Mostrando 10 resultados de: 15
Publisher
ACM International Conference Proceeding Series(2)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
2018 International Conference on Information and Computer Technologies, ICICT 2018(1)
Advances in Intelligent Systems and Computing(1)
International Journal of System Assurance Engineering and Management(1)
Área temáticas
Dirección general(5)
Métodos informáticos especiales(5)
Ciencias de la computación(3)
Instrumentos de precisión y otros dispositivos(3)
Economía(1)
Cloud Model for Purchase Management in Health Sector of Peru based on IoT and Blockchain
Conference ObjectAbstract: Purchase management of medical supplies is a critical and important process that affects the servicePalabras claves:BLOCKCHAIN, Health Sector, IOT, Pharmaceutics, Purchasing, Traceability, VisibilityAutores:Celiz R.C., David Mauricio, De La Cruz Y.E.Fuentes:scopusAspects of software quality applied to the process of agile software development: a systematic literature review
ReviewAbstract: The importance of quality in software engineering is widely recognized today. As a result, agile metPalabras claves:Agile model, agile practices, quality assurance, quality attributes, quality metrics, Systematic literature reviewAutores:David Mauricio, Gloria Arcos-MedinaFuentes:googlescopusConvolutional Neural Networks on Assembling Classification Models to Detect Melanoma Skin Cancer
ArticleAbstract: In 2020, there were more than 1.2 million new skin cancer diagnoses, and melanoma was the most recurPalabras claves:classification model, convolutional neural networks, deep learning, melanoma, Skin cancerAutores:Calderon-Vilca H.D., David Mauricio, Gamarra-Moreno J., Rodriguez C., Rodriguez D., Vega-Huerta H., Villanueva-Alarcón R.Fuentes:scopusDDoS attack detection mechanism in the application layer using user features
Conference ObjectAbstract: DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send largePalabras claves:DDoS, Denial of Service, dynamism user, features userAutores:Bravo S., David MauricioFuentes:scopusData science model for the evaluation of customers of rural savings banks without cbkp_redit history
Conference ObjectAbstract: The Data Science Model for the evaluation of clients of rural savings banks seeks to increase the cbPalabras claves:Cbkp_redit history, Data Analysis, data science, Evaluation model, Payment capacity, Rural saving bankAutores:David Mauricio, Gonzales A.D.C., Villantoy F.L.P.Fuentes:scopusDecision Support System for the Location of Retail Business Stores
Conference ObjectAbstract: Within the natural cycle of retail companies, there is the stage of expansion where one of the mostPalabras claves:Business analytics, decision support system, Location, Pbkp_redictive, SAP analytics cloud, Site retail selectionAutores:David Mauricio, Hernandez C., Loo N.Fuentes:scopusEnterprise architecture for cbkp_redits in the microfinance sector in Peru
Conference ObjectAbstract: The increase of bad debts portfolio of clients is a problem that occurs in companies in the microfinPalabras claves:Bad debts, BIAN, Enterprise architecture, Microfinance, TogafAutores:David Mauricio, Santos B., Ugarte D.Fuentes:scopusEssboard: A collaborative tool for using Essence in software development
Conference ObjectAbstract: Knowing the current situation and goals of software development is an activity that takes into accouPalabras claves:Collaborative software, Essence, SEMAT, Software development management, Software toolsAutores:David Mauricio, Mauricio-Delgadillo A., Quintanilla-Perez D.Fuentes:scopusDistributed denial of service attack detection in application layer based on user behavior
ArticleAbstract: Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, tPalabras claves:Application layer, Attack detection, Distributed denial of service, User behaviorAutores:Bravo S., David MauricioFuentes:scopusMouse features for DDoS attacks detection in the application layer
Conference ObjectAbstract: DDoS attacks are a threat to the security of the network. In recent years these attacks have been diPalabras claves:DDoS, Denial of Service, Mouse features, User dynamismAutores:Bravo S., David Mauricio, Moreno H.Fuentes:scopus