Mostrando 10 resultados de: 19
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(5)
Communications in Computer and Information Science(4)
Applied Sciences (Switzerland)(1)
Computer Standards and Interfaces(1)
ENASE 2016 - Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering(1)
Área temáticas
Ciencias de la computación(6)
Funcionamiento de bibliotecas y archivos(6)
Farmacología y terapéutica(4)
Física aplicada(4)
Dirección general(3)
Área de conocimiento
Ingeniería de software(5)
Software(5)
Aprendizaje automático(3)
Ciencias de la computación(3)
Factores humanos y ergonomía(3)
A learning tool for the ISO/IEC 29110 standard: Understanding the project management of basic profile
Conference ObjectAbstract: The “best practices” of international software standards are considered important in improving the sPalabras claves:Iso, ISO/IEC 29110, Learning tool, Process improvement, project management, Serious Game, Standards, VSEAutores:Colomo-Palacios R., Mary Luz Sanchez-Gordón, O’Connor R.V., Sandra Sanchez-GordonFuentes:scopusA real-time algorithm for movement assessment using fuzzy logic of hip arthroplasty patients
Conference ObjectAbstract: The present work proposes a model of detection of movements of patients in rehabilitation of hip surPalabras claves:fuzzy logic, Hip arthroplasty patients, kinect, Movement assessment, Tele-rehabilitation platformAutores:César Byron Guevara Maldonado, Cesar Guevara, Janio Jadán-Guerrero, Mario González-Rodríguez, Nunes I.L., Patricia Acosta-Vargas, Rybarczyk Y.P., Sandra Sanchez-Gordon, Santiago Villarreal-Narvaez, Tania Calle-Jimenez, Wilmer Danilo Esparza Yánez, Wilmer EsparzaFuentes:googlescopusClassification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn agile approach to improve the usability of a physical telerehabilitation platform
ArticleAbstract: The goal of a telerehabilitation platform is to safely and securely facilitate the rehabilitation ofPalabras claves:Exploratory prototyping, Heuristic Evaluation, Software product quality, telemedicine, Telerehabilitation, Usability Evaluation, User interfaceAutores:César Byron Guevara Maldonado, Cesar Guevara, Hennry Mauricio Pilco, Janio Jadán-Guerrero, Jorge Luis Pérez Medina, Nunes I.L., Rybarczyk Y.P., Sandra Sanchez-Gordon, Tania Calle-JimenezFuentes:googlescopusAnalysis and improvement of the usability of a tele-rehabilitation platform for hip surgery patients
Conference ObjectAbstract: The Tele-Rehabilitation platform for hip surgery allows patients to carry out part of their rehabiliPalabras claves:Cognitive walkthrough evaluation, Heuristic Evaluation, Hip surgery, tele-rehabilitation, telemedicine, Usability Evaluation, Web user interfaceAutores:Cesar Guevara, Hennry Mauricio Pilco, Janio Jadán-Guerrero, Nunes I.L., Patricia Acosta-Vargas, Rybarczyk Y.P., Sandra Sanchez-Gordon, Santiago Villarreal-Narvaez, Tania Calle-Jimenez, Wilmer EsparzaFuentes:scopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Algorithm for Classifying Handwritten Signatures Using Convolutional Networks
ArticleAbstract: In this study, a model based on convolutional neural networks is proposed to quickly and efficientlyPalabras claves:classification algorithms, convolutional neural networks, IEEE transactions, Stacking, SUPPORT VECTOR MACHINES, Three-dimensional displays, TransformsAutores:Sandra Sanchez-GordonFuentes:scopusImproving usability with think aloud and focus group methods. A case study: an intelligent police patrolling system (i-PAT)
Conference ObjectAbstract: This study proposes the use of Think Aloud and Focus Group methods for evaluating the usability of tPalabras claves:Focus group, I-Path, Patrolling, Think Aloud, UsabilityAutores:Cesar Guevara, Doris Tutillo-Sanchez, Janio Jadán-Guerrero, Luis Salvador-Ullauri, Nunes I.L., Patricia Acosta-Vargas, Patricio Lara-Alvarez, Sandra Sanchez-Gordon, Tania Calle-JimenezFuentes:scopusEvaluation of the implementation of a subset of ISO/IEC 29110 Software Implementation process in four teams of undergraduate students of Ecuador. An empirical software engineering experiment
ArticleAbstract: The competitiveness of software development companies depends on their ability to offer software proPalabras claves:empirical software engineering, Experimentation, ISO/IEC 25000, ISO/IEC 29110, Software implementation process, Software qualityAutores:Jorge Villarroel-Ramos, Luis Alberto Castillo-Salinas, Mary Luz Sanchez-Gordón, Sandra Sanchez-GordonFuentes:scopus