knowledge extraction from usage data of
play

Knowledge extraction from usage data of Dept. of Telematics - PowerPoint PPT Presentation

Knowledge extraction from usage data of Dept. of Telematics Engineering, GIST mobile devices with educational purposes Author : Francisco de Arriba Prez Advisors : Manuel Caeiro Rodrguez, Juan Manuel Santos Gago Research in laboratory and


  1. Knowledge extraction from usage data of Dept. of Telematics Engineering, GIST mobile devices with educational purposes Author : Francisco de Arriba Pérez Advisors : Manuel Caeiro Rodríguez, Juan Manuel Santos Gago Research in laboratory and educational settings Wearables Data collection Physiological signals Stress/Sleep detection userID SVM LWL C4.5 IBK Naive Bayes Analysis 001 94.3% 87.% 100% 98.0% 92.3% 002 99.7% 99.5% 99.0% 98.0% 96.8% . . . . . . . . . . . . Mean 97.9% 91.1% 99.3% 98.6% 94.9% std 2.10 7.74 0.78 0.51 3.03

  2. The technology related to the cloud Design a new architecture of GPU manager and computing , the GPUs and the container scheduler in cloud computing. ecosystem has been evolving in the last years. Modeling the GPU task on Docker and Kubernetes Test the GPU on the Embedded Board platform. Workshop on Monitoring PhD Student Progress, June 14-15, 2018, Vigo, Spain

  3. Be ha vio ura l Mo de lling o f Mic ro wa ve T ra nsisto rs fo r Wide b a nd Hig h E ffic ie nc y Po we r Amplifie r De sig n UAV Power contours around Z opt Interpolated Extrapolated Author : Mª de l Ro c ío Mo ure F e rná nde z Advisor s: Mó nic a F e rná nde z Ba rc ie la , Pa ul J. T a ske r

  4. Contribution to development of telematic services for data analysis in technology area. Application to eHealth field. Author: Mateo Ramos Merino Thesis Advisors: Juan M. Santos Gago, Luis M. Álvarez Sabucedo Department of Telematic Engineering , University of Vigo In some domains, such as Improve expressiveness of current OBJECTIVES modeling languages. eHealth, process monitoring is very important. It is mandatory to control, check and verify the Enhance results of conformance checking techniques using implementation of workflows as semantic information. designed in actual scenarios. Real behavior Collect traces on this for analyses Desired behavior Workflow Process model

  5. DESIGN OF SYSTEMS FOR BREAKTHROUGH RADIO SYSTEMS by David Álvarez Outerelo , Ana Vázquez Alejos and Francisco Díaz Otero 2018 WORKSHOP PhD STUDENT PROGRESS

  6. PRESENTATION ATTACK DETECTION ON FACE RECOGNITION SYSTEMS IN MOBILE DEVICES Artur Costa-Pazo, Esteban Vazquez-Fernandez and José Luis Alba-Castro Topic Achieved goals Reproducibility A python package will be available on 1st-ranked face-PAD algorithm on IJCB Face Recognition github. Conference, Denver 2017. Presentation Attack Detection We have written a chapter for the Scores and source code will be Handbook of Biometric Anti-Spoofing. Mobile devices available too. Challenges of Face Presentation Attack Detection in Real Scenarios Speaker at the Machine Learning Workshop Galicia , Santiago de Compostela. (+34) 986 120 430 ext 3009 | acosta@gradiant.org

  7. On-chip directly phase-modulated laser source for QKD applications by Pablo Vilar Gómez and Francisco Díaz Otero 2018 WORKSHOP PhD STUDENT PROGRESS QKD

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend