Search results for "module"
showing 10 items of 226 documents
Zenith distribution and flux of atmospheric muons measured with the 5-line ANTARES detector
2010
The ANTARES high energy neutrino telescope is a three-dimensional array of about 900 photomultipliers distributed over 12 mooring lines installed in the Mediterranean Sea. Between February and November 2007 it acquired data in a 5-line configuration. The zenith angular distribution of the atmospheric muon flux and the associated depth-intensity relation are measured and compared with previous measurements and Monte Carlo expectations. An evaluation of the systematic effects due to uncertainties on environmental and detector parameters is presented.
La modélisation du devenir des pesticides : Recueil de données et utilisation du modèle agronomique STICS pour simuler les transferts sur le long ter…
2016
From everyman's right to everyman's possibility
2016
This article describes a blended learning study module that was carried out in class teachers’ adult education. The goal of the planning of this module was to create a learning environment that would give a student an optimal learning experience in versatile, authentic, e-learning environments. In the study, the ubiquitous learning model was based on the principles of transformational pedagogy (OED). The module was carried out in flexible and versatile learning environments based on transformational pedagogy, where knowledge also included command of the 21st century teaching skills 21. The theoretical framework of the study module followed the model of contextual-pedagogical model [18]. The…
Jokamiehen oikeudesta jokamiehen mahdollisuudeksi
2016
Uudenlaisten pedagogisten mallien pohjalle suunnitellut opintokokonaisuudet lisäävät yliopistojen opintotarjonnan saavutettavuutta ja antavat yksilöille paremmat mahdollisuudet elinikäiseen oppimiseen. Luokanopettajien aikuiskoulutuksessa on käynnissä laaja oppimisympäristöjen kehittymistyö, jossa e-oppimisella on näkyvä sija. Aikuisopiskelijoiden elämäntilanne luo haasteita täysipäiväiselle läsnäololle ja siitä noussut tarve on nähty Luokanopettajien aikuiskoulutuksessa myös mahdollisuutena laajentaa henkilökunnan pedagogista osaamista uudistavien e-oppimiskäytänteiden ja pedagogisten mallien suunnittelijoina, kehittäjinä ja toteuttajina. Luokanopettajien aikuiskoulutuksen 25-vuotinen taiv…
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
A wireless battery charger architecture for consumer electronics
2012
In this paper, an innovative design of a wireless battery charger for portable electronic devices is proposed. The wireless power transfer is implemented through the magnetic coupling between a power transmitter, which is connected to the grid, and a power receiver, which is integrated inside the load device. An innovative receiver architecture which heavily improves the power conversion efficiency is presented. The proposed solution is standard compliant and suitable for IC implementation. A comparison between a conventional and the proposed receiver architectures is carried out by SPICE simulations. As shown by simulation results, a power efficiency increase by 40% is provided by the prop…
Specific protocol (SENSLOG) over TCP/IP for sensors applications
2005
The objective is to obtain an embedded system using a microcontroller that will communicate with other devices over a specific protocol (SENSLOG) over TCP/IP for sensors applications. The protocol has been designed for this application, but the commands are generic. They can be used for any type of sensing. We must take into account that this program will run in a microcontroller and it will communicate with another program running in a PC. The protocol is based on commands, like SMTP. From the PC we will send commands to the microcontroller to do specific tasks, and if it is necessary, the microcontroller will answer to the PC. Some of the functions designed for this protocol are: to contr…
Differential structure associated to axiomatic Sobolev spaces
2020
The aim of this note is to explain in which sense an axiomatic Sobolev space over a general metric measure space (à la Gol’dshtein–Troyanov) induces – under suitable locality assumptions – a first-order differential structure. peerReviewed
A MATLAB program for PV module performance analysis based on real outdoor data stored in a PostgreSQL database
2008
Topological surface wave metamaterials for robust vibration attenuation and energy harvesting
2021
International audience; We propose topological metamaterials working in Hertz frequency range, constituted of concrete pillars on the soil ground in a honeycomb lattice. Based on the analog of the quantum valley Hall effect, a non-trivial bandgap is formed by breaking the inversion symmetry of the unit cell. A topological interface is created between two different crystal phases whose robustness against various defects and disorders is quantitatively analyzed. Finally, we take advantage of the robust and compact topological edge state for designing a harvesting energy device. The results demonstrate the functionality of the proposed structure for both robust surface vibration reduction and …