Bilatu
688-tik 671-680 emaitza erakusten
IKARO: plataforma de benchmarking de algoritmos de fuzzing para sistemas embebidos
(Escola Politècnica Superior (EPS) de la Unversitat de Lleida (UdL), 2021)
La presencia de sistemas embebidos conectados aumenta progresivamente representando un desafío el poder actualizar vulnerabilidades una vez han sido desplegados en
campo. Por ello, es necesario optimizar la búsqueda de ...
Novel email spam detection method using sentiment analysis and personality recognition
(Oxford Academic, 2020)
Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to ...
Feeder mapping and load flow algorithms for LV distribution grids
(IEEE, 2021)
With the advent of the electric vehicle, distributed generation and other emerging technologies such as heat pumps, the complexity and uncertainty of LV Distribution Networks (LVDNs) is increasing. Advanced Metering ...
The impact of protective capacity in implementing drum-buffer-rope methodology in make-to-order environments: an assessment by simulationEl impacto de la capacidad de protección en la aplicación de la metodología “drum-buffer-rope” en entornos de fabricación “make-to-order”
(Publicaciones DYNA, 2022)
This study uses simulation to analyse the impact of protective capacity in the implementation of the step 3 of the theory of constraints (TOC) methodology in make-to-order (MTO) environments. The results suggest that at ...
Capacity buffer management in implementing drum-buffer-rope methodology in make-to-order environmentsGestión del búfer de capacidad en la aplicación de la metodología drum-buffer-rope en entornos de fabricación contra pedido
(Federación de Asociaciones de Ingenieros Industriales de España, 2022)
The research work conducted by Orue et al. [1] aims to analyze the impact of protective capacity on the application of the third step of the drum-buffer-rope methodology of the theory of constraints (subordinate everything ...
HRM systems and employee affective commitment: the role of employee gender
(Emerald, 2020)
Purpose
Despite decades of studies on high-involvement human resource management (HRM) systems, questions remain of whether high-involvement HRM systems can increase the commitment of women. This study aims to contribute ...
Li-ion Battery State-of-Charge estimation algorithm with CNN-LSTM and Transfer Learning using synthetic training data
(2022)
The development of State-of-Charge (SoC) algorithms for Li-ion batteries involves carrying out different laboratory tests with the money and time that this entails. Furthermore, such laboratory labours must typically be ...
Comparison between Bernardi’s equation and Heat Flux Sensor measurement as Battery Heat Generation Estimation Method
(2022)
The heat generation of an energy storage system is an essential topic when designing a battery pack and its cooling system. Heat generation estimation is used together with thermal models to predict battery temperature in ...
Modelo ASIG para dinámicas online
(Universidad de La Laguna, 2021)
La situación que vivimos de transformación digital ha subrayado que los entornos online son un espacio útil para el aprendizaje. Sin
embargo, no siempre es fácil diseñar y desarrollar dinámicas que, en
desapego a los ...
Thermal Mass Effect on the Solution Cooling Rate and on HIPped Astroloy Component Properties
(MDPI, 2022)
Astroloy is a Ni-based superalloy with high-volume fraction of γ′, which gives high temperature properties but reduces its forgeability. Therefore, powder metallurgy manufacturing processes such as Near Net Shape HIPping ...