Search results for "ACCESS"

showing 10 items of 1232 documents

Energy-Efficient M2M Communications in for Industrial Automation

2020

M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…

Computer sciencebusiness.industryDistributed computingKey (cryptography)Resource allocationAccess controlLyapunov optimizationThe InternetbusinessAutomationCommunication channelEfficient energy use
researchProduct

Research platform for medical device development to simplify translation to the market

2019

New regulations for medical products complicate research projects for new application fields and translation of innovative product ideas to refundable medical products becomes a high economic risk. All this demands for a CE-marked platform, which offers the possibility to access the recorded data online or even directly the hardware during research applications, to bridge the gap. This paper describes how a CE-marked medical product can be extended by different interfaces to enable basic research or simplify first proof-of-concept studies thus optimizing prototype development in research projects, simplifying the documentation process and reducing the risk for market access.

Computer sciencebusiness.industryProcess (engineering)010401 analytical chemistryMarket access01 natural sciencesBridge (nautical)030218 nuclear medicine & medical imaging0104 chemical sciences03 medical and health sciences0302 clinical medicineSoftwareDocumentationDevelopment (topology)Equipment and SuppliesProduct (category theory)Software engineeringbusinessGraphical user interfaceAnnual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference
researchProduct

Evaluation Framework of Hypertext Access for Program Comprehension Support

2008

Hypertext consists of text fragments connected by links enabling fast nonlinear browsing of the fragments. In case of program text there are many alternative ways to form the fragmentation and linkage. Transient hypertext is a general and well-grounded approach for offering capabilities to form versatile information access support for many kinds of central software maintenance activities. Transient hypertextual access structures (THASs) are data structures formed automatically based on situation dependent information needs of the users of program comprehension support tools. The approach has been implemented in HyperSoft system. It is aimed at supporting legacy software maintenance and comp…

Computer sciencebusiness.industryProgram comprehensionLegacy systemInformation accessInformation needsSoftware maintenanceData structurelaw.inventionMarket fragmentationWorld Wide WeblawHypertextSoftware engineeringbusiness
researchProduct

Filecasting for streaming content delivery in IP datacast over DVB-H systems

2008

In this paper we investigate the potential gain that can be obtained in DVB-H by delivering streaming content as a succession of time-constrained flies using Application Layer - Forward Error Correction (AL-FEC) for improving the reception for mobile terminals. Compared to the conventional approach with link layer MPE-FEC, this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of data bursts coded jointly ("file" or, source data block, size). The main drawback of this approach is an increase of the network latency proportional to the source block size, tha…

Computer sciencebusiness.industryRobustness (computer science)DVB-HDigital Video BroadcastingLink layerData_CODINGANDINFORMATIONTHEORYForward error correctionError detection and correctionbusinessLink marginAccess timeComputer network2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

The Vocationalisation of University Programmes in France: its Consequences for Employability and Mobility

2011

France has a multi-track higher education system which includes four key components: Grandes Ecoles, short vocational training tracks, specialised higher education institutions (in social work, healthcare and the arts), and universities. Access to higher education is traditionally defined by the contrast between universities (which enrol all holders of the baccalaureat without any selection process) and the extremely selective Grandes Ecoles. The other tertiary courses are not directly accessible to all baccalaureat holders who wish to enrol because the number of study places is limited; applications to these tracks involve a selection process (based on educational records or a competitive …

ComputingMilieux_THECOMPUTINGPROFESSIONHigher educationSocial workbusiness.industryEmployabilityThe artsTest (assessment)Vocational educationHealth carePedagogyComputingMilieux_COMPUTERSANDEDUCATIONSociologyAccess to Higher Educationbusiness
researchProduct

On the nature of consonant/vowel differences in letter position coding: Evidence from developing and adult readers

2016

In skilled adult readers, transposed-letter effects (jugde-JUDGE) are greater for consonant than for vowel transpositions. These differences are often attributed to phonological rather than orthographic processing. To examine this issue, we employed a scenario in which phonological involvement varies as a function of reading experience: a masked priming lexical decision task with 50-ms primes in adult and developing readers. Indeed, masked phonological priming at this prime duration has been consistently reported in adults, but not in developing readers (Davis, Castles, & Iakovidis, 1998). Thus, if consonant/vowel asymmetries in letter position coding with adults are due to phonological inf…

ConsonantMaleVocabularyDissociation (neuropsychology)Adolescentlexical accessLexical decisionmedia_common.quotation_subjectDecision MakingSocial SciencesVocabulary050105 experimental psychologyPSYCHOLOGY03 medical and health sciencesYoung Adult0302 clinical medicinemasked primingPhoneticsVowelLexical decision taskReaction Time:Psicologia [Ciências Sociais]Humans0501 psychology and cognitive sciencesChildLetter position codingGeneral Psychologymedia_commonlexical decision4. Education05 social sciencesPhoneticsRecognition PsychologyLinguisticsReadingletter position codingCiências Sociais::PsicologiaMasked primingLexical accessConsonant vowelFemalePsychology030217 neurology & neurosurgeryCognitive psychologyCoding (social sciences)
researchProduct

Does consonant–vowel skeletal structure play a role early in lexical processing? Evidence from masked priming

2017

Published online: 02 November 2017 Is the specific consonant–vowel (CV) letter combination of a word a basic source of information for lexical access in the early stages of processing? We designed two masked priming lexical decision experiments to respond to this question by directly examining the role of CV skeletal structure in written-word recognition. To that aim, each target word was preceded by a one-letter different nonword prime that kept the same CV skeletal structure or not. We also included an identity prime as a control. Results showed faster word identification times in the CV congruent condition than in the CV incongruent condition when a consonant was replaced from the target…

Consonantlexical decisionLinguistics and LanguageDissociation (neuropsychology)lexical access05 social sciencesWord processingconsonant–vowel structureExperimental and Cognitive Psychology050105 experimental psychologyLanguage and LinguisticsLinguistics03 medical and health sciencesPrime (symbol)0302 clinical medicinemasked primingVowelLexical decision task0501 psychology and cognitive sciencesControl (linguistics)PsychologyPriming (psychology)030217 neurology & neurosurgeryGeneral PsychologyCognitive psychology
researchProduct

La genitorialita` procreativa nella coppia omoaffettiva (femminile). Riflessioni a margine di Corte cost. n. 221/2019

2020

Il contributo esamina criticamente la sentenza della Corte costituzionale n. 221 del 2019, che ha affermato la legittimità costituzionale delle previsioni della legge 19 febbraio 2004, n. n. 40, che vietano l’accesso alle tecniche di procreazione medicalmente assistita alle coppie dello stesso sesso. Sulla base di una lettura evolutiva delle regole e dei principî costituzionali e convenzionali implicati, il saggio giunge a una diversa soluzione interpretativa, sostenendo la riconoscibilità del diritto alla genitorialità procreativa degli individui ad orientamento omoaffettivo e la sua compatibilità con l’interesse della prole a nascere e a crescere in un nucleo familiare idoneo ad assicurar…

Constitutional Court n. 221 of 2019Settore IUS/01 - Diritto Privatosame-sex coupleparental relationshipaccess to medically assisted reproductive technique
researchProduct