Listar LCC - Artículos por título
Mostrando ítems 121-140 de 244
-
Immune system for the internet of things using edge technologies
(2018-08-29)The Internet of Things (IoT) and Edge Computing are starting to go hand in hand. By providing cloud services close to end-users, edge paradigms enhance the functionality of IoT deployments, and facilitate the creation ... -
Improved detection of small objects in road network sequences using CNN and super resolution
(2021)The detection of small objects is one of the problems present in deep learning due to the context of the scene or the low number of pixels of the objects to be detected. According to these problems, current pre-trained ... -
Improving the fitness function of an evolutionary suspense generator through sentiment analysis
(IEEE, 2021-03-08)The perception of suspense in stories is affected not only by general literary aspects like narrative structure and linguistic features, but also by anticipation and evocation of feelings like aversion, disgust or empathy. ... -
Injecting domain knowledge in multi-objective optimization problems: A semantic approach.
(Elsevier, 2021-05-15)In the field of complex problem optimization with me-taheuristics, semantics has been used for modeling different aspects, such as: problem characterization, parameters, decision-maker's preferences, or algorithms. However, ... -
Integrating Blockchain in safety-critical systems: an application to the nuclear industry
(IEEE, 2020-10)Safety-Critical Systems (SCSs) often manage sensible data that must be trustworthy, especially in many cases in which different actors participate whose interests may not coincide. Blockchain is a disruptive technology ... -
Integrating FMI and ML/AI models on the open-sourcedigital twin framework OpenTwins
(Wiley, 2024-03-24)The realm of digital twins is experiencing rapid growth and presents a wealth ofopportunities for Industry 4.0. In conjunction with traditional simulation meth-ods, digital twins offer a diverse range of possibilities. ... -
Integrating river basin DSSs with model checking.
(Springer, 2017-10-24)This paper presents a Decision Support System (DSS) based on formal methods for the management of complex river basins in flood scenarios. The DSS is the result of integrating two different DSSs. First, a DSS for dam ... -
Intelligent Testing of Traffic Light Programs: Validation in Smart Mobility Scenarios.
(Wiley, 2016-02-08)In smart cities, the use of intelligent automatic techniques to find efficient cycle programs of traffic lights is becoming an innovative front for traffic flow management. However, this automatic programming of traffic ... -
Introducing passive strategies in the initial stage of the design to reduce the energy demand in single-family dwellings.
(Elsevier, 2021-06-15)This article analyses the influence of various variables defined in the initial stage of the design of a single-family dwelling on its energy efficiency. It also studies the possible contribution of a computer tool in ... -
Investigaciones en el sector l1 del complexo arqueológico dos Perdigões (Reguengos de Monsaraz, Portugal): cronología y temporalidad de dos recintos de fosos calcolíticos (f1 y f2)
(Ediciones Universidad de Salamanca, 2022)Resumen: La Universidad de Málaga –uma– ha llevado a cabo actividades arqueológicas en el Complexo Arqueológico dos Perdigões, Reguengos de Monsaraz, en el Alentejo portugués desde 2008 a 2016. Se han realizado prospecciones ... -
Kafka-ML: Connecting the data stream with ML/AI frameworks
(Elsevier, 2022-01-01)Machine Learning (ML) and Artificial Intelligence (AI) depend on data sources to train, improve, and make predictions through their algorithms. With the digital revolution and current paradigms like the Internet of Things, ... -
KNIT: Ontology reusability through knowledge graph exploration
(Elsevier, 2023)Ontologies have become a standard for knowledge representation across several domains. In Life Sciences, numerous ontologies have been introduced to represent human knowledge, often providing overlapping or conflicting ... -
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing
(2022-11)Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. ... -
Low Disruption Transformations on Cyclic Automata
(IOS Press, 2010)We extend the edit operators of substitution, deletion, and insertion of a symbol over a word by introducing two new operators (partial copy and partial elimination) inspired by biological gene duplication. We define a ... -
Maintaining flexibility in smart grid consumption through deep learning and deep reinforcement learning
(Elsevier, 2023-03-02)The smart grid concept is key to the energy revolution that has been taking place in recent years. Smart Grids have been present in energy research since their emergence. However, the scarcity of data from different energy ... -
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash)
(Elsevier, 2024)In the last few years, malware analysis has become increasingly important due to the rise of sophisticated cyberattacks. One of the objectives of this cybersecurity branch is to find similarities between different files ... -
Managing and Deploying Distributed and Deep Neural Models Through Kafka-ML in the Cloud-to-Things Continuum
(IEEE, 2021-08)The Internet of Things (IoT) is constantly growing, generating an uninterrupted data stream pipeline to monitor physical world information. Hence, Artificial Intelligence (AI) continuously evolves, improving life quality ... -
Melomics: A Case-Study of AI in Spain
(Association for the Advancement of Artificial Intelligence, 2013-10)Traditionally focused on good old-fashioned AI and robotics, the Spanish AI community holds a vigorous computational intelligence substrate. Neuromorphic, evolutionary, or fuzzylike systems have been developed by ... -
Metaheuristic Approaches to the Placement of Suicide Bomber Detectors.
(Springer Nature, 2017-05-15)Suicide bombing is an infamous form of terrorism that is becoming increasingly prevalent in the current era of global terror warfare. We consider the case of targeted attacks of this kind, and the use of detectors distributed ... -
Metaheuristics on quantum computers: Inspiration, simulation and real execution
(ELSEVIER, 2022)Quantum-inspired metaheuristics are solvers that incorporate principles inspired from quantum mechanics into classical-approximate algorithms using non-quantum machines. Due to the uniqueness of quantum principles, the ...