Browsing Ingeniería en computación e informática by Title
Now showing items 173-192 of 229
-
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
Red Iberoamericana de apoyo a los procesos de enseñanza-aprendizaje de competencias profesionales a través de entornos Ubicuos y Colaborativos
(06/01/2014)La nueva economía supone nuevos retos para los trabajadores, ya que se requieren niveles más elevados de conocimiento, actualización continua y permanente de la información, adquisición de nuevas competencias tecnológicas, ... -
Redes Sociales su impacto en la Educación Superior: Caso de estudio Universidad Tecnológica de Panamá
(03/28/2016)La incorporación de las Tecnologías de la Información y Comunicación (TIC) a la edu- cación han trazado nuevas demandas hacia los educadores, los usuarios, las instituciones educativas y en general a las distintas esferas ... -
Redes Sociales su impacto en la Educación Superior: Caso de estudio Universidad Tecnológica de Panamá
(Campus Virtuales, Vol. V, Num. 1, pp. 84-90.Campus Virtuales, Vol. V, Num. 1, pp. 84-90., 03/01/2016)La incorporación de las Tecnologías de la Información y Comunicación (TIC) a la educación han trazado nuevas demandas hacia los educadores, los usuarios, las instituciones educativas y en general a las distintas esferas ... -
Relation of the research indicators of the university rankings and the measurement of scientific production in Open Access
(2023-07-19)The evolution of university rankings over the years has been characterized by trying to respond to the shortcomings of their measurement systems and guiding the choice of students and academics in search of quality in ... -
Reuse of use cases diagrams: an approach based on ontologies and semantic web technologies
(2012-07-04)Software reuse is defined as the use of any artifact, or part thereof, created before, on a new Project. This practice has significant benefits in reducing costs and increasing quality and productivity in software development. ... -
Robot Semantic Localization Through CNN Descriptors
(11/12/2017)Semantic localization for mobile robots involves an accurate determination of the kind of place where a robot is located. Therefore, the representation of the knowledge of this place is crucial for the robot. In this paper ... -
RSOA basado en ontologías para entornos virtuales en la educación superior panameña
(Virtual Educa 2014Virtual Educa 2014, 07/01/2014)En la búsqueda de información en la Web hay diversos factores que dan como resultado que un alto porcentaje de los recursos recuperados con una herramienta de búsqueda no cumplan con las condiciones ... -
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
(05/01/2011)During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ... -
Sagnac loop in ring resonators for tunable optical filters
(08/01/2005)General filter architecture using co-and counterpropagation signals are studied. A specific configuration based on a Sagnac loop within a ring resonator is analyzed. Novel tuning, apart from conventional tuning,is achieved ... -
Scene classification based on semantic labeling
(07/14/2015)Finding an appropriate image representation is a crucial problem in robotics. This problem has been classically addressed by means of computer vision techniques, where local and global features are used. The selection ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ... -
Semantic Localization of a Robot in a Real Home
(11/21/2018)In social robotics, it is important that a mobile robot knows where it is because it provides a starting point for other activities such as moving from one room to another. As a contribution to solving this problem in the ... -
Semi-supervised 3D object recognition through CNN labeling
(04/01/2018)Despite the outstanding results of Convolutional Neural Networks (CNNs) in object recognition and classification, there are still some open problems to address when applying these solutions to real-world problems. Specifically, ... -
Services through NFC technology in AmI Environment
(11/24/2008)The use of Near Field Communications technology in AmI environments is a further step in achieving our particular proposal of the vision of Ubiquitous Computing and Ambient Intelligence. This work explores the single use ... -
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(2009-07-01)One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ... -
Sistema de Evaluación y Seguimiento Académico y su Aporte a los Procesos de re-acreditación de Carreras en la Universidad Tecnológica de Panam
(Engineering Innovations for Global Sustainability: Proceedings of the 14th Latin American and Caribbean Conference for Engineering and TechnologyEngineering Innovations for Global Sustainability: Proceedings of the 14th Latin American and Caribbean Conference for Engineering and Technology, 07/22/2016) -
Sistema Nefelometrico Auto-referenciado Inmune a Fuentes de Luz Externas
(02/11/2018)Este trabajo describe los conceptos y procedimientos aplicados para el dise no e implementación de un sensor de turbiedad de agua. El mismo se dise na con la finalidad de brindarnos lecturas de turbiedad del agua. El sensor ... -
A social software for mobile learning
(2012-07-04)The traditional teaching methods of the Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the student, for ...