935 resultados para latency


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the present thesis, a new methodology of diagnosis based on advanced use of time-frequency technique analysis is presented. More precisely, a new fault index that allows tracking individual fault components in a single frequency band is defined. More in detail, a frequency sliding is applied to the signals being analyzed (currents, voltages, vibration signals), so that each single fault frequency component is shifted into a prefixed single frequency band. Then, the discrete Wavelet Transform is applied to the resulting signal to extract the fault signature in the frequency band that has been chosen. Once the state of the machine has been qualitatively diagnosed, a quantitative evaluation of the fault degree is necessary. For this purpose, a fault index based on the energy calculation of approximation and/or detail signals resulting from wavelet decomposition has been introduced to quantify the fault extend. The main advantages of the developed new method over existing Diagnosis techniques are the following: - Capability of monitoring the fault evolution continuously over time under any transient operating condition; - Speed/slip measurement or estimation is not required; - Higher accuracy in filtering frequency components around the fundamental in case of rotor faults; - Reduction in the likelihood of false indications by avoiding confusion with other fault harmonics (the contribution of the most relevant fault frequency components under speed-varying conditions are clamped in a single frequency band); - Low memory requirement due to low sampling frequency; - Reduction in the latency of time processing (no requirement of repeated sampling operation).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis deals with heterogeneous architectures in standard workstations. Heterogeneous architectures represent an appealing alternative to traditional supercomputers because they are based on commodity components fabricated in large quantities. Hence their price-performance ratio is unparalleled in the world of high performance computing (HPC). In particular, different aspects related to the performance and consumption of heterogeneous architectures have been explored. The thesis initially focuses on an efficient implementation of a parallel application, where the execution time is dominated by an high number of floating point instructions. Then the thesis touches the central problem of efficient management of power peaks in heterogeneous computing systems. Finally it discusses a memory-bounded problem, where the execution time is dominated by the memory latency. Specifically, the following main contributions have been carried out: A novel framework for the design and analysis of solar field for Central Receiver Systems (CRS) has been developed. The implementation based on desktop workstation equipped with multiple Graphics Processing Units (GPUs) is motivated by the need to have an accurate and fast simulation environment for studying mirror imperfection and non-planar geometries. Secondly, a power-aware scheduling algorithm on heterogeneous CPU-GPU architectures, based on an efficient distribution of the computing workload to the resources, has been realized. The scheduler manages the resources of several computing nodes with a view to reducing the peak power. The two main contributions of this work follow: the approach reduces the supply cost due to high peak power whilst having negligible impact on the parallelism of computational nodes. from another point of view the developed model allows designer to increase the number of cores without increasing the capacity of the power supply unit. Finally, an implementation for efficient graph exploration on reconfigurable architectures is presented. The purpose is to accelerate graph exploration, reducing the number of random memory accesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Die Lunge stellt einen Hauptort der CMV-Latenz dar. Die akute CMV-Infektion wird durch infiltrierende antivirale CD8 T-Zellen terminiert. Das virale Genom verbleibt jedoch im Lungengewebe in einem nicht replikativen Zustand, der Latenz, erhalten. Es konnte bereits gezeigt werden, dass während der Latenz die Major Immediate Early- (MIE) Gene ie1- und ie2 sporadisch transkribiert werden. Bisher konnte diese beginnende Reaktivierung latenter CMV-Genome nur in einer Momentaufnahme gezeigt werden (Kurz et al., 1999; Grzimek et al., 2001; Simon et al., 2005; zur Übersicht: Reddehase et al., 2008). Die sporadische Expression der MIE-Gene führt jedoch zur Präsentation eines antigenen IE1-Peptids und somit zur Stimulation antiviraler IE1-Peptid-spezifischer CD8 T-Zellen, die durch ihre Effektorfunktion die beginnende Reaktivierung wieder beenden. Dies führte uns zu der Hypothese, dass MIE-Genexpression über einen Zeitraum betrachtet (period prevalence) häufiger stattfindet als es in einer Momentaufnahme (point prevalence) beobachtet werden kann.rnrnUm die Häufigkeit der MIE-Genexpression in der Dynamik in einem definierten Zeitraum zu erfassen, sollte eine Methode entwickelt werden, welche es erstmals ermöglicht, selektiv und konditional transkriptionell aktive Zellen sowohl während der akuten Infektion als auch während der Latenz auszulöschen. Dazu wurde mit Hilfe der Zwei-Schritt BAC-Mutagenese ein rekombinantes death-tagged Virus hergestellt, welches das Gen für den Diphtherie Toxin Rezeptor (DTR) unter Kontrolle des ie2-Promotors (P2) enthält. Ist der P2 transkriptionell aktiv, wird der DTR an der Zelloberfläche präsentiert und die Zelle wird suszeptibel für den Liganden Diphtherie Toxin (DT). Durch Gabe von DT werden somit alle Zellen ausgelöscht, in denen virale Genome transkriptionell aktiv sind. Mit zunehmender Dauer der DT-Behandlung sollte also die Menge an latenten viralen Genomen abnehmen.rnrnIn Western Blot-Analysen konnte das DTR-Protein bereits 2h nach der Infektion nachgewiesen werden. Die Präsentation des DTR an der Zelloberfläche wurde indirekt durch dessen Funktionalität bewiesen. Das rekombinante Virus konnte in Fibroblasten in Gegenwart von DT nicht mehr replizieren. In akut infizierten Tieren konnte die virale DNA-Menge durch eine einmalige intravenöse (i.v.) DT-Gabe signifikant reduziert werden. Verstärkt wurde dieser Effekt durch eine repetitive i.v. DT-Gabe. Auch während der Latenz gelang es, die Zahl der latenten viralen Genome durch repetitive i.v. und anschließende intraperitoneale (i.p.) DT-Gabe zu reduzieren, wobei wir abhängig von der Dauer der DT-Gabe eine Reduktion um 60\% erreichen konnten. Korrespondierend zu der Reduktion der DNA-Menge sank auch die Reaktivierungshäufigkeit des rekombinanten Virus in Lungenexplantatkulturen. rnrnrnUm die Reaktivierungshäufigkeit während der Latenz berechnen zu können, wurde durch eine Grenzverdünnungsanalyse die Anzahl an latenten viralen Genomen pro Zelle bestimmt. Dabei ergab sich eine Kopienzahl von 9 (6 bis 13). Ausgehend von diesen Ergebnissen lässt sich berechnen, dass, bezogen auf die gesamte Lunge, in dem getesteten Zeitraum von 184h durch die DT-Behandlung 1.000 bis 2.500 Genome pro Stunde ausgelöscht wurden. Dies entspricht einer Auslöschung von 110 bis 280 MIE-Gen-exprimierenden Lungenzellen pro Stunde. Damit konnte in dieser Arbeit erstmals die Latenz-assoziierte Genexpression in ihrer Dynamik dargestellt werden.rn

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Primary varicella-zoster virus (VZV) infection during childhood leads to varicella commonly known as chickenpox. After primary infection has occurred VZV establishes latency in the host. During subsequent lifetime the virus can cause reactivated infection clinically known as herpes zoster or shingles. In immunodeficient patients’ dissemination of the virus can lead to life-threatening disease. Withdrawal of acyclovir drug prophylaxis puts allogeneic hematopoietic stem-cell transplantation (HSCT) patients at increased risk for herpes zoster as long as VZV-specific cellular immunity is impaired. Although an efficient live attenuated VZV vaccine for zoster prophylaxis exists, it is not approved in immunocompromised patients due to safety reasons. Knowledge of immunogenic VZV proteins would allow designing a noninfectious nonhazardous subunit vaccine suitable for patients with immunodeficiencies. The objective of this study was to identify T cell defined virus proteins of a VZV-infected Vero cell extract that we have recently described as a reliable antigen format for interferon-gamma (IFN-γ) enzyme-linked immunosorbent spot (ELISpot) assays (Distler et al. 2008). We first separated the VZV-infected/-uninfected Vero cell extracts by size filtration and reverse-phase high performance liquid chromatography (RP-HPLC). The collected fractions were screened for VZV reactivity with peripheral blood mononuclear cells (PBMCs) of VZV-seropositive healthy individuals in the sensitive IFN-γ ELISpot assay. Using this strategy, we successfully identified bioactive fractions that contained immunogenic VZV material. VZV immune reactivity was mediated by CD4+ memory T lymphocytes (T cells) of VZV-seropositive healthy individuals as demonstrated in experiments with HLA blockade antibodies and T cell subpopulations already published by Distler et al. We next analyzed the bioactive fractions with electrospray ionization mass spectrometry (ESI-MS) techniques and identified the sequences of three VZV-derived proteins: glycoprotein E (gE); glycoprotein B (gB), and immediate early protein 62 (IE62). Complementary DNA of these identified proteins was used to generate in vitro transcribed RNA for effective expression in PBMCs by electroporation. We thereby established a reliable and convenient IFN-γ ELISPOT approach to screen PBMCs of healthy donors and HSCT patients for T cell reactivity to single full-length VZV proteins. Application in 10 VZV seropositive healthy donors demonstrated much stronger recognition of glycoproteins gE and gB compared to IE62. In addition, monitoring experiments with ex vivo PBMCs of 3 allo-HSCT patients detected strongly increased CD4+ T cell responses to gE and gB for several weeks to months after zoster onset, while IE62 reactivity remained moderate. Overall our results show for the first time that VZV glycoproteins gE and gB are major targets of the post-transplant anti-zoster CD4+ T cell response. The screening approach introduced herein may help to select VZV proteins recognized by memory CD4+ T cells for inclusion in a subunit vaccine, which can be safely used for zoster prophylaxis in immunocompromised HSCT patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is focused on Smart Grid applications in medium voltage distribution networks. For the development of new applications it appears useful the availability of simulation tools able to model dynamic behavior of both the power system and the communication network. Such a co-simulation environment would allow the assessment of the feasibility of using a given network technology to support communication-based Smart Grid control schemes on an existing segment of the electrical grid and to determine the range of control schemes that different communications technologies can support. For this reason, is presented a co-simulation platform that has been built by linking the Electromagnetic Transients Program Simulator (EMTP v3.0) with a Telecommunication Network Simulator (OPNET-Riverbed v18.0). The simulator is used to design and analyze a coordinate use of Distributed Energy Resources (DERs) for the voltage/var control (VVC) in distribution network. This thesis is focused control structure based on the use of phase measurement units (PMUs). In order to limit the required reinforcements of the communication infrastructures currently adopted by Distribution Network Operators (DNOs), the study is focused on leader-less MAS schemes that do not assign special coordinating rules to specific agents. Leader-less MAS are expected to produce more uniform communication traffic than centralized approaches that include a moderator agent. Moreover, leader-less MAS are expected to be less affected by limitations and constraint of some communication links. The developed co-simulator has allowed the definition of specific countermeasures against the limitations of the communication network, with particular reference to the latency and loss and information, for both the case of wired and wireless communication networks. Moreover, the co-simulation platform has bee also coupled with a mobility simulator in order to study specific countermeasures against the negative effects on the medium voltage/current distribution network caused by the concurrent connection of electric vehicles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Die primäre, produktive Cytomegalovirus (CMV)-Infektion wird im immunkompetenten Patienten effizient durch antivirale CD8+ T-Zellen kontrolliert. Das virale Genom besitzt jedoch die Fähigkeit, in einem nicht replikativen, Latenz genannten Zustand, in gewissen Zelltypen zu persistieren, ohne dass infektiöse Nachkommenviren produziert werden. Die molekularen Mechanismen, welche der Etablierung und Aufrechterhaltung der Latenz zugrundeliegen, sind noch weitestgehend unbekannt. Es gibt Hinweise darauf, dass zelluläre Verteidigungsmechanismen die Zirkularisierung und Chromatinisierung viraler Genome hervorrufen und dadurch die virale Genexpression größtenteils verhindert wird (Marks & Spector, 1984; Reeves et al., 2006).rnAllerdings liegen die Genome nicht in einem komplett inaktiven Zustand vor. Vielmehr konnte für das murine CMV (mCMV) bereits die sporadische Transkription der Gene ie1 und ie2 während der Latenz nachgewiesen werden (Kurz et al., 1999; Grzimek et al., 2001).rnIn der vorliegenden Arbeit wurde zum ersten Mal eine umfassende in vivo Latenz-Analyse zur Charakterisierung der viralen Transkription in einer Kinetik anhand der alle drei kinetischen Klassen repräsentierenden Transkripte IE1, IE3, E1, m164, M105 und M86 vorgenommen.rnNach Latenz-Etablierung, verifiziert durch Abwesenheit von infektiösem Virus, konnten alle getesteten Transkripte in der Lunge quantifiziert werden. Interessanterweise war die transkriptionelle Aktivität zu keinem Analyse-Zeitpunkt mit der klassischen IE-E-L-Kinetik der produktiven Infektion kompatibel. Stattdessen lag eine stochastische Transkript-Expression vor, deren Aktivität mit voranschreitender Zeit immer weiter abnahm.rnWährend der Latenz exprimierte Transkripte, die für antigene Peptide kodieren, können infizierte Zellen für das Immunsystem sichtbar machen, was zu einer fortwährenden Restimulation des memory T-Zell-pools führen würde. Durch zeitgleiche Analyse der Transkript-Expression, sowie der Frequenzen Epitop-spezifischer CD8+ T-Zellen während der Latenz (IE1, m164, M105), wurde eine möglicher Zusammenhang zwischen der transkriptionellen Aktivität und der Expansion des memory T-Zell-pools untersucht. Die weitere Charakterisierung von Subpopulationen der Epitop-spezifischen CD8+ T-Zellen identifizierte die SLECs (short-lived-effector cells; CD127low CD62Llow KLRG1high) als die dominante Population in Lunge und Milz während der mCMV-Latenz.rnIn einem weiteren Teil der Arbeit sollte untersucht werden, ob IE-Genexpression zur Etablierung von Latenz notwendig ist. Mit Hilfe der Rekombinanten mCMV-Δie2-DTR, die die Gensequenz des Diphtherietoxin-Rezeptors (DTR) anstelle des Gens ie2 trägt, konnten infizierte, DTR exprimierende Zellen durch eine DT-Applikation konditional depletiert werden.rnIm latent infizierbaren Zelltyp der Leber, den LSECs (liver sinusoidal endothelial cells) wurde die virale Load durch 90-stündige DT–Applikation nach mCMV-Δie2-DTR Infektion auf das Level latent infizierter LSECs reduziert. Diese Daten sprechen für die Hypothese eines von Beginn an inaktiven Genoms, das keine IE-Genexpression zur Latenz-Etablierung benötigt. Zusätzlich stellt dieser Ansatz ein neues Tier-Modell zur Latenz-Etablierung dar. Verringerte Wartezeiten bis zur vollständigen Latenz-Etablierung, im Vergleich zum bisherigen Knochenmarktransplantations-Modell, könnten anfallende Tierhaltungskosten erheblich reduzieren und das Voranschreiten der Forschung beschleunigen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PhEDEx, the CMS transfer management system, during the first LHC Run has moved about 150 PB and currently it is moving about 2.5 PB of data per week over the Worldwide LHC Computing Grid (WLGC). It was designed to complete each transfer required by users at the expense of the waiting time necessary for its completion. For this reason, after several years of operations, data regarding transfer latencies has been collected and stored into log files containing useful analyzable informations. Then, starting from the analysis of several typical CMS transfer workflows, a categorization of such latencies has been made with a focus on the different factors that contribute to the transfer completion time. The analysis presented in this thesis will provide the necessary information for equipping PhEDEx in the future with a set of new tools in order to proactively identify and fix any latency issues. PhEDEx, il sistema di gestione dei trasferimenti di CMS, durante il primo Run di LHC ha trasferito all’incirca 150 PB ed attualmente trasferisce circa 2.5 PB di dati alla settimana attraverso la Worldwide LHC Computing Grid (WLCG). Questo sistema è stato progettato per completare ogni trasferimento richiesto dall’utente a spese del tempo necessario per il suo completamento. Dopo svariati anni di operazioni con tale strumento, sono stati raccolti dati relativi alle latenze di trasferimento ed immagazzinati in log files contenenti informazioni utili per l’analisi. A questo punto, partendo dall’analisi di una ampia mole di trasferimenti in CMS, è stata effettuata una suddivisione di queste latenze ponendo particolare attenzione nei confronti dei fattori che contribuiscono al tempo di completamento del trasferimento. L’analisi presentata in questa tesi permetterà di equipaggiare PhEDEx con un insieme di utili strumenti in modo tale da identificare proattivamente queste latenze e adottare le opportune tattiche per minimizzare l’impatto sugli utenti finali.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile devices are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. To this end, mobile cloud computing (MCC) has been proposed to address the limited computation power, memory, storage, and energy of such devices. An important challenge in MCC is to guarantee seamless discovery of services. To this end, this thesis proposes an architecture that provides user-transparent and low-latency service discovery, as well as automated service selection. Experimental results on a real cloud computing testbed demonstrated that the proposed work outperforms state of-the-art approaches by achieving extremely low discovery delay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 5th generation of mobile networking introduces the concept of “Network slicing”, the network will be “sliced” horizontally, each slice will be compliant with different requirements in terms of network parameters such as bandwidth, latency. This technology is built on logical instead of physical resources, relies on virtual network as main concept to retrieve a logical resource. The Network Function Virtualisation provides the concept of logical resources for a virtual network function, enabling the concept virtual network; it relies on the Software Defined Networking as main technology to realize the virtual network as resource, it also define the concept of virtual network infrastructure with all components needed to enable the network slicing requirements. SDN itself uses cloud computing technology to realize the virtual network infrastructure, NFV uses also the virtual computing resources to enable the deployment of virtual network function instead of having custom hardware and software for each network function. The key of network slicing is the differentiation of slice in terms of Quality of Services parameters, which relies on the possibility to enable QoS management in cloud computing environment. The QoS in cloud computing denotes level of performances, reliability and availability offered. QoS is fundamental for cloud users, who expect providers to deliver the advertised quality characteristics, and for cloud providers, who need to find the right tradeoff between QoS levels that has possible to offer and operational costs. While QoS properties has received constant attention before the advent of cloud computing, performance heterogeneity and resource isolation mechanisms of cloud platforms have significantly complicated QoS analysis and deploying, prediction, and assurance. This is prompting several researchers to investigate automated QoS management methods that can leverage the high programmability of hardware and software resources in the cloud.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Antisaccade errors are attributed to failure to inhibit the habitual prosaccade. We investigated whether the amount of information about the required response the patient has before the trial begins also contributes to error rate. Participants performed antisaccades in five conditions. The traditional design had two goals on the left and right horizontal meridians. In the second condition, stimulus-goal confusability between trials was eliminated by displacing one goal upward. In the third, hemifield uncertainty was eliminated by placing both goals in the same hemifield. In the fourth, goal uncertainty was eliminated by having only one goal, but interspersed with no-go trials. The fifth condition eliminated all uncertainty by having the same goal on every trial. Antisaccade error rate increased by 2% with each additional source of uncertainty, with the main effect being hemifield information, and a trend for stimulus-goal confusability. A control experiment for the effects of increasing angular separation between targets without changing these types of prior response information showed no effects on latency or error rate. We conclude that other factors besides prosaccade inhibition contribute to antisaccade error rates in traditional designs, possibly by modulating the strength of goal activation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When healthy observers make a saccade that is erroneously directed toward a distracter stimulus, they often produce a corrective saccade within 100ms after the end of the primary saccade. Such short inter-saccadic intervals indicate that programming of the secondary saccade has been initiated prior to the execution of the primary saccade and hence that the two saccades have been programmed concurrently. Here we show that concurrent saccade programming is bilaterally impaired in left spatial neglect, a strongly lateralized disorder of visual attention resulting from extensive right cerebral damage. Neglect patients were asked to make saccades to targets presented left or right of fixation while disregarding a distracter presented in the opposite hemifield. We examined those experimental trials on which participants first made a saccade to the distracter, followed by a secondary (corrective) saccade to the target. Compared to healthy and right-hemisphere damaged control participants the proportion of secondary saccades directing gaze to the target instead of bringing it even closer to the distracter was bilaterally reduced in neglect patients. In addition, the characteristic reduction of secondary saccade latency observed in both control groups was absent in neglect patients, whether the secondary saccade was directed to the left or right hemifield. This pattern is consistent with a severe, bilateral impairment of concurrent saccade programming in left spatial neglect.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate a recently proposed model for decision learning in a population of spiking neurons where synaptic plasticity is modulated by a population signal in addition to reward feedback. For the basic model, binary population decision making based on spike/no-spike coding, a detailed computational analysis is given about how learning performance depends on population size and task complexity. Next, we extend the basic model to n-ary decision making and show that it can also be used in conjunction with other population codes such as rate or even latency coding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Narcolepsy is characterized by excessive daytime sleepiness and rapid eye movement (REM) sleep abnormalities, including cataplexy. The aim of this study was to assess REM sleep pressure and homeostasis in narcolepsy. Six patients with narcolepsy and six healthy controls underwent a REM sleep deprivation protocol, including one habituation, one baseline, two deprivation nights (D1, D2) and one recovery night. Multiple sleep latency tests (MSLTs) were performed during the day after baseline and after D2. During D1 and D2 REM sleep was prevented by awakening the subjects at the first polysomnographic signs of REM sleep for 2 min. Mean sleep latency and number of sleep-onset REM periods (SOREMs) were determined on all MSLT. More interventions were required to prevent REM sleep in narcoleptics compared with control subjects during D1 (57 ± 16 versus 24 ± 10) and D2 (87 ± 22 versus 35 ± 8, P = 0.004). Interventions increased from D1 to D2 by 46% in controls and by 53% in narcoleptics (P < 0.03). Selective REM sleep deprivation was successful in both controls (mean reduction of REM to 6% of baseline) and narcoleptics (11%). Both groups had a reduction of total sleep time during the deprivation nights (P = 0.03). Neither group had REM sleep rebound in the recovery night. Narcoleptics had, however, an increase in the number of SOREMs on MSLT (P = 0.005). There was no increase in the number of cataplexies after selective REM sleep deprivation. We conclude that: (i) REM sleep pressure is higher in narcoleptics; (ii) REM sleep homeostasis is similar in narcoleptics and controls; (iii) in narcoleptics selective REM sleep deprivation may have an effect on sleep propensity but not on cataplexy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: A controlled, gradual distraction of the periosteum is expected to result in the formation of new bone. Purpose: This study was designed to estimate the possibility of new bone formation by periosteal distraction in a rat calvarium model. Material and Methods: Sixteen animals were subjected to a 7-day latency period and distraction rate at 0.4 mm/24 hours for 10 days. Two experimental groups with seven rats each were killed at 10 and 20 days of consolidation period and analyzed by means of microcomputed tomography, histologically and histomorphometry. Results: In the central regions underneath the disk device, signs of both bone apposition and bone resorption were observed. Peripheral to the disc, new bone was consistently observed. This new bone was up to two and three times thicker than the original bone after a 10- and 20-day consolidation period, respectively. Signs of ongoing woven bone formation indicated that the stimulus for new bone formation was still present. There were no statistically significant differences regarding bone density, bone volume, and total bone height between the two groups. Conclusion: The periosteal distraction model in the rat calvarium can stimulate the formation of considerable amounts of new bone.