966 resultados para Masaniello, Tommaso Anielle, Known as, 1620-1647.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bone healing is known to occur through the successive formation and resorption of various tissues with different structural and mechanical properties. To get a better insight into this sequence of events, we used environmental scanning electron microscopy (ESEM) together with scanning small-angle X-ray scattering (sSAXS) to reveal the size and orientation of bone mineral particles within the regenerating callus tissues at different healing stages (2, 3, 6, and 9 weeks). Sections of 200 µm were cut from embedded blocks of midshaft tibial samples in a sheep osteotomy model with an external fixator. Regions of interest on the medial side of the proximal fragment were chosen to be the periosteal callus, middle callus, intercortical callus, and cortex. Mean thickness (T parameter), degree of alignment (ρ parameter), and predominant orientation (ψ parameter) of mineral particles were deduced from resulting sSAXS patterns with a spatial resolution of 200 µm. 2D maps of T and ρ overlapping with ESEM images revealed that the callus formation occurred in two waves of bone formation, whereby a highly disordered mineralized tissue was deposited first, followed by a bony tissue with more lamellar appearance in the ESEM and where the mineral particles were more aligned, as revealed by sSAXS. As a consequence, degree of alignment and mineral particle size within the callus increased with healing time, whereas at any given moment there were structural gradients, for example, from periosteal toward the middle callus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pore architecture of scaffolds is known to play a critical role in tissue engineering as it provides the vital framework for the seeded cells to organize into a functioning tissue. In this report, we investigated the effects of different concentration on silk fibroin protein 3D scaffold pore microstructure. Four pore size ranges of silk fibroin scaffolds were made by freeze-dry technique, with the pore sizes ranging from 50 to 300 µm. The pore size of the scaffold decreases as the concentration increases. Human mesenchymal stem cells were in vitro cultured in these scaffolds. After BMP7 gene transferred, DNA assay, ALP assay, hematoxylin–eosin staining, alizarin red staining and reverse transcription-polymerase chain reaction were performed to analyze the effect of the pore size on cell growth, differentiation and the secretion of extracellular matrix (ECM). Cell morphology in these 3D scaffolds was investigated by confocal microscopy. This study indicates mesenchymal stem cells prefer the group of scaffolds with pore size between 100 and 300 µm for better proliferation and ECM production

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Texas Transportation Commission (“the Commission”) is responsible for planning and making policies for the location, construction, and maintenance of a comprehensive system of highways and public roads in Texas. In order for the Commission to carry out its legislative mandate, the Texas Constitution requires that most revenue generated by motor vehicle registration fees and motor fuel taxes be used for constructing and maintaining public roadways and other designated purposes. The Texas Department of Transportation (TxDOT) assists the Commission in executing state transportation policy. It is the responsibility of the legislature to appropriate money for TxDOT’s operation and maintenance expenses. All money authorized to be appropriated for TxDOT’s operations must come from the State Highway Fund (also known as Fund 6, Fund 006, or Fund 0006). The Commission can then use the balance in the fund to fulfill its responsibilities. However, the value of the revenue received in Fund 6 is not keeping pace with growing demand for transportation infrastructure in Texas. Additionally, diversion of revenue to nontransportation uses now exceeds $600 million per year. As shown in Figure 1.1, revenues and expenditures of the State Highway Fund per vehicle mile traveled (VMT) in Texas have remained almost flat since 1993. In the meantime, construction cost inflation has gone up more than 100%, effectively halving the value of expenditure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analytical and closed form solutions are presented in this paper for the vibration response of an L-shaped plate under a point force or a moment excitation. Inter-relationships between wave components of the source and the receiving plates are clearly defined. Explicit expressions are given for the quadratic quantities such as input power, energy flow and kinetic energy distributions of the L-shaped plate. Applications of statistical energy analysis (SEA) formulation in the prediction of the vibration response of finite coupled plate structures under a single deterministic forcing are examined and quantified. It is found that the SEA method can be employed to predict the frequency averaged vibration response and energy flow of coupled plate structures under a deterministic force or moment excitation when the structural system satisfies the following conditions: (1) the coupling loss factors of the coupled subsystems are known; (2) the source location is more than a quarter of the plate bending wavelength away from the source plate edges in the point force excitation case, or is more than a quarter wavelength away from the pair of source plate edges perpendicular to the moment axis in the moment excitation case due to the directional characteristic of moment excitations. SEA overestimates the response of the L-shaped plate when the source location is less than a quarter bending wavelength away from the respective plate edges owing to wave coherence effect at the plate boundary

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.