Search results for "Versa"

showing 10 items of 1490 documents

Eliminación de la actividad silanofílica en cromatografía líquida en fase inversa mediante el uso de aditivos

2013

La gran mayoría de los compuestos utilizados como principios activos en los productos farmacéuticos contienen átomos de nitrógeno básicos en su estructura. Su análisis por cromatografía líquida de fase inversa (reversed-phase liquid chromatography, RPLC) con columnas de sílice presenta una serie de inconvenientes, entre los que destacan retenciones elevadas, picos con colas y bajas eficacias, lo que se debe a la presencia de grupos silanoles residuales en la fase estacionaria que cuando están ionizados, interaccionan con los analitos catiónicos a través de un proceso de intercambio iónico, siendo el efecto más o menos pronunciado dependiendo de la columna seleccionada. Aunque aparentemente …

brij-35líquidos iónicos:QUÍMICA::Química analítica::Análisis cromatográfico [UNESCO]fase inversa:QUÍMICA::Química Farmacéutica [UNESCO]UNESCO::QUÍMICA::Química analítica::Análisis cromatográficoUNESCO::QUÍMICA::Química Farmacéuticarendimiento cromatográficocromatografía líquida
researchProduct

Rilevazione della prevalenza del Bullismo in un campione di scuole di Palermo

2018

Il bullismo è uno dei problemi sociali e sanitari più rilevanti in ambito scolastico per i bambini e gli adolescenti di tutto il mondo. Dal 2007, il Ministero Italiano della Pubblica Istruzione (D.M. n°16 del 5 febbraio 2007) promuove attività per il contrasto e la prevenzione del fenomeno in scuole di ogni ordine e grado, ed allo stesso tempo le aziende sanitarie locali o provinciali dovrebbero farsi carico di una risposta socio-sanitaria efficace al problema. Nella città di Palermo, negli ultimi anni, sia alcune scuole che alcuni distretti sanitari hanno messo in atto attività ed interventi per cercare di contrastare il fenomeno in questione. La mancanza di un dato rilevato in maniera uni…

bullismo prevalenza studio trasversaleSettore MED/42 - Igiene Generale E Applicata
researchProduct

Use of a new aneurysm clip with an inverted-spring mechanism to facilitate visual control during clip application. Technical note.

1995

✓ When operating on deep-seated cerebral aneurysms, the surgeon's visual control of clip application may be impaired by the clip holder unless adjacent structures are retracted. To improve visual control and reduce the necessity for retraction, the senior author (A.P.) developed a new concept: an aneurysm clip with an inverted-spring mechanism. The clip has two jaws that point away from the clip blades. The jaws of the clip holder articulate with the inner side of the clip jaws. By distending the jaws of the clip holder the blades of the clip are opened and vice versa. Thus the visual field increases while the clip application is proceeding. This instrumentation is useful, especially in cas…

business.industryArterial diseasemedicine.medical_treatmentComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTechnical noteIntracranial AneurysmClipping (medicine)AnatomyEquipment Designmedicine.diseaseVisual controlVisual fieldAneurysmMedicineHumansMultiple aneurysmsbusinessVersaVascular Surgical ProceduresJournal of neurosurgery
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

Virtualization of Remote Devices and Services in Residential Networks

2009

Lately solutions for remote access for residential services have been proposed. However, these solutions require modifications to the service controllers. In addition, remote access adds complexity to the client application. We propose here a solution for decoupling remote access from the client itself with an entity that creates virtual instances of remote services in a local network. Thereby, clients will be able to discover the virtual instance and use it. Moreover, client applications do not need to distinguish between local and remote services hence reducing complexity.

business.industryComputer scienceMobile computingLocal area networkVirtual realityVirtualizationcomputer.software_genreComputer securityServerUniversal Plug and PlayHome computingbusinesscomputerComputer network2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
researchProduct

A feasibility analysis on the use of ultrasonic multihop communications for E-health applications

2017

Rise in population aging as well as diffusion of chronic diseases and health consciousness require constant monitoring of health conditions but also lead to increasing costs for the governments. Body Area Networks represent the next frontier in health care and are envisaged as the natural choice to provide detailed and updated information on health status to prevent health risks and diseases. However if, on the one hand, a large research effort has been devoted so far to the investigation of BAN communications on and around the body, on the other hand intra-BAN communications are still a scarcely explored area because of the difficulties and risks in successfully propagating signals inside …

business.industryComputer scienceUniversal Software Radio PeripheralNode (networking)020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologyTransmission (telecommunications)Default gatewayHealth care0202 electrical engineering electronic engineering information engineeringRadio frequencyUnicast0210 nano-technologyTelecommunicationsbusinessComputer network2017 IEEE International Conference on Communications (ICC)
researchProduct

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

Workplace Innovation Forum: A section in the EJWI

2015

Launching a new journal means beginning a distinctive new conversation. WorkplaceInnovation is about practice, and not just academic theory. The journal needs a place wherepractice is presented, and can influence the development of theory. Short articles arewelcome for the Forum Section in EJWI, facilitating debate and collaboration.

business.industryPolitical sciencemedia_common.quotation_subjectSection (typography)ConversationPublic relationsbusinessmedia_commonEuropean Journal of Workplace Innovation
researchProduct

A User-Centered Approach to Digital Household Risk Management

2020

Internet of Things (IoT) is expected to become as common as electricity (OECD 2016) and there is a high probability for connected homes to become central parts of critical societal. IoT technologies might access, manage and record sensitive data about citizens and, as they become more and more pervasive, unintended data breaches reports increase every week. However, most of the tools designed to protect users’ privacy and personal data on IoT devices fail to contemplate the experience of persons with disabilities, elderly and other vulnerable categories of people. As a consequence, they are forced to rely on the help of family members or other related persons with technical skills, as frequ…

business.industryUniversal design05 social sciencesInternet privacy020206 networking & telecommunications02 engineering and technologyData breach0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingTechnical skillsInternet of ThingsbusinessSet (psychology)Risk management
researchProduct

The Dual Nature of Spreading Negative eWOM for Branded Offers: Emotional Reaction or Social Response? – A Structured Abstract

2017

The exchange of comments online about branded offers is defined in the literature as electronic word of mouth (eWOM). Most of the existing academic research on consumer behaviour focuses on positive emotions and behaviour about branded offers (Veloutsou and McAlonan 2012; Zarantonello et al. 2016). However, next to sharing positive comments, consumers are increasingly using online media to distribute unfavourable experiences and opinions about products and brands (Ullrich and Brunner 2015), and more research on the effects of the expression of negative comments online is needed. The negative electronic word of mouth (NeWOM) is defined in this study as negative statements made or distributed…

business.industrymedia_common.quotation_subjectAdvertisingCustomer relationship managementSpace (commercial competition)Digital mediaCustomer baseConversationTechnology acceptance modelbusinessPsychologySocial psychologyConsumer behaviourmedia_commonQualitative research
researchProduct