Listar Ingeniería de Sistemas por título
Mostrando ítems 22-41 de 44
-
Humpback Whale’s Flukes Segmentation Algorithms
(Springer, 2021)Acceso restringidoPhoto-identification consists of the analysis of photographs to identify cetacean individuals based on unique characteristics that each specimen of the same species exhibits. The use of this tool allows us to carry out ... -
Implementación de una Red Neuronal Convolucional para la clasificación de ruido sísmico y señales sísmicas
(IEEE, 2021)Acceso restringidoThis article develops a detection methodology of seismic events based on Convolutional Neural Network in order to improve the processing of huge rawdata of seismograms. This is a trained model by using 45 thousand signals ... -
Information and communication technologies based teaching methodologies for Peruvian children with down syndrome
(Association for Computing Machinery, 2019)Acceso restringidoLearning disabilities are found in people that experience difficulties in the acquisition of basic intellectual skills, which are fundamental to succeeding at school, work or in life in general. An example of a learning ... -
Inserción de las empresas peruanas en las cadenas globales de suministro
(Consorcio de Universidades, 2016)La creciente importancia de la gestión de cadenas de suministro globales es resaltada por muchos investigadores y empresarios. La progresiva liberalización de las transacciones internacionales, los avances en los sistemas ... -
Integral and transformative engineering coursework in formative research for undergraduate curricula
(IEEE, 2016)Acceso restringidoAt several private Peruvian universities, formative research was not included in the curricula design. Here the problem to solve was the small number of undergraduate dissertations in Engineering. First, the coursework ... -
Is It Intelligent? A Systematic Review of Intelligence in the Most Cited Papers in IoT
(Springer, 2021)Acceso restringidoArtificial intelligence is a buzz word and even more when its accomplishments have challenged our intelligence. However, what is intelligence? Is there a consensus in its meaning for researchers and professionals? Is it ... -
Matching System for Animal-Assisted Therapy Based on the Levenshtein and Gale-Shapley Algorithms
(Springer, 2021)Acceso restringidoThis current research is based on the implementation of an algorithm that assigns pets, cats, or dogs to persons with depressive disorders such as low self-esteem. We found that even though different institutions have made ... -
Missed signals in the congruency between visual distracting cues and auditory goals
(ACM Association for Computing Machinery, 2018)Acceso restringidoPreviously, auditory-visual paradigms have been studied when the person is reading a text and receives a distractive sound stimulus. In this study, attention to sound stimulus is evaluated while receiving distractive visual ... -
Model Comparison for the Classification of Comments Containing Suicidal Traits from Reddit via NLP and Supervised Learning
(Springer, 2022)Acceso restringidoIn recent years, suicide has become one of the most critical issues regarding public health between teenagers and adults. On the other hand, the growth and wide-spread of social networks and mobile devices have allowed us ... -
Phishing video game to validate the principles of persuasion in university students
(Association for Information Systems, 2021)Acceso restringidoPhishing is a social engineering procedure in which a malicious actor impersonates a trusted third party with the intention of tricking the user into disclosing confidential information. Research on social engineering has ... -
PhyDaC - Stress Detection from Physiological Data in Cattle: Challenges in IoT
(CEUR-WS, 2022)Acceso abiertoStress in cattle is one of the main factors that generate economic losses in the livestock sector (e.g., reduction in the quality of milk or meat). In this field, heat stress has been considered as one of the main types ... -
Profits at the dawn of cybercrime-as-a-service
(IEEE, 2019)Acceso restringidoThe growing of Information and Communication Technologies (ICT) that has been experienced in recent years, has led to new and more sophisticated ways of doing business. Consequently, worldwide organized criminal groups ... -
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)Acceso restringidoSteganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ... -
QuinuaSmartApp: A Real-Time Agriculture Precision IoT Cloud Platform to Crops Monitoring
(Springer Science and Business Media Deutschland GmbH, 2024)Acceso restringidoIoT networks, cloud-based applications and the use of artificial intelligence models in precision agriculture present an important opportunity to increase production and optimize the use of water resources, which will allow ... -
Research gradualness matrix for undergraduate students in computing related careers
(IEEE, 2019)Acceso restringidoA drawback in the academic formation of some undergraduate students in computing related careers is the lack of preparation for improving their research skills. In the following article, we ought to know if the gradual ... -
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)Acceso restringidoChild malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ... -
Software Components of an IoT Monitoring Platform in Google Cloud Platform: A Descriptive Research and an Architectural Proposal
(Springer, 2020)Acceso restringidoAs software engineers, it is not an easy task to build a software solution that customers consider easy to use, cost-benefit balanced, secured, high available and prepared for high demand. There are many solutions for ... -
Source to source compiler for the automatic parallelization of JavaScript code
(IEEE, 2021)Acceso restringidoThis work focuses on the development of a source-to-source compiler for the automatic parallelization of JavaScript code. The proposed compiler transforms the input code to an AST (Abstract syntax tree). Afterward, we ... -
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(Springer, 2021)Acceso restringidoSteganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ... -
Tawa Pukllay Proof: New Method for Solving Arithmetic Operations with The Inca Yupana Using Pattern Recognition and Parallelism
(IEEE, 2022)Acceso restringidoYupana is an Inca device used for arithmetic operations. This article describes a new arithmetical system: Tawa Pukllay (TP), where arithmetic operations do not require mental calculations: no carries, no borrows, no ...