Buscar
Mostrando ítems 21-30 de 43
Implementación de una Red Neuronal Convolucional para la clasificación de ruido sísmico y señales sísmicas
(IEEE, 2021)
Acceso restringido
This article develops a detection methodology of seismic events based on Convolutional Neural Network in order to improve the processing of huge rawdata of seismograms. This is a trained model by using 45 thousand signals ...
Design and Implementation of a Prototype Based in 2D Blocks with Multiple Shapes for Teaching Computer Programming to Visually Impaired Children
(Institute of Electrical and Electronics Engineers Inc., 2021)
Acceso restringido
This paper proposes the implementation of a prototype based in physical 2D blocks with multiple shapes for teaching computer programming to visually impaired children. The image processing techniques used, the source code ...
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(Springer, 2021)
Acceso restringido
Steganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ...
Comparison of Supervised Learning Models for the Prediction of Coronary Artery Disease
(Association for Computing Machinery, 2021)
Acceso abierto
Cardiovascular diseases and Coronary Artery Disease (CAD) are the leading causes of mortality among people of different ages and conditions. The use of different and not so invasive biomarkers to detect these types of ...
Is It Intelligent? A Systematic Review of Intelligence in the Most Cited Papers in IoT
(Springer, 2021)
Acceso restringido
Artificial intelligence is a buzz word and even more when its accomplishments have challenged our intelligence. However, what is intelligence? Is there a consensus in its meaning for researchers and professionals? Is it ...
Phishing video game to validate the principles of persuasion in university students
(Association for Information Systems, 2021)
Acceso restringido
Phishing is a social engineering procedure in which a malicious actor impersonates a trusted third party with the intention of tricking the user into disclosing confidential information. Research on social engineering has ...
Source to source compiler for the automatic parallelization of JavaScript code
(IEEE, 2021)
Acceso restringido
This work focuses on the development of a source-to-source compiler for the automatic parallelization of JavaScript code. The proposed compiler transforms the input code to an AST (Abstract syntax tree). Afterward, we ...
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)
Acceso restringido
Child malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)
Acceso restringido
Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...