Recursos de colección

Universidad Nacional de La Plata (74.783 recursos)

Este servicio se brinda en el marco del Proyecto de Enlace de Bibliotecas (PrEBi) y significa una novedosa iniciativa en pos de la difusión a través de Internet, dentro y fuera del ámbito de la Universidad, de los conocimientos que en ella se generan para servir como vehículo de promoción y jerarquización. Los objetivos que se han planteados para SeDiCI son sumamente ambiciosos e incluyen la difusion electrónica de tesis, tesinas y disertaciones pero también de otros tipos de creaciones intelectuales, pretendiendo abarcar la ciencia, la tecnología y el arte buscando modos de presentación no solo de objetos en forma de documentos de texto sino también otros medios multimediales aptos para creaciones no documentales.

vol. 07, no. 03

Mostrando recursos 1 - 12 de 12

  1. Feedback scheduling of real-time control systems with resource constraints

    Xia, Feng
    This thesis observes the emerging trend of convergence of control with computing and communication. By exploiting control and scheduling codesign, we study some practical and open problems in RTCSs from a unique viewpoint of dynamic resource management. Considering constraints on three representative kinds of resources, i.e. CPU time, energy, and network bandwidth, we present a set of feedback scheduling methods that exploit a unified technological framework. They provide enabling technologies for closed-loop dynamic resource scheduling, and tackle some essential problems in the emerging field of feedback scheduling. Meanwhile, this thesis holistically addresses the problem of dynamic allocation of bottleneck resources...

  2. Operating systems: Internals and design principles, 5th ed. William Stallings

    Molinari, Lía
    As a professor of the Operating Systems subject, I can say that for many years the book “Operating Systems Concepts” by Avi Silberschatz et al. was considered as the unquestionable number one in the subject’s bibliography. The book we are talking about now, the new edition of “Operating Systems” by William Stallings, is thought to be the possible replacement of the first one.

  3. High-speed networks and Internet - Performance and quality of service, second edition. William Stallings

    Rosales, Alejandro
    The book presents the treatment of advanced topics in computer networks - mainly in those of high speed - which the designer or the network manager necessarily needs to know. These topics relate to multimedia traffic support, real time traffic, and congestion control as well as the needs of providing different levels of quiality of service (QoS) according to the applications and users.

  4. Segmentation of Medical Images using Fuzzy Mathematical Morphology

    Bouchet, A.; Pastore, Juan Ignacio; Ballarín, Virginia Laura
    Currently, Mathematical Morphology (MM) has become a powerful tool in Digital Image Processing (DIP). It allows processing images to enhance fuzzy areas, segment objects, detect edges and analyze structures. The techniques developed for binary images are a major step forward in the application of this theory to gray level images. One of these techniques is based on fuzzy logic and on the theory of fuzzy sets. Fuzzy sets have proved to be strongly advantageous when representing inaccuracies, not only regarding the spatial localization of objects in an image but also the membership of a certain pixel to a given class....

  5. Harmonic Theory and Machine Learning

    Nanclares, Jorge; Rapallini, Ulises Mario Alberto
    A natural inference mechanism is presented : the Black Box problem is transformed into a Dirichlet's problem on the closed cube. Then it is solved in closed polynomial form, together with a Mean-Value theorem and a Maximum Principle.A generalization to Polytopes and a reduction of any Dirichlet problem on compacta is mapp ed into a unit cub e in more dimensions.An algorithm for calculating the solution is suggested.

  6. Digital processing of in situ hybridization images: identification and spatial allocation of specific labels

    González, Mariela A.; Rapacioli, Melina; Ballarín, Virginia Laura; Fiszer de Plazas, Sara; Flores, Vladimir
    In situ hybridization (ISH) method allows to reveal specific genes expression, identify specific cell types and detect areas or tissues, displaying differential gene expression. This work describes a standardized procedure of digital image processing that allows detailed analyses of ISH preparations. We have developed a software that allows through a graphical interface (a) to reliably identify and quantify ISH labels, (b) to locate each label within the image reference system (c) to assemble the total series of images obtained from a complete histological sections of a biological structure, and d) to locate all the labels within a unique reference system...

  7. On Exponential Periodicity And Stability of Nonlinear Neural Networks With Variable Coefficients And Distributed Delays

    Lou, Xuyang; Cui, Baotong
    The exponential periodicity and stability of continuous nonlinear neural networks with variable coefficients and distributed delays are investigated via employing Young inequality technique and Lyapunov method. Some new sufficient conditions ensuring existence and uniqueness of periodic solution for a general class of neural systems are obtained. Without assuming the activation functions are to be bounded, differentiable or strictly increasing. Moreover, the symmetry of the connection matrix is not also necessary. Thus, we generalize and improve some previous works, and they are easy to check and apply in practice.

  8. Improved AFIS for Color and Gray Image based on Biometric Triangulation

    Espino-Gudiño, María del Carmen; Rodríguez-Hernández, Vicente; Terol Villalobos, Iván R.; Herrera Ruiz, Gilberto
    This research presents a fingerprint image processing algorithm for personal automatic identification, which has been in development since 1998. It is principally based on the comparison of the fingerprint's biometric pattern between the fingerprint captured (original) in each session and the one stored in database. It is preferable to capture the image in color. The biometric pattern is formed by the Euclidean distances based on the triangulation of only three minutiae. This methodology locates the position and the type of each minutia to perform the triangulation. The applied metric is the statistic similarity obtained by the comparison of both biometric...

  9. A Methodology for Vertically Partitioning in a Multi-Relation Database Environment

    Gorla, Narasimhaiah
    Vertical partitioning, in which attributes of a relation are assigned to partitions, is aimed at improving database performance. We extend previous research that is based on a single relation to multi-relation database environment, by including referential integrity constraints, access time based heuristic, and a comprehensive cost model that considers most transaction types including updates and joins. The algorithm was applied to a real-world insurance CLAIMS database. Simulation experiments were conducted and the results show a performance improvement of 36% to 65% over unpartitioned case. Application of our method for small databases resulted in partitioning schemes that are comparable to optimal.

  10. Optimizing Routes Quality and Scattering in the AODV Routing Protocol

    Guezouri, Mustapha; Ouamri, Abdelaziz
    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Routing protocols are used to discover routes between nodes. Many mobile ad-hoc networks protocols such as AODV construct route only when desired by the source node (reactively). The advantage hereof is that no prior assumptions of the network topology are required. In highly mobile networks this is an attractive property. Other used protocols (such as OLSR) are said proactive. Such protocols maintain information about routes to all destinations all times....

  11. A Simulative Comparison of BB84 Protocol with its Improved Version

    Sharifi, Mohsen; Azizi, Hooshang
    Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and...

  12. Peer-to-Peer Systems: The Present and the Future

    Ardenghi, Jorge Raúl; Echaiz, Javier
    Nowadays Peer-to-Peer (P2P) systems became an important part of Internet, millions of users have been attracted to use their structures and services. The popularity of Peer-to-Peer systems speed up academic research joining researchers from systems, networking and theory. The most popular P2P applications support file-sharing and content distribution, new applications are emerging in different fields, Internet telephony is an example. This paper discusses the issues of P2P systems such as characteristics, structures, protocols, drawbacks, open problems and futures fields of development.

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.