Mostrando 10 resultados de: 16
Filtros aplicados
Publisher
Communications in Computer and Information Science(2)
Iberian Conference on Information Systems and Technologies, CISTI(2)
International Journal of Applied Engineering Research(2)
ACM International Conference Proceeding Series(1)
ARPN Journal of Engineering and Applied Sciences(1)
Área temáticas
Física aplicada(5)
Ciencias de la computación(4)
Programación informática, programas, datos, seguridad(3)
Funcionamiento de bibliotecas y archivos(2)
Instrumentos de precisión y otros dispositivos(2)
Device control system for a smart home using voice commands: A practical case
Conference ObjectAbstract: The development of new voice-controlled home assistant devices such as Amazon Echo and Google Home hPalabras claves:Alexa, Home automation, IOT, Smart home, Voice recognitionAutores:Adrián Calvopiña, Pamela Orta, Sang Guun Yoo, Steven Guamán, Tapia FreddyFuentes:scopusData recovery on SSD storage devices using file carving
ArticleAbstract: This document aims to present the state of the art regarding the subject of data recovery in SSD stoPalabras claves:File Carving, Fragment recovery carving, Semantic carving, SSD devices with risk of physical damageAutores:Geovanni Ninahualpa Quiña, Sang Guun Yoo, Teresa GuardaFuentes:scopusData restoration and file carving
Conference ObjectAbstract: This document proposes to make a contribution to the conceptualization and implementation of data rePalabras claves:File Carving, Incidence factor, Metadata, Methodology, restorationAutores:Geovanni Ninahualpa Quiña, Javier F. Díaz, Piccirilli D., Sang Guun YooFuentes:googlescopusGaze Tracking: A Survey of Devices, Libraries and Applications
Conference ObjectAbstract: Gaze tracking is a technological discipline that offers an alternative interaction between human andPalabras claves:Eye tacking, Gaze tracking, IOTAutores:Edwin Cocha Toabanda, María Cristina Erazo, Sang Guun YooFuentes:scopusExperience in applying data mining techniques to musical content database to identify personality traits
ReviewAbstract: The present work takes a tour about the influence of music in the society and tries to find the connPalabras claves:Data Mining, MUSIC, OCEAN model, personalityAutores:Rubén Arroyo, Sang Guun Yoo, Xavier CampañaFuentes:scopusMalware detection and evasion with machine learning techniques: A survey
ArticleAbstract: Malware has become a powerful and sophisticated tool used by malicious users to compromise and harmPalabras claves:detection, evasión, Machine learning malware, Malware, ObfuscationAutores:Barriga J.J.A., Sang Guun YooFuentes:googlescopusIntegration of AI and IoT Approaches for Evaluating Cybersecurity Risk on Smart City
Book PartAbstract: Cities have adopted the smart city model based on decision-making to maintain their sustainability aPalabras claves:Bayesian network, DIGITAL TWIN, IOT, Risk analysis, smart cityAutores:Iván Ortiz, Luis Tello-Oquendo, Miguel Flores, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusIdentificación y control de vibraciones durante la perforación de formaciones heterogéneas mediante técnicas de inteligencia artificial
Master ThesisAbstract: En la región amazónica del Ecuador se perforan cientos de pozos de petróleo anualmente, concretamentPalabras claves:CONTROL DE VIBRACIONES, EXTRACCIÓN PETROLERA, Inteligencia ArtificialAutores:Luis Patricio Constante Gamboa, Sang Guun YooFuentes:rraaeMethod for the automated generation of a forest non forest map with LANDSAT 8 imagery by using artificial neural networks and the identification of pure class pixels
Conference ObjectAbstract: In this work, a methodology for the automated classification of Landsat 8 images from the integratioPalabras claves:artificial neural networks, Cross correlation coefficient, Forest non-forest map, LANDSAT 8 imageryAutores:Cindy-Pamela Lopez, Juan Carlos Tituana, Sang Guun YooFuentes:scopusSecurity Risk Analysis in IoT Systems through Factor Identification over IoT Devices
ArticleAbstract: IoT systems contribute to digital transformation through the development of smart concepts. However,Palabras claves:Attack graphs, IoT security, Risk analysis, Security modelingAutores:Barriga J.J.A., Iván Ortiz-Garcés, Jhonattan J. Barriga A., Roberto Omar Andrade, Sang Guun YooFuentes:googlescopus