Mostrando 6 resultados de: 6
Subtipo de publicación
Conference Object(6)
Publisher
Advances in Intelligent Systems and Computing(2)
ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems(1)
Proceedings of the 18th Mediterranean Electrotechnical Conference: Intelligent and Efficient Technologies and Services for the Citizen, MELECON 2016(1)
Proceedings of the 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2016 - Part of SummerSim 2016 Multiconference(1)
Smart Innovation, Systems and Technologies(1)
Área temáticas
Programación informática, programas, datos, seguridad(2)
Administración pública y ciencia militar(1)
Ciencia militar(1)
Ciencias de la computación(1)
Conocimiento(1)
Área de conocimiento
Ciencias de la computación(3)
Inteligencia artificial(1)
Lógica difusa(1)
Tecnología educativa(1)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusExpert Nutritional System for Military Athletes Based on Fuzzy Logic and Inferential Statistics
Conference ObjectAbstract: Athletic performance seeks to enhance the physical and mental state of the athlete, and it is implicPalabras claves:Athletes performance, Fuzzification, fuzzy logic, Inference engine, Inferential StatisticsAutores:Cristian Bejarano, Diana Vallejos, Hernán Aules, Michelle Torres, Tapia FreddyFuentes:scopusSoftware-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments
Conference ObjectAbstract: A software-based computing platform has been constructed as an experimental topology with the goal tPalabras claves:DDoS attacks, firewall rules, Virtual NetworksAutores:Hernán Aules, Miguel Morales, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusUse of e-Health as an Accessibility and Management Strategy Within Health Centers in Ecuador Through the Implementation of a Progressive Web Application as a Tool for Technological Development and Innovation
Conference ObjectAbstract: In Ecuador in recent years there has been a strong investment in the field of health, due to the incPalabras claves:CLOUD COMPUTING, e-Health, Medical Appointments, Progressive web appsAutores:Diego Terán, Hernán Aules, Joel Rivera, Sylvia Moncayo, Tapia FreddyFuentes:scopusOn the development of strategic games based on a Semiotic analysis: A case study of an optimized Tic-Tac-Toe
Conference ObjectAbstract: A picture can express something instead of having a thousand words that cannot do it. This phrase, wPalabras claves:Artificial Intelligence, Semiotic models for videogames, semiotics, Tic-Tac-Toe, VIDEOGAMESAutores:Ana Tacuri, CÉSAR VILLACÍS, Édgar Salguero Dorokhin, Hernán Aules, Margarita Zambrano, Mónica Santillán Trujillo, Walter FuertesFuentes:scopusPlayful and interactive environment-based augmented reality to stimulate learning of children
Conference ObjectAbstract: Our study is about how to create educational software using Augmented Reality combined with Bloom'sPalabras claves:Augmented reality, Bloom Taxonomy, Educational software, vuforiaAutores:Ana Tacuri, CÉSAR VILLACÍS, Claudia Arcos, Claudia Elizabeth Arcos Obando, Hernán Aules, Margarita Zambrano, Tatiana Noboa, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopus