995 resultados para Basis path testing
Resumo:
Platelet P2YI2 receptor inhibition with clopidogrel, prasugrel or ticagrelor plays a key role to prevent recurrent ischaemic events after percutaneous coronary intervention in acute coronary syndromes or elective settings. The degree of platelet inhibition depends on the antiplatelet medication used and is influenced by clinical and genetic factors. A concept of therapeutic window exists. On one side, efficient anti-aggregation is required in order to reduce cardio-vascular events. On the other side, an excessive platelet inhibition represents a risk of bleeding complications. This article describes the current knowledge about some platelet function tests and genetic tests and summarises their role in the clinical practice.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Integral abutment bridges are constructed without an expansion joint in the superstructure of the bridge; therefore, the bridge girders, deck, abutment diaphragms, and abutments are monolithically constructed. The abutment piles in an integral abutment bridge are vertically orientated, and they are embedded into the pile cap. When this type of a bridge experiences thermal expansion or contraction, horizontal displacements are induced at the top of the abutment piles. The flexibility of the abutment piles eliminates the need to provide an expansion joint at the inside face to the abutments: Integral abutment bridge construction has been used in Iowa and other states for many years. This research is evaluating the performance of integral abutment bridges by investigating thermally induced displacements, strains, and temperatures in two Iowa bridges. Each bridge has a skewed alignment, contains five prestressed concrete girders that support a 30-ft wide roadway for three spans, and involves a water crossing. The bridges will be monitored for about two years. For each bridge, an instrumentation package includes measurement devices and hardware and software support systems. The measurement devices are displacement transducers, strain gages, and thermocouples. The hardware and software systems include a data-logger; multiplexers; directline telephone service and computer terminal modem; direct-line electrical power; lap-top computer; and an assortment of computer programs for monitoring, transmitting, and management of the data. Instrumentation has been installed on a bridge located in Guthrie County, and similar instrumentation is currently being installed on a bridge located in Story County. Preliminary test results for the bridge located in Guthrie County have revealed that temperature changes of the bridge deck and girders induce both longitudinal and transverse displacements of the abutments and significant flexural strains in the abutment piles. For an average temperature range of 73° F for the superstructure concrete in the bridge located in Guthrie County, the change in the bridge length was about 1 118 in. and the maximum, strong-axis, flexural-strain range for one of the abutment piles was about 400 micro-strains, which corresponds to a stress range of about 11,600 psi.
Resumo:
We examine the power of different exact tests of differentiation for diploid populations. Since there is not necessarily random mating within populations, the appropriate hypothesis to construct exact tests is that of independent sampling of genotypes. There are two categories of tests, FST-estimator tests and goodness of fit tests. In this latter category, we distinguish "allelic statistics", which account for the nature of alleles within genotypes, from "genotypic statistics" that do not. We show that the power of FST-estimator tests and of allelic goodness of fit tests are similar when sampling is balanced, and higher than the power of genotypic goodness of fit tests. When sampling is unbalanced, the most powerful tests are shown to belong to the allelic goodness of fit group.
Resumo:
Individuals who are unaware of their HIV infection constitute a fragile and a critical population both from a personal and from a community-based point of view: if the infection is diagnosed too late, the outcome can be complicated by AIDS-defining diseases, whose prognosis may remain unfavourable even after the initiation of a potent antiretroviral therapy. These patients contribute to the virus spreading into the community, owing to a high viral load. It is now necessary to recognise the limits of a risk behaviour and disease-driven HIV screening policy. Since 2006, the American guidelines recommend a routine HIV testing for all patients age 13 to 64 years unless they specifically refuse the test (opt-out). In Switzerland, the recommendations remain so far risk-centred.
Resumo:
This main report provides a general discussion of the load testing, structural evaluation, and load rating procedures. Specific details for each bridge are provided in individual report sections. Additional supporting information on load testing, analyses, and load rating are also provided in the attached appendices.
Resumo:
BACKGROUND: Gastric banding (GB) is one of the most popular bariatric procedures for morbid obesity. Apart from causing weight loss by alimentary restriction, it can interfere with functions of the esophagus and upper stomach. The aim of this study was to evaluate if the results of extensive preoperative upper GI testing were correlated with long-term outcome and complications after GB. METHODS: Using a prospectively maintained computerized database including all the patients undergoing bariatric operations in both our hospitals, we performed a retrospective analysis of the patients who underwent complete upper gastrointestinal (GI) testing (endoscopy, pH monitoring, and manometry) before GB. RESULTS: One hundred thirty-four patients underwent complete testing before GB. Abnormal pH monitoring (increased total reflux time, increased diurnal reflux time, increased number of reflux episodes) predicted the development of complications and especially pouch dilatation and food intolerance. The mean De Meester score was higher among patients who developed complications than in the remaining ones (25.4 vs 17.7, P=0.03). High lower esophageal sphincter pressure also predicted progressive long-term food intolerance. Endoscopic findings were not predictive of the long-term outcome. CONCLUSIONS: There is some association between the function of the upper digestive tract and long-term complications after gastric banding. Abnormal pH monitoring predicts overall long-term complications, especially food intolerance with or without reflux, and pouch dilatation, and a high lower esophageal sphincter pressure predicts long-term food intolerance. Extended upper gastrointestinal testing with endoscopy, 24-h pH monitoring, and esophageal manometry is probably worthwhile in selecting patients for gastric banding.
Resumo:
The objective of this work was to obtain organic compounds similar to the ones found in the organic matter of anthropogenic dark earth of Amazonia (ADE) using a chemical functionalization procedure on activated charcoal, as well as to determine their ecotoxicity. Based on the study of the organic matter from ADE, an organic model was proposed and an attempt to reproduce it was described. Activated charcoal was oxidized with the use of sodium hypochlorite at different concentrations. Nuclear magnetic resonance was performed to verify if the spectra of the obtained products were similar to the ones of humic acids from ADE. The similarity between spectra indicated that the obtained products were polycondensed aromatic structures with carboxyl groups: a soil amendment that can contribute to soil fertility and to its sustainable use. An ecotoxicological test with Daphnia similis was performed on the more soluble fraction (fulvic acids) of the produced soil amendment. Aryl chloride was formed during the synthesis of the organic compounds from activated charcoal functionalization and partially removed through a purification process. However, it is probable that some aryl chloride remained in the final product, since the ecotoxicological test indicated that the chemical functionalized soil amendment is moderately toxic.
Resumo:
Background. The time passed since the infection of a human immunodeficiency virus (HIV)-infected individual (the age of infection) is an important but often only poorly known quantity. We assessed whether the fraction of ambiguous nucleotides obtained from bulk sequencing as done for genotypic resistance testing can serve as a proxy of this parameter. Methods. We correlated the age of infection and the fraction of ambiguous nucleotides in partial pol sequences of HIV-1 sampled before initiation of antiretroviral therapy (ART). Three groups of Swiss HIV Cohort Study participants were analyzed, for whom the age of infection was estimated on the basis of Bayesian back calculation (n = 3,307), seroconversion (n = 366), or diagnoses of primary HIV infection (n = 130). In addition, we studied 124 patients for whom longitudinal genotypic resistance testing was performed while they were still ART-naive. Results. We found that the fraction of ambiguous nucleotides increased with the age of infection with a rate of .2% per year within the first 8 years but thereafter with a decreasing rate. We show that this pattern is consistent with population-genetic models for realistic parameters. Finally, we show that, in this highly representative population, a fraction of ambiguous nucleotides of >.5% provides strong evidence against a recent infection event < 1 year prior to sampling (negative predictive value, 98.7%). Conclusions. These findings show that the fraction of ambiguous nucleotides is a useful marker for the age of infection.
Resumo:
Immigrant Pupils in Special Education Schools The study focused on the opinions of immigrant pupils in the 1st–9th grades of basic education in four special education schools of the City of Turku and in need of special support about the following: 1. Their difficulties in going to school in general education before the transfer to a special education school. 2. Their opinions about the transfer process to special education and the changes in their school practice after being transferred to a special education school. 3. Their experiences about their school and coping in special education school. The study strengthened the idea that immigrant pupils need positive special treatment, linguistic support, individual guidance, small teaching groups and operating models that promote well-being on their integration and education path. The central educational idea of inclusive education is based on deconstructing the power structures concerning gender, ethnicity and “race” and approval of differences in the pupils. Shifting the emphasis from the pupil to working on the learning environment has resulted in special education no longer being primarily separate special education tied to a certain place, but directing the teaching more towards individuality. The central dimension of intercultural competence of a teacher working in a multicultural class seems to be the attitudes and approaches to a different pupil; the teacher must be interculturally sensitive when facing children and young people from a foreign culture. Education and teaching affect every sector of the pupil’s well-being. Learning and learning results have a connection with teaching, education and well-being. Every sector is important for the going to school and integration of an immigrant pupil in need of special support. The basis of the study is the equality of opportunities and the humanistic idea of the human being in the Finnish education policy. The immigrant pupils selected for the study represented the following language groups: Arabian, Albanian, Somali, Russian and Vietnamese. In the four special education schools, the number of immigrant pupils belonging to these language groups (2004) totalled 104. A total of 89 pupils i.e. 86% answered the questionnaire, which is sufficient considering the generalisation of the study. Although this is basically a quantitative study, the interviewing method was used in part of the study, because the questionnaires were in Finnish and consequently, it was difficult for some immigrant pupils to understand them. Understanding the questions was also affected by the fact that the age distribution in the study was very wide (7–18). According to the results of the study, the immigrants felt that the biggest drawbacks in general education were their inability to speak Finnish and lack of concentration. The actual process of being transferred to a special education class remained unclear for immigrant pupils, and they could do very little about the transfer themselves. The results show that immigrant pupils coped well in special education school; they felt that their learning ability and concentration improved in the small groups of the special education school. They considered the individual support given in the special education schools to be useful. The lower-grade immigrant pupils had a more positive attitude towards special education school than the upper-grade immigrant pupils. In all the special education schools the immigrant pupils experienced that they were in a good position in the class; girls felt this even a little more strongly than boys. The teacher-pupil-relationship was felt to be good. School bullying being so common was a negative feature experienced by immigrant pupils, who were often targets or bullies themselves. Immigrant pupils believed in their success at school and in the opportunities offered by special education schools. Generally they were of the opinion that pupils are not labelled by special school; however, upper-grade immigrant pupils were more hesitant than lower-grade immigrant pupils. This study aimed at bringing out the immigrant pupils’ own opinions. Teaching immigrant pupils in special education schools has not been very much studied in Finland, which made the topic new and even more challenging.
Resumo:
Eggs deposited on plants by herbivorous insects represent a threat as they develop into feeding larvae. Plants are not a passive substrate and have evolved sophisticated mechanisms to detect eggs and induce direct and indirect defenses. Recent years have seen exciting development in molecular aspects of egg-induced responses. Some egg-associated elicitors have been identified, and signaling pathways and egg-induced expression profiles are being uncovered. Depending on the mode of oviposition, both the jasmonic acid and salicylic acid pathways seem to play a role in the induction of defense responses. An emerging concept is that eggs are recognized like microbial pathogens and innate immune responses are triggered. In addition, some eggs contain elicitors that induce highly specific defenses in plants. Examples of egg-induced suppression of defense or, on the contrary, egg-induced resistance highlight the complexity of plant-egg interactions in an on-going arms race between herbivores and their hosts. A major challenge is to identify plant receptors for egg-associated elicitors, to assess the specificity of these elicitors and to identify molecular components that underlie various responses to oviposition.
Resumo:
This work is devoted to the problem of reconstructing the basis weight structure at paper web with black{box techniques. The data that is analyzed comes from a real paper machine and is collected by an o®-line scanner. The principal mathematical tool used in this work is Autoregressive Moving Average (ARMA) modelling. When coupled with the Discrete Fourier Transform (DFT), it gives a very flexible and interesting tool for analyzing properties of the paper web. Both ARMA and DFT are independently used to represent the given signal in a simplified version of our algorithm, but the final goal is to combine the two together. Ljung-Box Q-statistic lack-of-fit test combined with the Root Mean Squared Error coefficient gives a tool to separate significant signals from noise.
Resumo:
Tämän diplomityön tavoitteena oli testata ja optimoida erään alipainerumpusuodattimen toimivuutta, ja lisäksi maksimoida tuottavuus ja vertailla erilaisten pesumenetelmientehokkuutta. Testilietteiden ¿ rautarikasteen ja täyteainepastan ¿ karakterisointi oli myös tärkeää. Kirjallisuusosassa tarkasteltiin lyhyesti neste-kiintoaine-erotuksen teoriaa, erityisesti alipainesuodatusta ja alipainerumpusuodattimia. Lisäksi käsiteltiin kapillaarisuodatuksen toimintaperiaatteita sekä selvitettiin kaivosteollisuuden veden talteenottokeinoja, kiintoainejäämien käsittelymenetelmiä ja Chilen kaivosteollisuuden nykytilaa. Työn kokeellinen osa suoritettiin käyttämällä raskaita ja kiintoainepitoisuuksiltaan korkeita lietteitä, eli rautarikastetta ja täyteainepastaa. Kokeet suoritettiin erityisellä alipainerumpusuodattimella, joka oli muokattu perinteisestäpäältä syötettävästä alipainerumpusuodattimesta. Kokeissa tutkittiin pyörimisnopeuden ja erilaisten pesumenetelmien vaikutusta kakun kosteuteen ja suodatuskapasiteettiin. Koelietteiden karakterisointi suoritettiin analysoimalla partikkelikokojakauma, kiintoainepitoisuus, metallipitoisuus ja koostumus. Kokeiden perusteella havaittiin, että rummun pyörimisnopeudella ja lietteen kiintoainepitoisuudella on merkittävä vaikutus suodatuskapasiteettiin ja kakun kosteuspitoisuuteen. Havaittiin myös, että kakun kosteuspitoisuuksissa ja rummun suodatuskapasiteeteissa oli eroja, kun verrattiin eri suodatinväliaineen pesumenetelmiä. Täten oikean pesumenetelmän valinta on tärkeää, ja sillä pystytään lisäämään suodatinväliaineen käyttöikää.