Search
Now showing items 41-50 of 53
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter
(Science and Information Organization, 2020)
Acceso abierto
Cyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ...
Semantic Segmentation of Weeds and Crops in Multispectral Images by Using a Convolutional Neural Networks Based on U-Net
(Springer, 2020)
Acceso restringido
A first step in the process of automating weed removal in precision agriculture is the semantic segmentation of crops, weeds and soil. Deep learning techniques based on convolutional neural networks are successfully applied ...
Research gradualness matrix for undergraduate students in computing related careers
(IEEE, 2019)
Acceso restringido
A drawback in the academic formation of some undergraduate students in computing related careers is the lack of preparation for improving their research skills. In the following article, we ought to know if the gradual ...
Numerical Simulation of Debris Flows of the Catastrophic Event of February 2019 in Mirave – Peru
(Instituto de Pesquisas Ambientais em Bacias Hidrograficas (IPABHi), 2019)
Acceso abierto
Debris flows are geophysical phenomena, caused by torrential rain, which occur in mountainous areas, characterized by the detachment of slope and riverbed materials and their consequent dislodge through watersheds and ...
Profits at the dawn of cybercrime-as-a-service
(IEEE, 2019)
Acceso restringido
The growing of Information and Communication Technologies (ICT) that has been experienced in recent years, has led to new and more sophisticated ways of doing business. Consequently, worldwide organized criminal groups ...
Heuristics Applied to Mutation Testing in an Impure Functional Programming Language
(Science and Information Organization, 2019)
Acceso abierto
The task of elaborating accurate test suites for program
testing can be an extensive computational work. Mutation
testing is not immune to the problem of being a computational and time-consuming task so that it has found ...
Beyond knowledge integration barriers in ERP implementations: An institutional approach
(University of Zagreb, 2018)
Acceso abierto
The objective of the article is to go beyond the knowledge integration barriers in ERP implementations by analyzing structural, technological, intellectual and socioemotional barriers that appear during an ERP implementation ...
Automated classification system of giant white corn using image processing and supervised techniques
(International Society for Computers and Their Applications, 2018)
Acceso restringido
Nowadays, the use of artificial vision for classification in agricultural products has proven to have a great impact on this field. The exportation of agricultural goods has risen all over the world, consequently, that is ...