764 resultados para Keys
Resumo:
Topology optimization consists in finding the spatial distribution of a given total volume of material for the resulting structure to have some optimal property, for instance, maximization of structural stiffness or maximization of the fundamental eigenfrequency. In this paper a Genetic Algorithm (GA) employing a representation method based on trees is developed to generate initial feasible individuals that remain feasible upon crossover and mutation and as such do not require any repairing operator to ensure feasibility. Several application examples are studied involving the topology optimization of structures where the objective functions is the maximization of the stiffness and the maximization of the first and the second eigenfrequencies of a plate, all cases having a prescribed material volume constraint.
Resumo:
The two especies of Lophopidae found in the lowland Amazon Basin, Hesticus rufimanus, (walker) and H. sanguinifrons Muir, are redescribed and their geographical distributions given. Keys are provided to genera of New World lophopidae, and to species of Hesticus .
Resumo:
v.2:no.5(1907)
Resumo:
v.53:no.4(1968)
Resumo:
This book is a collection of articles which analyze the sporting, social, political, communicative, urban, technological and economic impacts of the 1992 Barcelona Olympic Games.
Resumo:
Document published by the CEO-UAB, corresponding to the results of the research undertaken by the author during the celebration of the Sydney 2000 Games.
Resumo:
A revision is made of the previously poorly studied blackfly fauna from the south-western border of Guyana with Brazil. Notes on the biosystematics of the species found are provided, together with keys and illustrations based on their morphology. Of the 14 species recorded, eight are anthropophilic and two of these (Simulium oyapockense s.l. and S. guianense s.l.) are proven vectors of human onchocerciasis in the nearby Amazonia focus of the disease in neighbouring Brazil.
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.