Ara mostrant els elements 4701-4720 de 5539

    Sección recta de blancos radar complejos en tiempo real 

    Rius Casals, Juan Manuel (Data de defensa: 1991-07-08)

    Este trabajo resuelve el problema de gran interés para la industria aeronáutica: el cálculo de la sección recta (RCS) de blancos radar complejos en tiempo real. Para ello basta una estación de trabajo con un acelerador ...

    Second harmonic generation in disordered nonlinear crystals : application to ultra-short laser pulse characterization 

    Wang, Bingxia (Data de defensa: 2017-10-10)

    The PhD project, entitled "Second harmonic generation in disordered nonlinear crystals: application to ultra-short laser pulse characterization", is devoted to the study of second harmonic generation in nonlinear ferroelectric ...

    Second Harmonic Generation in Photonic Crystals 

    Trull Silvestre, José Francisco (Data de defensa: 1999-12-21)

    Photonic crystals emerged at the end of the last decade as a new frame to control the interaction between radiation and matter. The potential advances that such structures could report in photonics technology has lead to ...

    Second life batteries of electric vehicles : analysis of use and management models 

    Rallo Tolós, Héctor (Data de defensa: 2021-02-09)

    The mobility of the future undoubtedly involves the electrification of vehicles. The increase in social awareness towards a reduction in CO2 emissions, together with the introduction of new laws regulating them, has finally ...

    Secondary air pollutants in urban and rural Catalonia, Spain: characterizing the precursors, source-contributions, and toxicity 

    In 't Veld, Marten (Data de defensa: 2023-11-29)

    (English) Air pollutants can be classed as either primary or secondary pollutants. Primary air pollutants are those that are directly emitted into the atmosphere, whereas secondary air pollutants are generated in the ...

    Secure identity management in structured peer-to-peer (P2P) networks 

    Caubet Fernández, Juan (Data de defensa: 2016-01-25)

    Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...

    Securing and enhancing routing protocols for mobile ad hoc networks 

    Guerrero Zapata, Manel (Data de defensa: 2006-07-14)

    1. CONTEXTO<br/><br/>1.1. MANET<br/><br/>MANET (Mobile and Ad hoc NETworks) (Redes móviles sin cables) son redes formadas por nodos móviles. Se comunican sin cables i lo hacen de manera 'ad hoc'. En este tipo de redes, los ...

    Securing group based peer-to-peer systems 

    Arnedo-Moreno, Joan (Data de defensa: 2009-07-07)

    Peer-to-peer applications enable a group of users to create a communications framework from scratch without the need of a central service provider. This is achievable via the aggregation of resources each one of them ...

    Security architecture for Fog-To-Cloud continuum system 

    Kahvazadeh, Sarang (Data de defensa: 2019-11-12)

    Nowadays, by increasing the number of connected devices to Internet rapidly, cloud computing cannot handle the real-time processing. Therefore, fog computing was emerged for providing data processing, filtering, aggregating, ...

    Security in peer-to-peer communication systems 

    Suárez Touceda, Diego (Data de defensa: 2011-07-26)

    P2PSIP (Peer-to-Peer Session Initiation Protocol) is a protocol developed by the IETF (Internet Engineering Task Force) for the establishment, completion and modi¿cation of communication sessions that emerges as a complement ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Data de defensa: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...

    Security strategies in genomic files 

    Naro, Daniel (Data de defensa: 2020-05-15)

    There are new mechanisms to sequence and process the genomic code, discovering thus diagnostic tools and treatments. The file for a sequenced genome can reach hundreds of gigabytes. Thus, for further studies, we need new ...

    Sediment dynamics and associated heavy metals in small river-and wave-dominated inner shelf (Barcelona city, Nw Mediterranean) 

    López Fernández, Laura (Data de defensa: 2013-10-24)

    Wave storms and river inputs have been found to be the dominant forcing mechanism of sediment transport in continental shelves dominated by medium to large rivers around the world (e.g. Drake and Cacchione, 1985; Sherwood ...

    Sediment-water interaction in a water reservoir affected by acid mine drainage : experimental and modeling 

    Torres Sánchez, Ester (Data de defensa: 2013-11-15)

    The discharge of acid mine drainage into a water reservoir may seriously affect the water quality. In this setting, sediment is commonly thought to act as a sink for pollutants. However, redox oscillations in the bottom ...

    Sedimentación fina y corrientes de turbiedad en embalses. Caso de estudio: Embalse Amaluza (Ecuador) 

    Larriva Villarreal, Hernán Javier (Data de defensa: 2023-11-06)

    (English) Turbidity currents in reservoirs are of strong scientific interest because they can be responsible for the contribution of large amounts of fine sediments that can cause early sediment filling. The case study ...

    Segmental and whole body electrical impedance measurements in dialysis patients 

    Nescolarde Selva, Lexa (Data de defensa: 2006-07-20)

    The main objective of this thesis is to contribute to the prevention and control of the cardiovascular risk, hydration state and nutritional state in dialysis patients using non-invasive electrical impedance measurements. ...

    Seguridad en los procesos de voto electrónico remoto: registro, votación, consolidación de resultados y auditoria 

    Morales Rocha, Víctor Manuel (Data de defensa: 2009-03-13)

    En los últimos años se han estado utilizando medios electrónicos para automatizar y hacer más eficientes los diferentes procesos de una elección. Aún cuando esta automatización se ha presentado de manera gradual, el propósito ...

    Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA 

    Forné Muñoz, Jordi (Data de defensa: 1997-01-23)

    El estudio de arquitecturas de seguridad para redes de transmisión de datos adquiere cada día mayor importancia.<br/><br/>Por otra parte, es un hecho constatado que el mundo de las telecomunicaciones camina decididamente ...

    Seguridad en redes de computación ubicua: contribución a la validación de credenciales 

    Hinarejos Campos, M. Francisca (Data de defensa: 2010-06-30)

    Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ...

    Seguridad en redes locales de datos : contribución a la seguridad de redes 802.3/Ethernet extendidas 

    Recacha Castro, Francisco (Data de defensa: 1996-11-07)

    La presente tesis de enmarca dentro del área de la Seguridad de Comunicaciones. Concretamente, se estudian aquí mecanismos de seguridad adecuados a los entornos de Red de Área Local, proponiéndose y evaluándose un conjunto ...