首页 > 最新文献

The 10th International Conference on Digital Technologies 2014最新文献

英文 中文
Reliability study of selected communication systems for energy grid 电网选定通信系统可靠性研究
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868740
J. Vodrazka, P. Jares
The concept of Smart Grid technology, which promises highly efficient and dynamic energy systems, has to be backed by suitable information and communication system. The availability and reliability must be important features of the power energy grid. These are features which must satisfy too the communication network built to support it. The paper analyses theoretical basis and presents selected practical experience with circuit oriented and packet oriented network technologies to enable build of the fault tolerant systems. This paper describes availability model of the communication network with different network technology based on our own experiences and experiments. The common topology with path protection on optical fibres is considered.
智能电网技术的概念,承诺高效和动态的能源系统,必须有合适的信息和通信系统的支持。电网的可用性和可靠性必须成为电网的重要特征。这些特性也必须满足为支持它而建立的通信网络。本文分析了面向电路和面向分组网络技术的理论基础,并给出了构建容错系统的一些实践经验。本文根据自己的经验和实验,描述了不同网络技术下通信网络的可用性模型。考虑了光纤上具有路径保护的常见拓扑结构。
{"title":"Reliability study of selected communication systems for energy grid","authors":"J. Vodrazka, P. Jares","doi":"10.1109/DT.2014.6868740","DOIUrl":"https://doi.org/10.1109/DT.2014.6868740","url":null,"abstract":"The concept of Smart Grid technology, which promises highly efficient and dynamic energy systems, has to be backed by suitable information and communication system. The availability and reliability must be important features of the power energy grid. These are features which must satisfy too the communication network built to support it. The paper analyses theoretical basis and presents selected practical experience with circuit oriented and packet oriented network technologies to enable build of the fault tolerant systems. This paper describes availability model of the communication network with different network technology based on our own experiences and experiments. The common topology with path protection on optical fibres is considered.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Probabilistic network-based approach to infrastructure safety assessment with human factor consideration 基于概率网络的考虑人为因素的基础设施安全评估方法
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868684
Eugene Brezhnev, A. Boyarchuk
The combinations of low probability events (hardware and software faults, anomalous nature events, human operator errors) cause the infrastructure accidents and disruptions. There are different approaches for evaluation of human operator's reliability. Multi-factor analysis is the essential step for obtaining the trustworthiness estimations of infrastructure's safety. The application of Bayesian Belief Networks (BBN) as a basis of multi-factor safety analysis is suggested in the paper. Two approaches for integration of probabilistic estimations in different qualimetric scales are proposed. The example of using of BBN for assessment of human factor in NPP Fukushima-1 disaster is considered.
低概率事件(硬件和软件故障、异常自然事件、人为操作错误)的组合导致基础设施事故和中断。人类操作者的可靠性评估有不同的方法。多因素分析是基础设施安全可靠性评估的重要环节。本文提出将贝叶斯信念网络作为多因素安全分析的基础。提出了两种不同质量尺度下概率估计的积分方法。以福岛1号核电站灾害人为因素评价为例,讨论了利用BBN进行人为因素评价的方法。
{"title":"Probabilistic network-based approach to infrastructure safety assessment with human factor consideration","authors":"Eugene Brezhnev, A. Boyarchuk","doi":"10.1109/DT.2014.6868684","DOIUrl":"https://doi.org/10.1109/DT.2014.6868684","url":null,"abstract":"The combinations of low probability events (hardware and software faults, anomalous nature events, human operator errors) cause the infrastructure accidents and disruptions. There are different approaches for evaluation of human operator's reliability. Multi-factor analysis is the essential step for obtaining the trustworthiness estimations of infrastructure's safety. The application of Bayesian Belief Networks (BBN) as a basis of multi-factor safety analysis is suggested in the paper. Two approaches for integration of probabilistic estimations in different qualimetric scales are proposed. The example of using of BBN for assessment of human factor in NPP Fukushima-1 disaster is considered.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"104 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133452186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preparedness for mobile learning at higher education 为高等教育的移动学习做好准备
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868706
H. Kopackova
The aim of the article was to explore the possibility of incorporation of mobile technology into university course environment. Quantitative approach in the form of questionnaire was selected as appropriate. Students at the course answered questions focused on their hardware and software equipment, utilization of their devices for the study, curiosity and attitudes towards collaborative project development. The questionnaire also covered practical tasks for smartphone and tablet users. These practical tasks aimed to show how the students are used to solve problems using mobile technology, but there was also a question whether by the use of mobile technologies these tasks will be more interesting for students and if they show creativity.
本文的目的是探讨将移动技术纳入大学课程环境的可能性。适当选择问卷形式的定量方法。学生们在课程中回答的问题集中在他们的硬件和软件设备,他们的设备用于研究的利用,好奇心和对合作项目开发的态度。调查问卷还涵盖了智能手机和平板电脑用户的实际任务。这些实际任务旨在展示学生如何使用移动技术来解决问题,但也有一个问题,即通过使用移动技术,这些任务是否会让学生更感兴趣,以及它们是否表现出创造力。
{"title":"Preparedness for mobile learning at higher education","authors":"H. Kopackova","doi":"10.1109/DT.2014.6868706","DOIUrl":"https://doi.org/10.1109/DT.2014.6868706","url":null,"abstract":"The aim of the article was to explore the possibility of incorporation of mobile technology into university course environment. Quantitative approach in the form of questionnaire was selected as appropriate. Students at the course answered questions focused on their hardware and software equipment, utilization of their devices for the study, curiosity and attitudes towards collaborative project development. The questionnaire also covered practical tasks for smartphone and tablet users. These practical tasks aimed to show how the students are used to solve problems using mobile technology, but there was also a question whether by the use of mobile technologies these tasks will be more interesting for students and if they show creativity.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133469368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Channel selection in home 802.11 standard networks 家庭802.11标准网络中的信道选择
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868691
A. Masiukiewicz, I. Dolinska, Grzegorz Rządkowski
WiFi is one of the most popular wireless standard today. However its popularity is killing itself. The number of local networks dramatically arises and as results one can achieve much worse parameters then expected if taking into accounts the devices and different 802.11 standards specifications. One of the main reasons is interference. The authors test two real networks and make an optimisation of channel choice using tools which are available for ordinary user. The results shows total lack of any channel coordination in private networks and necessity of future works to improve the situation.
WiFi是当今最流行的无线标准之一。然而,它的受欢迎程度正在扼杀自己。本地网络的数量急剧增加,如果考虑到设备和不同的802.11标准规范,结果可能会获得比预期更差的参数。其中一个主要原因是干扰。作者测试了两个真实的网络,并使用普通用户可用的工具对信道选择进行了优化。结果表明,专网完全缺乏任何渠道协调,未来的工作必须改善这种情况。
{"title":"Channel selection in home 802.11 standard networks","authors":"A. Masiukiewicz, I. Dolinska, Grzegorz Rządkowski","doi":"10.1109/DT.2014.6868691","DOIUrl":"https://doi.org/10.1109/DT.2014.6868691","url":null,"abstract":"WiFi is one of the most popular wireless standard today. However its popularity is killing itself. The number of local networks dramatically arises and as results one can achieve much worse parameters then expected if taking into accounts the devices and different 802.11 standards specifications. One of the main reasons is interference. The authors test two real networks and make an optimisation of channel choice using tools which are available for ordinary user. The results shows total lack of any channel coordination in private networks and necessity of future works to improve the situation.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The knowledge base for computer-aided diagnosis of mental disorders based on psychometric tests 基于心理测验的精神障碍计算机辅助诊断知识库
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868724
Olga Mich, A. Burda, K. Pancerz, Jerzy Gomula
The knowledge base is a key element of many decision support systems. In the paper, we describe, the knowledge base implemented in the Copernicus system - a tool for computer-aided diagnosis of mental disorders based on data coming from psychometric tests, in the current version, coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. This tool uses a variety of classification ways for differential interprofile diagnosis. Therefore, the knowledge base embodied in the tool is of different character. The special attention is focused on new elements added in the last version of the Copernicus system.
知识库是许多决策支持系统的关键要素。在本文中,我们描述了哥白尼系统中实现的知识库,哥白尼系统是一种基于心理测试数据的精神障碍计算机辅助诊断工具,在当前版本中,来自明尼苏达多相人格量表(MMPI)测试。该工具使用多种分类方法进行剖面间的鉴别诊断。因此,工具中体现的知识库具有不同的特征。特别注意的是在哥白尼体系的最后一个版本中添加的新元素。
{"title":"The knowledge base for computer-aided diagnosis of mental disorders based on psychometric tests","authors":"Olga Mich, A. Burda, K. Pancerz, Jerzy Gomula","doi":"10.1109/DT.2014.6868724","DOIUrl":"https://doi.org/10.1109/DT.2014.6868724","url":null,"abstract":"The knowledge base is a key element of many decision support systems. In the paper, we describe, the knowledge base implemented in the Copernicus system - a tool for computer-aided diagnosis of mental disorders based on data coming from psychometric tests, in the current version, coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. This tool uses a variety of classification ways for differential interprofile diagnosis. Therefore, the knowledge base embodied in the tool is of different character. The special attention is focused on new elements added in the last version of the Copernicus system.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An analysis of the impact of packet loss, codecs and type of voice on internal parameters of P.563 model 丢包、编解码器和语音类型对P.563型号内部参数的影响分析
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868728
Jozef Polacky, P. Počta
This paper deals with an analysis of internal parameters of the P.563 non-intrusive quality prediction model forming an overall quality prediction of this model in the context of an impact of natural and synthesized speech degraded by packet loss (independent and dependent losses) and speech coding (ITU-T G.711 codec, ITU-T G.729AB codec and iLBC codec). A main aim of this paper is to identify dominant internal parameters of the P.563 model for all the investigated codecs and clp parameters by conducting two-way analysis of variance (ANOVA) tests on all internal parameters of the P.563 model. All the identified dominant internal parameters will be further used in an investigation of non-monotonic behavior of the P.563 model predictions in this context, reported for ITU-T G.729AB codec in [6].
本文对P.563非侵入式质量预测模型的内部参数进行分析,形成该模型在自然语音和合成语音因丢包(独立丢失和依赖丢失)和语音编码(ITU-T G.711编解码器、ITU-T G.729AB编解码器和iLBC编解码器)影响下的整体质量预测。本文的主要目的是通过对P.563模型的所有内部参数进行双向方差分析(ANOVA)测试,确定所有调查编解码器和clp参数的P.563模型的主要内部参数。所有确定的主要内部参数将进一步用于研究在这种情况下P.563模型预测的非单调行为,并在[6]中为ITU-T G.729AB编解码器报告。
{"title":"An analysis of the impact of packet loss, codecs and type of voice on internal parameters of P.563 model","authors":"Jozef Polacky, P. Počta","doi":"10.1109/DT.2014.6868728","DOIUrl":"https://doi.org/10.1109/DT.2014.6868728","url":null,"abstract":"This paper deals with an analysis of internal parameters of the P.563 non-intrusive quality prediction model forming an overall quality prediction of this model in the context of an impact of natural and synthesized speech degraded by packet loss (independent and dependent losses) and speech coding (ITU-T G.711 codec, ITU-T G.729AB codec and iLBC codec). A main aim of this paper is to identify dominant internal parameters of the P.563 model for all the investigated codecs and clp parameters by conducting two-way analysis of variance (ANOVA) tests on all internal parameters of the P.563 model. All the identified dominant internal parameters will be further used in an investigation of non-monotonic behavior of the P.563 model predictions in this context, reported for ITU-T G.729AB codec in [6].","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124814299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
N-queens problem by efficient non-backtracking algorithm using local search, heuristics and Tabu search elements 利用局部搜索、启发式和禁忌搜索元素的高效非回溯算法求解n皇后问题
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868708
M. Kováč
This paper presents an efficient algorithm using Local search, various heuristics and Tabu search elements, which is capable to find solution for huge instances of the n-queens (hundreds of millions n). The algorithm returns random solutions in short time even on an ordinary personal computer. There is no other faster algorithm in n-Queens bibliography as our presented algorithm so far.
本文提出了一种利用局部搜索、各种启发式和禁忌搜索元素的高效算法,该算法能够对n个皇后(数亿个n)的巨大实例进行求解,即使在普通个人计算机上也能在短时间内返回随机解。到目前为止,在n-Queens书目中还没有其他比我们提出的算法更快的算法。
{"title":"N-queens problem by efficient non-backtracking algorithm using local search, heuristics and Tabu search elements","authors":"M. Kováč","doi":"10.1109/DT.2014.6868708","DOIUrl":"https://doi.org/10.1109/DT.2014.6868708","url":null,"abstract":"This paper presents an efficient algorithm using Local search, various heuristics and Tabu search elements, which is capable to find solution for huge instances of the n-queens (hundreds of millions n). The algorithm returns random solutions in short time even on an ordinary personal computer. There is no other faster algorithm in n-Queens bibliography as our presented algorithm so far.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proxied IBE-based key establishment for LLNs 基于代理ibe的lln密钥建立
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868727
A. Papanikolaou, K. Rantos, I. Androulidakis
Embedded systems devices have a wide application range, an instance of which is their use in Low-power and Lossy Networks (LLNs), which are anticipated to become one of the fundamental building blocks for the realisation of the Internet of Things (IoT). The security issues emerging from the requirement for Web accessibility can be fulfilled by appropriate cryptographic techniques, so as to secure the communicated information, supported by appropriate key exchange protocols, able to cope with the particular nature of such networks. The properties of Identity-Based Encryption (IBE) seem to match well the nature of such networks, thus an IBE-based key establishment protocol would be a good choice to be used in an LLN. However, severe limitations on those devices resources render deployment of expensive key establishment protocols inappropriate. Alternatives are therefore proposed such as offloading some of the computationally-intensive tasks to other, more powerful devices. Our IBE-based key establishment protocol enables a constrained node to exchange a shared secret with a remote party, that typically operates outside the node's network through an also non-constrained proxy node that undertakes the task of performing some of the expensive computations. The proposed key establishment scheme facilitates secure communications among embedded systems devices providing information and services to remote parties, towards the realisation of the Internet of Things.
嵌入式系统设备具有广泛的应用范围,其中一个实例是它们在低功耗和有损网络(lln)中的使用,预计将成为实现物联网(IoT)的基本构建块之一。由于Web可访问性的要求而产生的安全问题可以通过适当的加密技术来解决,从而确保通信信息的安全,并在适当的密钥交换协议的支持下,能够应对此类网络的特殊性质。基于身份的加密(Identity-Based Encryption, IBE)的特性似乎与此类网络的性质很匹配,因此基于身份的密钥建立协议将是在LLN中使用的一个很好的选择。然而,这些设备资源的严重限制使得部署昂贵的密钥建立协议不合适。因此提出了替代方案,例如将一些计算密集型任务卸载到其他更强大的设备上。我们基于ibe的密钥建立协议使受约束的节点能够与远程方交换共享密钥,远程方通常通过同样不受约束的代理节点在节点网络之外操作,该代理节点承担执行一些昂贵计算的任务。建议的密钥建立方案促进向远程各方提供信息和服务的嵌入式系统设备之间的安全通信,从而实现物联网。
{"title":"Proxied IBE-based key establishment for LLNs","authors":"A. Papanikolaou, K. Rantos, I. Androulidakis","doi":"10.1109/DT.2014.6868727","DOIUrl":"https://doi.org/10.1109/DT.2014.6868727","url":null,"abstract":"Embedded systems devices have a wide application range, an instance of which is their use in Low-power and Lossy Networks (LLNs), which are anticipated to become one of the fundamental building blocks for the realisation of the Internet of Things (IoT). The security issues emerging from the requirement for Web accessibility can be fulfilled by appropriate cryptographic techniques, so as to secure the communicated information, supported by appropriate key exchange protocols, able to cope with the particular nature of such networks. The properties of Identity-Based Encryption (IBE) seem to match well the nature of such networks, thus an IBE-based key establishment protocol would be a good choice to be used in an LLN. However, severe limitations on those devices resources render deployment of expensive key establishment protocols inappropriate. Alternatives are therefore proposed such as offloading some of the computationally-intensive tasks to other, more powerful devices. Our IBE-based key establishment protocol enables a constrained node to exchange a shared secret with a remote party, that typically operates outside the node's network through an also non-constrained proxy node that undertakes the task of performing some of the expensive computations. The proposed key establishment scheme facilitates secure communications among embedded systems devices providing information and services to remote parties, towards the realisation of the Internet of Things.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of custom-made implants using industrial computed tomography 使用工业计算机断层扫描评估定制植入物
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868696
Hudák Radovan, Živčák Jozef, Tóth Teodor, Majerník Jaroslav, L. Martin
Verification of custom-made implants manufactured using the additive manufacturing technologies is the key task to be fulfilled prior to the clinical application of an implant. It consists of parameters verification within individual steps, from a software design, through manufacturing, surface finishing, up to finalisation of a medical product. The use of additive technologies facilitates the manufacture of custom-made implants for human body parts which are not mechanically loaded (e.g. cranial implant), as well as replacement of joints, or bones, which are mechanically loaded during common everyday activities. The article presents possible uses of a plastic 3D printing and the computed tomography (Metrotom 1500, Carl Zeiss, Germany) for the verification of selected parameters of static customised implants manufactured using the Direct Metal Laser Sintering (DMLS) technology with the EOSINT M280 equipment (EOS GmbH, Germany) from the biocompatible titanium alloy Ti-6Al-4V (Grade 5).
使用增材制造技术制造的定制植入物的验证是植入物临床应用之前要完成的关键任务。它包括各个步骤中的参数验证,从软件设计,到制造,表面处理,直到医疗产品的定型。增材技术的使用有助于制造非机械载荷的人体部位(例如颅骨植入物)的定制植入物,以及替换关节或骨骼,这些关节或骨骼在日常活动中受到机械载荷。本文介绍了塑料3D打印和计算机断层扫描(Metrotom 1500, Carl Zeiss,德国)的可能用途,用于验证使用直接金属激光烧结(DMLS)技术和EOSINT M280设备(EOS GmbH,德国)制造的静态定制植入物的选定参数,这些植入物来自生物相容性钛合金Ti-6Al-4V(5级)。
{"title":"Evaluation of custom-made implants using industrial computed tomography","authors":"Hudák Radovan, Živčák Jozef, Tóth Teodor, Majerník Jaroslav, L. Martin","doi":"10.1109/DT.2014.6868696","DOIUrl":"https://doi.org/10.1109/DT.2014.6868696","url":null,"abstract":"Verification of custom-made implants manufactured using the additive manufacturing technologies is the key task to be fulfilled prior to the clinical application of an implant. It consists of parameters verification within individual steps, from a software design, through manufacturing, surface finishing, up to finalisation of a medical product. The use of additive technologies facilitates the manufacture of custom-made implants for human body parts which are not mechanically loaded (e.g. cranial implant), as well as replacement of joints, or bones, which are mechanically loaded during common everyday activities. The article presents possible uses of a plastic 3D printing and the computed tomography (Metrotom 1500, Carl Zeiss, Germany) for the verification of selected parameters of static customised implants manufactured using the Direct Metal Laser Sintering (DMLS) technology with the EOSINT M280 equipment (EOS GmbH, Germany) from the biocompatible titanium alloy Ti-6Al-4V (Grade 5).","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122648757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recent advances in mesh-based modeling of individual cells in biological fluids 生物流体中单个细胞网格建模的最新进展
Pub Date : 2014-07-09 DOI: 10.1109/DT.2014.6868686
I. Cimrák, Iveta Jančgová, R. Tóthová
The problem of modeling blood flow can be approached on different levels of accuracy. We investigate a model consisting of two major components: the fluid representing blood plasma and the elastic objects representing all types of cells in blood, e.g. red blood cells. The elastic objects are immersed in the fluid and they interact with each other. Our research is focused on spring-network models of elastic objects. We present the results concerning the scalability of meshes. We investigate the relation between mechanical properties of physical cells and the stiffness parameters of underlying meshes. Further, we present new metric that supplements energy-based approaches in cases when the energy is difficult to calculate. To demonstrate the abilities of our software implementation, we provide tests concerning the computational complexity. We show the significant speed-up caused by using templates when generating many cells with the same elastic properties. We also demonstrate the quadratic dependence of the computational time on increasing number of simulated cells. We suggest several directions for further model enhancements, such as better implementation of cell-cell collisions, inclusion of adhesion processes, monitoring the rupture of cells, and development of physically more relevant implementation of forces for some cell's elastic moduli.
血流建模的问题可以在不同的精度水平上进行处理。我们研究了一个由两个主要组成部分组成的模型:代表血浆的液体和代表血液中所有类型细胞(如红细胞)的弹性物体。弹性物体浸入流体中,它们相互作用。我们的研究重点是弹性物体的弹簧网络模型。我们给出了关于网格可扩展性的结果。我们研究了物理单元的力学性能与底层网格的刚度参数之间的关系。此外,当能量难以计算时,我们提出了新的度量来补充基于能量的方法。为了证明我们的软件实现的能力,我们提供了有关计算复杂性的测试。我们展示了在生成具有相同弹性属性的许多单元时使用模板所引起的显著加速。我们还证明了计算时间与模拟细胞数量的二次依赖关系。我们提出了进一步增强模型的几个方向,例如更好地实现细胞-细胞碰撞,包含粘附过程,监测细胞破裂,以及开发一些细胞弹性模量的物理上更相关的力实现。
{"title":"Recent advances in mesh-based modeling of individual cells in biological fluids","authors":"I. Cimrák, Iveta Jančgová, R. Tóthová","doi":"10.1109/DT.2014.6868686","DOIUrl":"https://doi.org/10.1109/DT.2014.6868686","url":null,"abstract":"The problem of modeling blood flow can be approached on different levels of accuracy. We investigate a model consisting of two major components: the fluid representing blood plasma and the elastic objects representing all types of cells in blood, e.g. red blood cells. The elastic objects are immersed in the fluid and they interact with each other. Our research is focused on spring-network models of elastic objects. We present the results concerning the scalability of meshes. We investigate the relation between mechanical properties of physical cells and the stiffness parameters of underlying meshes. Further, we present new metric that supplements energy-based approaches in cases when the energy is difficult to calculate. To demonstrate the abilities of our software implementation, we provide tests concerning the computational complexity. We show the significant speed-up caused by using templates when generating many cells with the same elastic properties. We also demonstrate the quadratic dependence of the computational time on increasing number of simulated cells. We suggest several directions for further model enhancements, such as better implementation of cell-cell collisions, inclusion of adhesion processes, monitoring the rupture of cells, and development of physically more relevant implementation of forces for some cell's elastic moduli.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
The 10th International Conference on Digital Technologies 2014
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1