Search
Now showing items 181-190 of 243
Behaviour of steel-fibre-reinforced normal-strength concrete slender columns under cyclic loading
(2012-03-28)
The inclusion of ductility requirements is necessary to guarantee a safety design of concrete structures subjected to unexpected and/or reversal loads. It is important to outline that plastic hinges may develop in columns ...
Evolución de las Redes Sociales en Latinoamérica a Nivel Corporativo
(V Jornada de Campus VirtualesV Jornada de Campus Virtuales, 10/01/2014)
A lo largo de las últimas décadas hemos asistido a una evolución de las funcionalidades y posibilidades que nos ha ido ofreciendo Internet, primero de la mano de la Web 1.0, posteriormente de la Web 2.0 que disfrutamos ...
A Fuzzy Logic Approach To Modelling The Passengers’ Flow And Dwelling Time
(2012-07-04)
The passengers’ flow and station dwell time estimation are important tasks for mass transit planning. However, classical methods are difficult to apply into some practical achievements. This paper presents a new approach ...
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)
SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ...
Computing Image Descriptors from Annotations Acquired from External Tools
(11/28/2015)
Visual descriptors are widely used in several recognition and classification tasks in robotics. The main challenge for these tasks is to find a descriptor that could represent the image content without losing representative ...
Cramér-Rao Bound Study of Multiple Scattering Effects in Target Localization
(2012-07-04)
The target position information contained in scattering data is explored in the context of the scalar Helmholtz operator for the basic two-point scatterer system by means of the statistical estimation framework of the ...
Implementación de algoritmo en el Lenguaje R para extraer los datos de los Perfiles en Google Scholar utilizando la técnica web Scraping de Minería de datos
(Congreso Compdes 2017, HondurasCongreso Compdes 2017, Honduras, 07/01/2017)
Este articulo muestra diferentes pruebas realizadas para extraer datos de los perfiles y publicaciones de una afiliación en Google Scholar utilizando la técnica de Web Scrpaing de minería de texto no estructurada. El ...
An Adaptive Mechanism to Protect Databases against SQL Injection
(2015-07-01)
The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ...
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ...
Environment to Support Mobile Learning
(2010-07-02)
Este trabajo presenta la propuesta de diseño de una arquitectura para el desarrollo de una plataforma educativa de aprendizaje móvil, m-learning, que facilite a los usuarios interactuar de forma eficiente, flexible y ...