Search results for "Wire"

showing 10 items of 1383 documents

Ficción televisiva y puesta en cuestión de la lógica discursiva del capitalismo contemporáneo: The Wire (HBO, 2002-2008) como caso de estudio.

2019

En un contexto, el contemporáneo, en el que la consideración del modo de producción capitalista como el mejor y único posible parece cada vez más disputada, al tiempo que dicha discusión nos confirma su ubicuidad y omnipresente dominio, esta investigación parte de la cada vez más urgente necesidad de reflexión y cuestionamiento sobre nuestra turbulenta situación contemporánea. Desde tal posicionamiento, este proyecto de tesis doctoral tiene como principal objetivo explorar los procesos y aparatos a través de los cuales se producen y reproducen los discursos sostenedores del saber y del poder en las sociedades occidentales contemporáneas, realizando un examen crítico de las relaciones y vínc…

UNESCO::SOCIOLOGÍA::Comunicaciones sociales:LINGÜÍSTICA [UNESCO]UNESCO::CIENCIAS DE LAS ARTES Y LAS LETRAS::Teoría análisis y crítica de las Bellas Arteslenguaje televisivo:CIENCIAS DE LAS ARTES Y LAS LETRAS::Teoría análisis y crítica de las Bellas Artes [UNESCO]comunicacióncapitalismoUNESCO::LINGÜÍSTICAThe wire:SOCIOLOGÍA::Comunicaciones sociales [UNESCO]
researchProduct

Software Requirements for Ubiquitous Ad Hoc Mobile Networks: An Example of a Bluetooth Application

2009

In contrast with the simple and elegant concept of global computing, also called ubiquitous computing - where daily life objects get now computing capacity and interact among them to provide a wide range of services to users - a major difficulty is arising with the software engineering process to develop applications for these devices. This article discusses the additional parameters that should be taken into account when designing and developing software for ubiquitous devices in ad-hoc networks. In these networks the mobility of the devices could increase the complexity of the requirements to be considered. As a case study, we present a Bluetooth application that has been developed to ful…

Ubiquitous robotUbiquitous computingbusiness.industryComputer scienceWireless ad hoc networkDistributed computinglaw.inventionBluetoothSoftware development processSoftwarelawServerSoftware requirementsbusinessComputer network2009 Fourth International Conference on Software Engineering Advances
researchProduct

Ultrasonic phased array inspection of wire plus arc additive manufacture ‎‎(WAAM) samples using conventional and total focusing method (TFM) ‎imaging…

2018

In this study, three aluminium samples produced by wire + arc additive manufacture (WAAM) are inspected using ultrasonic phased array technology. Artificial defects are machined using a centre drill, ø3 mm, and electro-discharge machining (EDM), ø0.5-1 mm, in a cylindrical through hole topology. The sample was first inspected by a single element wheel probe mounted on a KUKA robot in order to investigate the feasibility of using a conventional ultrasonic transducer approach. Unfortunately, the wheel probe was found to be unsuitable for scanning of the WAAM specimens and ultrasonic phased arrays were employed next. The setup included 5 MHz and 10 MHz arrays (128 elements) in direct contact w…

Ultrasonic phased arraySettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineWire + Arc additive manufacture (WAAM)Full matrix capture (FMC)Total focusing method (TFM)Artificial defects
researchProduct

Modeling of kinetic and static friction between an elastically bent nanowire and a flat surface

2011

Friction forces for a nanowire (NW) elastically bent on flat substrate were investigated both theoretically and experimentally. Models based on elastic beam theory were proposed considering balance of external, frictional, and elastic forces along the NW. The distributed friction force was determined for two cases: (i) the NW was uniformly dragged at its midpoint and bent by kinetic friction forces and (ii) the NW was held in a bent state by static friction forces. The first case considers a uniform distribution of kinetic friction along the NW and enables the measurement of the friction force from the elastically deformed NW profile. The second case exploits the interplay between static fr…

Uniform distribution (continuous)Materials scienceMechanical EngineeringBent molecular geometryNanowireNanotechnologySubstrate (electronics)MechanicsTribologyCondensed Matter PhysicsKinetic energyMomentumMechanics of MaterialsGeneral Materials ScienceWaferJournal of Materials Research
researchProduct

How value and trust influence loyalty in wireless telecommunications industry

2012

Despite making significant investments in enhancing the customer service experience, long-term customer loyalty remains an elusive dream for many service providers. Particularly in the telecommunications industry, switching providers even from within continuous contract relationships is easy and companies struggle to retain their customers. Trust and value are considered cornerstones of long-term relationships, so it is perhaps surprising that previous research on how relationship age and usage level actually affect value, trust and loyalty is inconclusive. The current research is set in the telecommunications services field and draws on a large-scale survey undertaken in Finland. The findi…

Usage levellojaaliusEconomics and Econometricsmedia_common.quotation_subjectTelecommunications serviceLibrary and Information SciencesManagement Monitoring Policy and LawkäyttöAffect (psychology)Management Information SystemsLoyalty business modelPerceived valueLoyaltyWireless servicesMarketingSet (psychology)ta512uskollisuusmedia_commonbusiness.industryCommunicationService providerKoettu arvolangattomat palvelutluottamusValue (economics)Relationship ageMobile telephonyasiakassuhteen kestobusinessInformation SystemsTelecommunications Policy
researchProduct

WhoSNext: Recommending Twitter Users to Follow Using a Spreading Activation Network Based Approach

2020

The huge number of modern social network users has made the web a fertile ground for the growth and development of a plethora of recommender systems. To date, recommending a new user profile X to a given user U that could be interested in creating a relationship with X has been tackled using techniques based on content analysis, existing friendship relationships and other pieces of information coming from different social networks or websites. In this paper we propose a recommending architecture - called WhoSNext (WSN) - tested on Twitter and which aim is promoting the creation of new relationships among users. As recent researches show, this is an interesting recommendation problem: for a …

User profileInformation retrievalSocial networkbusiness.industryComputer sciencesocial networkingmedia_common.quotation_subjectTwitterKnowledge engineeringspreading activation network020207 software engineering02 engineering and technologyRecommender systemFriendshipContent analysis0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingData pre-processingRecommender systembusinessWireless sensor networksocial users recommendationmedia_common2020 International Conference on Data Mining Workshops (ICDMW)
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

Discrete-time multioverlapping controller design for structural vibration control of tall buildings under seismic excitation

2012

Published version of an article from the journal: Mathematical Problems in Engineering. Also available from the publisher:http://dx.doi.org/10.1155/2012/636878 In this paper, a computationally effective strategy to obtain multioverlapping controllers via the Inclusion Principle is applied to design discrete-time state-feedback multioverlapping LQR con- trollers for seismic protection of tall buildings. To compute the corresponding control actions, the proposed semidecentralized controllers only require state information from neighboring stories. This particular configuration of information exchange allows introducing a dramatic reduction in the transmission range required for a wireless imp…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413EngineeringArticle Subject:Informàtica::Automàtica i control [Àrees temàtiques de la UPC]General MathematicsLatency (audio)Edificis -- Vibració:Enginyeria civil::Materials i estructures [Àrees temàtiques de la UPC]Feedback control systemsCommunications systemControl d'estructures (Enginyeria)Earthquake resistant designSampling (signal processing):93 Systems Theory; Control [Classificació AMS]Control theoryControlWirelessBuildings -- VibrationInformation exchange:93 Systems Theory [Classificació AMS]business.industryVDP::Technology: 500::Building technology: 530Disseny antisísmiclcsh:MathematicsGeneral EngineeringControl engineeringlcsh:QA1-939Transmission (telecommunications)Discrete time and continuous timelcsh:TA1-2040Sistemes de control per retroaccióBuildings--VibrationStructural control (Engineering)businessReduction (mathematics)lcsh:Engineering (General). Civil engineering (General)
researchProduct

Design and Validation of a Dynamic Inductive Power Transfer System for EV Battery Charging

2022

In this paper, a Dynamic Resonant Inductive Power Transfer (DRIPT) System for the Electric Vehicle (EV) battery charging is proposed. In particular, the aim of the work is the general design of the whole system and its validation, with particular attention to the power electronic converters and their control. For the transmitter side, a DC/AC converter is used. It is controlled through the phase-shift technique and supervised by a Zero Phase Angle detection algorithm to ensure the maximum power transfer. For the receiver side, a double conversion stage, consisting of a diode rectifier and a controlled buck converter, is provided. The system is then simulated to verify its proper design.

Vehicle ChargingWireless Power TransferSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciInductive Power TransferEnergy Conversion2022 Second International Conference on Sustainable Mobility Applications, Renewables and Technology (SMART)
researchProduct