Search
Now showing items 31-40 of 64
Enabling NFC technology to public services
(1997-07-01)
Ambient Intelligent are usually emerged in contexts like health, education, business and so
on. However there are not many researches focusing on social aspects as public
administrations. In these kinds of contexts, some ...
Mobile Monitoring Framework to Design Parameterized and Personalized m-Health Applications According to the Patient’s Diseases
(10/01/2015)
The development of personalized mobile monitoring applications is a complex work. Currently, the most of applications for patients monitoring through mobile devices, is not developed considering the particular characteristics ...
Synthesis of Optical Filters Using Sagnac Interferometer in Ring Resonator
(11/12/2007)
We propose a new synthesis method for the implementation of infinite impulse response filters, using a Sagnac interferometer within a ring resonator. This structure permits the synthesis of second-order optical functions ...
Application of pedagogical robotics in learning for children with special needs APRoLeCSNe
(08/21/2013)
APRoLeCSNe is a project that presents the approach of pedagogical robotics to support the learning methods for children with special learning needs (CSLN). Pedagogical Robotics focuses on inductive learning and guided ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
Optical router for optical fiber sensor networks based on a liquid crystal cell
(09/04/2003)
Optical fiber sensor networks are evolving rapidly. They are used because of the inert nature of optical fibers allowing no electromagnetic interference and safe applications in inflammable atmospheres; other relevant ...
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(2009-07-01)
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ...
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
(05/01/2011)
During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ...
Improving the security level of the FUSION@ multi-agent architecture
(06/06/2012)
The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ...
Synthesis of optical filters using microring resonators with ultra-large FSR
(12/06/2010)
We propose a novel synthesis method for designing flexible, tunable non-periodic filters. It is based on a building block which is presented by first time for these purposes, being the poles position tuned by means of a ...