Results 11 to 20 of about 18,702 (208)

Kalman reduced form and pole placement by state feedback for multi‐input linear systems over Hermite rings

open access: yesMathematical Methods in the Applied Sciences, Volume 46, Issue 15, Page 15996-16005, October 2023., 2023
A Kalman reduced form is obtained for linear systems over Hermite rings. This reduced form gives information of the set of assignable polynomials to a given linear system.
Miguel V. Carriegos, M. Teresa Trobajo
wiley   +1 more source

Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift

open access: yesComputational and Mathematical Methods, Volume 2023, Issue 1, 2023., 2023
In this article, we have carried out a case study to optimize the classification of the maliciousness of cybersecurity events by IP addresses using machine learning techniques. The optimization is studied focusing on time complexity. Firstly, we have used the extreme gradient boosting model, and secondly, we have parallelized the machine learning ...
M. V. Carriegos   +3 more
wiley   +1 more source

Natural Factorization of Linear Control Systems through Parallel Gathering of Simple Systems

open access: yesJournal of Mathematics, Volume 2023, Issue 1, 2023., 2023
Linear systems over vector spaces and feedback morphisms form an additive category taking into account the parallel gathering of linear systems. This additive category has a minimal exact structure and thus a notion of simple systems as those systems have no subsystems apart from zero and themselves.
M. V. Carriegos, Firdous A. Shah
wiley   +1 more source

A survey on methods, datasets and implementations for scene text spotting

open access: yesIET Image Processing, Volume 16, Issue 13, Page 3426-3445, 13 November 2022., 2022
Abstract Text Spotting is the union of the tasks of detection and transcription of the text that is present in images. Due to the various problems often found when retrieving text, such as orientation, aspect ratio, vertical text or multiple languages in the same image, this can be a challenging task.
Pablo Blanco‐Medina   +3 more
wiley   +1 more source

Towards explainability in robotics: A performance analysis of a cloud accountability system

open access: yesExpert Systems, Volume 39, Issue 9, November 2022., 2022
Abstract Understanding why a robot's behaviour was triggered is a growing concern to get human‐acceptable social robots. Every action, expected and unexpected, should be able to be explained and audited. The formal model proposed here deals with different information levels, from low‐level data, such as sensors' data logging; to high‐level data that ...
Francisco Javier Rodríguez‐Lera   +4 more
wiley   +1 more source

Spanish Airport Network Structure: Topological Characterization

open access: yesComputational and Mathematical Methods, Volume 2022, Issue 1, 2022., 2022
Applied complex network theory has become an interesting research field in the last years. Many papers have appeared on this subject dealing with the topological description of real transport systems, from small networks like the Italian airport network to the worldwide air transportation network.
M. T. Trobajo   +2 more
wiley   +1 more source

Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura

open access: yesPixel-Bit, 2022
La capacidad de una organización para hacer frente a las amenazas y vulnerabilidades depende en gran medida de los niveles de formación y concienciación en ciberseguridad de su personal, y en consecuencia, de la existencia de un marco de competencias que
Josu Mendivil Caldentey   +2 more
doaj   +1 more source

Auditoría y ciberseguridad

open access: yesAudit.AR, 2022
Este ensayo tiene como objetivo ser una discusión argumentativa sobre un tema de actualidad, que involucra tanto a las empresas, organismos reguladores y auditores externos, y por el cual el estos últimos están comenzando a adaptar la planificación y ejecución de alguno de sus trabajos.
Martín Santiago Ghirardotti   +1 more
openaire   +1 more source

Cómo promueven los Estados la ciberseguridad de las pymes

open access: yesInterfases, 2023
La tecnología ha producido cambios en la sociedad que han forjado la evolución de nuestra especie. Actualmente, la digitalización ha dado lugar al uso exponencial de tecnologías de la información y la comunicación, lo que ha generado un aumento en el ...
Olda Bustillos Ortega   +1 more
doaj   +1 more source

Tecnología de contenedores y su aplicación en el aprendizaje de ciberseguridad: una revisión sistemática de literatura

open access: yesReCIBE, 2021
El aprendizaje de Ciberseguridad por su naturaleza cambiante exige de procesos cognitivos tanto teóricos como prácticos, particularmente, los prácticos requieren de entornos hiperrealistas que no pongan en riesgo infraestructura real o acarreen ...
Roger Andres Chingo Esquivel   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy