Mostrando 10 resultados de: 18
Filtros aplicados
Publisher
Research Anthology on Agile Software, Software Development, and Testing(3)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020(1)
Advances in Intelligent Systems and Computing(1)
CISCI 2008 - Septima Conferencia Iberoamericana en Sistema, Cibernetica e Informatica 5to SIECI 2008, 3er Simposium Internacional en Comunicacion del Conocimiento y Conferencias, CCC 2008 - Memorias(1)
Área temáticas
Dirección general(3)
Métodos informáticos especiales(3)
Programación informática, programas, datos, seguridad(3)
Educación superior(2)
Enfermedades(2)
Cloud Model for Purchase Management in Health Sector of Peru based on IoT and Blockchain
Conference ObjectAbstract: Purchase management of medical supplies is a critical and important process that affects the servicePalabras claves:BLOCKCHAIN, Health Sector, IOT, Pharmaceutics, Purchasing, Traceability, VisibilityAutores:Celiz R.C., David Mauricio, De La Cruz Y.E.Fuentes:scopusA Model Based on Data Envelopment Analysis for the Measurement of Productivity in the Software Factory
Book PartAbstract: Productivity in software factories is very important because it allows organizations to achieve greaPalabras claves:Autores:Castañeda Vargas P.S., David MauricioFuentes:scopusA model of compaction of irregular objects
Conference ObjectAbstract:Palabras claves:Autores:David Mauricio, Rivera L.A., Torres F.Fuentes:scopusDeep Learning and Transfer Learning Methods to Effectively Diagnose Cervical Cancer from Liquid-Based Cytology Pap Smear Images
ArticleAbstract: As cervical cancer is considered one of the leading causes of death for women globally, different scPalabras claves:Cáncer cervical, deep learning, liquid-based cytology pap smear, ResNet101V2, ResNet50V2, Transfer learningAutores:Ccopa A., David Mauricio, Diaz E., Valcarcel S., Villoslada V., Wong L.R.Fuentes:scopusFactors of technology transfer and its relation to success
ArticleAbstract: Technology transfer is the process by which science and technology developed in universities are traPalabras claves:technology transfer, Technology transfer factor technology, Transfer success, University-industryAutores:David Mauricio, Ximena López-MendozaFuentes:googlescopusDilud: A Mobile Application to Reinforce Rote Learning in Elementary School Children with Attention Deficit Hyperactivity Disorder
ArticleAbstract: Attention and hyperactivity disorder is one of the most frequent chronic conditions in children, whiPalabras claves:attention deficit hyperactivity disorder (ADHD), CHILDREN, Cognitive training, Mobile application, WISC-VAutores:Casas M., Celis G., David Mauricio, Santisteban J.Fuentes:scopusMulti-agent system to measure the reliability of the dimensions of availability and reliability of a system involving critical ERP system, database and OS
Conference ObjectAbstract: This paper plans to develop a model for the "Multi-agent system to measure the trustworthiness in thPalabras claves:Critical systems, Enterprise resource planning systems, Indicators, Software agentsAutores:David Mauricio, Hermoza A., Rivera L.A.Fuentes:scopusNeural networks to pbkp_redict dropout at the universities
ArticleAbstract: The university student's dropout is a problem that affects the governments, institutions and studentPalabras claves:Multilayer perceptrom, Neural networks, pbkp_rediction, Radial basis function, university student desertionAutores:Alban M., David MauricioFuentes:scopusNew Factors Affecting Productivity of the Software Factory
Book PartAbstract: Productivity is very important because it allows organizations to achieve greater efficiency and effPalabras claves:Autores:Castañeda Vargas P.S., David MauricioFuentes:scopusNew features of user's behavior to distributed denial of service attacks detection in application layer
ArticleAbstract: Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, tPalabras claves:Application layer, Attack detection, DDoS, User's behaviorAutores:Bravo S., David MauricioFuentes:scopus