865 resultados para Cipher and telegraph codes
Resumo:
The aim of this study was to determine the prevalence of enamel white spots and the quality of oral hygiene in children up to 36 months old, in municipalities with different fluoride levels in the water supply, analyzing the contribution of several variables. After approval of the Ethics Committee, the parents signed an informed consent form and were interviewed about their educational level, economic classification of the family, nursing habits, use of toothpaste, access to dental service and other information. The children were clinically examined using the same codes and criteria established by the WHO (World Health Organization) and ADA (American Dental Association). The data were processed and analyzed with the Epi-info software program, version 3.2, and Microsoft Excel. Fisher's exact test (p<0.05) was applied to assess the association among the variables. The enamel white spot prevalence was 30.8% and the age group, duration of the bedtime milk feeding habit, age of initial practice of oral hygiene and presence of caries lesions with cavitation were considered statistically significant with regard to enamel white spot prevalence (p < 0.05). No association was found between oral hygiene quality and the study variables. © 2009 Sociedade Brasileira de Pesquisa Odontológica.
Resumo:
The GEANT4 simulations are essential for the development of medical tomography with proton beams pCT. In the case of thin absorbers the latest releases of GEANT4 generate very similar final spectra which agree well with the results of other popular Monte Carlo codes like TRIM/SRIM, or MCNPX. For thick absorbers, however, the disagreements became evident. In a part, these disagreements are due to the known contradictions in the NIST PSTAR and SRIM reference data. Therefore, it is interesting to compare the GEANT4 results with each other, with experiment, and with diverse code results in a reduced form, which is free from this kind of doubts. In this work such comparison is done within the Reduced Calibration Curve concept elaborated for the proton beam tomography. © 2010 IEEE.
Resumo:
Includes bibliography
Resumo:
This paper describes strategies and techniques to perform modeling and automatic mesh generation of the aorta artery and its tunics (adventitia, media and intima walls), using open source codes. The models were constructed in the Blender package and Python scripts were used to export the data necessary for the mesh generation in TetGen. The strategies proposed are able to provide meshes of complicated and irregular volumes, with a large number of mesh elements involved (12,000,000 tetrahedrons approximately). These meshes can be used to perform computational simulations by Finite Element Method (FEM). © Published under licence by IOP Publishing Ltd.
Resumo:
In this work, we propose an innovative methodology to extend the construction of minimum and non-minimum delay perfect codes as a subset of cyclic division algebras over ℚ(ζ3), where the signal constellations are isomorphic to the hexagonal An 2 -rotated lattice, for any channel of any dimension n such that gcd{n, 3) = 1.
Resumo:
The major histocompatibility complex (MHC) in mammals codes for antigen-presenting proteins. For this reason, the MHC is of great importance for immune function and animal health. Previous studies revealed this gene-dense and polymorphic region in river buffalo to be on the short arm of chromosome 2, which is homologous to cattle chromosome 23. Using cattle-derived STS markers and a river buffalo radiation hybrid (RH) panel (BBURH5000), we generated a high-resolution RH map of the river buffalo MHC region. The buffalo MHC RH map (cR5000) was aligned with the cattle MHC RH map (cR 12000) to compare gene order. The buffalo MHC had similar organization to the cattle MHC, with class II genes distributed in two segments, class IIa and class IIb. Class IIa was closely associated with the class I and class III regions, and class IIb was a separate cluster. A total of 53 markers were distributed into two linkage groups based on a two-point LOD score threshold of ≥8. The first linkage group included 32 markers from class IIa, class I and class III. The second linkage group included 21 markers from class IIb. Bacterial artificial chromosome clones for seven loci were mapped by fluorescence in situ hybridization on metaphase chromosomes using single- and double-color hybridizations. The order of cytogenetically mapped markers in the region corroborated the physical order of markers obtained from the RH map and served as anchor points to align and orient the linkage groups. © 2012 The Authors, Animal Genetics © 2012 Stichting International Foundation for Animal Genetics.
Resumo:
Includes bibliography.
Resumo:
ABSTRACT: In this work we are concerned with the existence and uniqueness of T -periodic weak solutions for an initial-boundary value problem associated with nonlinear telegraph equations typein a domain. Our arguments rely on elliptic regularization technics, tools from classical functional analysis as well as basic results from theory of monotone operators.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The Finite Element Method (FEM) is a way of numerical solution applied in different areas, as simulations used in studies to improve cardiac ablation procedures. For this purpose, the meshes should have the same size and histological features of the focused structures. Some methods and tools used to generate tetrahedral meshes are limited mainly by the use conditions. In this paper, the integration of Open Source Softwares is presented as an alternative to solid modeling and automatic mesh generation. To demonstrate its efficiency, the cardiac structures were considered as a first application context: atriums, ventricles, valves, arteries and pericardium. The proposed method is feasible to obtain refined meshes in an acceptable time and with the required quality for simulations using FEM.
Resumo:
Cognitive radio is a growing zone in wireless communication which offers an opening in complete utilization of incompetently used frequency spectrum: deprived of crafting interference for the primary (authorized) user, the secondary user is indorsed to use the frequency band. Though, scheming a model with the least interference produced by the secondary user for primary user is a perplexing job. In this study we proposed a transmission model based on error correcting codes dealing with a countable number of pairs of primary and secondary users. However, we obtain an effective utilization of spectrum by the transmission of the pairs of primary and secondary users' data through the linear codes with different given lengths. Due to the techniques of error correcting codes we developed a number of schemes regarding an appropriate bandwidth distribution in cognitive radio.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
A Goppa code is described in terms of a polynomial, known as Goppa polynomial, and in contrast to cyclic codes, where it is difficult to estimate the minimum Hamming distance d from the generator polynomial. Furthermore, a Goppa code has the property that d ≥ deg(h(X))+1, where h(X) is a Goppa polynomial. In this paper, we present a decoding principle for Goppa codes constructed by generalized polynomials, which is based on modified Berlekamp-Massey algorithm.
Resumo:
The frequency spectrums are inefficiently utilized and cognitive radio has been proposed for full utilization of these spectrums. The central idea of cognitive radio is to allow the secondary user to use the spectrum concurrently with the primary user with the compulsion of minimum interference. However, designing a model with minimum interference is a challenging task. In this paper, a transmission model based on cyclic generalized polynomial codes discussed in [2] and [15], is proposed for the improvement in utilization of spectrum. The proposed model assures a non interference data transmission of the primary and secondary users. Furthermore, analytical results are presented to show that the proposed model utilizes spectrum more efficiently as compared to traditional models.