<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://hdl.handle.net/10366/134486">
<title>BISITE. Ponencias / Actas</title>
<link>http://hdl.handle.net/10366/134486</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://hdl.handle.net/10366/156942"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149872"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149871"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149867"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149866"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149865"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149864"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149863"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/149857"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/145818"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/145815"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/145814"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/145813"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/145809"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/144152"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/144150"/>
</rdf:Seq>
</items>
<dc:date>2026-04-21T06:20:44Z</dc:date>
</channel>
<item rdf:about="http://hdl.handle.net/10366/156942">
<title>Introducing a Distributed Architecture for Heterogeneous Wireless Sensor Networks</title>
<link>http://hdl.handle.net/10366/156942</link>
<description>This paper presents SYLPH, a novel distributed architecture which integrates a service-oriented approach into Wireless Sensor Networks. One of the characteristics of SYLPH is that it can be executed over multiple wireless devices independently of their microcontroller or the programming language they use. SYLPH works in a distributed way so that most of the application code does not have to reside in a central node. Furthermore, SYLPH allows the interconnection of several networks from different wireless technologies, such as ZigBee or Bluetooth. This paper focuses on describing the main components of SYLPH and the issues that lead to design and develop this new approach. Results and conclusions are presented after evaluating a preliminary version of this architecture
</description>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149872">
<title>A feature based approach on behavior analysis of the users on twitter: A case study of AusOpen tennis championship</title>
<link>http://hdl.handle.net/10366/149872</link>
<description>[EN] Due to the advancement of technology, and the promotion of smart-
phones, using social media got more and more popular. Nowadays, it has become

an undeniable part of people’s lives. So, they will create a flow of information by
the content they share every single moment. Analyzing this information helps us
to have a better understanding of users, their needs, their tendencies and classify
them into different groups based on their behavior. These behaviors are various and
due to some extracted features, it is possible to categorize the users into different
categories. In this paper, we are going to focus on Twitter users and the AusOpen
Tennis championship event as a case study. We define the attributions describing
each class and then extract data and identify features that are more correlated to
each type of user and then label user type based on the reasoning model. The
results contain 4 groups of users; Verified accounts, Influencers, Regular profiles,
and Fake profiles.
</description>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149871">
<title>The reversibility of cellular automata on trees with loops</title>
<link>http://hdl.handle.net/10366/149871</link>
<description>[EN] In this work the notion of linear cellular automata on trees with loops is introduced and the reversibility problem in some particular cases is tackled. The explicit expressions of the inverse cellular automata are computed.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149867">
<title>The importance of bankruptcy prediction in the advancement of today’s businesses and economies</title>
<link>http://hdl.handle.net/10366/149867</link>
<description>[EN] The prediction of bankruptcy in companies is a problem that has
concerned entrepreneurs, researchers and even governments for years, since
detecting early signs that a company is going to enter bankruptcy involuntarily
and being able to save it from that process, can help reduce the economic losses
that bankruptcy entails, both in quantitative and qualitative terms. To try to
avoid bankruptcy, it is very common to analyze the evolution of different
financial ratios as it’s been done in this article.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149866">
<title>The impact and correlation of the digital transformation on GDP growth in different regions Worldwide</title>
<link>http://hdl.handle.net/10366/149866</link>
<description>[EN] Currently our society is experiencing a process of digital transfor-
mation worldwide, in 2016 the digital economy accounted for 22.5% of the
world economy. The digital transformation has enabled the creation of new
business models, the generation of opportunities and the maximization of effi-
ciency in traditional companies that have wanted to reconvert their business
model towards a new digital environment and the culture of data orientation.
This document contains an analysis of how the adoption of digital technologies
has a positive influence on the growth of the world economy as a whole, and
particularly on the growth of some regions of the world.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149865">
<title>Technology as a lever for the evolution and recovery of the financial and construction sectors in Spain</title>
<link>http://hdl.handle.net/10366/149865</link>
<description>[EN] The economic crisis started in Spain between 2008 and 2009. During
the previous years there had been a growth of the Spanish economy above 3%
per year, combined with a reduction of the unemployment rate to values close to
8%, the lowest unemployment rate in the last two decades. This situation was
seen by analysts and politicians as a perfect situation for the Spanish economy,
which did not foreshadow the existence of the crisis that would follow, beyond a
minority that warned of a bubble in the real estate sector and a possible slow-
down in the economy. This study reviews the ratios and sectors that have
suffered most from the consequences of the crisis and describes the need for the
implementation of technology as levers to improve the productivity of these
sectors.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149864">
<title>Study based on the incidence of the index of economy and digital society (DESI) in the GDP of the eurozone economies</title>
<link>http://hdl.handle.net/10366/149864</link>
<description>[EN] In the different developed societies, the different relationships
between the so-called technological indicators and social development have
been studied in the recent years. The aim of this work is to find a link between
variables of the DESI (digital economy and society index) technology indicator
and the GDP (gross domestic product) per capita for the current year. These
relationships exist and are directly related to the use of certain services on the
Internet by citizens and the integration of technology by companies.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149863">
<title>A review of k-NN algorithm based on classical and Quantum Machine Learning</title>
<link>http://hdl.handle.net/10366/149863</link>
<description>[EN] Artificial intelligence algorithms, developed for traditional computing, based on Von Neumann’s architecture, are slow and expensive in terms of computational resources. Quantum mechanics has opened&#13;
&#13;
up a new world of possibilities within this field, since, thanks to the basic&#13;
properties of a quantum computer, a great degree of parallelism can be&#13;
achieved in the execution of the quantum version of machine learning&#13;
&#13;
algorithms. In this paper, a study has been carried out on these proper-&#13;
ties and on the design of their quantum computing versions. More specif-&#13;
ically, the study has been focused on the quantum version of the k-NN&#13;
algorithm that allows to understand the fundamentals when transcribing&#13;
classical machine learning algorithms into its quantum versions.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/149857">
<title>Proposing to use artificial neural Networks for NoSQL attack detection</title>
<link>http://hdl.handle.net/10366/149857</link>
<description>[EN] Relationships databases have enjoyed a certain boom in software
worlds until now. These days, with the rise of modern applications, unstructured
data production, traditional databases do not completely meet the needs of all
systems. Regarding these issues, NOSQL databases have been developed and
are a good alternative. But security aspects stay behind. Injection attacks are the
most serious class of web attacks that are not taken seriously in NoSQL.
This paper presents a Neural Network model approach for NoSQL injection.
This method attempts to use the best and most effective features to identify an
injection. The features used are divided into two categories, the first one based
on the content of the request, and the second one independent of the request
meta parameters. In order to detect attack payloads features, we work on
character level analysis to obtain malicious rate of user inputs. The results
demonstrate that our model has detected more attack payloads compare with
models that work black list approach in keyword level.
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/145818">
<title>Energy Flexibility Assessment of a Multi Agent-based Smart Home Energy System</title>
<link>http://hdl.handle.net/10366/145818</link>
<description>[EN] Power systems worldwide are complex and challenging environments. The increasing necessity for an adequate integration of renewable energy sources is resulting in a rising complexity in power systems operation. Multi-agent based simulation platforms have proven to be a good option to study the several issues related to these systems. In a smaller scale, a home energy management system would be effective for the both sides of the network. It can reduce the electricity costs of the demand side, and it can assist to relieve the grid congestion in peak times. This paper represents a domestic energy management system as part of a multi-agent system that models the smart home energy system. Our proposed system consists of energy management and predictor systems. This way, homes are able to transact with the local electricity market according to the energy flexibility that is provided by the electric vehicle, and it can manage produced electrical energy of the photovoltaic system inside of the home.
</description>
<dc:date>2018-01-11T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/145815">
<title>Application of artificial immune system to domestic energy management problem</title>
<link>http://hdl.handle.net/10366/145815</link>
<description>[EN] The connection of devices in a smart home should be done optimally, this helps save energy and money. Numerous optimization models have been applied, they are based on fuzzy logic, linear programming or bio-inspired algorithms. The aim of this work is to solve an energy management problem in a domestic environment by applying an artificial immune system. We carried out a thorough analysis of the different strategies that optimize a domestic environment system, in order to demonstrate the ability of an artificial immune system to find a successful optima that satisfies the problem constraints.
</description>
<dc:date>2018-01-11T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/145814">
<title>Formation of optimal Boolean functions for analog-digital conversion</title>
<link>http://hdl.handle.net/10366/145814</link>
<description>[EN] This paper describes a situation in which the function obtained from an analog-to-digital conversion is considered a partially-certain function. In this case it is possible to neglect the least significant bits and therefore redefine them arbitrarily. A realization of proposed method simplifies the further processing of the received signal, and saves hardware consumption at designing and usage of hardware and software systems that include analog-to-digital converters.
</description>
<dc:date>2018-01-08T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/145813">
<title>Smart Protective Protection Equipment for an accessible work environment and occupational hazard prevention</title>
<link>http://hdl.handle.net/10366/145813</link>
<description>[EN] Wearable technologies have begun to play an important role in the workplace. This paper presents a Smart PPE (Personal Protective Equipment) solution which employs a sensor network located on a helmet and a belt to monitor the state of the worker and the environment. Most of the accidents that occur in the workplace are caused by the lack of prevention measures, poor safety training and obsolete safety systems which do no adapt technologically to the needs of today's work environments. The solutions provided by Industry 4.0 for hazard prevention and propose a wireless PPE model that incorporates intelligent tools and fabrics capable of reacting in real time to a risk situation. This novel model implements continuous risk monitoring biometrics of the worker, detects the external impact, shock, luminosity, gases, temperature of the environment and provides real-time recommendations to workers. The motivation behind this work is to improve health and safety in work sectors with high accident risk.
</description>
<dc:date>2020-04-09T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/145809">
<title>An agent-based Internet of Things platform for distributed real time machine control</title>
<link>http://hdl.handle.net/10366/145809</link>
<description>[EN] The way in which the Internet of Things and the Web of Things improve everyday objects may seem obvious; elements that make up our daily life are increasingly interconnected and it is becoming more common for us to be surrounded by them. However, the possibilities these technologies offer are not only limited to routinely used objects. By adapting these still emerging technologies, any kind of an object can achieve better performance. They can, for example be applied to research tools, to obtain faster search results and improve the user's experience. The presented work follows these lines; we present a Web-operated machine for the study of the behaviour of certain animals. In addition, the proposed architecture favours the addition of cognitive abilities, due to the inclusion of a Multi-Agent System.
</description>
<dc:date>2018-01-11T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/144152">
<title>Design and development of solutions for research projects: upper, citychain and pulse generator</title>
<link>http://hdl.handle.net/10366/144152</link>
<description>[EN]This paper describes the research work done in several projects.&#13;
These projects have a different scope, from the monitoring of a city to&#13;
the safety of workers in their workplaces. The solutions provided in these&#13;
projects are focused on custom electronics and IoT technology
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/144150">
<title>Distribution of quantum keys over commercial networks</title>
<link>http://hdl.handle.net/10366/144150</link>
<description>[EN]Modern cryptography – as it was conceived – is under a threat by the development of quantum mechanics applications. The abilities of quantum computers for solving complex mathematical problems, as a strong computational novelty, is the root of that risk. The main challenge is to find commercial exploits of quantum properties and developments, following these directions for both, theoretic and test tube environments. This work proposes a pilot experiment that implements a quantum communication system on a commercial fiber optic network, covering an area of almost 100,000 km2.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
