938 resultados para UNIX (Operating System)
Resumo:
CONCLUSION: Our self-developed planning and navigation system has proven its capacity for accurate surgery on the anterior and lateral skull base. With the incorporation of augmented reality, image-guided surgery will evolve into 'information-guided surgery'. OBJECTIVE: Microscopic or endoscopic skull base surgery is technically demanding and its outcome has a great impact on a patient's quality of life. The goal of the project was aimed at developing and evaluating enabling navigation surgery tools for simulation, planning, training, education, and performance. This clinically applied technological research was complemented by a series of patients (n=406) who were treated by anterior and lateral skull base procedures between 1997 and 2006. MATERIALS AND METHODS: Optical tracking technology was used for positional sensing of instruments. A newly designed dynamic reference base with specific registration techniques using fine needle pointer or ultrasound enables the surgeon to work with a target error of < 1 mm. An automatic registration assessment method, which provides the user with a color-coded fused representation of CT and MR images, indicates to the surgeon the location and extent of registration (in)accuracy. Integration of a small tracker camera mounted directly on the microscope permits an advantageous ergonomic way of working in the operating room. Additionally, guidance information (augmented reality) from multimodal datasets (CT, MRI, angiography) can be overlaid directly onto the surgical microscope view. The virtual simulator as a training tool in endonasal and otological skull base surgery provides an understanding of the anatomy as well as preoperative practice using real patient data. RESULTS: Using our navigation system, no major complications occurred in spite of the fact that the series included difficult skull base procedures. An improved quality in the surgical outcome was identified compared with our control group without navigation and compared with the literature. The surgical time consumption was reduced and more minimally invasive approaches were possible. According to the participants' questionnaires, the educational effect of the virtual simulator in our residency program received a high ranking.
Resumo:
During endoscopic surgery, it is difficult to ascertain the anatomical landmarks once the anatomy is fiddled with or if the operating area is filled with blood. An augmented reality system will enhance the endoscopic view and further enable surgeons to view hidden critical structures or the results of preoperative planning.
Resumo:
In the current market system, power systems are operated at higher loads for economic reasons. Power system stability becomes a genuine concern in such operating conditions. In case of failure of any larger component, the system may become stressed. These events may start cascading failures, which may lead to blackouts. One of the main reasons of the major recorded blackout events has been the unavailability of system-wide information. Synchrophasor technology has the capability to provide system-wide real time information. Phasor Measurement Units (PMUs) are the basic building block of this technology, which provide the Global Positioning System (GPS) time-stamped voltage and current phasor values along with the frequency. It is being assumed that synchrophasor data of all the buses is available and thus the whole system is fully observable. This information can be used to initiate islanding or system separation to avoid blackouts. A system separation strategy using synchrophasor data has been developed to answer the three main aspects of system separation: (1) When to separate: One class support machines (OC-SVM) is primarily used for the anomaly detection. Here OC-SVM was used to detect wide area instability. OC-SVM has been tested on different stable and unstable cases and it is found that OC-SVM has the capability to detect the wide area instability and thus is capable to answer the question of “when the system should be separated”. (2) Where to separate: The agglomerative clustering technique was used to find the groups of coherent buses. The lines connecting different groups of coherent buses form the separation surface. The rate of change of the bus voltage phase angles has been used as the input to this technique. This technique has the potential to exactly identify the lines to be tripped for the system separation. (3) What to do after separation: Load shedding was performed approximately equal to the sum of power flows along the candidate system separation lines should be initiated before tripping these lines. Therefore it is recommended that load shedding should be initiated before tripping the lines for system separation.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
This study assessed if hospital-wide implementation of a needleless intravenous connection system reduces the number of reported percutaneous injuries, overall and those specifically due to intravenous connection activities.^ Incidence rates were compared before and after hospital-wide implementation of a needleless intravenous system at two hospitals, a full service general hospital and a pediatric hospital. The years 1989-1991 were designated as pre-implementation and 1993 was designated as post-implementation. Data from 1992 were not included in the effectiveness evaluation to allow employees to become familiar with use of the new device. The two hospitals showed rate ratios of 1.37 (95% CI = 1.22-1.54, p $\le$.0001) and 1.63 (95% CI = 1.34-1.97, p $\le$.0001), or a 27.1% and a 38.6% reduction in overall injury rate, respectively. Rate ratios for intravenous connection injuries were 2.67 (95% CI = 1.89-3.78, p $\le$.0001) and 3.35 (95% CI = 1.87-6.02, p $\le$.0001), or a 62.5% and a 69.9% reduction in injury rate, respectively. Rate ratios for all non-intravenous connection injuries were calculated to control for factors other than device implementation that may have been operating to reduce the injury rate. These rate ratios were lower, 1.21 and 1.44, demonstrating the magnitude of injury reduction due to factors other than device implementation. It was concluded that the device was effective in reduction of numbers of reported percutaneous injuries.^ Use-effectiveness of the system was also assessed by a survey of randomly selected device users to determine satisfaction with the device, frequency of use and barriers to use. Four hundred seventy-eight surveys were returned for a response rate of 50.9%. Approximately 94% of respondents at both hospitals expressed satisfaction with the needleless system and recommended continued use. The survey also revealed that even though over 50% of respondents report using the device "always" or "most of the time" for intravenous medication administration, flushing lines, and connecting secondary intravenous lines, needles were still being used for these same activities. Compatibility, accessibility and other technical problems were reported as reasons for using needles for these activities. These problems must be addressed, by both manufacturers and users, before the needleless system will be effective in prevention of all intravenous connection injuries. ^
Resumo:
In this paper, we present a novel technique for the removal of astigmatism in submillimeter-wave optical systems through employment of a specific combination of so-called astigmatic off-axis reflectors. This technique treats an orthogonally astigmatic beam using skew Gaussian beam analysis, from which an anastigmatic imaging network is derived. The resultant beam is considered truly stigmatic, with all Gaussian beam parameters in the orthogonal directions being matched. This is thus considered an improvement over previous techniques wherein a beam corrected for astigmatism has only the orthogonal beam amplitude radii matched, with phase shift and phase radius of curvature not considered. This technique is computationally efficient, negating the requirement for computationally intensive numerical analysis of shaped reflector surfaces. The required optical surfaces are also relatively simple to implement compared to such numerically optimized shaped surfaces. This technique is implemented in this work as part of the complete optics train for the STEAMR antenna. The STEAMR instrument is envisaged as a mutli-beam limb sounding instrument operating at submillimeter wavelengths. The antenna optics arrangement for this instrument uses multiple off-axis reflectors to control the incident radiation and couple them to their corresponding receiver feeds. An anastigmatic imaging network is successfully implemented into an optical model of this antenna, and the resultant design ensures optimal imaging of the beams to the corresponding feed horns. This example also addresses the challenges of imaging in multi-beam antenna systems.
Resumo:
BACKGROUND No reliable tool to predict outcome of acute kidney injury (AKI) exists. HYPOTHESIS A statistically derived scoring system can accurately predict outcome in dogs with AKI managed with hemodialysis. ANIMALS One hundred and eighty-two client-owned dogs with AKI. METHODS Logistic regression analyses were performed initially on clinical variables available on the 1st day of hospitalization for relevance to outcome. Variables with P< or = .1 were considered for further analyses. Continuous variables outside the reference range were divided into quartiles to yield quartile-specific odds ratios (ORs) for survival. Models were developed by incorporating weighting factors assigned to each quartile based on the OR, using either the integer value of the OR (Model A) or the exact OR (Models B or C, when the etiology was known). A predictive score for each model was calculated for each dog by summing all weighting factors. In Model D, actual values for continuous variables were used in a logistic regression model. Receiver-operating curve analyses were performed to assess sensitivities, specificities, and optimal cutoff points for all models. RESULTS Higher scores were associated with decreased probability of survival (P < .001). Models A, B, C, and D correctly classified outcomes in 81, 83, 87, and 76% of cases, respectively, and optimal sensitivities/specificities were 77/85, 81/85, 83/90 and 92/61%, respectively. CONCLUSIONS AND CLINICAL RELEVANCE The models allowed outcome prediction that corresponded with actual outcome in our cohort. However, each model should be validated further in independent cohorts. The models may also be useful to assess AKI severity.
Resumo:
This paper presents the capabilities of a Space-Based Space Surveillance (SBSS) demonstration mission for Space Surveillance and Tracking (SST) based on a micro- satellite platform. The results have been produced in the frame of ESA’s "As sessment Study for Space Based Space Surveillance Demonstration Mission (Phase A) " performed by the Airbus DS consortium. Space Surveillance and Tracking is part of Space Situational Awareness (SSA) and covers the detection, tracking and cataloguing of spa ce debris and satellites. Derived SST services comprise a catalogue of these man-made objects, collision warning, detection and characterisation of in-orbit fragmentations, sub-catalogue debris characterisation, etc. The assessment of SBSS in an SST system architecture has shown that both an operational SBSS and also already a well - designed space-based demonstrator can provide substantial performance in terms of surveillance and tracking of beyond - LEO objects. Especially the early deployment of a demonstrator, possible by using standard equipment, could boost initial operating capability and create a self-maintained object catalogue. Unlike classical technology demonstration missions, the primary goal is the demonstration and optimisation of the functional elements in a complex end-to-end chain (mission planning, observation strategies, data acquisition, processing and fusion, etc.) until the final products can be offered to the users. The presented SBSS system concept takes the ESA SST System Requirements (derived within the ESA SSA Preparatory Program) into account and aims at fulfilling some of the SST core requirements in a stand-alone manner. The evaluation of the concept has shown that an according solution can be implemented with low technological effort and risk. The paper presents details of the system concept, candidate micro - satellite platforms, the observation strategy and the results of performance simulations for GEO coverage and cataloguing accuracy
Resumo:
This paper presents the capabilities of a Space-Based Space Surveillance (SBSS) demonstration mission for Space Surveillance and Tracking (SST) based on a micro-satellite platform. The results have been produced in the frame of ESA’s "Assessment Study for Space Based Space Surveillance Demonstration Mission" performed by the Airbus Defence and Space consortium. The assessment of SBSS in an SST system architecture has shown that both an operational SBSS and also already a well- designed space-based demonstrator can provide substantial performance in terms of surveillance and tracking of beyond-LEO objects. Especially the early deployment of a demonstrator, possible by using standard equipment, could boost initial operating capability and create a self-maintained object catalogue. Furthermore, unique statistical information about small-size LEO debris (mm size) can be collected in-situ. Unlike classical technology demonstration missions, the primary goal is the demonstration and optimisation of the functional elements in a complex end-to-end chain (mission planning, observation strategies, data acquisition, processing, etc.) until the final products can be offered to the users and with low technological effort and risk. The SBSS system concept takes the ESA SST System Requirements into account and aims at fulfilling SST core requirements in a stand-alone manner. Additionally, requirements for detection and characterisation of small-sizedLEO debris are considered. The paper presents details of the system concept, candidate micro-satellite platforms, the instrument design and the operational modes. Note that the detailed results of performance simulations for space debris coverage and cataloguing accuracy are presented in a separate paper “Capability of a Space-based Space Surveillance System to Detect and Track Objects in GEO, MEO and LEO Orbits” by J. Silha (AIUB) et al., IAC-14, A6, 1.1x25640.
Resumo:
BACKGROUND: We evaluated Swiss slaughterhouse data for integration in a national syndromic surveillance system for the early detection of emerging diseases in production animals. We analysed meat inspection data for cattle, pigs and small ruminants slaughtered between 2007 and 2012 (including emergency slaughters of sick/injured animals); investigating patterns in the number of animals slaughtered and condemned; the reasons invoked for whole carcass condemnations; reporting biases and regional effects. RESULTS: Whole carcass condemnation rates were fairly uniform (1-2‰) over time and between the different types of production animals. Condemnation rates were much higher and less uniform following emergency slaughters. The number of condemnations peaked in December for both cattle and pigs, a time when individuals of lower quality are sent to slaughter when hay and food are limited and when certain diseases are more prevalent. Each type of production animal was associated with a different profile of condemnation reasons. The most commonly reported one was "severe lesions" for cattle, "abscesses" for pigs and "pronounced weight loss" for small ruminants. These reasons could constitute valuable syndromic indicators as they are unspecific clinical manifestations of a large range of animal diseases (as well as potential indicators of animal welfare). Differences were detected in the rate of carcass condemnation between cantons and between large and small slaughterhouses. A large percentage (>60% for all three animal categories) of slaughterhouses operating never reported a condemnation between 2007 and 2012, a potential indicator of widespread non-reporting bias in our database. CONCLUSIONS: The current system offers simultaneous coverage of cattle, pigs and small ruminants for the whole of Switzerland; and traceability of each condemnation to its farm of origin. The number of condemnations was significantly linked to the number of slaughters, meaning that the former should be always be offset by the later in analyses. Because this denominator is only communicated at the end of the month, condemnations may currently only be monitored on a monthly basis. Coupled with the lack of timeliness (30-60 days delay between condemnation and notification), this limits the use of the data for early-detection.
Resumo:
OBJECTIVES Left ventricular assist devices are an important treatment option for patients with heart failure alter the hemodynamics in the heart and great vessels. Because in vivo magnetic resonance studies of patients with ventricular assist devices are not possible, in vitro models represent an important tool to investigate flow alterations caused by these systems. By using an in vitro magnetic resonance-compatible model that mimics physiologic conditions as close as possible, this work investigated the flow characteristics using 4-dimensional flow-sensitive magnetic resonance imaging of a left ventricular assist device with outflow via the right subclavian artery as commonly used in cardiothoracic surgery in the recent past. METHODS An in vitro model was developed consisting of an aorta with its supra-aortic branches connected to a left ventricular assist device simulating the pulsatile flow of the native failing heart. A second left ventricular assist device supplied the aorta with continuous flow via the right subclavian artery. Four-dimensional flow-sensitive magnetic resonance imaging was performed for different flow rates of the left ventricular assist device simulating the native heart and the left ventricular assist device providing the continuous flow. Flow characteristics were qualitatively and quantitatively evaluated in the entire vessel system. RESULTS Flow characteristics inside the aorta and its upper branching vessels revealed that the right subclavian artery and the right carotid artery were solely supported by the continuous-flow left ventricular assist device for all flow rates. The flow rates in the brain-supplying arteries are only marginally affected by different operating conditions. The qualitative analysis revealed only minor effects on the flow characteristics, such as weakly pronounced vortex flow caused by the retrograde flow via the brachiocephalic artery. CONCLUSIONS The results indicate that, despite the massive alterations in natural hemodynamics due to the retrograde flow via the right subclavian and brachiocephalic arteries, there are no drastic consequences on the flow in the brain-feeding arteries and the flow characteristics in the ascending and descending aortas. It may be beneficial to adjust the operating condition of the left ventricular assist device to the residual function of the failing heart.
Resumo:
Heater-cooler units (HCUs) were recently identified as a source of Mycobacterium chimaera causing surgical site infections. We investigated transmission of this bacterium from HCUs to the surgical field by using a thermic anemometer and particle counter, videotape of an operating room equipped with an ultraclean laminar airflow ventilation system, and bacterial culture sedimentation plates in a nonventilated room. Smoke from the HCU reached the surgical field in 23 s by merging with ultraclean air. The HCU produced on average 5.2, 139, and 14.8 particles/min in the surgical field at positions Off, On/oriented toward, and On/oriented away, respectively. Culture plates were positive for M. chimaera <5 m from the HCU in the test room. These experiments confirm airborne transmission of M. chimaera aerosols from a contaminated HCU to an open surgical field despite ultraclean air ventilation. Efforts to mitigate infectious risks during surgery should consider contamination from water sources and airflow-generating devices.
Resumo:
LatLongConverter converts positions from geodetic system to Gauss-Krüger or UTM coordinates. This program is distributed as freeware for the operating systems Microsoft Windows, Apple OS X and Linux.
Resumo:
We describe lpdoc, a tool which generates documentation manuals automatically from one or more logic program source files, written in ISO-Prolog, Ciao, and other (C)LP languages. It is particularly useful for documenting library modules, for which it automatically generates a rich description of the module interface. However, it can also be used quite successfully to document full applications. A fundamental advantage of using lpdoc is that it helps maintaining a true correspondence between the program and its documentation, and also identifying precisely to what version of the program a given printed manual corresponds. The quality of the documentation generated can be greatly enhanced by including within the program text assertions (declarations with types, modes, etc.) for the predicates in the program, and machine-readable comments. One of the main novelties of lpdoc is that these assertions and comments are written using the Ciao system assertion language, which is also the language of communication between the compiler and the user and between the components of the compiler. This allows a significant synergy among specification, documentation, optimization, etc. A simple compatibility library allows conventional (C)LP systems to ignore these assertions and comments and treat normally programs documented in this way. The documentation can be generated in many formats including texinfo, dvi, ps, pdf, info, html/css, Unix nroff/man, Windows help, etc., and can include bibliographic citations and images. lpdoc can also generate “man” pages (Unix man page format), nicely formatted plain ascii “readme” files, installation scripts useful when the manuals are included in software distributions, brief descriptions in html/css or info formats suitable for inclusion in on-line indices of manuals, and even complete WWW and info sites containing on-line catalogs of documents and software distributions. The lpdoc manual, all other Ciao system manuals, and parts of this paper are generated by lpdoc.
Resumo:
Autonomous systems refer to systems capable of operating in a real world environment without any form of external control for extended periods of time. Autonomy is a desired goal for every system as it improves its performance, safety and profit. Ontologies are a way to conceptualize the knowledge of a specific domain. In this paper an ontology for the description of autonomous systems as well as for its development (engineering) is presented and applied to a process. This ontology is intended to be applied and used to generate final applications following a model driven methodology.