Mostrando 4 resultados de: 4
Publisher
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(2)
Advances in Intelligent Systems and Computing(1)
Proceedings of SPIE - The International Society for Optical Engineering(1)
Área temáticas
Ciencias de la computación(2)
Programación informática, programas, datos, seguridad(2)
Dirección general(1)
Interacción social(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(2)
Aprendizaje automático(1)
Ingeniería de software(1)
Innovación(1)
Pedagogía(1)
Origen
scopus(4)
Application of machine learning as a solution in business systems
ArticleAbstract: Economic development has been driven by great technological innovations, companies try to take advanPalabras claves:Artificial Intelligence, Business intelligence, Machine learningAutores:Daniel I. Quirumbay, George Ramírez, Geovanny Méndez, Jaime Orozco, Kevin Gómez, Marjorie Coronel, Mervy Magallan, Teresa GuardaFuentes:scopusGlossalab.Edu project: Integrating and co-creating learning through interdisciplinary glossaries
ArticleAbstract: The glossaLAB.edu project aimed at the development, in educational contexts, of tools for conceptualPalabras claves:Information studies, Interdisciplinarity, knowledge integration, Systems scienceAutores:Carolina Lituma, Daniel I. Quirumbay, Díez-Gutiérrez E.J., Iván A. Coronel, José María Díaz-Nafría, Maria Fernanda Augusto, Teresa GuardaFuentes:scopusTraffic Analysis in Data Networks: Design and Development of Monitor Software NMTraffic
Conference ObjectAbstract: Data networks are part of the development of communication technologies. It is important to know thePalabras claves:Data Traffic, Data transmission, Network data analysis, Network scanning, NETWORKING, Software monitoringAutores:Daniel I. Quirumbay, Jorge Isaac Avilés, Lidice Haz, Ximena AcaroFuentes:scopusThreats and risks to information security: A practical analysis of free access wireless networks
Conference ObjectAbstract: Nowadays, there is an ever-growing need to investigate, consult and communicate through the internetPalabras claves:802.11 protocol, Computer security, CYBERCRIME, ETHICAL HACKING, IT audit, PentestingAutores:Daniel I. Quirumbay, Gromaszek K., Iván A. Coronel, Kozbekova A., M. M. Bayas, Ronald H. Rovira, Tleshova A.Fuentes:scopus