• No se han encontrado resultados

technologies and architectures

Radiofrequency architectures and technologies for software defined radio

Radiofrequency architectures and technologies for software defined radio

... dBm, and the RF power varies from –70 to –10 ...behaviour and the low–pass filters have ideal ...magnitude and phase parameters of each output port: between 2.5 and 3 dB in magnitude, ...

194

Low Power Distribution Module for Space Applications: Analysis and Comparison of Different Architectures and DC/DC Topologies

Low Power Distribution Module for Space Applications: Analysis and Comparison of Different Architectures and DC/DC Topologies

... aerospace technologies is ...load and to charge the on board batteries that are discharged when the satellite is in ...Bus and provide a number of different output voltages from ...

6

Custom architectures for fuzzy and neural networks controllers

Custom architectures for fuzzy and neural networks controllers

... simulation and verification, with different types of simulation (events, functional, digital or ...place and route) and technologies (microprocessor programmability) produced the drastic ...

7

Analysis and implementation of a BLAST-Like algorithm for MIC architectures

Analysis and implementation of a BLAST-Like algorithm for MIC architectures

... architecture and programming is, not only an explanation or a shallow view of the technologies, but it is intended to serve as a guide for a beginner in these new ...understanding and skills required ...

89

TítuloPerformance Evaluation of MPI, UPC and
OpenMP on Multicore Architectures

TítuloPerformance Evaluation of MPI, UPC and OpenMP on Multicore Architectures

... multicore architectures became NUMA architectures with the inclusion of the memory controller in the ...language, and has been used in this evaluation due to its important support by academia ...

11

A Multiagent Approach to Outbound Intrusion Detection

A Multiagent Approach to Outbound Intrusion Detection

... cause and constitutes the foundation of a type of security tools whose objective is to protect neighboring systems by blocking intrusion attempts launched locally toward them and by alerting them about the ...

224

New technologies and alternative uses for poplar wood

New technologies and alternative uses for poplar wood

... reliability and availability of precise technical information: these are the main factors that could grant successful and even increasing use of this wood in the building ...

10

Technologies and educational activities for supporting and implementing challenge- based learning

Technologies and educational activities for supporting and implementing challenge- based learning

... methodologies and tools described in this paper have been successfully used in real scenarios in schools located in different ...teachers and 200 students haven been involved in usage scenarios ranging from ...

10

Development methodology for semantic and distributed systems, with emphasis in Ambient Assisted Living Domain

Development methodology for semantic and distributed systems, with emphasis in Ambient Assisted Living Domain

... daily, and intuitively knows how many they should ...shared and thus create marketplaces for data; following the example the user might want to share her/his data with some entity, in exchange they get ...

334

Crédito académico, autonomía y TIC´sCredits, autonomy and information and communications technologies

Crédito académico, autonomía y TIC´sCredits, autonomy and information and communications technologies

... Colombia, and specifically on the conception and application of the academic credit, and its relation with the independent work of the student and the incorporation of technologies of ...

10

Design and implementation of a function block based holonic control architecture for a new generation flexible manufacturing system

Design and implementation of a function block based holonic control architecture for a new generation flexible manufacturing system

... MH and the physical ...another and is strongly related to the grade of openness of the own ...hardware and/or software serial or Ethernet interfaces can be ...closed and only allow accessing a ...

18

Security analysis and monitoring of smart building technologies and IoT

Security analysis and monitoring of smart building technologies and IoT

... Lights do not require a connection to the Internet or to an offline router. Even when there is no access to it (for example, a malfunctioning or a network failure), lights can be used as regular bulbs. They can be ...

77

Law, Uncertainty and Emerging Technologies

Law, Uncertainty and Emerging Technologies

... uncertainty and its qualitative distinctiveness from risk may, in my view, justify soft law as a useful subsidiary ...responsibility and to promote stake- holders’ ...businesses and epistemic ...

16

Lecture 4: Parallel architectures and programming

Lecture 4: Parallel architectures and programming

... Sevcik, and P. Wong, “Theory and practice in parallel job scheduling,” in IPPS ’97:Proceedings of the Workshop on Job Scheduling Strategies for Parallel ...

34

Agile Construction and Evolution of Product-Line Architectures

Agile Construction and Evolution of Product-Line Architectures

... (AOP) and SPLs [Kakarontzas et ...aspects and components is not ...component), and thus, they are not ...pointcuts and weaving operators outside the variants, thus they are ...

309

Commerce and new technologies

Commerce and new technologies

... widespread and highest level of memory, because it is moving images, flashy and often with fun ...services and brands to consumers, but in reality it involves much more than ...how and to ...

93

Designing Web-enabled services to provide damage estimation maps caused by natural hazards

Designing Web-enabled services to provide damage estimation maps caused by natural hazards

... analysis and design of a set of web services complying with the OGC Specifications and ISO Standards, so that by being interconnected as a distributed system, they will use the available resources as ...

6

The Student's Guide to VHDL, Peter J. Ashenden, Morgan Kaufmann . Morgan Kaufmann Publishers, 1998. ISBN 1-55860-520-7

The Student's Guide to VHDL, Peter J. Ashenden, Morgan Kaufmann . Morgan Kaufmann Publishers, 1998. ISBN 1-55860-520-7

... them and the hierarchical structure of the design. Chapters 6 and 7: extend this basic set of facilities with other language features available to make modeling of large systems more ...

1

The book industry and the information technologies

The book industry and the information technologies

... Information Technologies is the appearance of Multi- sided ...Haigu and Julian Wright refer to them as “ an organization that creates value primarily by enabling direct interactions between two (or more) ...

42

Wireless networks in industrial environments: state of the art and issues

Wireless networks in industrial environments: state of the art and issues

... in-the-homes and is now used in industrial environment for voice and data over the private phone ...communications and emergency alarms using the worldwide ISM ...

16

Show all 10000 documents...

Related subjects