Computing Network
Mostrando 1-12 de 104 artigos, teses e dissertações.
-
1. Identifying olive oil fraud and adulteration using machine learning algorithms
As olive oil (OO) is more expensive than other vegetable oils, it is usually adulterated by blending it with more economic edible oils such as cottonseed oil (CSO), canola oil (CO), and soybean oil (SO). This research aimed to determine the fatty acid compositions obtained as a result of blending different proportions of CSO, CO and SO with OO using a gas ch
Química Nova. Publicado em: 2022
-
2. Editorial Comment: Penile cancer information on the internet: a needle in a haystack
Abstract A good wireless network design depends on technical and financial viability and a number of other criteria that must be met. Following the emergence of new technologies and services, such as 5G transmission and the reuse of frequencies, new work is being carried out to ensure a better design for a particular area. This study examines a discrete radi
Int. braz j urol.. Publicado em: 2020-12
-
3. Optimum Positioning of Base Station for Cellular Service Devices Using Discrete Knowledge Model
Abstract A good wireless network design depends on technical and financial viability and a number of other criteria that must be met. Following the emergence of new technologies and services, such as 5G transmission and the reuse of frequencies, new work is being carried out to ensure a better design for a particular area. This study examines a discrete radi
J. Microw. Optoelectron. Electromagn. Appl.. Publicado em: 2020-12
-
4. Projetos e práticas de mídia-educação nas escolas públicas municipais do Rio de Janeiro
Resumo A rede pública municipal de ensino do Rio de Janeiro desenvolve práticas de mídia-educação desde os anos 1980. A pesquisa a que se refere este artigo teve como objetivo analisar características e abrangência dessas práticas e possíveis relações destas com diretrizes formuladas pela SMERJ para o setor. Foi realizada, em primeira etapa, atrav
Educ. Pesqui.. Publicado em: 14/10/2019
-
5. COST-EFFECTIVE BANDWIDTH PROVISIONING IN MICROWAVE WIRELESS NETWORKS UNDER UNRELIABLE CHANNEL CONDITIONS
ABSTRACT Cost-effective planning and dimensioning of backhaul microwave networks under unreliable channel conditions remains a relatively underexplored area in the literature. In particular, bandwidth assignment requires special attention as the transport capacity of microwave links is prone to variations due to, e.g., weather conditions. In this paper, we f
Pesqui. Oper.. Publicado em: 2017-09
-
6. COMPUTING MAX FLOWS THROUGH CUT NODES
ABSTRACT In this work, the presence of cut nodes in a network is exploited to propose a competitive method for the multi-terminal maximum flow problem. The main idea of the method is based on the relation between cut-trees and cut nodes, which is observed in the context of sensitivity analysis on the variation of edges capacities. Computational experiments w
Pesqui. Oper.. Publicado em: 2017-09
-
7. LOCATING PUBLIC SCHOOLS IN FAST EXPANDING AREAS: APPLICATION OF THE CAPACITATED p-MEDIAN AND MAXIMAL COVERING LOCATION MODELS
The area of Guaratiba, in Rio de Janeiro, presents extraordinary population growth rates that exceed all other districts of the city. Moreover, the public investments underway, in view of the 2106 Olympic Games, are making the region even more attractive. Therefore, it is appropriate to suggest proactive measures to avoid the predicted collapse of several pu
Pesqui. Oper.. Publicado em: 2014-08
-
8. Algoritmos para o planejamento da operação de sistemas modernos de distribuição de energia elétrica = : Algorithms for operation planning of modern electric distribution power systems / Algorithms for operation planning of modern electric distribution power systems
The distribution system operation planning stage is concerned with the determination of capacitor bank, transformer and voltage regulator settings. This must be accomplished considering active and reactive power injections of distributed generators and at the main substation, as well as physical and regulatory issues in order to improve the network performan
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 07/08/2012
-
9. PROGRAMAÇÃO GENÉTICA, REDES NEURAIS ARTIFICIAIS E TÉCNICAS DE BALANCEAMENTO NA MODELAGEM DE DADOS AGRÍCOLAS: ESTUDO DA DOENÇA MOFO BRANCO
Data regression problems are common in the literature, therein it is desired to infer the relationship between the dependent (output) and independent variable (input) from a dataset. Infer the relationship between variables is not a simple task, many times there is a high non-linearity and noise in the data inside them. Two machine learning techniques that a
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 01/08/2012
-
10. Uma aplicação de redes definidas por software para a gerência de redes de datacenters virtualizados
Cloud-Computing services related to infrastructure have been drawing much attention recently. On this business model, virtualization is an efficient way to ofier flexibility, isolation and several new functionalities. This technology has led to the multi-tenant datacenter model for Cloud-Computing, where the client (tenant) can rent not only a virtual machin
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 31/07/2012
-
11. ACUMAAF: ambiente de computação ubíqua para o monitoramento e avaliação de atividade física / ACUMAAF: ambiente de computação ubíqua para o monitoramento e avaliação de atividade física
A inatividade física tem sido apontada pela Organização Mundial de Saúde (OMS) como um dos principais fatores de risco comportamentais responsáveis pela incidência de Doenças Crônicas Não Transmissíveis (DCNTs). Milhões de mortes no mundo são decorrentes dessas doenças e esse número vem aumentando a cada ano. Na tentativa de reverter esse quadr
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 13/06/2012
-
12. Architecture for generic detection of machine code injection in computer networks
Since the creation of public exploitation frameworks, advanced payloads are used in computer attacks. The attacks generally employ evasion techniques, have anti-forensics capabilities, and use target machines as pivots to reach other machines in the network. The attacks also use polymorphic malicious code that automatically transforms themselves in semantica
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 03/06/2012