16 resultados para Kernel Linux TED Wi-Fi VoIP

em Reposit


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an Advanced Traveler Information System (ATIS) developed on Android platform, which is open source and free. The developed application has as its main objective the free use of a Vehicle-to- Infrastructure (V2I) communication through the wireless network access points available in urban centers. In addition to providing the necessary information for an Intelligent Transportation System (ITS) to a central server, the application also receives the traffic data close to the vehicle. Once obtained this traffic information, the application displays them to the driver in a clear and efficient way, allowing the user to make decisions about his route in real time. The application was tested in a real environment and the results are presented in the article. In conclusion we present the benefits of this application. © 2012 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless communications is a feature that has become indispensable for many people in the whole world. Through this feature, communication process can become much more efficient, allowing people to access information much more quickly wherever they are. The constant evolution of communication technologies allows the development of new unthinkable applications and services. This new range of possibilities brings greater mobility and efficiency for final users and also helps service providers and carriers to improve the quality of services offered by them. This study presents the principles of wireless communication and the Wi-Fi technology as well as its most modern applications, covering from the basics of computer networks to the procedures of planning a wireless network, concepts of radio frequency, antennas, patterns, regulatory agencies, network equipment, protocols and network monitoring

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study Hardy spaces on the boundary of a smooth open subset or R-n and prove that they can be defined either through the intrinsic maximal function or through Poisson integrals, yielding identical spaces. This extends to any smooth open subset of R-n results already known for the unit ball. As an application, a characterization of the weak boundary values of functions that belong to holomorphic Hardy spaces is given, which implies an F. and M. Riesz type theorem. (C) 2004 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vegetable oils are important sources of essential fatty acids. It is, therefore, important to characterize plant species that can be used as new oil sources. This study aimed to characterize the oils from guariroba (Syagrus oleracea), jeriva (Syagrus romanzoffiana), and macauba (Acrocomia aculeata). The physicochemical characterization was performed using official analytical methods for oils and fats, free fatty acids, peroxide value, refractive index, iodine value, saponification number, and unsaponifiable matter. The oxidative stability was determined using the Rancimat at 110 degrees C. The fatty acid composition was performed by gas chromatography. The results were submitted to Tukey's test for the medium to 5% using the ESTAT program. The pulp oils were more unsaturated than kernel oils, as evidenced by the higher refractive index and iodine value, especially the macauba pulp oil which gave 1.4556 and 80 g I(2)/100 g, respectively, for these indices. The kernel oils were less altered by oxidative process and had high induction period, free fatty acids below 0.5%, and peroxide value around 0.19 meq/kg. The guariroba kernel oil showed the largest induction period, 91.82 h.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJETIVO: Comparar os tempos de geração e digitação de laudos radiológicos entre um sistema eletrônico baseado na tecnologia de voz sobre o protocolo de internet (VoIP) e o sistema tradicional, em que o radiologista escreve o laudo à mão. MATERIAIS E MÉTODOS: Foi necessário modelar, construir e implantar o sistema eletrônico proposto, capaz de gravar o laudo em formato de áudio digital, e compará-lo com o tradicional já existente. Por meio de formulários, radiologistas e digitadores anotaram os tempos de geração e digitação dos laudos nos dois sistemas. RESULTADOS: Comparadas as médias dos tempos entre os sistemas, o eletrônico apresentou redução de 20% (p = 0,0410) do tempo médio de geração do laudo em comparação com o sistema tradicional. O tradicional foi mais eficiente em relação ao tempo de digitação, uma vez que a média de tempo do eletrônico foi três vezes maior (p < 0,0001). CONCLUSÃO: Os resultados mostraram diferença estatisticamente significante entre os sistemas comparados, sendo que o eletrônico foi mais eficiente do que o tradicional em relação ao tempo de geração dos laudos, porém, em relação ao tempo de digitação, o tradicional apresentou melhores resultados.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We show how the zero-temperature result for the heat-kernel asymptotic expansion can be generalized to the finite-temperature one. We observe that this general result depends on the interesting ratio square-root tau/beta, where tau is the regularization parameter and beta = 1/T, so that the zero-temperature limit beta --> infinity corresponds to the cutoff limit tau --> 0. As an example, we discuss some aspects of the axial model at finite temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dinuclear azido-palladium(II) complex [Pd2(N3)4(PPh3)2(μ-ted)], where PPh3 = triphenylphosphine and ted = triethylenediamine, was synthesized and characterized by single-crystal X-ray diffraction. The title compound was crystallized in a triclinic system, space group P1 with a = 11.5875(2)Å, b = 13.0817(3)Å, c = 15.2618(3)Å, α = 93.306(2)°, β =110.040(1)°, γ = 98.486(1)°, V = 2134.95(8)Å3, Z = 2. Each Pd(II) center displays a distorted squareplanar coordination environment formed by two N atoms from two trans terminally coordinated azido groups, one P atom from the phosphine and one N atom from the bridging ted ligand. 2008 © The Japan Society for Analytical Chemistry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A positive measure ψ defined on [a,b] such that its moments μn=∫a btndψ(t) exist for n=0,±1,±2,⋯, is called a strong positive measure on [a,b]. If 0≤akernel polynomials associated with these L-orthogonal polynomials. As applications, we consider the quadrature rules associated with these kernel polynomials. Associated eigenvalue problems and numerical evaluation of the nodes and weights of such quadrature rules are also considered. © 2010 IMACS. Published by Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)