903 resultados para variable structure system
Resumo:
Dissertation for the Master’s Degree in Structural and Functional Biochemistry
Resumo:
Dissertation presented to obtain the Ph.D degree in Biology
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
Phenolic acids are aromatic secondary plant metabolites, widely spread throughout the plant kingdom. Due to their biological and pharmacological properties, they have been playing an important role in phytotherapy and consequently techniques for their separation and purification are in need. This thesis aims at exploring new sustainable separation processes based on ionic liquids (ILs) in the extraction of biologically active phenolic acids. For that purpose, three phenolic acids with similar chemical structures were selected: cinnamic acid, p-coumaric acid and caffeic acid. In the last years, it has been shown that ionic liquids-based aqueous biphasic systems (ABSs) are valid alternatives for the extraction, recovery and purification of biomolecules when compared to conventional ABS or extractions carried out with organic solvents. In particular, cholinium-based ILs represent a clear step towards a greener chemistry, while providing means for the implementation of efficient techniques for the separation and purification of biomolecules. In this work, ABSs were implemented using cholinium carboxylate ILs using either high charge density inorganic salt (K3PO4) or polyethylene glycol (PEG) to promote the phase separation of aqueous solutions containing three different phenolic acids. These systems allow for the evaluation of effect of chemical structure of the anion on the extraction efficiency. Only one imidazolium-based IL was used in order to establish the effect of the cation chemical structure. The selective extraction of one single acid was also researched. Overall, it was observed that phenolic acids display very complex behaviours in aqueous solutions, from dimerization to polymerization and also hetero-association are quite frequent phenomena, depending on the pH conditions. These phenomena greatly hinder the correct quantification of these acids in solution.
Resumo:
With the recent advances in technology and miniaturization of devices such as GPS or IMU, Unmanned Aerial Vehicles became a feasible platform for a Remote Sensing applications. The use of UAVs compared to the conventional aerial platforms provides a set of advantages such as higher spatial resolution of the derived products. UAV - based imagery obtained by a user grade cameras introduces a set of problems which have to be solved, e. g. rotational or angular differences or unknown or insufficiently precise IO and EO camera parameters. In this work, UAV - based imagery of RGB and CIR type was processed using two different workflows based on PhotoScan and VisualSfM software solutions resulting in the DSM and orthophoto products. Feature detection and matching parameters influence on the result quality as well as a processing time was examined and the optimal parameter setup was presented. Products of the both workflows were compared in terms of a quality and a spatial accuracy. Both workflows were compared by presenting the processing times and quality of the results. Finally, the obtained products were used in order to demonstrate vegetation classification. Contribution of the IHS transformations was examined with respect to the classification accuracy.
Resumo:
The “CMS Safety Closing Sensors System” (SCSS, or CSS for brevity) is a remote monitoring system design to control safety clearance and tight mechanical movements of parts of the CMS detector, especially during CMS assembly phases. We present the different systems that makes SCSS: its sensor technologies, the readout system, the data acquisition and control software. We also report on calibration and installation details, which determine the resolution and limits of the system. We present as well our experience from the operation of the system and the analysis of the data collected since 2008. Special emphasis is given to study positioning reproducibility during detector assembly and understanding how the magnetic fields influence the detector structure.
Resumo:
INTRODUCTION: Tuberculosis (TB) control is linked to the availability of qualified methods for microbiological diagnostics; however, microscopy with limited sensitivity is the only method available in many locations. The objective of this study was to evaluate the introduction of culture, drug susceptibility testing (DST), and genotyping in the routine of a Municipal Program of Tuberculosis Control. METHODS: Direct microscopy of sputum and culture in Ogawa-Kudoh were performed on 1,636 samples from 787 patients. DST of positive cultures was performed by resazurin microtiter assay and genotyping by mycobacterial interspersed repetitive units-variable number tandem repeat. RESULTS: A total 91 patients with TB were identified. The culture increased case detection by 32% compared with the microscopy; acquired resistance was 3.3% and the genotyping showed high genetic diversity. CONCLUSIONS: Ogawa-Kudoh contributed significantly to the increase in case detection and is suitable for implementation in poor-resource locations. The acquired resistance rate was lower than that reported in a recent Brazilian survey. The high genetic diversity is possibly related to the high TB prevalence in the population, as well as to early detection and suitable treatment of patients. The interaction between research and health care is important for reorienting the practice, transferring technology, and improving TB control.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
Autor proof
Resumo:
Dissertação de mestrado em Bioinformática
Resumo:
In this work we perform a comparison of two different numerical schemes for the solution of the time-fractional diffusion equation with variable diffusion coefficient and a nonlinear source term. The two methods are the implicit numerical scheme presented in [M.L. Morgado, M. Rebelo, Numerical approximation of distributed order reaction- diffusion equations, Journal of Computational and Applied Mathematics 275 (2015) 216-227] that is adapted to our type of equation, and a colocation method where Chebyshev polynomials are used to reduce the fractional differential equation to a system of ordinary differential equations
Resumo:
Tese de Doutoramento em Ciência e Engenharia de Polímeros e Compósitos
Resumo:
A new integrated mathematical model for the simulation of an offshore wind system having a rectifier input voltage malfunction at one phase is presented in this paper. The mathematical model considers an offshore variable-speed wind turbine on a floating platform, equipped with a permanent magnet synchronous generator using full-power three-level converter to inject energy into the electric network, through a high voltage direct current transmission submarine cable. The model for the drive train is a discrete three mass, incorporating the dynamic of the moving surface. A case study is presented to access conclusion about the malfunction.