Now showing items 1-10 of 15
Matching System for Animal-Assisted Therapy Based on the Levenshtein and Gale-Shapley Algorithms
This current research is based on the implementation of an algorithm that assigns pets, cats, or dogs to persons with depressive disorders such as low self-esteem. We found that even though different institutions have made ...
Proposing a TAM-SDT-based model to examine the user acceptance of massively multiplayer online games
This study is focused on the massively multiplayer online games’ acceptance. In general, while specialized literature reveals that the online gaming industry has grown strongly in recent years, little evidence is identified ...
Virtual Reality Application to Teach Dangerous Over Exposure to UV Radiation
The high levels of ultraviolet (UV) radiation in Peru constitute a risk for the population, that does not give it the importance that it should and does not take adequate measures to protect against it and to prevent skin ...
Comparison of Classifiers Models for Prediction of Intimate Partner Violence
Intimate partner violence (IPV) is a problem that has been studied by different researchers to determine the factors that influence its occurrence, as well as to predict it. In Peru, 68.2% of women have been victims of ...
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications
Internet of Things (IoT) has posed new requirements to the underlying processing architecture, specially for real-time applications, such as event-detection services. Complex Event Processing (CEP) engines provide a powerful ...
SCUT sampling and classification algorithms to identify levels of child malnutrition
Child malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
Dimensionality reduction via an orthogonal autoencoder approach for hyperspectral image classification
(The International Society for Photogrammetry and Remote Sensing, 2020)
Nowadays, the increasing amount of information provided by hyperspectral sensors requires optimal solutions to ease the subsequent analysis of the produced data. A common issue in this matter relates to the hyperspectral ...
Proofs of the undecidability of stegananalysis techniques
Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...