Search results for " programmi"

showing 10 items of 1629 documents

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

Evolution Within a Bizarre Phylum: Homologies of the First Echinoderms

1998

SYNOPSIS. The Extraxial/Axial Theory (EAT) of echinoderm skeletal homologies describes two major body wall types: axial and extraxial. The latter is subdivided into perforate and imperforate regions. Each of the regions has a distinctly different source in early larval development. Axial skeleton originates in the rudiment, and develops in association with the pentaradially arranged hydrocoel according to specific ontogenetic principles. Perforate and imperforate extraxial regions are associated with the left and right somatocoels respectively, are not governed by ontogenetic principles of plate addition, and are products of the non-rudiment part of the larval body. The morphology of even t…

Axial skeletonPhylummedia_common.quotation_subjectOntogenyAnatomyBiologybiology.organism_classificationSkeleton (computer programming)medicine.anatomical_structureDevelopmental trajectoryEchinodermmedicineGeneral Earth and Planetary SciencesMetamorphosisProcess (anatomy)General Environmental Sciencemedia_commonAmerican Zoologist
researchProduct

Cold recycling of reclaimed asphalt pavements

2018

Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…

BSM – bitumen stabilized materialsRecycling Reclaimedasphalt Foambitumen Bituminous emulsion Cohesion test Fragmentation test BSM – bitumen stabilized materialsComputer scienceProcess (engineering)Materials Science (miscellaneous)Cohesion test0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionFragmentation testMix designNatural resourceConstruction engineering0201 civil engineeringBituminous emulsionAsphalt021105 building & constructionBituminous emulsion; BSM – bitumen stabilized materials; Cohesion test; Foam bitumen; Fragmentation test; Reclaimed asphalt; Recycling; Civil and Structural Engineering; Building and Construction; Materials Science (miscellaneous)Foam bitumenRecyclingProtocol (object-oriented programming)Reclaimed asphaltCivil and Structural Engineering
researchProduct

Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive

2014

Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…

Base stationProtocol overheadSocial networkbusiness.industryComputer scienceComponent (UML)Service discoveryCellular networkContext (language use)businessProtocol (object-oriented programming)5GComputer network2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Multi Architecture Optimization of a Hybrid Electric Vehicle Using Object-Oriented Programming

2017

This article presents an energetic macroscopic representation multi-architecture model for hybrid vehicles using object-oriented programming. This approach is successfully used to evaluate the power performance and fuel consumption of different vehicles on different driving cycles. An optimization of power source sizing (ICE, EM and Battery) and system control, based on simulation results, is carried. Different architectures are compared for given cycles and optimization of hybrid architecture will also be possible.

Battery (electricity)Object-oriented programmingbusiness.product_categoryComputer science020209 energyControl engineering02 engineering and technologySizingPower (physics)Unified Modeling LanguageControl systemElectric vehicle0202 electrical engineering electronic engineering information engineeringFuel efficiencybusinesscomputercomputer.programming_language2017 IEEE Vehicle Power and Propulsion Conference (VPPC)
researchProduct

Cell Association for MTC Devices in 5G Networks: Schemes and Performance Evaluation

2021

Fifth generation (5G) networks offer tremendous opportunities for Internet of things applications by facilitating massive machine-type communications (MTC). As many MTC devices are battery powered and intend to stay often in the sleep or power-saving mode, cell (re)association needs to be performed when a device wakes up. On the other hand, 5G networks are usually deployed as heterogeneous networks consisting of both macro and small cells under which a single device may be covered by multiple radio access technologies (RATs) simultaneously. Therefore, it is imperative to design effective cell association schemes for the purpose of efficient connectivity and resource utilization, especially …

Battery (electricity)Scheme (programming language)Computer sciencebusiness.industryAssociation (object-oriented programming)Association schemeHandoverMacrobusinesscomputer5GHeterogeneous networkcomputer.programming_languageComputer network2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit)
researchProduct

A new compact formulation for the discrete p-dispersion problem

2017

Abstract This paper addresses the discrete p -dispersion problem (PDP) which is about selecting  p facilities from a given set of candidates in such a way that the minimum distance between selected facilities is maximized. We propose a new compact formulation for this problem. In addition, we discuss two simple enhancements of the new formulation: Simple bounds on the optimal distance can be exploited to reduce the size and to increase the tightness of the model at a relatively low cost of additional computation time. Moreover, the new formulation can be further strengthened by adding valid inequalities. We present a computational study carried out over a set of large-scale test instances i…

Binary search algorithmMathematical optimization021103 operations researchInformation Systems and ManagementLine searchGeneral Computer Science0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchSolver01 natural sciencesIndustrial and Manufacturing EngineeringFacility location problemSet (abstract data type)010201 computation theory & mathematicsModeling and SimulationProgramming paradigmInteger programmingAlgorithmStandard model (cryptography)MathematicsEuropean Journal of Operational Research
researchProduct

Structural difficulty in grammatical evolution versus genetic programming

2013

Genetic programming (GP) has problems with structural difficulty as it is unable to search effectively for solutions requiring very full or very narrow trees. As a result of structural difficulty, GP has a bias towards narrow trees which means it searches effectively for solutions requiring narrow trees. This paper focuses on the structural difficulty of grammatical evolution (GE). In contrast to GP, GE works on variable-length binary strings and uses a grammar in Backus-Naur Form (BNF) to map linear genotypes to phenotype trees. The paper studies whether and how GE is affected by structural difficulty. For the analysis, we perform random walks through the search space and compare the struc…

Binary treeGrammarGrammatical evolutionmedia_common.quotation_subjectStructure (category theory)Contrast (statistics)Genetic programmingRepresentation (mathematics)Random walkAlgorithmmedia_commonMathematicsProceedings of the 15th annual conference on Genetic and evolutionary computation
researchProduct

On the Locality of Standard Search Operators in Grammatical Evolution

2014

Offspring should be similar to their parents and inherit their relevant properties. This general design principle of search operators in evolutionary algorithms is either known as locality or geometry of search operators, respectively. It takes a geometric perspective on search operators and suggests that the distance between an offspring and its parents should be less than or equal to the distance between both parents. This paper examines the locality of standard search operators used in grammatical evolution (GE) and genetic programming (GP) for binary tree problems. Both standard GE and GP search operators suffer from low locality since a substantial number of search steps result in an o…

Binary treeTheoretical computer sciencebusiness.industryPerspective (graphical)LocalityEvolutionary algorithmGenetic programmingcomputer.software_genreRandom walkGrammatical evolutionArtificial intelligencebusinesscomputerNatural language processingMathematics
researchProduct

Bicausative matrices to measure structural change: Are they a good tool?

1999

The causative-matrix method to analyze temporal change assumes that a matrix transforms one Markovian transition matrix into another by a left multiplication of the first matrix; the method is demand-driven when applied to input-output economics. An extension is presented without assuming the demand-driven or supply-driven hypothesis. Starting from two flow matrices X and Y, two diagonal matrices are searched, one premultiplying and the second postmultiplying X, to obtain a result the closer as possible to Y by least squares. The paper proves that the method is deceptive because the diagonal matrices are unidentified and the interpretation of results is unclear. Keywords : Input-Output ; Ch…

BiproportionBicausativePure mathematicsJEL: C - Mathematical and Quantitative Methods/C.C6 - Mathematical Methods • Programming Models • Mathematical and Simulation Modeling/C.C6.C67 - Input–Output Modelsjel:C63jel:C67JEL: D - Microeconomics/D.D5 - General Equilibrium and Disequilibrium/D.D5.D57 - Input–Output Tables and AnalysisLeast squaresMeasure (mathematics)Interpretation (model theory)JEL: C - Mathematical and Quantitative Methods/C.C6 - Mathematical Methods • Programming Models • Mathematical and Simulation Modeling/C.C6.C63 - Computational Techniques • Simulation ModelingSylvester's law of inertiaMatrix (mathematics)Diagonal matrixStatisticsJEL : D - Microeconomics/D.D5 - General Equilibrium and Disequilibrium/D.D5.D57 - Input–Output Tables and Analysis[ SHS.ECO ] Humanities and Social Sciences/Economies and finances[SHS.ECO] Humanities and Social Sciences/Economics and FinanceGeneral Environmental ScienceMathematicsJEL : C - Mathematical and Quantitative Methods/C.C6 - Mathematical Methods • Programming Models • Mathematical and Simulation Modeling/C.C6.C67 - Input–Output Modelseconomic theoryhumanities social sciencessciences humaines et socialesStochastic matrixStructural ChangeGeneral Social Scienceseconomics[SHS.ECO]Humanities and Social Sciences/Economics and Financejel:D57CausativeJEL : C - Mathematical and Quantitative Methods/C.C6 - Mathematical Methods • Programming Models • Mathematical and Simulation Modeling/C.C6.C63 - Computational Techniques • Simulation ModelingChaosMultiplicationThe Annals of Regional Science
researchProduct