Literatura científica selecionada sobre o tema "Device access"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Device access".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Device access":

1

Singh Bhullar, Jasneet, Robert Scott, Mitesh Patel e Vijay K. Mittal. "Kidney Access Device". JSLS : Journal of the Society of Laparoendoscopic Surgeons 18, n.º 4 (2014): e2014.00219. http://dx.doi.org/10.4293/jsls.2014.00219.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Iselin, L., M. Naef, H. E. Wagner e W. G. Mouton. "Peripheral Access for Implantable Venous Access Device". European Journal of Vascular and Endovascular Surgery 30, n.º 4 (outubro de 2005): 450. http://dx.doi.org/10.1016/j.ejvs.2005.05.036.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Iselin, L., M. Naef, H. E. Wagner e W. G. Mouton. "Peripheral Access for Implantable Venous Access Device". EJVES Extra 10, n.º 2 (agosto de 2005): 54–56. http://dx.doi.org/10.1016/j.ejvsextra.2005.05.006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Noble, David. "Rapid Vascular Access Device". Prehospital and Disaster Medicine 17, S2 (dezembro de 2002): S54. http://dx.doi.org/10.1017/s1049023x00010311.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Labow, Cynthia A. "Venous Access Device Options". Surgical Oncology Clinics of North America 4, n.º 3 (julho de 1995): 473–78. http://dx.doi.org/10.1016/s1055-3207(18)30438-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Brant, Jeannine M., e Lora Wingerter. "Vascular Access Device Thrombosis". Clinical Journal of Oncology Nursing 7, n.º 3 (1 de maio de 2003): 345–48. http://dx.doi.org/10.1188/03.cjon.345-348.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Monturo, Cheryl Ann. "Enteral Access Device Selection". Nutrition in Clinical Practice 5, n.º 5 (outubro de 1990): 207–13. http://dx.doi.org/10.1177/0115426590005005207.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

&NA;. "57. ACCESS DEVICE REPAIR". Journal of Infusion Nursing 29, Supplement (janeiro de 2006): S63. http://dx.doi.org/10.1097/00129804-200601001-00062.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Glickman, Marc H. "HeRO Vascular Access Device". Seminars in Vascular Surgery 24, n.º 2 (junho de 2011): 108–12. http://dx.doi.org/10.1053/j.semvascsurg.2011.05.006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Goldsworthy, L. L., e H. M. Daly. "Implantable intravenous access device." Archives of Disease in Childhood 67, n.º 1 (1 de janeiro de 1992): 131–32. http://dx.doi.org/10.1136/adc.67.1.131.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Device access":

1

Idris, Fakrulradzi. "Resource allocation for energy efficient device-to-device communications". Thesis, University of Manchester, 2019. https://www.research.manchester.ac.uk/portal/en/theses/resource-allocation-for-energy-efficient-devicetodevice-communications(fe38ee57-5947-497e-a744-373937f7f9ab).html.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Device-to-Device (D2D) communication is one of the technologies for next generation communication system. Unlike traditional cellular network, D2D allows proximity users to communicate directly with each other without routing the data through a base station. The main aim of this study is to improve the overall energy efficiency (EE) of D2D communications overlaying cellular system. To reduce the complexity of joint EE optimization, we decompose the main EE problem into two subproblems; resource efficiency (RE) optimization in the first stage and EE optimization for D2D pairs in the second stage. Firstly, we propose an alternative two-stage RE-EE scheme for a single cellular user equipment (CUE) and a D2D pair utilizing uplink spectrum. Later, we extend this work for multiple CUEs and D2D pairs by considering the downlink orthogonal frequency division multiple access (OFDMA). By exploiting a range of optimization tools including the Bisection method, interior point algorithm, fractional programming, Dinkelbach approach, Lagrange dual decomposition, difference of convex functions, and concave-convex procedure, the original non-convex problems are solved and we present iterative two-stage RE-EE solutions. Simulation results demonstrate that the proposed two-stage scheme for uplink scenario outperforms the cellular mode and dedicated mode of communications and the performance is close to the global optimal solution. The results also show that the proposed schemes for downlink resource sharing provide improved system EE performance with significant gain on EE for D2D users compared to a two-stage EE-EE solution, which is obtained numerically. Furthermore, the RE and EE optimization for non-orthogonal multiple access (NOMA) are considered to study the effect of users' access to the whole spectrum. The results indicate that the proposed RE scheme for NOMA with D2D communications achieves higher system EE compared to the OFDMA based schemes.
2

Begemann, Albert. "The innovation process of a universal remote access device / A. Begemann". Thesis, North-West University, 2003. http://hdl.handle.net/10394/243.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
A small design firm faces several risks when designing a new product. One of the biggest risks is not knowing the potential demand for a product that they might want to produce and market. Small firms have limited resources and cannot afford to design products that would fail in the marketplace. The concept of innovation refers to bringing a new product to the market successfully. Bringing a new product to the market before a competitor does so, reduces the potential risk of failure by the producer and increases their chance of successfully marketing their new product. It is difficult to assess the potential degree of innovativeness of a product before it is marketed. The most innovative products are those that satisfy the needs and wishes of the client as closely as possible. It is therefore necessary to somehow include the wishes of the client in the design stage of a new product. This will ensure that the wishes of the client is reflected as accurately as possible in all the design stages of a product, reducing the risk that the final product will miss its target clients. A Quality Function Deployment (QFD) process is used in the conceptual design stage of a new product to construct a user requirement statement. The closer this statement reflects the wishes of the client, the more potentially innovative a product may be. By using Multi Criteria Decision Making techniques, and especially the latest methodology in applying Thomas Saaty's Analytical Hierarchy Process, a clearer picture of design requirements may emerge. The design requirements may more closely reflect customer requirements by using techniques that have been proven to work better by other researchers. In addition to reflecting the wishes of the client, the proper use of system engineering techniques for the new design should be implemented. Using these systems engineering techniques, a design is carried out in an organised fashion and precious resources are not wasted and the QFD techniques are facilitated. As a case study, the evolution of a patented universal remote access device is described. The initial bad designs that lead to less innovative devices, are corrected when the wishes of the client are included in a new design. This successful design incorporates the QFD techniques described above.
Thesis (M.Ing. (Electronical Engineering))--North-West University, Potchefstroom Campus, 2004.
3

Roy, Deb Kumar 1969. "NewsComm--a hand-held device for interactive access to structured audio". Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/60444.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Corbett, Cherita L. "Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification". Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10500.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
IEEE 802.11 wireless networks are plagued with problems of unauthorized access. Left undetected, unauthorized access is the precursor to additional mischief. Current approaches to detecting intruders are invasive or can be evaded by stealthy attackers. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC). This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on two functions, active scanning and dynamic rate switching, required by the 802.11 standard that are implemented in the hardware and software of the wireless NIC. We show that the implementation of these functions influence the transmission patterns of a wireless stream that are observable through traffic analysis. Furthermore, differences in the behavior of a wireless stream caused by differences in the implementation of these functions are exploited to establish the identity of a NIC. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by active scanning and rate switching. A spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can discern between NICs manufactured by different vendors and NICs within the same manufacturer using the spectral profile.
5

Schlegel, Tina K. "Role of Midline Catheters in Patient Care". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3632.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Central line-associated bloodstream infections (CLABSIs) are responsible for 100,000 patient deaths per year, creating a critical need for prevention of these deadly infections that occur with central venous lines (CVLs). Alternative forms of IV access such as midline catheters (MLCs) may offer lower rates of infection than those seen with CVLs. MLCs were implemented at the practice setting in 2016; however, no evaluation of their effectiveness had been conducted. The purpose of this project was to evaluate the effectiveness of MLCs using a retrospective, pre- post- comparison of CLABSI rates and device utilization rates (DUR) obtained from the practice setting before and after implementation of MLCs. Infection control and Lewin's change theories were used to provide a foundation for the project. This retrospective, pre-post comparison of CLABSI and DUR 6 months before and after introduction of MLCs sought to determine if MLC use affected either rate. Results of a Wilcoxon signed-rank test showed no statistical differences (p > .05) in CLABSI rates and DUR when comparing the rates from the specified 6 month periods. A secondary purpose was to identify the characteristics and conditions in which MLCs were used. Patients with cardiovascular, neuro, and infection diagnoses constituted 43% of the 262 MLC placements. No statistically significant improvement in infection rates was demonstrated by this project; however, these findings illuminate the types of patients or conditions where MLCs are a viable alternative for IV access, and this knowledge may assist providers in options for patient care. This project promotes positive social change by raising awareness of potential strategies for reducing infections in patients when they are at their most vulnerable.
6

Hirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents". 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
8

Bursum, Kim. "Initial Comparative Empirical Usability Testing for the Collaborative Authentication System". Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6614.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The Collaborative Authentication (co-authentication) system is an authentication system that relies on some or all members of a pre-registered set of secure hardware tokens being concurrently present to an authentication server at the moment of authentication. Previous researchers have compared various embodiments of the co-authentication system to each other including using Quick Response (QR) codes/cellphone cameras and Near Field Communication (NFC) between tokens. This thesis concerns the initial design and implementation of empirical comparative testing mechanisms between one embodiment of the co-authentication system and other commonly used authentication systems. One contribution is the simulated standard user ID and password login in a computer browser and a simulated RSA SecureID ® one time password (OTP) and login with embedded usability testing mechanisms. Another contribution is the development and implementation of a new Bluetooth communication functionality between tokens. A third contribution is the addition of usability testing mechanisms to two versions of this new functionality.
9

Pandharpure, Shrinivas. "Process development for integration of CoFeB/MgO-based magnetic tunnel junction (MTJ) device on silicon /". Online version of thesis, 2007. http://hdl.handle.net/1850/5060.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Gallo, Melissa A. "Vascular Access: A Navigation Map". Mount St. Joseph University Dept. of Nursing / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=msjdn1619264506925441.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Device access":

1

Sze, S. M., e Tseung-Yuen Tseng. Nonvolatile memories: Materials, device and applications. Stevenson Ranch, California, USA: American Scientific Publishers, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Iannacci, Jerry. Access device fraud and related financial crimes. Boca Raton, Fla: CRC Press, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Camp-Sorrell, Dawn. Access device guidelines: Recommendations for nursing practice and education. 3a ed. Pittsburgh, Pa: Oncology Nursing Society, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Commission, United States International Trade. In the matter of certain memory devices with increased capacitance and products containing same. Washington, DC: U.S. International Trade Commission, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

United States International Trade Commission. In the matter of certain dynamic random access memories, components thereof and products containing same: Investigation no. 337-TA-242. Washington, DC: U.S. International Trade Commission, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

United States International Trade Commission. 64K dynamic random access memory components from Japan: Determination of the Commission in investigation no. 731-TA-270 (preliminary) under the Tariff Act of 1930, together with the information obtained in the investigation. Washington, D.C: U.S. International Trade Commission, 1985.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Commission, United States International Trade. 64K dynamic random access memory components from Japan: Determination of the Commission in investigation no. 731-TA-270 (final) under the Tariff Act of 1930, together with the information obtained in the investigation. Washington, DC: U.S. International Trade Commission, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Commission, United States International Trade. In the matter of certain dynamic random access memories, components thereof and products containing same: Investigation no. 337-TA-242. Washington, DC: U.S. International Trade Commission, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Niederhuber, John E. Totally Implantable Venous Access Devices. Editado por Isidoro Di Carlo e Roberto Biffi. Milano: Springer Milan, 2012. http://dx.doi.org/10.1007/978-88-470-2373-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

H, Johnson Robert. DASD: IBM's direct access storage devices. New York: McGraw-Hill, 1992.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Device access":

1

Pääkkönen, Joonas, Camilla Hollanti e Olav Tirkkonen. "Device-to-Device Data Storage with Regenerating Codes". In Multiple Access Communications, 57–69. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23440-3_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Køien, Geir M. "Privacy Enhanced Device Access". In Security and Privacy in Mobile Information and Communication Systems, 76–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Moureau, Nancy L., e Evan Alexandrou. "Device Selection". In Vessel Health and Preservation: The Right Approach for Vascular Access, 23–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03149-7_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Tsolkas, Dimitris, Eirini Liotou, Nikos Passas e Lazaros Merakos. "LTE-A Access, Core, and Protocol Architecture for D2D Communication". In Smart Device to Smart Device Communication, 23–40. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04963-2_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Fujii, Hidenori. "Access Device 1: Multiple Trocars Method". In Reduced Port Laparoscopic Surgery, 35–44. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Shibao, Kazunori, Aiichiro Higure e Koji Yamaguchi. "Access Device 2: Multi-Channel Port". In Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kutscher, Dirk, e Jörg Ott. "Dynamic Device Access for Mobile Users". In Personal Wireless Communications, 53–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39867-7_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

LaBella, Gennaro D., e Julius Tang. "Removal of Totally Implantable Venous Access Device". In Totally Implantable Venous Access Devices, 247–55. Milano: Springer Milan, 2012. http://dx.doi.org/10.1007/978-88-470-2373-4_35.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Reed, William P. "Blood Access without Needles: The Hemasite Titanium Vascular Access Device". In Vascular and Peritoneal Access for Dialysis, 91–110. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-1589-6_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Perrucci, Gian Paolo, Frank H. P. Fitzek e Morten V. Petersen. "Energy Saving Aspects for Mobile Device Exploiting Heterogeneous Wireless Networks". In Heterogeneous Wireless Access Networks, 1–27. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Device access":

1

Shen, Kevin Z., Turki E. A. Alharbi e Daniel K. C. So. "Cache-Aided Device-to-Device Non-Orthogonal Multiple Access". In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring). IEEE, 2020. http://dx.doi.org/10.1109/vtc2020-spring48590.2020.9129503.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Kim, Se Won, Chiyoung Lee, MooWoong Jeon, Hae Young Kwon, Hyun Woo Lee e Chuck Yoo. "Secure device access for automotive software". In 2013 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2013. http://dx.doi.org/10.1109/iccve.2013.6799789.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Douros, Vaggelis G., Stavros Toumpis e George C. Polyzos. "Channel access competition in linear multihop device-to-device networks". In 2014 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2014. http://dx.doi.org/10.1109/iwcmc.2014.6906502.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Xiao, Yong, Kwang-Cheng Chen, Chau Yuen e Luiz A. DaSilva. "Spectrum sharing for device-to-device communications in cellular networks: A game theoretic approach". In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817780.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kandeepan, Sithamparanathan, Karina Mabell Gomez, Leonardo Gorratti, Tinku Rasheed e Gianmarco Baldini. "Power controlling for device to device transmissions in aerial access networks". In 2016 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2016. http://dx.doi.org/10.1109/atc.2016.7764828.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Luo, Yuansheng, Kun Yang, Qiang Tang, Jianming Zhang e Shi Qiu. "Device-to-Device Service Selection Framework in Cloud Radio Access Network". In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2015. http://dx.doi.org/10.1109/waina.2015.64.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Rajachandrasekar, Raghunath, Rupak Nagarajan, G. Sridhar e G. Sumathi. "Mobile Device Interface to Access Computational Grid". In 2009 International Conference on Advances in Recent Technologies in Communication and Computing. IEEE, 2009. http://dx.doi.org/10.1109/artcom.2009.56.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Pandurov, Milan, Ivan Lazarevic, Roman Pavlovic e Nikola Smiljkovic. "Unified device access in home automation environment". In 2014 22nd Telecommunications Forum Telfor (TELFOR). IEEE, 2014. http://dx.doi.org/10.1109/telfor.2014.7034568.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Narimatsu, Hiromi, e Hiroyuki Kasai. "Resource access aggregation for mobile CE device". In 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722746.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Korivi, Naga S., e Pratul K. Ajmera. "Percutaneous Access Device With Stress Relief Features". In ASME 2010 5th Frontiers in Biomedical Devices Conference. American Society of Mechanical Engineers, 2010. http://dx.doi.org/10.1115/biomed2010-32022.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
A polymer based percutaneous access device (PAD) has been developed to allow for a physical interconnection between an implant and the outer world during chronic animal experiments. The PAD consists of a skin-piercing conduit connected to a flat base that is typically implanted. The skin-piercing conduit has one or more circumferential notches in its walls. The stress resulting from external forces acting on the PAD conduit is concentrated at the root of the notch. This permits the conduit to bend more easily at the notch rather than at the PAD-skin interface, thereby reducing the deleterious effect of forces on the PAD-skin interface and extending the useful life of the PAD.

Relatórios de organizações sobre o assunto "Device access":

1

Cerjan, C., e B. P. Law. Magnetic Random Access Memory (MRAM) Device Development. Office of Scientific and Technical Information (OSTI), janeiro de 2000. http://dx.doi.org/10.2172/15006522.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Souppaya, Murugiah P., e Karen A. Scarfone. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. National Institute of Standards and Technology, julho de 2016. http://dx.doi.org/10.6028/nist.sp.800-46r2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Cingel, Drew P., Alexis R. Lauricella, Ellen Wartella e Annie Conway. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership. Librello, janeiro de 2014. http://dx.doi.org/10.12924/mac2013.01010028.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Koga, R., S. D. Pinkerton, T. J. Lie e K. B. Crawford. Single-Word Multiple-Bit Upsets in Static Random Access Devices. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1998. http://dx.doi.org/10.21236/ada345734.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Scarfone, K. A., e M. P. Souppaya. User's guide to securing external devices for telework and remote access. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-114.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Grennan, Matthew, e Robert Town. Regulating Innovation with Uncertain Quality: Information, Risk, and Access in Medical Devices. Cambridge, MA: National Bureau of Economic Research, fevereiro de 2015. http://dx.doi.org/10.3386/w20981.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ren, Jinchen, Yunqi Man e Gang Li. Selection of intraosseous access devices in adult patients: a systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maio de 2021. http://dx.doi.org/10.37766/inplasy2021.5.0065.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

O’Brien, Tom, Deanna Matsumoto, Diana Sanchez, Caitlin Mace, Elizabeth Warren, Eleni Hala e Tyler Reeb. Southern California Regional Workforce Development Needs Assessment for the Transportation and Supply Chain Industry Sectors. Mineta Transportation Institute, outubro de 2020. http://dx.doi.org/10.31979/mti.2020.1921.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
COVID-19 brought the public’s attention to the critical value of transportation and supply chain workers as lifelines to access food and other supplies. This report examines essential job skills required of the middle-skill workforce (workers with more than a high school degree, but less than a four-year college degree). Many of these middle-skill transportation and supply chain jobs are what the Federal Reserve Bank defines as “opportunity occupations” -- jobs that pay above median wages and can be accessible to those without a four-year college degree. This report lays out the complex landscape of selected technological disruptions of the supply chain to understand the new workforce needs of these middle-skill workers, followed by competencies identified by industry. With workplace social distancing policies, logistics organizations now rely heavily on data management and analysis for their operations. All rungs of employees, including warehouse workers and truck drivers, require digital skills to use mobile devices, sensors, and dashboards, among other applications. Workforce training requires a focus on data, problem solving, connectivity, and collaboration. Industry partners identified key workforce competencies required in digital literacy, data management, front/back office jobs, and in operations and maintenance. Education and training providers identified strategies to effectively develop workforce development programs. This report concludes with an exploration of the role of Institutes of Higher Education in delivering effective workforce education and training programs that reimagine how to frame programs to be customizable, easily accessible, and relevant.
9

Bao, Jieyi, Xiaoqiang Hu, Cheng Peng, Yi Jiang, Shuo Li e Tommy Nantung. Truck Traffic and Load Spectra of Indiana Roadways for the Mechanistic-Empirical Pavement Design Guide. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317227.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The Mechanistic-Empirical Pavement Design Guide (MEPDG) has been employed for pavement design by the Indiana Department of Transportation (INDOT) since 2009 and has generated efficient pavement designs with a lower cost. It has been demonstrated that the success of MEPDG implementation depends largely on a high level of accuracy associated with the information supplied as design inputs. Vehicular traffic loading is one of the key factors that may cause not only pavement structural failures, such as fatigue cracking and rutting, but also functional surface distresses, including friction and smoothness. In particular, truck load spectra play a critical role in all aspects of the pavement structure design. Inaccurate traffic information will yield an incorrect estimate of pavement thickness, which can either make the pavement fail prematurely in the case of under-designed thickness or increase construction cost in the case of over-designed thickness. The primary objective of this study was to update the traffic design input module, and thus to improve the current INDOT pavement design procedures. Efforts were made to reclassify truck traffic categories to accurately account for the specific axle load spectra on two-lane roads with low truck traffic and interstate routes with very high truck traffic. The traffic input module was updated with the most recent data to better reflect the axle load spectra for pavement design. Vehicle platoons were analyzed to better understand the truck traffic characteristics. The unclassified vehicles by traffic recording devices were examined and analyzed to identify possible causes of the inaccurate data collection. Bus traffic in the Indiana urban areas was investigated to provide additional information for highway engineers with respect to city streets as well as highway sections passing through urban areas. New equivalent single axle load (ESAL) values were determined based on the updated traffic data. In addition, a truck traffic data repository and visualization model and a TABLEAU interactive visualization dashboard model were developed for easy access, view, storage, and analysis of MEPDG related traffic data.
10

Plant Protection and Quarantine: Helping U.S. Agriculture Thrive--Across the Country and Around the World, 2016 Annual Report. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, março de 2017. http://dx.doi.org/10.32747/2017.7207241.aphis.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
For Plant Protection and Quarantine (PPQ) and our partners, 2016 was a year of remarkable successes. Not only did we eradicate 10 fruit fly outbreaks, but we also achieved 4 years with zero detections of pink bollworm, moving us one step closer to eradicating this pest from all commercial cotton-growing areas of the continental United States. And when the U.S. corn industry faced the first-ever detection of bacterial leaf streak (Xanthomonas vasicular pv vasculorum), we devised a practical and scientific approach to manage the disease and protect valuable export markets. Our most significant domestic accomplishment this year, however, was achieving one of our agency’s top 10 goals: eliminating the European grapevine moth (EGVM) from the United States. On the world stage, PPQ helped U.S. agriculture thrive in the global market-place. We worked closely with our international trading partners to develop and promote science-based standards, helping to create a safe, fair, and predictable agricultural trade system that minimizes the spread of invasive plant pests and diseases. We reached critical plant health agreements and resolved plant health barriers to trade, which sustained and expanded U.S. export markets valued at more than $4 billion. And, we helped U.S. producers meet foreign market access requirements and certified the health of more than 650,000 exports, securing economic opportunities for U.S. products abroad. These successes underscore how PPQ is working every day to keep U.S. agriculture healthy and profitable.

Vá para a bibliografia