Search results for " protocol"

showing 10 items of 1320 documents

Evaluating the microscopic effect of brushing stone tools as a cleaning procedure

2020

Cleaning stone tool surfaces is a common procedure in lithic studies. The first step widely applied at any archeological site (and/or at field laboratories) is the gross removal of sediment from the surfaces of artifacts. Lithic surface alterations due to mechanical action applied in wet or dry cleaning regimes have never been examined at a microscopic scale. This could have important implications in traceology, as any modern surface modifications inflicted on archeological artifacts might compromise their functional interpretations. The current trend toward quantification of use-wear traces makes the testing even more important, as even slight, apparently invisible surface alterations migh…

Stone toolbepress|Social and Behavioral Sciences|AnthropologyBrushing010506 paleontologyCleaning protocolsSocArXiv|Social and Behavioral Sciences|AnthropologyDry cleaningengineering.material010502 geochemistry & geophysicsUse-wear analysis01 natural sciencesMicroscopic scaleSocArXiv|Social and Behavioral Sciences|Anthropology|Archaeological AnthropologyStone toolsConfocal microscopyMining engineeringengineeringSurface roughnessbepress|Social and Behavioral Sciences|Anthropology|Archaeological Anthropologybepress|Social and Behavioral SciencesSocArXiv|Social and Behavioral SciencesControlled experimentGeology0105 earth and related environmental sciencesEarth-Surface Processes
researchProduct

Firefly algorithm based upon slicing structure encoding for unequal facility layout problem

2019

Finding the locations of departments or machines in a workspace is classified as a Facility Layout Problem. Good placement of departments has a relevant influence on manufacturing costs, work in process, lead times and production efficiency. This paper analyses the problem of allocating departments with restrictions in terms of unequal area and rectangular shape within a facility, in order to minimize the sum of material handling costs taking into account the satisfaction of the aspect ratio requested. In particular, we propose for the first time a Firefly Algorithm based on the slicing structure encoding. The proposed method was tested comparing the results obtained from other authors on t…

Structure (mathematical logic)Firefly protocollcsh:T55.4-60.8Computer scienceSlicingFacility layout problemFirefly algorithm Problem; Slicing structure; Unequal area-facility layoutIndustrial and Manufacturing EngineeringEncoding (memory)Settore ING-IND/17 - Impianti Industriali MeccaniciFirefly algorithm Problem Slicing structure Unequal area-facility layoutFirefly Algorithmlcsh:Industrial engineering. Management engineeringFirefly algorithmUnequal Area-Facility Layout ProblemSlicing Structurelcsh:Production management. Operations managementlcsh:TS155-194AlgorithmInternational Journal of Industrial Engineering Computations
researchProduct

An analysis of ego network communities and temporal a affinity for online social networks

2017

The wide diffusion of Online Social Networks (OSNs) presents several advantages, like the definition of simple tools for information sharing and spreading. However, OSNs present also some drawbacks, one of the most important one is the problem of privacy disclosures. Distributed Online Social Networks (DOSNs), which decentralize the control of the social network, have been recently proposed to overcome these issues. The decentralization of the control has issued several challenges, one of the main ones is guaranteeing data availability without relying on a central server. To define users’ data allocation strategies, the knowledge of the structure of the ego network and of the user’ temporal…

Structure (mathematical logic)SIMPLE (military communications protocol)Social networkCommunity detectionSettore INF/01 - Informaticabusiness.industryComputer Networks and CommunicationsInformation sharingControl (management)020206 networking & telecommunications02 engineering and technologyData scienceDecentralizationField (computer science)Data availabilityOrder (exchange)020204 information systems0202 electrical engineering electronic engineering information engineeringSociologyP2P social networkSocial sciencebusinessTemporal affinityDOSN
researchProduct

NEITHER AUTHORIZED NOR PROHIBITED? SECESSION AND INTERNATIONAL LAW AFTER KOSOVO, SOUTH OSSETIA AND ABKHAZIA

2008

The flexibility mechanisms introduced by the Kyoto Protocol on climate change promote the realization of climate change related investment projects which aim to contribute both to the fight against climate change as well as to foster sustainable development patterns in host countries. At first glance, the flexibility mechanisms seem to represent paradigmatic examples of green economy instruments which have numerous potential benefits. However, the implementation of such mechanisms may give rise to some negative environmental externalities which have the consequence of creating a new type of investment versus environment conflict, characterized by a new form of conflict with an internal envi…

Sustainable developmentPolitical economy of climate changeGlobal warmingIUS/13 - DIRITTO INTERNAZIONALEInvestment (macroeconomics)Green economyGeographyuse of forceright to self-determinationSustainabilitySustainability and systemic change resistanceKyoto ProtocolSettore IUS/13 - Diritto InternazionaleEconomic systemEnvironmental planningUN Security CouncilsecessionThe Italian Yearbook of International Law Online
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Trattamento delle manifestazioni vascolari nella Sclerosi Sistemica e qualità della vita: nuovo protocollo

2005

TRATTAMENTO DELLE MANIFESTAZIONI VASCOLARI NELLA SCLEROSI SISTEMICA E QUALITA’ DELLA VITA: NUOVO PROTOCOLLO
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct

A Teledentistry system for the second opinion

2014

In this paper we present a Teledentistry system aimed to the Second Opinion task. It make use of a particular camera called intra-oral camera, also called dental camera, in order to perform the photo shooting and real-time video of the inner part of the mouth. The pictures acquired by the Operator with such a device are sent to the Oral Medicine Expert (OME) by means of a current File Transfer Protocol (FTP) service and the real-time video is channeled into a video streaming thanks to the VideoLan client/server (VLC) application. It is composed by a HTML5 web-pages generated by PHP and allows to perform the Second Opinion both when Operator and OME are logged and when one of them is offline.

TeledentistryFile Transfer ProtocolHTML5Multimediabusiness.industrySecond opinionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingcomputer.software_genreTask (computing)Operator (computer programming)DentistryImage Processing Computer-AssistedHumansTelemetryMedicineVideo streamingTeledentistrybusinessReferral and ConsultationcomputerAlgorithms2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
researchProduct

An IoT and Fog Computing-Based Monitoring System for Cardiovascular Patients with Automatic ECG Classification Using Deep Neural Networks

2020

Telemedicine and all types of monitoring systems have proven to be a useful and low-cost tool with a high level of applicability in cardiology. The objective of this work is to present an IoT-based monitoring system for cardiovascular patients. The system sends the ECG signal to a Fog layer service by using the LoRa communication protocol. Also, it includes an AI algorithm based on deep learning for the detection of Atrial Fibrillation and other heart rhythms. The automatic detection of arrhythmias can be complementary to the diagnosis made by the physician, achieving a better clinical vision that improves therapeutic decision making. The performance of the proposed system is evaluated on a…

TelemedicineIoTComputer scienceInternet of Things02 engineering and technology030204 cardiovascular system & hematologyMachine learningcomputer.software_genrelcsh:Chemical technologyBiochemistryLoRaArticleAnalytical Chemistry03 medical and health sciencesElectrocardiography0302 clinical medicineFog computingAtrial FibrillationFog-AI0202 electrical engineering electronic engineering information engineeringmedicineHumanslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMonitoring Physiologicbusiness.industryECGDeep learningAtrial fibrillationMonitoring systemCloud Computingmedicine.diseaseAtomic and Molecular Physics and Opticscardiovascular diseasesEdge-AIDeep neural networks020201 artificial intelligence & image processingArtificial intelligenceNeural Networks ComputerCommunications protocolbusinessInternet of ThingscomputerAlgorithmsSensors
researchProduct

Challenging aspects in Consensus protocols for networks

2008

Results on consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to- peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the unknown but bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the epsiv-consensus problem, where the states…

Theoretical computer scienceAutomatic controlConsensus problemsWireless ad hoc networkStochastic processEstimation theoryComputer scienceDistributed computingMulti-agent systemConsensus problems; Consensus protocolsConsensus protocolsBounded functionConvergence (routing)Wireless sensor network
researchProduct