Listar Ingeniería de Sistemas por título
Mostrando ítems 60-79 de 85
-
Phishing video game to validate the principles of persuasion in university students
(Association for Information Systems, 2021)Acceso restringidoPhishing is a social engineering procedure in which a malicious actor impersonates a trusted third party with the intention of tricking the user into disclosing confidential information. Research on social engineering has ... -
PhyDaC - Stress Detection from Physiological Data in Cattle: Challenges in IoT
(CEUR-WS, 2022)Acceso abiertoStress in cattle is one of the main factors that generate economic losses in the livestock sector (e.g., reduction in the quality of milk or meat). In this field, heat stress has been considered as one of the main types ... -
Prediction of binding miRNAs involved with immune genes to the SARS-CoV-2 by using sequence features extraction and One-class SVM
(Elsevier, 2022)Acceso abiertoThe prediction of host human miRNA binding to the SARS-COV-2-CoV-2 RNA sequence is of particular interest. This biological process could lead to virus repression, serve as biomarkers for diagnosis, or as potential treatments ... -
Profit scoring for credit unions using the multilayer perceptron, XGBoost and TabNet algorithms: Evidence from Peru
(Elsevier, 2023)Acceso restringidoCredit unions are growing microfinance institutions that base their lending decisions on the judgment of their credit analysts. Therefore, the purpose of this paper is to design 6 profit scoring models, capable of predicting ... -
Profits at the dawn of cybercrime-as-a-service
(IEEE, 2019)Acceso restringidoThe growing of Information and Communication Technologies (ICT) that has been experienced in recent years, has led to new and more sophisticated ways of doing business. Consequently, worldwide organized criminal groups ... -
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)Acceso restringidoSteganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ... -
Proposing a TAM-SDT-based model to examine the user acceptance of massively multiplayer online games
(MDPI, 2021)Acceso abiertoThis study is focused on the massively multiplayer online games’ acceptance. In general, while specialized literature reveals that the online gaming industry has grown strongly in recent years, little evidence is identified ... -
Quality Management, Knowledge Creation, and Innovation Performance: Insights from Ecuador
(Taylor & Francis Group, 2023)Acceso restringidoThis paper aims to analyze the relationship between quality management, knowledge management, and innovative performance, and their impact on organizational performance in an emerging country. A sample of 349 Ecuadorian ... -
QuinuaSmartApp: A Real-Time Agriculture Precision IoT Cloud Platform to Crops Monitoring
(Springer Science and Business Media Deutschland GmbH, 2024)Acceso restringidoIoT networks, cloud-based applications and the use of artificial intelligence models in precision agriculture present an important opportunity to increase production and optimize the use of water resources, which will allow ... -
Recent trends in movement ecology of animals and human mobility
(BioMed Central Ltd, 2022)Acceso abiertoMovement is fundamental to life, shaping population dynamics, biodiversity patterns, and ecosystem structure. In 2008, the movement ecology framework (MEF Nathan et al. in PNAS 105(49):19052–19059, 2008) introduced an ... -
Research gradualness matrix for undergraduate students in computing related careers
(IEEE, 2019)Acceso restringidoA drawback in the academic formation of some undergraduate students in computing related careers is the lack of preparation for improving their research skills. In the following article, we ought to know if the gradual ... -
Route Planning using Wireless Sensor Network for Garbage Collection in COVID-19 Pandemic
(Science and Information Organization, 2022)Acceso abiertoGarbage collection is a responsibility faced by all cities and, if not properly carried out, can generate greater costs or sanitary problems. Considering the sanitary situation due to the COVID-19 pandemic, it is necessary ... -
Sci tech-reading and writing the english of science and technology. First edition. Karl Drobnic, Sharon Abrams and Marjorie Morray
(Wiley-Blackwell, 1981)Acceso restringido -
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)Acceso restringidoChild malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ... -
Semiotic Alternations with the Yupana Inca Tawa Pukllay in the Gamified Learning of Numbers at a Rural Peruvian School
(International Forum of Educational Technology and Society, National Taiwan Normal University, 2023)Acceso restringidoYupana Inca Tawa Pukllay (YITP) is a ludic didactic resource based on semiotic alternation that, using the reading of numbers in the Inca numeral system, improves its equivalent Indo-Arabic reading. Twelve children from ... -
Software Components of an IoT Monitoring Platform in Google Cloud Platform: A Descriptive Research and an Architectural Proposal
(Springer, 2020)Acceso restringidoAs software engineers, it is not an easy task to build a software solution that customers consider easy to use, cost-benefit balanced, secured, high available and prepared for high demand. There are many solutions for ... -
Source to source compiler for the automatic parallelization of JavaScript code
(IEEE, 2021)Acceso restringidoThis work focuses on the development of a source-to-source compiler for the automatic parallelization of JavaScript code. The proposed compiler transforms the input code to an AST (Abstract syntax tree). Afterward, we ... -
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(Springer, 2021)Acceso restringidoSteganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ... -
Systematic mapping of the literature on Secure Software Development
(IEEE, 2021)Acceso abiertoThe accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ... -
Tawa Pukllay Proof: New Method for Solving Arithmetic Operations with The Inca Yupana Using Pattern Recognition and Parallelism
(IEEE, 2022)Acceso restringidoYupana is an Inca device used for arithmetic operations. This article describes a new arithmetical system: Tawa Pukllay (TP), where arithmetic operations do not require mental calculations: no carries, no borrows, no ...