Buscar
Mostrando ítems 41-50 de 50
Cooperation in clusters: A study case in the furniture industry in Colombia
(Springer, 2018)
Cooperation is increasingly been used in the industrial sector because of its benefits. This have motivated companies to establish alliances and agreements with others in order to reduce cost or access new markets, for ...
Security evaluation in wireless networks
(Springer, 2018)
In the last years, the breathtaking development of technology has had as principal focus the growth of mobile and wireless devices. The last is more predominant in the market due to the apogee of the wireless networks. ...
Úlceras de pie: percepción de pacientes con diabetes mellitus tipo 2
(Facultad de Ciencias, 2018)
Introducción. En la última década, la diabetes miellitus ha presentado un aumento exorbitante en el mundo y la úlcera del pie se constituye como la complicación más seria y costosa, con posible amputación e inclusive la ...
Niveles de hormonas tiroideas en recién nacidos muy prematuros y prematuros extremos
(Facultad de Ciencias, 2018)
Introducción: La función tiroidea del prematuro se ve alterada por la relativa inmadurez del eje hipotálamo-hipófisis-tiroides, junto a otros factores como la incidencia de enfermedades o el uso de algunos fármacos. ...
Tendencia de la lactancia materna exclusiva en Chile antes y después de la implementación de la Ley Postnatal Parental
(Facultad de Ciencias, 2018)
Introducción: Dada la implementación de la ley postnatal parental en niños atendidos en sistema público de salud, el objetivo de este estudio es describir la tendencia de la lactancia materna exclusiva (LME) al sexto de ...
Matlab programmed method for the optical flow estimation based on the integral image
(IEEE, 2018)
The Optical Flow computation is the estimation of the apparent displacement of the object on an image sequence (actual image and next image). There are different methods for Optical Flow estimation, standing out exhaustive ...
Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
(IEEE, 2018)
What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires ...
Implementation of an emitting LED circuit in a Visible Light communications positioning system
(2018)
In this paper, two LED emitting circuits are implemented in a VLC positioning system, a regular Bias-Tee and a circuit proposed by Ghassemlooy, aiming to provide the system with portability and functionality. For this, an ...
Purification of Exosomes from Primary Schwann Cells, RNA Extraction, and Next-Generation Sequencing of Exosomal RNAs
(Humana Press, 2018)
Exosomes are small (30-150 nm) vesicles of endosomal origin secreted by most cell types. Exosomes contain proteins, lipids, and RNA species including microRNA, mRNA, rRNA, and long noncoding RNAs. The mechanisms associated ...
Teased Fiber Preparation of Myelinated Nerve Fibers from Peripheral Nerves for Vital Dye Staining and Immunofluorescence Analysis
(Humana Press, 2018)
Glial cells regulate a wide variety of neuronal functions during physiological and pathological conditions. Therefore, the study of glial cells and their association with axons is of paramount importance in order to ...