Search results for "Cryptography"

showing 10 items of 657 documents

"Table 13" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at high KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct

"Table 11" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in pp collisions versus Nch at high KT3.

R lambdaInclusiveProton-Proton Scattering7000.0Astrophysics::Earth and Planetary AstrophysicsP P --> PI+ XNuclear ExperimentP P --> PI- XComputer Science::Cryptography and Security
researchProduct

Human body sensing: A pervasive approach by implanted RFID tags

2011

Starting from the physical evidence that passive RFID systems may be used as self-sensing devices, the feasibility of human monitoring by means of implanted tags is here investigated. The key parameters to master with the purpose to enhance the sensitivity of the implanted radiosensor have been theoretically analyzed and numerically applied to a specific medical problem, i.e. the continuous monitoring of liver cancer evolution. Preliminary experimental results with simplified phantoms corroborate the analysis.

RFIDImplanted tagUbiquitous computingComputer sciencebusiness.industryWearable tagRFID sensor Wearable tag Implanted tagReal-time computingContinuous monitoringSettore ING-INF/02 - Campi ElettromagneticisensorHuman monitoringKey (cryptography)RFID sensorSensitivity (control systems)Telecommunicationsbusiness2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)
researchProduct

Passive UHF RFID antennas for sensing applications: Principles, methods, and classifcations

2013

UHF passive radio-frequency identification technology is rapidly evolving from simple labeling of things to wireless pervasive sensing. A remarkable number of scientific papers demonstrate that objects in principle can have their physical properties be remotely tracked and monitored all along their life cycle. The key background is a new paradigm of antenna design that merges together the conventional communication issues with more-specific requirements about sensitivity to time-varying boundary conditions. This paper presents a unified review of the state of the art of the tag-as-sensor problem. Particular care is taken to formalize the measurement indicators and the communication and sens…

RFIDInternet of thingsEngineeringSIMPLE (military communications protocol)business.industrySettore ING-INF/02 - Campi ElettromagneticiCondensed Matter PhysicsSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)antennaVariety (cybernetics)Ultra high frequencyKnowledge baseElectronic engineeringKey (cryptography)WirelessSensitivity (control systems)State (computer science)RFID sensorElectrical and Electronic Engineeringbusinesssensor network
researchProduct

Feature selection using ROC curves on classification problems

2010

Feature Selection (FS) is one of the key stages in classification problems. This paper proposes the use of the area under Receiver Operator Characteristic curves to measure the individual importance of every input as well as a method to discover the variables that yield a statistically significant improvement in the discrimination power of the classification model.

Receiver operating characteristicbusiness.industryFeature extractionKey (cryptography)Feature selectionLinear classifierPattern recognitionArtificial intelligencebusinessMeasure (mathematics)Power (physics)MathematicsThe 2010 International Joint Conference on Neural Networks (IJCNN)
researchProduct

Cost-effective Multiresolution schemes for Shock Computations

2009

Harten's Multiresolution framework has provided a fruitful environment for the development of adaptive codes for hyperbolic PDEs. The so-called cost-effective alternative [4,8,21] seeks to achieve savings in the computational cost of the underlying numerical technique, but not in the overall memory requirements of the code. Since the data structure of the basic algorithm does not need to be modified, it provides a set of tools that can be easily implemented into existing codes and that can be very useful in order to speed up the numerical simulations involved in the testing process that is associated to the development of new numerical schemes.
In this paper we present two different applica…

Reduction (complexity)Set (abstract data type)SpeedupComputer engineeringComputer scienceComputationProcess (computing)Code (cryptography)Data miningData structurecomputer.software_genrecomputerShock (mechanics)ESAIM: Proceedings
researchProduct

On strongly tactical codes

1986

We study perfect error correcting codes in which the codewords are protected by Hamming spheres of distinct protective radii. These codes have been introduced by Cohen, Montaron and Frankl [3, 4, 10].

Reed–Solomon error correctionConcatenated error correction codeTurbo codeForward error correctionConstant-weight codeLow-density parity-check codeError detection and correctionHamming codeAlgorithmComputer Science::Cryptography and SecurityComputer Science::Information TheoryMathematics
researchProduct

Evaluación de la educación digital y digitalización de la evaluación

2021

La evaluación de la educación digital y digitalización de la evaluación son procesos por el que transita tanto la educación digital como la educación digital de emergencia. Aunque el tema de la evaluación, por sí misma, ya es complejo, esta complejidad aumenta cuando media la tecnología digital. Lejos de pensar que se trata de una acción técnica, la evaluación digital y la digitalización de la evaluación, como lo demuestra el contenido de este monográfico, no se reducen a la inserción de sistemas tecnológicos, sino a la comprensión pedagógica de su rol e impacto en los procesos educativos. Los trabajos que conforman este monográfico buscan contribuir, desde el análisis empírico y la reflexi…

Reflection (computer programming)Computer scienceProcess (engineering)media_common.quotation_subjectSubject (documents)Data scienceAction (philosophy)Information and Communications TechnologyAprenentatgeKey (cryptography)General Earth and Planetary SciencesQuality (business)EducacióConstruct (philosophy)PedagogiaGeneral Environmental Sciencemedia_common
researchProduct

Anatomy of Trading Rules

2017

This key chapter presents a methodology for examining how the trading signal in a moving average rule is computed. Then using this methodology the chapter examines the computation of trading signals in all moving average rules and investigates the commonalities and differences between the rules. The main conclusion that can be drawn from this study is that the computation of the trading indicator in every rule, based on either one or multiple moving averages, can equivalently be interpreted as the computation of a single weighted moving average of price changes. The analysis presented in this chapter uncovers the anatomy of moving average trading rules, provides very useful insights about p…

ReinterpretationTrading rulesComputer scienceMoving averageComputationSIGNAL (programming language)Key (cryptography)Anatomy
researchProduct

THE ROLE OF ONTOLOGICAL LEARNING LEVELS IN DEVELOPING DYNAMIC CAPABILITIES

2018

This paper explores the links between the fields of dynamic capabilities and organisational learning (OL), emphasising the role of the different ontological learning levels. The resource-based view (RBV) is pinpointed as the key origin of the dynamic capabilities view (DCV), in connection with OL and knowledge management. Ontological learning levels are identified as key OL stages. The knowledge-based view (KBV) of the firm is introduced as a key link between OL processes and dynamic capabilities development. Specifically, we propose a novel and integrative framework for understanding the role that the RBV, the DCV, OL, and the KBV, have, in an inter-connected way, have played in achieving …

Resource (project management)Knowledge managementbusiness.industryComputer scienceManagement of Technology and InnovationKey (cryptography)Dynamic capabilitiesbusinessCompetitive advantageEducationInternational Journal of Learning and Change
researchProduct