75
play

75% Location profiler 85% Flow profiler Real user behavior 52% - PowerPoint PPT Presentation

T HESIS OBJECTIVES Static Canopy Model (SCM); Dynamic Canopy Model (DCM); Enhanced Static Trunk and Ground(ESTG) model; Combination of individual models into a generic doubly-selective 3D vegetation model; Final model


  1. T HESIS OBJECTIVES  Static Canopy Model (SCM);  Dynamic Canopy Model (DCM);  Enhanced Static Trunk and Ground(ESTG) model;  Combination of individual models into a generic doubly-selective 3D vegetation model;  Final model validation. | Vigo – 22 nd June 2017 1

  2. SDN-ORIENTED GLOBAL NETWORK OPTIMIZATION ALGORITHM MHIRI Saber, Francisco Javier González Castaño AtlantTIC, GTI Group University of vigo Control Plane Real AP network (Wifi + 5G) 75% Location profiler 85% Flow profiler Real user behavior 52% APs assignment algorithm

  3. SENTIMENT ANALYSIS IN SOCIAL MEDIA CONTENTS USING NATURAL LANGUAGE PROCESSING TECHNIQUES Author: Tamara Álvarez López Advisors: Enrique Costa Montenegro, Milagros Fernández Gavilanes Affiliation: AtlantTIC Research Center, University of Vigo MOTIVATION OBJECTIVES Automatic sentence-level SA system. ➢ Growth of social networks and ➢ Fine-grained SA system, by means of aspect ➢ their users. detection. New way of expression. ➢ Application and adaptation to different datasets ➢ Very valuable information for and contexts. ➢ companies, who need to analyse it. Implementation for English and Spanish. ➢ e.g. Service was nice but price was not worth it and food quality was very miserable. Sentence-level SA Natural Language Processing ➢ Great amount of (NLP) techniques. ➢ Service information available Applied in fields like: Sentiment Price ➢ Aspect-level SA online. Analysis (SA) , Aspect Food quality Difficult to analyse. Extraction , Text Generation, Entity ➢ Recognition, etc.

  4. PRESENTATION ATTACK DETECTION ON FACE RECOGNITION SYSTEMS IN MOBILE DEVICES Artur Costa-Pazo, Esteban Vazquez-Fernandez and José Luis Alba-Castro Thesis Objectives ● Analysis of Presentation Attack Detection PAD in Real Scenarios. ● Evaluation Framework. ● Develop robust face-PAD methods in mobile devices Preliminary Results ● Proposal and commitment for writing a chapter on a book. Handbook of Biometric Antispoofing ● Participation on IJCB 2017 competition on Figure 1: Samples of the different presentations attack instruments, PAI. generalized face presentation attack detection in Replay-Mobile database was mobile authentication scenarios obtaining the 1st captured within the framework of collaboration between Idiap and rank across all the four protocols. Gradiant. Workshop on Monitoring PhD Student Progress acosta@gradiant.org

  5. Homomorphic Lattice Cryptosystems for Secure Signal Processing Workshop on Monitoring PhD Student Progress. June 22-23, 2017. Alberto Pedrouzo-Ulloa, Advisors: Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González {apedrouzo@gts.uvigo.es, juan.troncoso-pastoriza@epfl.ch, fperez@gts.uvigo.es} Main objective • Privacy protection when dealing with sensitive signals in untrustworthy environments through the use of SSP (Secure Signal Processing) Specific objectives • Privacy protection when dealing with multidimensional signals • Design of new primitives and protocols for encrypted signal processing • Security analysis and development of encrypted compression schemes Secret key owner Service A Service B Encrypted data Encrypted data Encrypted results Encrypted results Service C Service D Sensitive signals 1

  6. PROPOSAL OF A SOCIAL INTERACTION TOOL, INTEGRATED IN FACEBOOK, FOR E-LEARNING author HELDER RODRIGO SOARES PINTO thesis advisor MARTÍN LLAMAS NISTAL PhD in ICT and FERNANDO MIKIC FONTE ARCHITECTURE AND TELEMATIC SERVICES E-LEARNING ENVIRONMENT OF A SOCIAL INTERACTION DEVICE FACEBOOK APP STORAGE WEB SITE WEB BROWSER MOBILE SQL DATABASE WEB SITE ACHIVEMENTS

  7. Radio Frequency Propagation, Characterization And Measurements For Antenna Sensor Networks With Applications In Smart Farming Hicham Klaina, supervised by Ana Vazquez Alejos and Otman Aghzout Hicham Klaina, Ana Vazquez Alejos and Otman Aghzout Hicham Klaina, Ana Vazquez Alejos and Otman Aghzout “Radio frequency propagation study for near- “RFID Tags Detection Effects for Smart Agriculture Motivation ground antenna sensor networks dedicated to Applications” under review . agriculture” under review . Results and Discussions Fig 2. RSSI values using ALN G tag attached to a plastic Fig 1. Path loss in agriculture fields at 2.4GHz for H1=20cm bottle at 7cm from the bottom. & H2=40cm. Measurements demonstrate that RFID tags type, Measurements show that a significant change in positioning and food dielectric constant have a big path loss occurs when lowering the height of the Thesis Objectives influence on tags attached to food detection antennas near to ground after a break distance, performance. Novel design needed . changing the propagation channel model . Traceability of food transportation using Arduino: WSN for farm monitoring using Raspberry: Data model offered to farmers to trace their food transportation which is a part of the new V2X technology , from the farm to the table. Food Design and development of an ideal smart farming system for crops Using this WSN topology , farmer is allowed to traceability in real-time on Google Maps will monitor his farm in real time using his smartphone monitoring from cultivation to transport and storage in accessible to the farmer. warehouses. or laptop whenever and wherever he is. Workshop on Monitoring PhD students Progress - PhD program in Information and Communications Technology - June 2017

  8. DISTRIBUTED COLLABORATION IN MOBILE CONTEXT-AWARE SYSTEMS Urban areas Social proximity Local proximity Bluetooth WiFi Accelerometer GPS Proximity Magnetometer Gyroscope Microphone Fátima Castro Jul I & C Lab Ana Fernández Vilas 2 AtlantTIC Research Center Rebeca P . Díaz Redondo Universidade de Vigo

  9. Evaluate Share Use Remix Explore Create By: Carmelo B. España V .

  10. DATA-DRIVEN ALLOCATION OF NETWORK RESOURCES IN UDNs SILVESTRE LOMBA MALTA, SUPERVISED BY MANUEL FERNANDEZ VEIGA Ultra-dense networks (UDN) have been considered one of the most advanced technologies in 5G and • can be the key to meet users’ expectations. Due to UDN characteristics, energy management and energy consumptions are serious challenges to • network operators. Studies have concluded that Base Stations consume about 60%-80% of energy use in cellular networks. • In my thesis, I would like to contribute with: • New techniques for sampling, compressing and summarizing network mobility information in real- • time. Evaluate the performance improvements of knowing mobility and traffic patterns in UDNs, as far as • energy-efficiency is concerned. Develop deterministic mean-field approximations for predicting the performance in large UDNs. •

  11. Recommendation of Tourism Resources Supported by Crowdsourcing Recommendations based on Crowd-sourced information Research Plan Tourism Profiling Recommendations Crowdsourcing  State-of-the-art review  Data collection  User-based and item-based  Tourist behaviour  Crowd-sourced data analysis recommendations  Multi-criteria profiling  Off-line questionnaire && On-line  Trust & Reputation modeling processing Final Done Thesis 13-06-2017 Fátima Leal, University of Vigo, June 2017 – Workshop DOC-TIC

  12. Thesis Objectives Motivation Results​ • E -Health applications privacy • Genomic data are sensitive. • Novel protocol of paternity testing. • Genomic data are unique identifier analysis​. Develop and device • Achieving anonymous credential for countermeasure. of each person. access control in genomic area. • Genomic data are not revocable. • Sketch of the protocol featuring​ an “inherent” access control​ through attributes enforcing the​ patient’s access policy​ • Implementing "entropy-based" privacy measurement • Dynamic Privacy-Preserving Genomic Susceptibility Testing.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend