5 resultados para Network deployment methods
em Universidad de Alicante
Resumo:
This work focuses on the preparation of flexible ruthenium oxide containing activated carbon cloth by electrodeposition. Different electrodeposition methods have been used, including chronoamperometry, chronopotentiometry and cyclic voltammetry. The electrochemical properties of the obtained materials have been measured. The results show that the potentiostatic method allows preparing composites with higher specific capacitance than the pristine activated carbon cloth. The capacitance values measured by cyclic voltammetry at 10 mV s−1 and 1 V of potential window were up to 160 and 180 F g−1. This means an improvement of 82% and 100% with respect to the capacitance of the pristine activated carbon cloth. This excellent capacitance enhancement is attributed to the small particle size (4–5 nm) and the three-dimensional nanoporous network of the ruthenium oxide film which allows reaching very high degree of oxide utilization without blocking the pore structure of the activated carbon cloth. In addition, the electrodes maintain the mechanical properties of the carbon cloth and can be useful for flexible devices.
Resumo:
Society today is completely dependent on computer networks, the Internet and distributed systems, which place at our disposal the necessary services to perform our daily tasks. Subconsciously, we rely increasingly on network management systems. These systems allow us to, in general, maintain, manage, configure, scale, adapt, modify, edit, protect, and enhance the main distributed systems. Their role is secondary and is unknown and transparent to the users. They provide the necessary support to maintain the distributed systems whose services we use every day. If we do not consider network management systems during the development stage of distributed systems, then there could be serious consequences or even total failures in the development of the distributed system. It is necessary, therefore, to consider the management of the systems within the design of the distributed systems and to systematise their design to minimise the impact of network management in distributed systems projects. In this paper, we present a framework that allows the design of network management systems systematically. To accomplish this goal, formal modelling tools are used for modelling different views sequentially proposed of the same problem. These views cover all the aspects that are involved in the system; based on process definitions for identifying responsible and defining the involved agents to propose the deployment in a distributed architecture that is both feasible and appropriate.
Resumo:
Feature selection is an important and active issue in clustering and classification problems. By choosing an adequate feature subset, a dataset dimensionality reduction is allowed, thus contributing to decreasing the classification computational complexity, and to improving the classifier performance by avoiding redundant or irrelevant features. Although feature selection can be formally defined as an optimisation problem with only one objective, that is, the classification accuracy obtained by using the selected feature subset, in recent years, some multi-objective approaches to this problem have been proposed. These either select features that not only improve the classification accuracy, but also the generalisation capability in case of supervised classifiers, or counterbalance the bias toward lower or higher numbers of features that present some methods used to validate the clustering/classification in case of unsupervised classifiers. The main contribution of this paper is a multi-objective approach for feature selection and its application to an unsupervised clustering procedure based on Growing Hierarchical Self-Organising Maps (GHSOMs) that includes a new method for unit labelling and efficient determination of the winning unit. In the network anomaly detection problem here considered, this multi-objective approach makes it possible not only to differentiate between normal and anomalous traffic but also among different anomalies. The efficiency of our proposals has been evaluated by using the well-known DARPA/NSL-KDD datasets that contain extracted features and labelled attacks from around 2 million connections. The selected feature sets computed in our experiments provide detection rates up to 99.8% with normal traffic and up to 99.6% with anomalous traffic, as well as accuracy values up to 99.12%.
Resumo:
A novel and selective electrochemical functionalization of a highly reactive superporous zeolite templated carbon (ZTC) with two different aminobenzene acids (2-aminobenzoic and 4-aminobenzoic acid) was achieved. The functionalization was done through potentiodynamic treatment in acid media under oxidative conditions, which were optimized to preserve the unique ZTC structure. Interestingly, it was possible to avoid the electrochemical oxidation of the highly reactive ZTC structure by controlling the potential limit of the potentiodynamic experiment in presence of aminobenzene acids. The electrochemical characterization demonstrated the formation of polymer chains along with covalently bonded functionalities to the ZTC surface. The functionalized ZTCs showed several redox processes, producing a capacitance increase in both basic and acid media. The rate performance showed that the capacitance increase is retained at scan rates as high as 100 mV s−1, indicating that there is a fast charge transfer between the polymer chains formed inside the ZTC porosity or the new surface functionalities and the ZTC itself. The success of the proposed approach was also confirmed by using other characterization techniques, which confirmed the presence of different nitrogen groups in the ZTC surface. This promising method could be used to achieve highly selective functionalization of highly porous carbon materials.
Resumo:
The purpose of this study is to analyze the existing literature on hospitality management from all the research papers published in The International Journal of Hospitality Management (IJHM) between 2008 and 2014. The authors apply bibliometric methods – in particular, author citation and co-citation analyses (ACA) – to identify the main research lines within this scientific field; in other words, its ‘intellectual structure’. Social network analysis (SNA) is also used to perform a visualization of this structure. The results of the analysis allow us to define the different research lines or fronts which shape the intellectual structure of research on hospitality management.