Refine Search

New Search

Result: 7,351,138

(searched for: conference:*)
Page of 735,114
Articles per Page
by
Show export options
  Select all
, Segundo Esteban, , Christophe Pasquier
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) pp 346-355; https://doi.org/10.1007/978-3-030-87872-6_34

Abstract:
International mobility enriches both, educational institutions and students that enjoy it. In this paper, the process of getting an Erasmus+ traineeship and the benefits derived from it are presented. This work shares the experience of a group of French students who have enjoyed an internship at a Spanish university in 2021. The importance of preparing the stay and the procedure to be carried out from both educational institutions, the one of origin and the receiving, is shown. For the successful of this mobility, it is also key to define a project that motivates the students and suits their background and skills. In this case, a project focused on renewable energies has been proposed. It consists on the design of a floating wind turbine prototype. Clean energy has proven to be very attractive to students and it is a way to discover new vocations for young researchers.
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) pp 384-393; https://doi.org/10.1007/978-3-030-87872-6_38

Abstract:
Sustainable development (SD) is a great global commitment in economic, social, and environmental terms of the century XXI. This model integrates conventional developmental models that seek economic growth, but at the same time encourages human development, all within the framework of respect and sustainable use of natural resources. This integrative work is a challenge that must involve all levels of society. Higher education is not out of this line, since universities must strive for knowledge, research and innovation to achieve or at least promote sustainable development. For achieving this, there is a model called Education for Sustainable Development (ESD). Environmental engineering is a branch of engineering that seeks through the technique to solve environmental problems that involve engineering development. ESD has become an indirect measurement instrument for the inclusion of SD in curricula, which demonstrate how up-to-date the study plan is. With this research, based on a systematic literature review (SLR), it was sought to answer some research questions about the degree of inclusion of ESD in the environmental engineering curriculum and to recognize the success stories that are documented in the Science Direct, Scopus, and ERIC databases. It was possible to identify, among other things, the most promoted competencies within ESD and the techniques and tools used by universities to promote SD in this engineering curriculum.
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) pp 116-125; https://doi.org/10.1007/978-3-030-87872-6_12

Abstract:
Communication networks and systems are continuously threatened by a great variety of cybersecurity attacks coming from new malware that targets old and new systems’ vulnerabilities. In this sense, Intrusion Detection Systems (IDSs) and, specifically, Network IDSs (NIDSs) are used to count on robust methods and techniques to detect and classify security attacks. One of the important parts in the assessment of NIDSs, is the Feature Engineering (FE) process, where raw datasets are transformed onto derived ones where both, features and observations are smartly transformed. In this work, the ff4ml framework, which includes the Feature as a Counter (FaaC) FE approach, is used to transform raw features into new ones that are counters of the originals. The FaaC approach aggregates raw observations by time intervals, thus limiting its use to network datasets containing timestamps. This work proposes a batch-based aggregation technique that allows applying FaaC in timestamp-less datasets and analyzes its impact on the performance of Machine Learning (ML)-based NIDSs in comparison to timestamp-based aggregation approaches.
José Antonio López-Vázquez, , María Isabel Fernández-Ibáñez, José Luis Casteleiro-Roca, Francisco Zayas, Andrés Suárez-García
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) pp 295-304; https://doi.org/10.1007/978-3-030-87872-6_29

Abstract:
The low academic performance rates in the majority of the STEAM (Science, Technology, Engineering, Arts and Math) degrees, is an issue that influences not only the degree quality rates, but also the teaching staff assessments. In this study, 254 graduates of the Industrial Electronics and Automation Engineering degree were monitored over eight academic years. For this purpose, individual academic records were compiled and the individual grades were analyzed. The results showed that there were inter-course differences. Significant differences were also observed in the grades for different subjects. Statistical analysis results also showed that in subjects with low performance rates less than 20% of grades exceeded pass mark. Subjects where final exam does not have a 100% weight in the qualification, performance rates are higher. In addition, significant differences were found between the grades of compulsory and the optional subjects.
Antonello Calabrò, Emilia Cioroaica, , Eda Marchetti
Proceedings of Second Doctoral Symposium on Computational Intelligence pp 181-191; https://doi.org/10.1007/978-3-030-87872-6_18

Abstract:
Context: Within digital ecosystems avoiding the propagation of security and trust violations among interconnected parties is a mandatory requirement, especially when a new device, a software component, or a system component is integrated within the ecosystem. Objective: The aim is to define an auditing framework able to assess and evaluate the specific functional and non-functional properties of the ecosystems and their components. Method: In this paper, we present the concept of predictive simulation and runtime monitoring for detecting malicious behavior of ecosystem components. Results and Conclusion: We defined a reference architecture allowing the automation of the auditing process for the runtime behavior verification of ecosystems and their components. Validation of the proposal with real use-cases is part of the future BIECO’s activities.
José Aveleira-Mata, , David Yeregui Marcos del Blanco, María Teresa García Ordás, Francico Zayas-Gato, Álvaro Michelena, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, José Luis Calvo-Rolle
Proceedings of Second Doctoral Symposium on Computational Intelligence pp 84-93; https://doi.org/10.1007/978-3-030-87872-6_9

Abstract:
Nowadays, Internet of things (IoT) systems add connectivity to physical and common objects offering new possibilities, this systems have special features such as the low capacity of the devices and behaviour of the protocols used. These facts make cybersecurity in this kind of systems is critical. The current work uses a dataset is based on denial of service attacks over a traffic protocol used in IoT systems, called MQTT. In order to address the classification of new denial of service attacks, one-class technique is applied, obtaining good results using the Principal Component Analysis (PCA) algorithm as complement to this method.
Hernando Avella Forero, Néstor Rafael Perico-Granados, , , Heidy Madeleine Arévalo Algarra
Proceedings of Second Doctoral Symposium on Computational Intelligence pp 374-383; https://doi.org/10.1007/978-3-030-87872-6_37

Abstract:
For the development of society, the training of upright professionals is required, especially in environmental matters. Therefore, it is necessary to apply training processes that involve the construction of competencies, to face the solution of the problems that currently arise. For this, academic spaces are required with methodologies that apply and execute human and disciplinary competencies; one of these methodologies is the POPBL (Project-Oriented Problem-Based Learning). This research will establish environmental education as a strategy to solve the generation of solid waste, applying the POPBL method and the development of human and professional skills and competencies. The projects were developed and applied by students from the Faculty of Environmental Engineering of the Santo Tomas University, in the first, sixth, and seventh semesters in the 2019-II period, guided by the teacher and where the main topic was environmental education and solid waste management. The researcher applied qualitative and quantitative data collection instruments to determine the state of the competencies and strengthened in the academic period through the POPBL. It was evident that the students at the beginning of this research were not clear about how these competencies were developed and their answers were according to their expectations of application and generation. As the application of research projects and teacher interventions explained the development of competencies, the students were able to relate their training process with the development of competencies and solve current environmental problems.
, M. Santos, M. Romana
Proceedings of Second Doctoral Symposium on Computational Intelligence pp 94-104; https://doi.org/10.1007/978-3-030-87872-6_10

Abstract:
This paper presents a Soft Computing based system to identify risky driving maneuvers on conventional two-lane roads. Road design and vehicle dynamics are considered. Specifically, a fuzzy rule-based Mamdani-type inference system is applied. The vehicle dynamics features are measured by smartphone inertial sensors. The real data obtained from the GPS, accelerometer, and gyroscope are used to identify the driving maneuvers. A conventional two-lane road located in the Madrid Region, Spain is used for this research. The results obtained with the fuzzy system are promising and suggest that this intelligent system can be used to warn drivers of a risky maneuver in real time for a safer, more ecological and comfortable driving.
, , Daniela Delinschi, Laura Andreica
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) pp 214-223; https://doi.org/10.1007/978-3-030-87872-6_21

Abstract:
Far from being a hype, cybersecurity is one of the most important aspects of our daily lives. Gaining trust in a cyber system is not an easy task, as problems and security hazards can be willingly or unwillingly introduced in it. This paper describes a security-centric architecture of the communication bus in loosely coupled heterogeneous systems. The concept is modular and designed having in mind the fulfillment of the principles of Service Oriented Architecture as well as the common functional and non-functional requirements regarding such communications.
Xiaochao Guo, Yanyan Wang, Qingfeng Liu, Duanqin Xiong, Jian Du, XueQian Deng
Lecture Notes in Electrical Engineering pp 766-772; https://doi.org/10.1007/978-981-16-5963-8_104

Abstract:
There were 45 male fighter pilots participating in two-step procedures of test pilot selection for human system integration (HSI). The pilots did psychological tests as well as special tests of aviation medicine including clinical medicine examinations and so on. For the pilots selected for test pilots 4 psychological abilities was scored by PC program or panel of experts, but 7 different abilities was for the test pilots selected for type test flight. The results were found that the psychological selection didn’t be influenced by test blocks, pilot’s age and experienced type of fighter, and the composite scores could act as qualification index of psychological selection. Test pilots also differed from the candidates at least on language performance, comprehensive analysis, and achievement motivation in problem solving. It was found that the criterion validity of the psychological selection was 0.92, and the chosen test pilots had good performances in practical test flight.
Page of 735,114
Articles per Page
by
Show export options
  Select all
Back to Top Top