Search results for "ACCESS"
showing 10 items of 1232 documents
Energy-Efficient M2M Communications in for Industrial Automation
2020
M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…
Research platform for medical device development to simplify translation to the market
2019
New regulations for medical products complicate research projects for new application fields and translation of innovative product ideas to refundable medical products becomes a high economic risk. All this demands for a CE-marked platform, which offers the possibility to access the recorded data online or even directly the hardware during research applications, to bridge the gap. This paper describes how a CE-marked medical product can be extended by different interfaces to enable basic research or simplify first proof-of-concept studies thus optimizing prototype development in research projects, simplifying the documentation process and reducing the risk for market access.
Evaluation Framework of Hypertext Access for Program Comprehension Support
2008
Hypertext consists of text fragments connected by links enabling fast nonlinear browsing of the fragments. In case of program text there are many alternative ways to form the fragmentation and linkage. Transient hypertext is a general and well-grounded approach for offering capabilities to form versatile information access support for many kinds of central software maintenance activities. Transient hypertextual access structures (THASs) are data structures formed automatically based on situation dependent information needs of the users of program comprehension support tools. The approach has been implemented in HyperSoft system. It is aimed at supporting legacy software maintenance and comp…
Filecasting for streaming content delivery in IP datacast over DVB-H systems
2008
In this paper we investigate the potential gain that can be obtained in DVB-H by delivering streaming content as a succession of time-constrained flies using Application Layer - Forward Error Correction (AL-FEC) for improving the reception for mobile terminals. Compared to the conventional approach with link layer MPE-FEC, this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of data bursts coded jointly ("file" or, source data block, size). The main drawback of this approach is an increase of the network latency proportional to the source block size, tha…
Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks
2016
Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…
Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks
2018
International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …
The Vocationalisation of University Programmes in France: its Consequences for Employability and Mobility
2011
France has a multi-track higher education system which includes four key components: Grandes Ecoles, short vocational training tracks, specialised higher education institutions (in social work, healthcare and the arts), and universities. Access to higher education is traditionally defined by the contrast between universities (which enrol all holders of the baccalaureat without any selection process) and the extremely selective Grandes Ecoles. The other tertiary courses are not directly accessible to all baccalaureat holders who wish to enrol because the number of study places is limited; applications to these tracks involve a selection process (based on educational records or a competitive …
On the nature of consonant/vowel differences in letter position coding: Evidence from developing and adult readers
2016
In skilled adult readers, transposed-letter effects (jugde-JUDGE) are greater for consonant than for vowel transpositions. These differences are often attributed to phonological rather than orthographic processing. To examine this issue, we employed a scenario in which phonological involvement varies as a function of reading experience: a masked priming lexical decision task with 50-ms primes in adult and developing readers. Indeed, masked phonological priming at this prime duration has been consistently reported in adults, but not in developing readers (Davis, Castles, & Iakovidis, 1998). Thus, if consonant/vowel asymmetries in letter position coding with adults are due to phonological inf…
Does consonant–vowel skeletal structure play a role early in lexical processing? Evidence from masked priming
2017
Published online: 02 November 2017 Is the specific consonant–vowel (CV) letter combination of a word a basic source of information for lexical access in the early stages of processing? We designed two masked priming lexical decision experiments to respond to this question by directly examining the role of CV skeletal structure in written-word recognition. To that aim, each target word was preceded by a one-letter different nonword prime that kept the same CV skeletal structure or not. We also included an identity prime as a control. Results showed faster word identification times in the CV congruent condition than in the CV incongruent condition when a consonant was replaced from the target…
La genitorialita` procreativa nella coppia omoaffettiva (femminile). Riflessioni a margine di Corte cost. n. 221/2019
2020
Il contributo esamina criticamente la sentenza della Corte costituzionale n. 221 del 2019, che ha affermato la legittimità costituzionale delle previsioni della legge 19 febbraio 2004, n. n. 40, che vietano l’accesso alle tecniche di procreazione medicalmente assistita alle coppie dello stesso sesso. Sulla base di una lettura evolutiva delle regole e dei principî costituzionali e convenzionali implicati, il saggio giunge a una diversa soluzione interpretativa, sostenendo la riconoscibilità del diritto alla genitorialità procreativa degli individui ad orientamento omoaffettivo e la sua compatibilità con l’interesse della prole a nascere e a crescere in un nucleo familiare idoneo ad assicurar…