Buscar
Mostrando ítems 1-10 de 17
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)
Acceso restringido
Child malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ...
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic Professionals, 2020)
Acceso abierto
In the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ...
Software Components of an IoT Monitoring Platform in Google Cloud Platform: A Descriptive Research and an Architectural Proposal
(Springer, 2020)
Acceso restringido
As software engineers, it is not an easy task to build a software solution that customers consider easy to use, cost-benefit balanced, secured, high available and prepared for high demand. There are many solutions for ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)
Acceso restringido
Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...
Are information systems and computer science overlapping more and more?
(ACM Association for Computing Machinery, 2020)
Acceso abierto
In this research, we posit the importance of including Computer Science topics in undergraduate Information Systems courses. A review of the existing literature has mentioned the importance of learning some Computer Science ...
Coping Responses During the COVID-19 Pandemic: A Cross-Cultural Comparison of Russia, Kyrgyzstan, and Peru
(Russsian Psychological Society, 2020)
Acceso abierto
Background. The COVID-19 pandemic has subjected people around the world to severe stress, evoking a variety of coping responses. Coping responses can be broadly classified into four strategies: 1) problem-focused coping; ...
A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter
(Science and Information Organization, 2020)
Acceso abierto
Cyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ...