Buscar
Mostrando ítems 101-110 de 321
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Giving Neurons to Sensors: An Approach to QoS Management Through Artificial Intelligence in Wireless Networks
(Springer, 2006)
For the latest ten years, many authors have focused their investigations in wireless sensor networks. Different researching issues have been extensively developed: power consumption, MAC protocols, selforganizing network ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Monitoring Tissue Evolution on Electrodes with Bio-Impedance Test
(IEEE Computer Society, 2016)
A technique for real-time monitoring of bioimpedances using a Voltage Oscillation (VO) methodology is proposed. The main idea relies on connecting the bio-system in such a way that a suitable electrical oscillator, which ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Choosing the Right Protocol Stack for an Open and Flexible Remote Unit
(IEEE Computer Society, 2008)
This paper presents some works made in the development of communications software for an embedded open core system. By using a Linux-based processor implemented on a FPGA, we are developing the appropriate software in ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Posibilidades de la evaluación continua en las titulaciones de Informática de la Universidad de Sevilla
(2006)
La próxima reforma ha hecho que se pongan en práctica experiencias piloto y ensayos de nuevas metodologías de enseñanza aprendizaje. Se podría decir que todos los sectores de la universidad están en un proceso de reflexión ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Intelligent Information System as a Tool to Reach Unaproachable Goals for Inspectors - High-Performance Data Analysis for Reduction of Non-Technical Losses on Smart Grids
(IARIA, 2016)
The Non-Technical Losses (NTLs) represent the non-billed energy due to faults or illegal manipulations in customer facilities. The objective of the Midas project is the detection of NTL through the application of ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks
(Springer, 2011)
The study of forest fires has been traditionally considered as an important application due to the inherent danger that this entails. This phenomenon takes place in hostile regions of difficult access and large areas. ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Multiagent Systems and Wireless Sensor Networks convergence for an intelligent waterway ambient
(2008)
Lately Maritime research areas have moved their interests to cover new areas conferring a more general character to them. BOYAS project is proposed including these new perspectives as well as the classical ones. Trying to ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
ADKI: un sistema web de adquisición de datos bajo Linux
(Universidad Politécnica de Valencia, 2004)
Esta contribución presenta una aplicación genérica de adquisición de datos y control para sistemas simples que incorpora el registro histórico de la actividad del sistema y la capacidad de consulta y gestión de la ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Customizable Software Interface for Monitoring Applications
(Springer, 2010)
In this paper we propose an application based on virtual keyboard and automatic scanning to communicate with a PC and the others people. The aim users are the people with disabilities. A high degree of customization is ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
(Institute of Electrical and Electronics Engineers, 2023-12)
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of ...