
Sökresultat:
660 Uppsatser om Suppression techniques - Sida 15 av 44
Parallell beräkning av omslutande volymer
This paper presents techniques for speeding up commonly used algorithms forbounding volume (BV) computation, such as the AABB, sphere and k-DOP. Byexploiting the possibilities of parallelismin modern processors, the result exceedsthe expected theoretical result. The methods focus on data-level-parallelism(DLP) using Intel?s SSE instructions, for operations on 4 parallel independentsingle precision floating point values, with a theoretical speed-up factor of 4 ondata throughput. Still, a speed-up between 7?9 are shown in the computation ofAABBs and k-DOPs.
Samiskt skogsutnyttjande, dimensionsavverkningar och naturvärden : skogshistorisk analys i block 5, Pakko kronopark i Norrbotten
In order to understand the human impact on today?s remaining ?virgin? forest and to develop sensible management strategies for future reserves, it is necessary to know how these forests have developed. This knowledge can be gained by using forest history analysis. here are large areas of forests still untouched by modern forestry in the mountainous region in the county of Norrbotten. These forests are highly interesting study objects from an ecological and historical point of view.
Nätet spinns vidare : Hur används Internet i ungdomsromanen?
The essay is a text centred study of ten Young Adult Novels, in which Internet plays an essential part. The structure is put into light out of used narrative techniques of how to create stories and its construction elements. I compare the ten Young Adult novels to each other. My aim is to analyze the functions of the Internet motive in the chosen novels, using different approaches, and enlighten it with concerns to the new phenomenon that Internet is in society. Consequently the essay will also have a mimetic touch to it.The ten novels that I base the analysis on are written of both med and women and have both male and female as main fictive persons, and are from different parts of the world.
De autistiska barnens dataprogram - hur bör de vara?
This report presents a study of the basic criteria for computer programmes that may be consideredadequate for aiding children with autism in their education and upbringing. I have based thisstudy on descriptions, opinions and proposals from people who deal with treatment and/orother issues concerning children with autism, as well as relevant literature.The study has been carried out in a major Swedish metropolitan municipality. The intervieweeswere civil servants from this municipality and representing different institutional endeavourson the issue of autism.I used a combination of both quantitative and qualitative techniques, as there was need for bothstandardization and qualitative variation. The main aim of the study was to seek suggestionson how computer programmes should be. That is, if they are to be considered appropriate föraiding children with autism develop their personality.The general conclusion of this study is that computer programmes, that may be consideredappropriate for the above mentioned purpose, should have certain characteristics of whichpedagogic usefulness and user suitability are of primary importance..
Elevers syn på klimatfrågan : Klimatundervsiningen i skolan
The aim of this study is to find out in which way the education about climate in school is taught and how the students experience the world situation today. There are various theories about the greenhouse effect and its origin and these theories should be addressed to ensure that students get a broader understanding of how climate change occurs. This includes the natural phenomena and also the human impact on climate change. Students in school are a source of concern that only human are the cause of global warming, and know little or almost nothing about the natural phenomena of global warming. I will mention what has emphasized in the national steering documents in the case of environmental education at school.I have used a qualitative method, where interviews and document analysis were used as techniques. The interviews took place with five students in ninth grade and with three science teachers in the same school..
Motiv till att fortsätta föreningsidrotta : En enkätstudie om 13 till 18-åriga föreningsidrottande flickor
Pupils, and most of all girls, drop out of organized sports in the ages 13-18. The purpose of this survey was to study which motives girls had to proceed in sports together with differences between certain groups. This study was based on a survey which included 86 responses from girls active in sports in 10 different compounds. The results showed that the most frequent motives to do sports were to have fun and to feel well. Differences showed were that the ones who trained more often and the ones who practiced more than one sport found that to work hard was an important motive, compared to the other groups.
Magomvridning :
The purpose of the study was to review the current veterinary literature regarding gastric dilatation and volvulus (GDV) considering pathophysiology and treatment, and to evaluate the operative technique (incisional gastropexy) used during the years 2005 and 2006 at the University Animal Hospital (Universitetsdjursjukhuset), SLU, Uppsala, Sweden.
GDV has a complicated pathophysiology which foremost effects the circulatory system. Progress is often acute and it is not unusual that patients are affected with shock. The initial treatment targets to alleviate the shock by fluid therapy and decompression of the stomach. There is a high risk of recurrence in the long term perspective unless the stomach is surgically fixated by gastropexy. The study describes two different techniques for gastropexy; incisional gastropexy, and funduspexy.
Long term complications were rare among the patients that were treated surgically, while about half out of the eighteen dogs that undergo surgery do experience complications of various severity in the short term..
Kammararytmi hos hund : behandling ? när och med vad?
Ventrikulära takyarytmier är den vanligaste typen av rytmrubbningar hos hundar.
Ventrikulära extraslag (VES), när depolarisationen utgår från kammaren, är den mildaste formen. Flera VES på rad med en hög hjärtrytm kallas ventrikulär takykardi (VT) och kan
utvecklas till livshotande kammarflimmer (VF) då inget blod pumpas ut i kroppen.
Arytmier upptäcks normalt vid en klinisk undersökning med auskultation följt av elektrokardiografi (EKG). Dessa korta tre-minuters avläsningar kan identifiera en arytmi om
den är vanligt förekommande. Allt vanligare blir användningen av 24-timmars ambulatorisk elektrokardiografi (AEKG) som läser av hjärtrytmen under ett helt dygn. AEKG är mycket användbar för att upptäcka oregelbundna arytmier.
Effektivare produktionsarbete med BIM som arbetssätt på Skanska Väg och Anläggning region Stockholm
The author of this report has created a Web-based invoice system and CRM at therequest of the company Webhouse.se. The purpose of the System is to makeeveryday tasks in the company easier. The system also needed to prevent mistakesand errors by managing orders and invoices.The system has been created with the company?s requests in focus. During thedevelopment of the system information security and interaction design have beenimportant aspects that have been taken into consideration.The system has been created using techniques such as PHP and MYSQL.
Effekten av ett probiotikum i en besättning med hög incidens spädgrisdiarré
Magnetic resonance imaging (MRI) has the potential to be used for the diagnosis and study of osteoarthrosis in the equine tarsal region. In the development of new diagnostic MRI techniques cadaver specimens are often used. To allow the use of cadaver legs for these types of studies it is important to know the effect of time after death on the MRI image. Since the relaxation times are temperature dependent, it is interesting to examine whether the time after death and the temperature of the cadaver may play a role in the image appearance and quality. The radio pulse sequences that show the different types of tissues are also important to know when pathological evaluation with MRI is used.
Lakvattenrening och kontroll vid deponier : granskning och sammanställning
If not purified leachate from landfills would cause damages on the environment. At most landfills in Sweden local treatment of leachate is achieved, at the rest the leachate is transported to sewertreatment. While no comprehensive legal provisions for discharge exist in Sweden there is a difference in discharges between the installations for landfill. If no comprehensive legal provisions is produced guidance must improve.Treatment of leachate and self monitoring system at fifteen installations in Sweden has been studied and compared. A study of literature about different treatment solutions has also been performed.
Nanostrukturell ytbeläggning på utsatta delar av marina drivlinor
Nowadays naval units are participating in international missions, where new and in many cases tougher conditions will affect their propulsion. This essay deals with some of the now developed nanostructure coatings and gives a presentation of how the coatings could function on some exposed parts of the naval powertrain. The essay investigates the possibility that the coatings can be used as a protective layer that will reduce or prevent wear on selected parts of the naval powertrains. As a basis for the essay, nanotechnology is described, as well as different reasons that wear occurs and application techniques for coatings The conclusion is that nanostructured coatings can be applied and provide a much better result on hardness and wear resistance as of naval powertrains compared to micro-structural coatings, both for manufacturing and renovation. The essay presents a few examples of the military utility of the nanostructure coatings as well as suggestions for further research..
Testsystem för utredning av integrerad styrning för RC-helikopter
AbstractThis report is about the creation of a test system for development of a control system for a off the shelf RC-helicopter, which can be bought for about two thousand SEK. The test system consists of both electronics for controlling the helicopter and mechanical constrainer. The constrainer is used for mounting the helicopter so that it won´t crash.A circuit board including processor and sensors was manufactured. This was used for doing test of the different control algorithms. In this way were we able to analyze the quality of the sensors chosen, and what other sensors that could contribute to the control of the system.Basic helicopter control have been studied and presented in the report.
Alternativa metoder för att kontrollera ett användargränsnitt i en browser för teknisk dokumentation
When searching for better and more practical interfaces between users and their computers, additional or alternative modes of communication between the two parties would be of great use. This thesis handles the possibilities of using eye and head movements as well as voice input as these alternative modes of communication. One part of this project is devoted to find possible interaction techniques when navigating in a computer interface with movements of the eye or the head. The result of this part is four different controls of an interface, adapted to suit this kind of navigation, combined together in a demo application. Another part of the project is devoted to the development of an application, with voice control as primary input method.
IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter
The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.