Search results for "Wire"
showing 10 items of 1383 documents
Ficción televisiva y puesta en cuestión de la lógica discursiva del capitalismo contemporáneo: The Wire (HBO, 2002-2008) como caso de estudio.
2019
En un contexto, el contemporáneo, en el que la consideración del modo de producción capitalista como el mejor y único posible parece cada vez más disputada, al tiempo que dicha discusión nos confirma su ubicuidad y omnipresente dominio, esta investigación parte de la cada vez más urgente necesidad de reflexión y cuestionamiento sobre nuestra turbulenta situación contemporánea. Desde tal posicionamiento, este proyecto de tesis doctoral tiene como principal objetivo explorar los procesos y aparatos a través de los cuales se producen y reproducen los discursos sostenedores del saber y del poder en las sociedades occidentales contemporáneas, realizando un examen crítico de las relaciones y vínc…
Software Requirements for Ubiquitous Ad Hoc Mobile Networks: An Example of a Bluetooth Application
2009
In contrast with the simple and elegant concept of global computing, also called ubiquitous computing - where daily life objects get now computing capacity and interact among them to provide a wide range of services to users - a major difficulty is arising with the software engineering process to develop applications for these devices. This article discusses the additional parameters that should be taken into account when designing and developing software for ubiquitous devices in ad-hoc networks. In these networks the mobility of the devices could increase the complexity of the requirements to be considered. As a case study, we present a Bluetooth application that has been developed to ful…
Ultrasonic phased array inspection of wire plus arc additive manufacture (WAAM) samples using conventional and total focusing method (TFM) imaging…
2018
In this study, three aluminium samples produced by wire + arc additive manufacture (WAAM) are inspected using ultrasonic phased array technology. Artificial defects are machined using a centre drill, ø3 mm, and electro-discharge machining (EDM), ø0.5-1 mm, in a cylindrical through hole topology. The sample was first inspected by a single element wheel probe mounted on a KUKA robot in order to investigate the feasibility of using a conventional ultrasonic transducer approach. Unfortunately, the wheel probe was found to be unsuitable for scanning of the WAAM specimens and ultrasonic phased arrays were employed next. The setup included 5 MHz and 10 MHz arrays (128 elements) in direct contact w…
Modeling of kinetic and static friction between an elastically bent nanowire and a flat surface
2011
Friction forces for a nanowire (NW) elastically bent on flat substrate were investigated both theoretically and experimentally. Models based on elastic beam theory were proposed considering balance of external, frictional, and elastic forces along the NW. The distributed friction force was determined for two cases: (i) the NW was uniformly dragged at its midpoint and bent by kinetic friction forces and (ii) the NW was held in a bent state by static friction forces. The first case considers a uniform distribution of kinetic friction along the NW and enables the measurement of the friction force from the elastically deformed NW profile. The second case exploits the interplay between static fr…
How value and trust influence loyalty in wireless telecommunications industry
2012
Despite making significant investments in enhancing the customer service experience, long-term customer loyalty remains an elusive dream for many service providers. Particularly in the telecommunications industry, switching providers even from within continuous contract relationships is easy and companies struggle to retain their customers. Trust and value are considered cornerstones of long-term relationships, so it is perhaps surprising that previous research on how relationship age and usage level actually affect value, trust and loyalty is inconclusive. The current research is set in the telecommunications services field and draws on a large-scale survey undertaken in Finland. The findi…
WhoSNext: Recommending Twitter Users to Follow Using a Spreading Activation Network Based Approach
2020
The huge number of modern social network users has made the web a fertile ground for the growth and development of a plethora of recommender systems. To date, recommending a new user profile X to a given user U that could be interested in creating a relationship with X has been tackled using techniques based on content analysis, existing friendship relationships and other pieces of information coming from different social networks or websites. In this paper we propose a recommending architecture - called WhoSNext (WSN) - tested on Twitter and which aim is promoting the creation of new relationships among users. As recent researches show, this is an interesting recommendation problem: for a …
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
2010
Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…
Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game
2012
Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …
Discrete-time multioverlapping controller design for structural vibration control of tall buildings under seismic excitation
2012
Published version of an article from the journal: Mathematical Problems in Engineering. Also available from the publisher:http://dx.doi.org/10.1155/2012/636878 In this paper, a computationally effective strategy to obtain multioverlapping controllers via the Inclusion Principle is applied to design discrete-time state-feedback multioverlapping LQR con- trollers for seismic protection of tall buildings. To compute the corresponding control actions, the proposed semidecentralized controllers only require state information from neighboring stories. This particular configuration of information exchange allows introducing a dramatic reduction in the transmission range required for a wireless imp…
Design and Validation of a Dynamic Inductive Power Transfer System for EV Battery Charging
2022
In this paper, a Dynamic Resonant Inductive Power Transfer (DRIPT) System for the Electric Vehicle (EV) battery charging is proposed. In particular, the aim of the work is the general design of the whole system and its validation, with particular attention to the power electronic converters and their control. For the transmitter side, a DC/AC converter is used. It is controlled through the phase-shift technique and supervised by a Zero Phase Angle detection algorithm to ensure the maximum power transfer. For the receiver side, a double conversion stage, consisting of a diode rectifier and a controlled buck converter, is provided. The system is then simulated to verify its proper design.