = 108.36; P < 0.0001]. In 5-syllable pseudowords, errors occurred mainly in the middle of the stimuli, before the syllabic stress [F(4,16) = 6.03; P = 0.003]; substitutions appeared more at the end of the stimuli, after the stress [F(12,48) = 2.27; P = 0.02]. In conclusion, the BCPR error analysis supports the idea that phonological loop capacity is relatively constant during development, although school learning increases the efficiency of this system. Moreover, there are indications that long-term memory contributes to holding memory trace. The findings were discussed in terms of distinctiveness, clustering and redintegration hypotheses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to evaluate, through histologic examination, the effect of surgical repositioning of intruded dog teeth upon the pulpal and surrounding tissues. Thirty teeth in 10 adult dogs, aged 2-3 years, were used. Fifteen teeth were intruded, surgically repositioned and fixed using orthodontics wire, composite resin, and enamel acid conditioning. All these teeth served as the experimental group. The remaining intruded teeth were not treated ( control group). The animals were sacrificed to allow observations at 7,15, and 30 post-operative days. The maxillary and mandibular archs were removed and processed for histologic exam. Based on the methodology and observed results, we concluded that: pulpal necrosis, external root resorption and ankylosis were common sequelae to severe traumatic intrusion; a careful immediate surgical repositioning of severed intruded permanent tooth with complete root formation has many advantages with few disadvantages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.