922 resultados para Kernel Linux TED Wi-Fi VoIP


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We show how the zero-temperature result for the heat-kernel asymptotic expansion can be generalized to the finite-temperature one. We observe that this general result depends on the interesting ratio square-root tau/beta, where tau is the regularization parameter and beta = 1/T, so that the zero-temperature limit beta --> infinity corresponds to the cutoff limit tau --> 0. As an example, we discuss some aspects of the axial model at finite temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dinuclear azido-palladium(II) complex [Pd2(N3)4(PPh3)2(μ-ted)], where PPh3 = triphenylphosphine and ted = triethylenediamine, was synthesized and characterized by single-crystal X-ray diffraction. The title compound was crystallized in a triclinic system, space group P1 with a = 11.5875(2)Å, b = 13.0817(3)Å, c = 15.2618(3)Å, α = 93.306(2)°, β =110.040(1)°, γ = 98.486(1)°, V = 2134.95(8)Å3, Z = 2. Each Pd(II) center displays a distorted squareplanar coordination environment formed by two N atoms from two trans terminally coordinated azido groups, one P atom from the phosphine and one N atom from the bridging ted ligand. 2008 © The Japan Society for Analytical Chemistry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A positive measure ψ defined on [a,b] such that its moments μn=∫a btndψ(t) exist for n=0,±1,±2,⋯, is called a strong positive measure on [a,b]. If 0≤akernel polynomials associated with these L-orthogonal polynomials. As applications, we consider the quadrature rules associated with these kernel polynomials. Associated eigenvalue problems and numerical evaluation of the nodes and weights of such quadrature rules are also considered. © 2010 IMACS. Published by Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O advento de novas formas multimídia tem atraído uma clientela exigente, onde preocupação não é somente com o serviço, mas também, com a qualidade que esse serviço pode ser oferecido. As WLAN (Wireless Local Area Networks) tornaram-se a forma mais comum de roteamento de Internet, devido ao seu baixo custo e facilidade de implementação. Para realizar um bom roteamento é necessário um planejamento, utilizando-se modelos. Os modelos de propagação existentes na literatura fazem a predição da intensidade do sinal, mas algumas vezes não contemplam a previsão de um bom serviço. Nesse sentido a presente dissertação propõe-se a elaborar um modelo de propagação empírico indoor multi-andar que não só prediz a potência recebida, mas também faz uma previsão para algumas métricas de QoS (Quality of Service) de chamadas VoIP (Voice over Internet Protocol). Para a elaboração do modelo proposto foram feitas campanhas de medição, em um prédio de dois andares, em pisos distintos mantendo-se a posição do ponto de acesso (PA) fixa. Estudos de geometria analítica para a contagem e agregação de perdas em pisos e paredes. Os resultados do modelo proposto foram comparados com um modelo da literatura que tem um comportamento similar, onde é possível verificar o melhor desempenho do modelo proposto, e para efeito de estudo um andar completamente simulado foi introduzido para avaliação.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Though intended as a field guide to the birds of the Great Plains, this book seems to serve best as a general introduction to Great Plains birds and will mostly benefit those casually interested in birds. The definition of Great Plains the book uses is rather broad, and some species are included that, in my opinion, aren't really birds of the Great Plains. For example, several warblers are included as breeding species although they nest within the book's definition of the region only in the conifer or mixed forest of north-central to northwestern Minnesota, which isn't really a part of the Great Plains proper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The multiple-instance learning (MIL) model has been successful in areas such as drug discovery and content-based image-retrieval. Recently, this model was generalized and a corresponding kernel was introduced to learn generalized MIL concepts with a support vector machine. While this kernel enjoyed empirical success, it has limitations in its representation. We extend this kernel by enriching its representation and empirically evaluate our new kernel on data from content-based image retrieval, biological sequence analysis, and drug discovery. We found that our new kernel generalized noticeably better than the old one in content-based image retrieval and biological sequence analysis and was slightly better or even with the old kernel in the other applications, showing that an SVM using this kernel does not overfit despite its richer representation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kathy and Susie, members of the faculty, and staff of the School of Natural Resource Sciences, ladies and gentlemen. There are some things in this world that, try as we may, just cannot be adequately accomplished. One of those things, for me at least, is to express adequately what I feel about the passing of Dr. Edward (Ted) Elliot. Ted came to this University of Nebraska a few months before I arrived, and it was my distinct honor to count him among my friends at this great University. Ted was a man of exceptional scientific standing and wisdom, and his loss leaves a void in all of our lives that will not be readily filled.