Regresar
Mostrando 10 resultados de: 1701
Filtros aplicados
Subtipo de publicación
Conference Object(551)
Bachelor Thesis(473)
Article(340)
Other(216)
Master Thesis(95)
Publisher
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(100)
Communications in Computer and Information Science(44)
Advances in Intelligent Systems and Computing(41)
Universidad de las Fuerzas Armadas ESPE. Carrera de Ingeniería en Sistemas e Informática.(38)
Universidad de las Fuerzas Armadas ESPE. Carrera de Ingeniería en Electrónica y Telecomunicaciones.(35)
Área temáticas
Ciencias de la computación(877)
Métodos informáticos especiales(511)
Programación informática, programas, datos, seguridad(413)
Física aplicada(351)
Funcionamiento de bibliotecas y archivos(329)
Área de conocimiento
Aprendizaje automático(199)
Ingeniería de software(176)
Red informática(176)
Visión por computadora(139)
Inteligencia artificial(107)
3D environment mapping using the Kinect V2 and path planning based on RRT algorithms
ArticleAbstract: This paper describes a 3D path planning system that is able to provide a solution trajectory for thePalabras claves:3D modeling, Computational geometry, mobile robotics, PATH PLANNING, Point cloud registration, RGB-D segmentation, RRT, RRT ⋆Autores:Stephanie G. Morales, Wilbert G. AguilarFuentes:googlescopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Better Infected Hosts Detection Combining Ensemble Learning and Threat Intelligence
Conference ObjectAbstract: Ensemble learning techniques have been successfully proposed and used to improve threats detection iPalabras claves:CYBERSECURITY, ensemble learning, intrusion detection, MalwareAutores:Garcia S., Javier F. Díaz, Venosa P.Fuentes:scopusA Brief Review on Instance Selection Based on Condensed Nearest Neighbors for Data Classification Tasks
Conference ObjectAbstract: The condensed nearest neighbor (CNN) classifier is one of the techniques used and known to perform rPalabras claves:classification, Nearest neighbor algorithms, PrototypesAutores:Ana C. Umaquinga-Criollo, Cabrera-Alvarez E.N., Diego Hernán Peluffo-Ordóñez, Fernández-Fernández Y., Leandro L. Lorente-LeyvaFuentes:scopusA Chatterbot Based on Genetic Algorithm: Preliminary Results
Conference ObjectAbstract: Chatterbots are programs that simulate an intelligent conversation with people. They are commonly usPalabras claves:ChatBot, Evolutionary programming, Natural Language processingAutores:Cristian Orellana, Diego Hernán Peluffo-Ordóñez, Jeremy Yazán, Lorena Guachi-Guachi, Martín TobarFuentes:scopusA Comparison of Cybersecurity Risk Analysis Tools
Conference ObjectAbstract: This paper presents ongoing work of a decision aiding software intended to support cyber risk and cyPalabras claves:Cibersecurity, Decision aiding, Risk analysisAutores:Basto-Fernandes V., Gabriela Roldán-Molina, Mario Almache-Cueva, Silva-Rabadao C., Yevseyeva I.Fuentes:scopusA Comparison of Machine Learning and Classical Demand Forecasting Methods: A Case Study of Ecuadorian Textile Industry
Conference ObjectAbstract: This document presents a comparison of demand forecasting methods, with the aim of improving demandPalabras claves:Classical methods, Demand forecasting methods, Forecast error, Machine learning, TEXTILE INDUSTRYAutores:Alemany M.M.E., Diego Hernán Peluffo-Ordóñez, Israel D. Herrera-Granda, Leandro L. Lorente-LeyvaFuentes:scopusA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA Computer Vision Model to Identify the Incorrect Use of Face Masks for COVID-19 Awareness
ArticleAbstract: Face mask detection has become a great challenge in computer vision, demanding the coalition of techPalabras claves:Artificial Intelligence, Computer Vision, covid-19, deep learning, face mask recognition, image classification, object detectionAutores:Anthony Crespo, Diego Hernán Peluffo-Ordóñez, Fabricio Crespo, Manuel Eugenio Morocho-Cayamcela, Sierra-Martínez L.M.Fuentes:scopus