oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Posthysterectomy vault prolapse of vaginal walls: Choice of operating procedure  [PDF]
Argirovi? Rajka
Srpski Arhiv za Celokupno Lekarstvo , 2012, DOI: 10.2298/sarh1210666a
Abstract: Post-hysterectomy vaginal vault prolapse is a common complication following different types of hysterectomy with a negative impact on the woman’s quality of life due to associated urinary, anorectal and sexual dysfunction. A clear understanding of the supporting mechanisms for the uterus and vagina is important in order to make the right choice of the corrective procedure and also to minimize the risk of posthysterectomy occurrence of vault prolapse. Preexisting pelvic floor defect prior to hysterectomy is the single most important risk factor for vault prolapse. Various surgical techniques have been advanced in hysterectomy to prevent vault prolapse. Vaginal vault repair can be carried out abdominally or vaginally. Sacrospinous fixation and abdominal sacrocolpopexy are the commonly performed procedures. The vaginal approach for vault prolapse is superior to the abdominal approach in terms of complication rates, blood loss, postoperative discomfort, length of hospital stay and costeffectiveness. Moreover, it allows the simultaneous repair of all coexistent pelvic floor defects, such as cystocele, enterocele and rectocele. Abdominal sacrocolpopexy is associated with a lower rate of recurrent vault prolapse and dyspareunia than the vaginal sacrospinous colpopexy. Other less commonly performed procedures include uterosacral ligament suspension and illeococcygeal fixation with a high risk of ureteric injury. Surgical mesh of non-absorbent material is gaining in popularity and preliminary data from vaginal mesh procedures is encouraging.
ParamILS: An Automatic Algorithm Configuration Framework  [PDF]
Frank Hutter,Thomas Stuetzle,Kevin Leyton-Brown,Holger H. Hoos
Computer Science , 2014, DOI: 10.1613/jair.2861
Abstract: The identification of performance-optimizing parameter settings is an important part of the development and application of algorithms. We describe an automatic framework for this algorithm configuration problem. More formally, we provide methods for optimizing a target algorithm's performance on a given class of problem instances by varying a set of ordinal and/or categorical parameters. We review a family of local-search-based algorithm configuration procedures and present novel techniques for accelerating them by adaptively limiting the time spent for evaluating individual configurations. We describe the results of a comprehensive experimental evaluation of our methods, based on the configuration of prominent complete and incomplete algorithms for SAT. We also present what is, to our knowledge, the first published work on automatically configuring the CPLEX mixed integer programming solver. All the algorithms we considered had default parameter settings that were manually identified with considerable effort. Nevertheless, using our automated algorithm configuration procedures, we achieved substantial and consistent performance improvements.
Automatic Control of Configuration of Web Anonymization  [PDF]
Tomas Sochor
International Journal of New Computer Architectures and their Applications , 2013,
Abstract: Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The results presented here focus on measuring the parameters of such deceleration in terms of response time, transmission speed and latency and proposing the way how to control it. This study focuses on TOR primarily because recent studies have concluded that other tools (like I2P and JAP) provide worse service. Sets of 14 file locations and 30 web pages have been formed and the latency, response time and transmission speed during the page or file download were measured repeatedly both with TOR active in various configurations and without TOR. The main result presented here comprises several ways how to improve the TOR anonymization efficiency and the proposal for its automatic control. In spite of the fact that efficiency still remains too low compared to normal web traffic for ordinary use, its automatic control could make TOR a useful tool in special cases.
Automatic Synchronization of Common Parameters in Configuration Files  [PDF]
Moupojou Matango Emmanuel, Moukouop Nguena Ibrahim
Journal of Software Engineering and Applications (JSEA) , 2015, DOI: 10.4236/jsea.2015.84020
Abstract: In an information system, applications often make use of services that they access using the parameters described in their configuration files. Various applications then use different codes to denote the same parameters. When access parameters of a service are modified, it is necessary to update them in every configuration file using them. These changes are necessary, for example because of security policies involving regular changes of passwords, or departure of some system administrators. The database password could be changed for example. When system administrators can not immediately identify all services affected by a change or when they feel they don’t have the skills to edit these files, these parameters remain unchanged, creating critical security flaws. This was observed in more than 80% of the organizations we studied. It then becomes necessary to ensure automatic synchronization of all affected files when changing certain settings. Conventional synchronization solutions are difficult to apply when the relevant applications have already been developed by third parties. In this paper, we propose and implement a solution to automatically update all configuration files affected by a change, respecting their structure and codification. It combines a parameters database, a mapping between the configuration files parameters codes and those of the database, and templates for the generation of files. It achieves the objective for all non-encrypted configuration files.
Automatic measurement of instantaneous changes in the walls of carotid artery with sequential ultrasound images
Mehravar Rafati,Manijhe Mokhtari-Dizaji,Hajir Saberi,Hadi Grailu
Physiology and Pharmacology , 2009,
Abstract: Introduction: This study presents a computerized analyzing method for detection of instantaneous changes of far and near walls of the common carotid artery in sequential ultrasound images by applying the maximum gradient algorithm. Maximum gradient was modified and some characteristics were added from the dynamic programming algorithm for our applications. Methods: The algorithm was evaluated on the common carotid artery of 10 healthy volunteers. Local measurements of vessel intensity, intensity gradient and boundary continuity are extracted for all of the sequential ultrasonic frames throughout three cycles. We extracted the instantaneous changes of far and near arterial walls and hence the lumen diameter. The manual measurements were applied and compared for validation of the automatic method. Peak systolic, end diastolic and mean diameters extracted by the automated method were compared with the same parameters measured by the manual method throughout three cycles. Results: There was no significant difference between automated and manual methods (p>0.05) with paired t-test analysis. In the verification study, correlation between automated and manual methods was excellent (R2 = 0.85, p<0.05) with a negligible bias (0.003 mm) as determined by Bland Altman analysis. Conclusion: It is concluded that computerized analyzing method can automatically detect the instantaneous changes of the arterial walls in sequential B-mode images.
AUTMOD3: The Integration of Design and Planning Tools for Automatic Modular Construction
Ramiro Diez,Victor M. Padron,Mohamed Abderrahim,Carlos Balaguer
International Journal of Advanced Robotic Systems , 2008,
Abstract: Europe is facing a fast growing need for affordable, high quality housing, which can not be solved by means of traditional or conventional building technology and its associated methods of construction. One of the solutions to this problem is the application of high quality modular construction, which defines a new building process as the assembly of pre-fabricated modules in the construction site. As part of this philosophy, AUTMOD3 is an automatic modular construction software environment, developed in the frame of the EU project FutureHome. The system seamlessly integrates architectural design, planning and simulation tools in a wellknown CAD program commonly used by designers. Architectural design using previously defined 3D and 2D modules or modularisation of the traditional building design are the main objectives of the AUTMOD3 design tool. The production planning and the on-site modular assembly planning are the main task to be performed by the planning tool. The AUTMOD3 assembly planning tool generates the trajectories, which can be applied directly to a robotized crane develop in the project FutureHome.
DAC: Generic and Automatic Address Configuration for Data Center Networks .  [PDF]
P. Gobi,S.Arulselvi,Dr T.Kirankumar
International Journal of Engineering Sciences & Research Technology , 2013,
Abstract: DAC, a generic and automatic Data center Address Configuration system. With an automatically generatedblueprint that defines the connections of servers and switches labeled by logical Ids, e.g., IP addresses, DAC first learns the physical topology labeled by device IDs, e.g., MAC addresses. Then, at the core of DAC is its device-tological ID mapping and malfunction detection. DAC makes an innovation in abstracting the device-to-logical ID mapping to the graph isomorphism problem and solves it with low time complexity by leveraging the attributes of data center network topologies. Its malfunction detection scheme detects errors such as device and link failures and mis-wirings, including the most difficult case where mis-wirings do not cause any node degree change. We have evaluated DAC via simulation, implementation, and experiments.
Automatic Host Configuration of IPSec Remote Access Client
IPSec 远程访问模式下客户端的自动配置

MA Xue-ying,XU Hui,YE Cheng-qing,
马雪英
,须晖,叶澄清

计算机应用研究 , 2005,
Abstract: Accessing protected internal subnetwork is an important application of the VPN technology. In this access scenario, the automatic configuration of the remote access client is of great importance to the security and management of internal network resources. After a concise introdution of manual configuration method and ISAKMP configuration method,discusses the content and implementation of the DHCP configuration of IPSec tunnel mode.
Automatic Modeling of Fault Tree for NuIEEE Transactions on Power Electronics,Clear Power Safety I&C Configuration  [PDF]
Shan Leng, Bo Zhang, Wei Sun, Zhiwu Guo, Yichen Hao
Energy and Power Engineering (EPE) , 2013, DOI: 10.4236/epe.2013.54B052
Abstract: The automatic modeling of fault tree for nuclear power safety I&C configuration is designed to meet the requirements of reducing the workload and improving the traceability during the nuclear power safety I&C system reliability assessment work. To complete the fault tree automatic modeling, the Visio Automation software technology is used to analyze the topology of the nuclear power safety I&C system hardware device and software function. The good result in practical implementations shows that the nuclear power safety I&C system fault tree modeling work is successfully simplified.
Investigation of Scattered Radiation Dose at the Door of a Radiotherapy Vault When the Maze Intersects the Primary Beam  [PDF]
Sean Michael Tanny, Nicholas Niven Sperling, E. Ishmael Parsai
Journal of Modern Physics (JMP) , 2015, DOI: 10.4236/jmp.2015.62019
Abstract: NCRP 151 provides very detailed examples demonstrating the necessary concerns for shielding a conventional radiotherapy vault with a maze where the useful beam is parallel to the maze. However, it provides little guidance on how to properly shield a vault with the maze-wall acting as part of a compound primary barrier. We have modeled a new radiotherapy vault with this configuration and assessed the additional photon shielding burden at the door with MCNP5. MCNP simulations demonstrated an increase in overall photon shielding burden at the door relative to calculations that only consider photon workloads presented in NCRP 151. Two additional components of scattered radiation are considered and methods for calculation are presented.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.