Search results for "LESS"

showing 10 items of 2452 documents

Relazioni d’aiuto ed alessitimia: un’indagine empirica su un campione di studenti universitari

2007

ALESSITIMIA psicopatologia
researchProduct

Anodic alumina membranes modified by electroless deposition of Pd and Ni

2006

ALUMINA MEMBRANE Pd Ni Electroless
researchProduct

'Contextualized lexicography',

2005

The essay takes into examination the technique by which words drawn from glossaries or other kinds of lexicographic compilations were embedded in both prose and verse and went to build a lexical continuum. The definition I propose for such a technique is ‘contextualized lexicography’. It dates from late antiquity, if not earlier, but it was in a number of works composed in the Middle Ages and circulating in the British Isles that it became the governing principle of composition. A penchant for this device is evident in different genres, both literary and utilitarian. These works were written with various aims and addressed to different kinds of audience. The stylistic feature under discussi…

ANGLOSASSONE GLOSSOGRAFIA MEDIEVALE LESSICO DIDATTICA ERUDIZIONE LUDICO
researchProduct

Disfunzioni sessuali, farmaci antiepilettici e profilo ormonale sierico negli uomini affetti da epilessia.

2011

ANTIEPILETTICISIERICOORMONALEfarmaci antiepiletticiSettore MED/26 - NeurologiaEPILESSIADisfunzioni sessualiprofilo ormonale siericoepilessia.Settore MED/24 - Urologia
researchProduct

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

Proxy Mobile IPv6-Based Seamless Handover

2013

A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…

Access networkHandoverWireless networkMobile IPbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCore networkbusinessProxy Mobile IPv6Mobility managementIPv6Computer network
researchProduct

Subjective Evaluation of Video on Demand Systems Using Different Network Connections

2009

Nowadays, society makes use of new technologies as they appear. Due to this boom, the use of resources via web is increasing notably. In of training and education cases, companies such as universities are offering tele-learning platforms to complement and facilitate the learning process. Some of these called e-learning platforms can have explanatory videos as a resource for training. For the codification of these videos, we have to use parameters which provide a trade-off between the video sizes to be transmitted that optimize bandwidth and video and audio quality. This paper presents a subjective study of the video quality on transmission depending on the types of users’ network access to …

Access networkMultimediaComputer scienceInteractive videoWireless networkbusiness.industryVideo qualitycomputer.software_genreResource (project management)ServerThe InternetSound qualitybusinesscomputer2009 First International Conference on Intensive Applications and Services
researchProduct

Thermodynamic properties of a liquid–vapor interface in a two-component system

2010

Abstract We report a complete set of thermodynamic properties of the interface layer between liquid and vapor two-component mixtures, using molecular dynamics. The mixtures consist of particles which have identical masses and diameters and interact with a long-range Lennard-Jones spline potential. The potential depths in dimensionless units for like interactions is 1 (for component 1) and 0.8 (for component 2). The surface excess entropy decreases when the temperature increases, so the surface has a negative excess heat capacity. This is a consequence of the fact that the surface tension decreases to zero at the critical point, proportional to ( T C , i − T ) 2 ν . The surface entropy decre…

Activity coefficientEquation of stateChemistryApplied MathematicsGeneral Chemical EngineeringThermodynamicsGeneral ChemistryHeat capacityIndustrial and Manufacturing EngineeringSurface tensionsymbols.namesakeGibbs isothermCritical point (thermodynamics)symbolsCritical exponentDimensionless quantityChemical Engineering Science
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct