Search
Now showing items 171-180 of 503
Novel tunable optical filter employing a fiber loop mirror for synthesis applications in WDM
(11/12/2001)
A novel optical filter employing a fiber loop mirror within an amplified ring resonator is presented. The fiber loop mirror allows tuning by changing the coupling factor of a coupler. The device can be used as a building ...
Services through NFC technology in AmI Environment
(11/24/2008)
The use of Near Field Communications technology in AmI environments is a further step in achieving our particular proposal of the vision of Ubiquitous Computing and Ambient Intelligence. This work explores the single use ...
A Fuzzy Logic Inference Approach for the Estimation of the Passengers Flow Demand
(2016-07-02)
This paper presents a new approach that designs the flow of passengers in mass transportation systems in presence of uncertainties. One of the techniques used for the prediction of passenger demand is the origin- destination ...
Distribución personalizada de Linux para uso de tableros digitales de bajo costo
(2013-07-05)
Encontramos un interés particular en el uso de tableros digitales interactivos de bajo costo como herramienta para mejorar el proceso de enseñanza-aprendizaje. Este trabajo propone el desarrollo de una distribución ...
Diagnostico Parcial de aplicación de normas de Ergonomía Informática en sitios Web Educativos en Panamá
(05/12/2014)
Basado en las normas de ergonomía Informática ISO 9241-11 y la UNE 139803-2012, se aplicaron listas de Verificación a sitios Web educativos que se utilizan para aprender diversos tópicos, con el propósito de identificar ...
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)
This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Enabling NFC technology to public services
(1997-07-01)
Ambient Intelligent are usually emerged in contexts like health, education, business and so
on. However there are not many researches focusing on social aspects as public
administrations. In these kinds of contexts, some ...
Mobile Monitoring Framework to Design Parameterized and Personalized m-Health Applications According to the Patient’s Diseases
(10/01/2015)
The development of personalized mobile monitoring applications is a complex work. Currently, the most of applications for patients monitoring through mobile devices, is not developed considering the particular characteristics ...
Synthesis of Optical Filters Using Sagnac Interferometer in Ring Resonator
(11/12/2007)
We propose a new synthesis method for the implementation of infinite impulse response filters, using a Sagnac interferometer within a ring resonator. This structure permits the synthesis of second-order optical functions ...