Bilatu
327-tik 321-327 emaitza erakusten
Determination of molecular diffusion coefficient in n-Alkane binary mixtures: empirical correlations
(ACS Publishing, 2012)
In this work we have measured the molecular diffusion coefficient of the n-alkane binary series nCi-nC6, nCi-nC10, and nCi-nC12 at 298 K and 1 atm and a mass fraction of 0.5 by using the so-called sliding symmetric tubes ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Analysis of non-uniform circumferential segmentation of magnets to reduce eddy-current losses in SPMSM machines
(IEEE, 2012)
Eddy current losses generated in the rotor of the permanent magnet machines may lead to an excessive magnet heating. This can cause full demagnetization of the magnets so it is very important to analyze the losses on them ...
The use of wikis in a CLIL-POI context as tools for collaborative writing: impact of attitudes
(Mondragon Unibertsitatea. Humanitate eta Hezkuntza Zientzien Fakultatea, 2012)
Taking into account some of the main aspects regarding changes promoted by the Knowledge Society and their impact on education, the aim of the present study is to explore contextual factors which impact on the development ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...
SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications
(Mondragon Unibertsitatea, 2012)
In this work a comparison of the SURF and MUSURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in ...
XII Reunión Española sobre Criptología y Seguridad de la Información
(Mondragon Unibertsitatea, 2012)