No abstract available.
Proceeding Downloads
Using Semantic Web to Improve Accessibility to Visually Impaired Users: The Adaptive Model @dapt++
- Tatiana Amaral Sorrentino,
- Joaquim Macedo,
- Alexandre Santos,
- Claudia Ribeiro,
- Victor Vieira,
- Marlon Secundo
Web is a great resource and has become indispensable today. However, visually impaired users still face many difficulties in using the services available on the web. This paper presents experimental results of a semantic model that provides ...
Analysis of Relational and Object Oriented Database from SAE-GIN
The authors developed a Sistematização de Assistência de Enfermagem (SAE) system to the Clínica Escola da Universidade Potiguar (UnP) -- Campus Mossoró (RN - Brazil), that aids in tracking gynecologic cancer. This methodology had been implemented and ...
Building Software Products with use Open Data and Big Data in Smart Cities
- Anne C. M. Santos,
- Ávner J. S. Pereira,
- Manoela R. Oliveira,
- Hendrik T. Macedo,
- Rogério P. C. Nascimento
The use of Big Data and Open Data has been increasing and becoming a tendency in the last years. Big Data is about collect, store and analysis and interpretation of datasets so big and complex that traditional applications of data processing are not ...
An Investigation on the use of Ontologies for pattern classification - Study applied to the monitoring of food intake
- Ingridy M. P. Barbalho,
- Patricio de A. Silva,
- Felipe R. dos S. Fernandes,
- Francisco M. M. Neto,
- Cicilia R. M. Leite
Several tools are developed with the purpose of solving problems and exposing results similar to human reasoning. For this, various artificial intelligence techniques are being implemented to improve these applications. For the poorly structured and ...
Implementation of an Architecture for Streaming Data Acquisition Incorporating Quality Attributes
The volume of data that humanity is producing is a phenomenon that arouses research interest, considering different aspects and contexts involved. In this subject, data quality requires attention for acquisition and proper handling in order to provide ...
Dengue 360: a business intelligence tool for analysis and dissemination of epidemiological situation
The numbers of dengue fever cases in Brazil have grown in recent years, with the arrival of other diseases related to the mosquito that transmits dengue fever (Aedes Aegypt), the situation is very alarming. This paper presents the development of Dengue ...
Performance Evaluation of Wireless Mesh Networks in Smart Cities Scenarios
A significant increase in the Internet traffic is expected for future scenarios of smart cities due to the emergence of billions of heterogeneous Internet of Things (IoT) objects with the ability to collect and exchange information. Thus, understanding ...
Intelligent Solution for Classification of Diseases Transmitted by Vector Aedes Aegypti
Several physical or emotional factors can contribute negatively to critical moments in the health area, negatively influencing the diagnosis of diseases. Therefore, this work proposes an intelligent solution based on classifiers as an inference ...
Automatic diagnosis of Hypoacusia with Associative Memories
Hypoacusia 1 is the reduction in hearing ability. An early diagnose could avoid the complete loss of the sense of hearing. We propose a modification of modified Johnson-Möbius together with a tool of Artificial Intelligence to diagnose hearing losing. ...
Mobile Software for Support of Inputs Application in Rice Culture
This paper presents an experimental research with the purpose of developing a mobile software to aid the inputs application in rice culture. The proposed mobile software supports the application of inputs in order to provide a more effective and ...
Intrusion Detection via Multilayer Perceptron using a Low Power Device
- Felipe de Almeida Florencio,
- Edward David Moreno,
- Hendrik Macedo,
- Ricardo J. P. de B. Salgueiro,
- Filipe Barreto do Nascimento,
- Flavio Arthur Oliveira Santos
This work investigates the use of Multi-layered Perceptron Networks (MLP) for attack detection, using the Arduino embedded system as a case study. This paper also investigates techniques to reduce the computational cost of ANN (Artificial Neural ...
Study about software project management with Design Thinking
This article presents an ongoing work on how it may be possible to work on software development using not only agile methodologies for the processes, but also the use of Design Thinking for the requirements analysis and software quality measurement. ...
Remote Access with Wake on LAN
Decentralizing information and processes is an important challenge for companies nowadays. More and more companies need to have their information accessible at any time and from anywhere quickly and easily. Besides, they often need to rely on external ...
Low-cost ADS-B Collectors for Distributed Aircraft Surveillance
Efficiency is a fundamental problem in systems intended to capture, process and send a considerable amount of data in short periods. In this work we developed an embedded systems application for the Android operating system aimed at collecting airborne ...
Analysis of the data sets published in the Colombian open data portal: Case of the Metropolitan Area of the Aburra Valley
This document presents the results of an investigation carried out in order to know the characteristics of the data published by the municipalities that make up the Aburra Valley in Antioquia and its relationship with the strategic issues defined by the ...
Identification of Information Technology Tools for the Inclusion of People in Condition of Extreme Poverty
The purpose of this article is to present the results of a research aimed to identify the ICT tools proposed in the scientific literature, in the period from 2006 to 2015, to support the inclusion of people in extreme poverty. A systematic literature ...
Internet of Things: A Survey on Communication Protocol Security
- Walter E. Santo,
- Ricardo J. P. de B. Salgueiro,
- Reneilson Santos,
- Danilo Souza,
- Admilson Ribeiro,
- Edward Moreno
This paper presents a survey on the main security problems that affect the communication protocols in the context of Internet of Things, in order to identify possible threats and vulnerabilities. The protocols RFID, NFC, 6LoWPAN, 6TiSCH, DTSL, CoAP and ...
High Coverage of Connected Nodes routing protocol with reduced power consumption for multi-hop Wireless Sensor Network
The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol for distributed clustering. It is based on a probabilistic calculation to select cluster head. Successive LEACH protocols have involved other parameters for ...
ML-LEACH: Multi-Level LEACH for uniformly distributed clusters and low energy consumption
Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption increases exponentially with communication distance, multi-hop routing is very advantageous to save energy and prolong network lifetime. For these reasons, we ...
A comparative analysis of protocols for IoT network management
The complexity and growth of new smart objects networks are generating a new demand for the maintenance of these devices, with the need to remotely monitor and control these devices without consuming significant resources. Analyzing the memory and ...
Sentiment Analysis on Tweets related to infectious diseases in South America
- José Antonio García-Díaz,
- Óscar Apolinario-Arzube,
- José Medina-Moreira,
- Harry Luna-Aveiga,
- Katty Lagos-Ortiz,
- Rafael Valencia-García
Infectious diseases have a huge social and economic impact. They are caused by pathogenic microorganisms such as bacteria, viruses, parasites or fungi and they can be transmitted, directly or indirectly, from one person to another or from animals to ...
State of the art about use of IoT in education
Every day the devices connected autonomously to the communication networks are increased. New applications arise for this type of interconnected objects, thus offering new alternatives for solutions of any kind, through the use of technology based on ...
Classification of Gunshots with KNN Classifier
In this article a system of detection and classification of gunshots is proposed, which consists of using the KNN classifier in the presence and absence of Gaussian additive noise. The results guarantee that the classifier reaches up to 94 % of ...
Customizing Usability Heuristics for Augmentative and Alternative Communication Systems
The Augmentative and Alternative Communication Systems (AACS), by means of symbols selections, help to develop communication and reduce the frustration of those people who have difficulty in speaking. In order to inspect the usability of this type of ...
Analysis of Elasticity Impact in Hybrid Computational Clouds
Hybrid computational clouds are considered an interesting choice in the usage of computational resources in terms of elasticity. However, proper management of elasticity is necessary because computational resources can be provisioned inefficiently, ...
Exploratory Search as a Knowledge-intensive Process
This paper presents an exploratory search model capable of assisting the visualization of search patterns and clarifying best practices associated to users' decision-making process, with implications in areas related to information retrieval, ...
Dropout in distance learning: a reference model for an integrated alert system
Distance education has expanded over the past two decades. Parallel to this expansion, the high dropout rate of undergraduates has been a cause of concern for education administrators and researchers. The reference model for an integrated alert system ...
Web Tool for Path Analysis in Wireless Sensor Networks to Improve Their Performance
- Santiago Felici-Castell,
- Enrique Navarro-Camba,
- Juan José Pérez-Solano,
- Jaume Segura-García,
- Adolfo Pastor Aparicio,
- Miguel García-Pineda
Wireless Sensor Networks (WSNs) are based on tiny autonomous devices, usually named motes or nodes, and are used in many monitoring applications, such as environment, habitat, precision horticulture, etc. These motes are power-limited and most energy is ...
Open Government Data Usage Overview: A Systematic Literature Mapping
- Antônio J. Alves Neto,
- Danilo F. Neves,
- Lidiany C. Santos,
- Max C. Rodrigues Junior,
- Rogério P. C. do Nascimento
Open Government Data (OGD) is a practice that has become widespread and has brought countless benefits to both government and citizens. The Open Government Partnership is a group formed by over 60 countries, all countries sharing the same purpose: A ...
Stochastic Collaborative Beamforming in Wireless Sensor Networks
- Enrique A. Navarro-Camba,
- Santiago Felici-Castell,
- Juan J. Pérez-Solano,
- Jaume Segura-Garcia,
- Miguel García-Pineda,
- Adolfo Pastor-Aparicio
Wireless Sensor Networks (WSNs) are composed of spatially distributed autonomous sensor devices, named motes. These devices are constituted by a microcontroller, sensors, and they have the ability to communicate in the ISM frequency band using the IEEE ...
Index Terms
Proceedings of the Euro American Conference on Telematics and Information Systems
Recommendations
Acceptance Rates
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| EATIS '14 | 64 | 17 | 27% |
| Overall | 64 | 17 | 27% |



