Listar Computación e informática por título
Mostrando ítems 208-227 de 249
-
Scheduling of events through notifications in mobile devices
(2019-08)It is very common to interact with notifications every day with our mobile devices. Notifications have advantages and disadvantages. They bring information for the user, but they are also interruptions. In this study, the ... -
Sign language recognition model combining non-manual markers and handshapes
(2016-11-29)People with disabilities have fewer opportunities. Technological developments should be used to help these people to have more opportunities. In this paper we present partial results of a research project which aims to ... -
Sign Language Recognition Using Leap Motion
(2015-12-01)Several million people around the world use signs as their main mean of communication. The advances in technologies to recognize such signs will make possible the computer supported interpretation of sign languages. There ... -
Sistema de gestión y manejo de reuniones para una sala de reunión inteligente basado en la ocupación real y sincronizado con el sistema Meeting Room Booking System
(2019)Este documento propone la creación de una sala de reuniones inteligente, mediante la incorporación de un sensor infrarrojo pasivo (PIR) para la detección de movimiento, el cual reacciona ante la luz infrarroja emitida por ... -
Sistemas de apoyo a la toma de decisiones que usan inteligencia artificial en la agricultura de precisión
(2020)Los sistemas de apoyo a la toma de decisiones para la agricultura permiten optimizar los procesos de cultivo, al utilizar la menor cantidad de recursos (tierra, agua y fertilizantes). En esta investigación, se caracterizaron ... -
Smart Meeting Room Management System Based on Real-Time Occupancy
(2019)This paper proposes the creation of a smart meeting room through the incorporation of a PIR sensor and an AWS IoT button that allows the booking system to reflect a more precise availability of meeting rooms according to ... -
Social network analysis for automatic ranking of political stakeholders: A case study
(2022-10)This article exposes the way in which the creation of a new method for calculating the popularity of stake holders in social networks can support political data analysis experts. The definition of a new formula for estimating ... -
Social Robotics Guidelines
(2019-08-19)Human interactions are affected by society's norms and cultural criteria. Individuals expect certain behaviors from other people, who have an obligation to act according to the expected behavior in the cultural and social ... -
Software Fault Prediction: A Systematic Mapping Study
(2015)Context: Software fault prediction has been an important research topic in the software engineering field for more than 30 years. Software defect prediction models are commonly used to detect faulty software modules based ... -
Software practitioners’ point of view on technical debt payment
(2023-02-01)Context: Technical debt (TD) payment refers to the activity of expending maintenance effort and resources to make up for the effects of previous technical compromises. Aims: To investigate if software practitioners ... -
Soluciones de Software Libre para mejorar la gestión de la información en pequeñas y medianas empresas costarricenses con giro industrial
(2020)Objetivo general Recomendar 3 soluciones ERP de tipo software libre para apoyar la mejora de la gestión de la información de pequeñas y medianas empresas costarricenses con giro industrial. Objetivos específicos 1. ... -
Standardized Questionnaires for User Experience Evaluation: A Systematic Literature Review
(2019)Standardized questionnaires are one of the methods used to evaluate User Experience (UX). Standardized questionnaires are composed of an invariable group of questions that users answer themselves after using a product ... -
Supporting phobia treatment with virtual reality: systematic desensitization using oculus rift
(2017)An irrational fear is called a phobia. Cognitive therapy teaches patients how to respond to triggering stimuli, by relaxing their mind and entering a state of reduced anxiety. Some of these methods depend on patient’s ... -
Supporting User Awareness Using Smart Device-Based Notifications
(2016)This paper provides an overview of a doctoral research project which focuses in developing a framework to allow smart device-based notifications to provide user awareness. Notifications are mechanisms by which the user’s ... -
SWIPE: A Sawtooth Waveform Inspired Pitch Estimator for Speech and Music
(2011-10-11)A Sawtooth Waveform Inspired Pitch Estimator (SWIPE) has been developed for processing speech and music. SWIPE is shown to outperform existing algorithms on several publicly available speech/musical-instruments databases ... -
Technical and Nontechnical Prioritization Schema for Technical Debt: Voice of TD-Experienced Practitioners
(2021-08-09)Technical debt (TD) can be injected at any stage of software development, spreading across other phases and causing various problems. This article presents a model for conceptualizing TD causes, effects, payment practices, ... -
Technical Debt is not Only about Code and We Need to be Aware about It
(2021-12-14)Context: It is common for a software project to incur technical debt (TD) during its development. It can impact several artifacts produced throughout the software development process. Therefore, it is necessary to carry ... -
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ... -
The relationship between acoustic habitat, hearing and tonal vocalizations in the Antillean manatee (Trichechus manatus manatus, Linnaeus, 1758)
(2015-09)The Antillean manatee (Trichechus manatus manatus) is an endangered marine mammal that inhabits the Caribbean Sea and riverine systems in Central America. Their acoustic behavior is relevant for individual identification, ...