Listar Investigación por fecha de publicación
Mostrando ítems 121-140 de 484
-
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)Abstract: In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ... -
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ... -
Application of pedagogical robotics in learning for children with special needs APRoLeCSNe
(08/23/2013)APRoLeCSNe is a project that presents the approach of pedagogical robotics to support the learning methods for children with special learning needs (CSLN). Pedagogical Robotics focuses on inductive learning and guided ... -
Demultiplexers for ultranarrow channel spacing based on Mach-Zehnders and ring resonators
(09/01/2004)Novel demultiplexer configurations based on concatenated Mach-Zehnders and a ring resonator are presented. These new devices exhibit high channel isolation, flexibility, no loss, and megahertz-adjustable full width at half ... -
Time Division Multiplexing Fibre-Optic Liquid Level Sensors using a Nematic 1x2 Optical Switch
(09/01/2004)In this paper, time division multiplexing with optical switches in a multi-sensor system for level measurements with POF is reported. POF are used in the sensor heads and as transmission media along the optical network. ... -
Hacia la reutilización de datos abiertos: caso de la República de Panamá
(09/01/2017)La apertura de datos en América Latina está en la agenda pública de los gobiernos. A lo largo del mundo cada vez son más los gobiernos que se suman a las iniciativas de datos abiertos, debido a las múltiples ventajas que ... -
Context Cookies
(09/03/2008)In an ambient intelligence world, devices work in order to support people carrying out their everyday life activities in a natural way. Therefore, it is necessary to know the entities in the environment and to consider new ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
(09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
Teaching Software Engineering from a Collaborative Perspective: Some Latin-American Experiences
(09/03/2010)Teaching software engineering has been recognized as an important challenge for computer science undergraduate programs. Instruction in such area requires not only to deliver theoretical knowledge, but also to perform ... -
Optical router for optical fiber sensor networks based on a liquid crystal cell
(09/04/2003)Optical fiber sensor networks are evolving rapidly. They are used because of the inert nature of optical fibers allowing no electromagnetic interference and safe applications in inflammable atmospheres; other relevant ... -
Measurement Invariance of Personal Well-Being Index (PWI-8) Across 26 Countries
(09/08/2016)This report examines the measurement invariance of the Personal Well-being Index with 8 items (PWI-8). University students (N = 5731) from 26 countries completed the measure either through paper and pencil or electronic ... -
Ubiquitous Computing and Ambient Intelligence—UCAmI
(Sensors — Open Access JournalSensors — Open Access Journal, 09/13/2019)The Ubiquitous Computing (UC) idea envisioned by Weiser in 1991 [1] has recently evolved to a more general paradigm known as Ambient Intelligence (AmI) that represents a new generation of user-centred computing environments ... -
Applying Ontologies in the Development of Patient Mobile Monitoring Framework
(2nd International Conference on e-Health and Bioengineering2nd International Conference on e-Health and Bioengineering, 09/17/2009)In this paper, patient mobile monitoring enabling framework architecture is presented. To this end, biometric devices (e.g. glucometers, blood pressure meters) are used to send data to the mobile phone via technology such ... -
Advances in the adsorptive particulate flotation process
(09/18/2003)The removal of contaminants from liquid effluents by the adsorptive particulate flotation (APF) process, including new adsorbents and flotation devices, are reported. Herein, contaminants are adsorbed (and/or absorbed) ... -
Improving the Language Active Learning with Multiagent Systems
(09/23/2009)Nowadays, there is a growing need for providing novel solutions to facilitate active learning in dependency environments. This paper present a multiagent architecture that incorporates agents specifically designed to provide ... -
A long-term field study on the adoption of smartphones by children in Panama
(MobileHCI '14 Proceedings of the 16th international conference on Human-computer interaction with mobile devices & serviceMobileHCI '14 Proceedings of the 16th international conference on Human-computer interaction with mobile devices & service, 09/23/2014)Computing technology is currently adopted in emerging countries. Especially mobile phones and smart phones become widely used - with a much higher penetration than traditional computers. In our work we investigate how ... -
Classification Agent-Based Techniques for Detecting Intrusions in Databases
(09/24/2008)This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reasoning mechanism whose main characteristic ... -
High-Resolution Indirect Feet–Ground Interaction Measurement for Hydraulic-Legged Robots
(10/01/2009)Feet-ground interactions influence the legged robot's stability. In this paper, a high-resolution indirect force measurement for hydraulic-legged robots is presented. The use of pressure transducers placed at one or both ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
Aproximación al Estudio de los Factores que inciden en el abandono de las asignaturas Virtuales en la Universidad Tecnológica de Panamá
(10/01/2011)El tema de la deserción es una realidad que no se presenta únicamente en las asignaturas impartidas en la modalidad presencial, también son evidentes en la modalidad virtual. Esta deserción puede ocurrir durante las etapas ...