Buscar
Mostrando ítems 1-10 de 12677
Modal Considerations on Information Processing and Computation in the Nervous System
(Seoul National University. Institute for Cognitive Science, 2013-09)
We can characterize computationalism very generally as a complex thesis with two main parts: the thesis that the brain (or the nervous system) is a computational system and the thesis that neural computation explains ...
Desafios de BYOD em redes emergentes
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Eletrônica, 2013-08-31)
This monograph discusses a study on BYOD (Bring your own device) and contextualizes factors to be implemented on the network, such as equipment, capacity and functionality face new dipositivos outside the domain. It also ...
Algorithm for Detection of Raising Eyebrows and Jaw Clenching Artifacts in EEG Signals Using Neurosky Mindwave Headset
(2021-01-01)
The present work proposes an algorithm to detect and identify the artifact signals produced by the concrete gestural actions of jaw clench and eyebrows raising in the electroencephalography (EEG) signal. Artifacts are ...
Web control and monitoring system : experimentation with haematococcus pluvialis
(International Journal Of Engineering, 2012-10-18)
This paper presents both, the design and development of a monitoring and control system via web for a closed microalgae crop and the results that were obtained using the strain Haematococcus pluvialis. The research was ...
Cloud computing: uma questão de segurança
(Universidade Tecnológica Federal do ParanáCuritibaBrasilEspecialização em Gestão de Serviços de TelecomunicaçõesUTFPR, 2016-03-01)
Cloud Computing comes the need to build complex IT infrastructure, where users do not have to perform installation, configuration and software upgrades in a new model emerging computing that moves all data and user ...
Creation of computer Aided Manufacturing software from computer aided design software in the milling process
(Universidad Autónoma de Occidente, 2013-04)
SAFEFW: controle de conexões remotas
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Elétrica e Informática Industrial, 2011-08-16)
The remote access protocols are used to enable a user to access a machine remotely. The most common protocols are SSH, RDP, RFB and Telnet. These protocols provide greater flexibility for users, allowing quick access to ...