Search results for "amer"
showing 10 items of 2105 documents
La comunicación: disciplina y campo de estudio. La experiencia latina
2011
La investigación en comunicación presenta una serie de particularidades que le otorgan un interés específico y una cierta capacidad de adaptación a la hora de analizar los fenómenos sociales. Se trata de una disciplina y un campo de estudio a la vez, lo que implica una necesaria transdisciplinariedad en el proceso de estudio de los paradigmas sociales y de formación de los profesionales de la comunicación. Esta adaptación de los estudios de comunicación supone una redefinición de las características propias de cada contexto, especialmente si se ha de llevar a cabo este estudio en América latina y en la Europa latina (Francia, Portugal, España e Italia). Su consideración como un espacio prop…
La contrattazione collettiva in Europa del Sud al tempo della crisi: aziendalizzazione, europeizzazione, americanizzazione
2018
Il saggio analizza i recenti sviluppi della contrattazione collettiva in Europa del Sud all’insegna del trinomio aziendalizzazione-europeizzazione-americanizzazione: nonostante le differenze strutturali, i sistemi analizzati hanno notevolmente rafforzato il ruolo del contratto aziendale nel sistema delle fonti rispetto alla legge e al contratto nazionale, oltre che funzionalizzato la rappresentanza dei lavoratori in azienda a meccanismi di verifica effettiva del consenso. Tale traiettoria, frutto della governanceeconomica europea quale risposta alla crisi, porta a una convergenza funzionale dei sistemi sud-europei verso quello statunitense, ove prevale la regolazione di prossimità. The essa…
Dataset for the manuscript "Are remote sensing evapotranspiration models reliable 2 across South American ecoregions?" published in WRR
2021
Metadata of ‘Are remote sensing evapotranspiration models reliable across South American ecoregions?’ This document describes the file formatting and data used to run and evaluate the evapotranspiration models in this study. Because forcing data varies among models, each input file contains a different set of meteorological data placed within a folder named after the corresponding model. File format and time stamps Data files are CSV formatted with timestamps in the first column of the file. The following timestamps are used: GLEAM: Year (YYYY); Day of Year (DDD) PT-JPL: Year (YYYY); Month (MM); Day (DD) PM-MOD: Year (YYYY); Month (MM); Day (DD) PM-VI: Date (MM/DD/YYYY) Missing data Missing…
Perché Eve Kosofsky Sedgwick? Leggere Stanze private.
2011
Reconstruction of the evolutionary history of Saccharomyces cerevisiae x S. kudriavzevii hybrids based on multilocus sequence analysis.
2012
In recent years, interspecific hybridization and introgression are increasingly recognized as significant events in the evolution of Saccharomyces yeasts. These mechanisms have probably been involved in the origin of novel yeast genotypes and phenotypes, which in due course were to colonize and predominate in the new fermentative environments created by human manipulation. The particular conditions in which hybrids arose are still unknown, as well as the number of possible hybridization events that generated the whole set of natural hybrids described in the literature during recent years. In this study, we could infer at least six different hybridization events that originated a set of 26 S…
Protocols for UV camera volcanic SO2 measurements
2010
Abstract Ultraviolet camera technology offers considerable promise for enabling 1 Hz timescale acquisitions of volcanic degassing phenomena, providing two orders of magnitude improvements on sampling frequencies from conventionally applied scanning spectrometer systems. This could, for instance enable unprecedented insights into rapid processes, such as strombolian explosions, and non-aliased corroboration with volcano geophysical data. The uptake of this technology has involved disparate methodological approaches, hitherto. As a means of expediting the further proliferation of such systems, we here study these diverse protocols, with the aim of suggesting those we consider optimal. In part…
Sevilla : Exposición Ibero-Americana
1929
Optical design improvement for noncontact skin cancer diagnostic device
2018
Multispectral diffuse reflectance imaging and autofluorescence photo-bleaching imaging are methods that have been investigated for use in skin disorder diagnostics. In response to the ever-increasing incidence of skin cancer in light skinned populations a new device has been designed incorporating both of these methods. The aim of the study was to create a device that is most efficient in terms of hardware and software parameters for the screening of malignant and benign skin lesions. A set of 525 nm, 630 nm and 980 nm LEDs were used to illuminate the skin area at three wavelengths [1] and a set of 405 nm LEDs were used to induce the skin autofluorescence [2]. For a more homogenous illumina…
Kameras kontroles programmatūra un Chrome spraudnis sistēmas stāvokļa pārraudzībai un kontrolei
2015
Kvalifikācijas darba mērķis ir izstrādāt programmatūru fotoaparāta Sony QX1, vai citu Sony Remote Camera API izmantojošu kameru attālinātai kontrolei bezvadu tīklā, grafisko vidi nodrošinot ar tīmekļa pārlūka Google Chrome spraudni. Šāds risinājums ļautu nodrošināt programmatūras darbību neatkarīgi no lietotāja izvēlētās personālā datora operētājsistēmas. Sistēma izstrādāta, izmantojot tīmekļa tehnoloģijas un programmēšanas valodu Python. Sistēmas lietotāji var attālināti pārraudzīt kameras uzņemšanas parametrus un veikt attēla uzņemšanu.
Security of public key cryptosystems based on Chebyshev Polynomials
2004
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …