Search results for "550"
showing 10 items of 1192 documents
A quantitative high-resolution summer temperature reconstruction based on sedimentary pigments from Laguna Aculeo, central Chile, back to AD 850
2009
We present a pigment-based quantitative high-resolution (five years) austral summer DJF (December to February) temperature reconstruction for Central Chile back to AD 850. We used non-destructive in situ multichannel reflection spectrometry data from a short sediment core of Laguna Aculeo (33°50′S/70°54′W, 355 m a.s.l., central Chile). Calibration-in-time (period AD 1901—2000, cross-validated with split periods) revealed robust correlations between local DJF temperatures and total sedimentary chlorin (relative absorption band depth (RABD) centred in 660—670 nm RABD660;670: r=0.79, P<0.01; five-years triangular filtered) and the degree of pigment diagenesis ( R660nm/670 nm: r=0.82, P<…
Pottery decoration in the Neolithic of Kaf Taht el-Ghar (Tetouan, Morocco). AGRIWESTMED Works 2012
2021
Presentamos el estudio de los restos cerámicos de la fase neolítica de Kaf Taht el-Ghar (Mechrouha, Tetuán, Marruecos), enfocado principalmente en el análisis de técnicas y patrones decorativos. Ello cuenta con el interés añadido de corresponder, en su fase antigua, a las cerámicas asociadas a las primeras evidencias de agricultura y ganadería en el Magreb Occidental, encuadradas en el tercer cuarto del VI milenio cal AC. En dichas decoraciones dominan impresiones variadas, en particular las realizadas con concha estriada y lisa, peine y de cypraea. El uso de tales técnicas podría incluir estas primeras producciones cerámicas dentro del mundo impresso-cardial de la Europa mediterránea centr…
1200 years of decadal-scale variability of Mediterranean vegetation and climate at Pantelleria Island, Italy.
2013
A new sedimentary sequence from Lago di Venere on Pantelleria Island, located in the Strait of Sicily between Tunisia and Sicily was recovered. The lake is located in the coastal infra-Mediterranean vegetation belt at 2 m a.s.l. Pollen, charcoal and sedimentological analyses are used to explore linkages among vegetation, fire and climate at a decadal scale over the past 1200 years. A dry period from ad 800 to 1000 that corresponds to the 'Medieval Warm Period' (WMP) is inferred from sedimentological analysis. The high content of carbonate recorded in this period suggests a dry phase, when the ratio of evaporation/precipitation was high. During this period the island was dominated by thermop…
Juan II de Aragón y las artes suntuarias
2015
Producción Científica
Blockchain-Based Land Registration System: A Conceptual Framework
2022
Land registration authorities are frequently held accountable for the alleged mismanagement and manipulation of land records in various countries. Pakistan’s property records are especially vulnerable to falsification and corruption because of the country’s poverty. Different parties therefore claim varying degrees of authority over a specific piece of land. Given the fact that this data has been consolidated, it has become significantly more vulnerable to security threats. The goal of decentralized system research has been to increase the reliability of these systems. In order to fix the flaws of centralized systems, blockchain-based decentralized systems are currently in development. By u…
An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm
2022
Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for …
In the Direction of Service Guarantees for Virtualized Network Functions
2022
The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profi…
Face Mask Detection Using Deep Convolutional Neural Network and MobileNetV2-Based Transfer Learning
2022
The rapid spreading of Coronavirus disease 2019 (COVID-19) is a major health risk that the whole world is facing for the last two years. One of the main causes of the fast spreading of this virus is the direct contact of people with each other. There are many precautionary measures to reduce the spread of this virus; however, the major one is wearing face masks in public places. Detection of face masks in public places is a real challenge that needs to be addressed to reduce the risk of spreading the virus. To address these challenges, an automated system for face mask detection using deep learning (DL) algorithms has been proposed to control the spreading of this infectious disease effecti…
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
2022
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this re…
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home
2022
The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…