The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital image processing is highlighted in the medical setting for automatic diagnosis of diseases. Glaucoma has no cure, and is the second leading cause of blindness worldwide. Currently there are treatments to prevent vision loss, but the disease will be discovered still in the early stages. Thus, this study aims to develop an automatic detection method of Glaucoma in retinal images. The methodology...
Several countries in the world are undertaking an immensely challenging task: successfully perform the so-called "analogical blackout" of television. In Latin America in particular, the chosen transmission scheme is, in most cases, ISDB-T (the Japanese standard, later adapted by Brazil). Key to the success of this blackout is a thorough understanding of the technology of choice. The present...
This work deals with the Traveling Salesman Problem with Hotel Selection (TSPHS), a variant of the classic Traveling Salesman Problem (TSP). In the TSPHS, a set of hotels can be visited in strategic points of the route, dividing it in a minimum number of trips. Each trip must not exceed a given time limit, minimizing also the total time traveled. The TSPHS is NP-Hard, being a generalization of the...
In this paper it is proposed a hybrid algorithm, so-called HGVPRLB, for solving generic binary problems. The algorithm HGVPRLB combines the heuristic procedures GRASP, Variable Neighborhood Descent, Constraint Propagation and Local Branching Cuts. It was tested in a set of binary problems from MIPLIB 2010 in order to check both its ability to obtain feasible solutions as its ability to improve the...
This work aims to evaluate the use of Learning Analitycs (LA) in Higher Education; students, and attributes such as: profile, interactions in a virtual learning environment learning — for this use business intelligence paradigm in order to explore and exploit the data from one of the actors in the educational process is analyzed, test scores, among others, which will contribute to their educational...
Dengue is a viral disease transmitted by the aedes aegypti mosquito. In Paraguay — South America, health authorities carry out entomological surveillance activities in order to monitor the vector density in endemic and non-endemic areas through techniques based on the use of traditional index. Currently there are numerous methods and most practical, efficient and economic indicators to determine the...
In face recognition systems that work with databases of thousands of images it is not practical to compare the query image against each stored image to determine similarity. The increasing use of these systems in various fields creates the need to explore mechanisms for efficient and effective search in terms of use of computing resources and percentage of hits. In order to reduce the load of face...
Logical Analysis of Data (LAD) is a two-class learning algorithm which integrates principles of combinatorics, optimization, and the theory of Boolean functions. This paper proposes an algorithm based on mixed integer linear programming to extend the LAD methodology to solve multi-class classification problems, where One-vs-All (OvA) learning models are efficiently constructed to classify observations...
Network Virtualization is a key technology for the Future Internet, as it allows the deployment of independent virtual networks using resources of the same basic infrastructure. An important challenge in the dynamic provision of virtual networks resides in the optimal assignment of physical resources (nodes and links) to requirements of virtual networks. This problem is known as Virtual Network Embedding...
Modern compilers provide several optimizations that can be applied to the source code, in order to increase its performance. Due to the complex relationship between various optimizations, discovering harmful compiler optimizations is a problem in the context of compilers. Strategies based on iterative compilation try to solve this problem evaluating the performance of the compiled program using different...
In this paper we present an experimental study of trilateration and probabilistic multilateration. Both methods are techniques aimed at estimating the location of a point, based on the position of three or more references and distances to them. To asses the effectiveness of the aforementioned methods, we present a characterization of the various error conditions, a sensitivity analysis of the trilateration...
Open Government concept is experiencing an upswing. Open Government is based on three concepts (transparency, participation and collaboration) that require accessing data. To provide this access, Open Data Portals are being implemented around the world by every kind of organizations, mainly in the public sector. The aim of an Open Data Portal is exposing data in such a way that reusing is facilitated...
This article presents the results obtained in the process of analysis of the web access level on sites chosen within the framework of the strategy of the Online Government project of the Colombian state. Initially, there is a review about the standards and recommendations provided by the W3C international organization in matter of web access in its two versions of WCAG. Next, there is a contextualization...
Peru has a variety of names to describe university degrees in computer science or related fields. The adoption of international standards both in the area of knowledge and professional profiles generates all kinds of debates and reactions with few adoption results. The present study introduces the innovation diffusion theory to the analysis of the characteristics of the Peruvian university educational...
This paper describes how to semantically enrich clusters from signaling pathways networks. The study is divided into two phases, the first is the detection of clusters in signaling pathways networks, after getting these clusters, they are passed to an extraction process of centrality within each one, so the second phase can enrich them semantically. The centrality chosen for the case study is the...
Aim: Getting information to automatically collect object oriented metrics (OO metrics) in order to assist the comprehension and assessment of software products. Method: It was developed a study based on a systematic review and 37 primary studies were selected from 577 papers retrieved in 3 databases. Result: 177 metrics that can be automatically collected were cataloged. Besides, 27 from such total...
Interactive Learning objects (ILO) are explored in this paper in order to provide an improvement in teaching learning process, ensuring the monitoring of students by professor through the interaction provided by ILO. The article describes an ontology that defines and structure the classes of the elements of the ILO's metadata standard. This ontology is used as the basis for the development of a Virtual...
BPM as an integrated discipline postulated that technology has to follow the processes and processes the strategy. BPM literature emphasizes the importance and necessity of aligning strategy with business processes, but one of the main problems of people working in a unit of processes is to map and formally integrate strategic planning with organizational processes. The study of the literature shows...
This paper proposes novel techniques for the extraction of structural information from the source code of Java concurrent programs for their coverage testing. Such techniques differ from others because they consider synchronization flow among processes/threads, distinct paradigms of communication/synchronization, method calls and pointer manipulation. The structural information gathered from the source...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.