858 resultados para Baldovinetti, Alesso, 1425-1499.
Resumo:
Capitulares grab. xil.
Resumo:
Pie de imp. tomado del colofón en D10v y F6r
Resumo:
Capitulares grab. xil.
Resumo:
Pie de imp. tomado de colofón
Resumo:
n this article, a tool for simulating the channel impulse response for indoor visible light communications using 3D computer-aided design (CAD) models is presented. The simulation tool is based on a previous Monte Carlo ray-tracing algorithm for indoor infrared channel estimation, but including wavelength response evaluation. The 3D scene, or the simulation environment, can be defined using any CAD software in which the user specifies, in addition to the setting geometry, the reflection characteristics of the surface materials as well as the structures of the emitters and receivers involved in the simulation. Also, in an effort to improve the computational efficiency, two optimizations are proposed. The first one consists of dividing the setting into cubic regions of equal size, which offers a calculation improvement of approximately 50% compared to not dividing the 3D scene into sub-regions. The second one involves the parallelization of the simulation algorithm, which provides a computational speed-up proportional to the number of processors used.
Resumo:
El texto alude a una pragmatica de 1499
Resumo:
Mención de traductor tomado inicio de texto en h. 1
Resumo:
Cognitive wireless sensor network (CWSN) is a new paradigm, integrating cognitive features in traditional wireless sensor networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in cognitive wireless sensor networks is an important problem since these kinds of networks manage critical applications and data. The specific constraints of WSN make the problem even more critical, and effective solutions have not yet been implemented. Primary user emulation (PUE) attack is the most studied specific attack deriving from new cognitive features. This work discusses a new approach, based on anomaly behavior detection and collaboration, to detect the primary user emulation attack in CWSN scenarios. Two non-parametric algorithms, suitable for low-resource networks like CWSNs, have been used in this work: the cumulative sum and data clustering algorithms. The comparison is based on some characteristics such as detection delay, learning time, scalability, resources, and scenario dependency. The algorithms have been tested using a cognitive simulator that provides important results in this area. Both algorithms have shown to be valid in order to detect PUE attacks, reaching a detection rate of 99% and less than 1% of false positives using collaboration.
Resumo:
Contiene : Veteris translationis ; Noue translationis ; Nouissime translatôis Marsilii
Resumo:
El nombre del autor precede al tit
Resumo:
Texto en valenciano
Resumo:
Escritura por la que Jeroni Torrella, doncel de Gandía, vende a Alonso de la Serna, doncel de Gandía, un censal de 60 libras valencianas y pensión anual de 90 sueldos valencianos, originalmente vendido a Jaume Roca, caballero de Gandia, por Francesc Joan Corts, señor del lugar de la Pobla, su mujer Beatriu Esplugues, Jaume Martorell y su mujer Caterina, y Joan Nadal y su mujer Joana, vecinos del lugar de la Pobla, ante el notario de la ciudad de Xàtiva Miquel Puig el 5 de agosto de 1499. A la escritura de venta acompaña el ápoca del pago de las 60 libras realizado por Alonso de la Sena a Jeroni Torrella. Notario, Francesc Pérez de Culla. Testigos: Damià Ones, panadero, y Jaume Diego, vecinos de Gandía.
Resumo:
Indices con términos médicos del texto