Buscar
Mostrando ítems 61-70 de 191
Diagnóstico y seguimiento de la fragilidad en ancianos mediante el uso de dispositivos móviles
(11/03/2011)
Con la edad, la resistencia y las reservas fisiológicas de una persona adulta disminuyen, provocando un mayor riesgo de sufrir efectos adversos para la salud. Estos factores llevan al conocido estado de fragilidad. El ...
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)
Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ...
A System for Mobile Learning: A Need in a Moving World
(07/04/2013)
This paper presents MLEA, a mobile learning application that brings together functionalities of Android devices, Moodle LMS and needs of Mobile learning system users. The application is an answer to young adult learners ...
Automatic generation of ETL processes from conceptual models
(11/06/2009)
Data warehouses (DW) integrate different data sources in order to give a multidimensional view of them to the decision-maker. To this aim, the ETL (Extraction, Transformation and Load) processes are responsible for extracting ...
NFC Approach: Towards a Simple Interaction
(01/01/2009)
Nowadays, there are devices with great computing capabilities and these in different places around us. This technology opens us new possibilities and allows us the simple and easy interaction between user and computer. We ...
Model for the Evaluation of Educational Quality Using Virtual Learning Environment
(2011-07-03)
This article describes a model for the evaluation of educational quality using a virtual learning environment. This model describes quantitative and qualitative aspects that are based on a set of quality attributes and ...
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)
This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
Semi-supervised 3D object recognition through CNN labeling
(04/01/2018)
Despite the outstanding results of Convolutional Neural Networks (CNNs) in object recognition and classification, there are still some open problems to address when applying these solutions to real-world problems. Specifically, ...
Assessing usability in dof: an Activity for children with speech disorders
(IADIS International Conference e-Society 2017IADIS International Conference e-Society 2017, 06/01/2017)
This paper presents the findings of an empirical study of a prototype for children with speech disorders. --- the purpose of this work was to evaluate the interaction process of children on the Dice of Phoneme DoF (DoF) ...