Mostrando 1 - 3 Resultados de 3 Para Buscar 'Guzman Zumaeta, Alberto Karel', tiempo de consulta: 0.10s Limitar resultados
1
artículo
Computer crimes in the telematic systems of company’s harm society because they cause a climate of uncertainty in customers, who have the perception that the computer system, in charge of managing the service or product to be consumed, is not so secure as to trust its money or make transactions remotely. One of the most widespread computer crimes is Spoofing, which consists of impersonating the identity of a person or entity. The objective is to implement a voice recognition system as a mobile application to identify cases of voice impersonation by Spoofing through telephone calls. For this purpose, the Mel scale cepstral coefficients (MFCC) were used as a classifier for cleaning anomalies in the audios, as well as back-propagation neural networks for the user identification system that works together within a mobile application. In the tests carried out, the proposed system had a succ...
2
tesis de grado
Los crímenes cibernéticos mediante las aplicaciones informáticas que utilizan las compañías producen pérdidas a las empresas y causan inseguridad a los usuarios, quienes tienen la impresión de que el producto o servicio recibido no es suficientemente seguro, en contraprestación a la inversión que realizaron. Una de las transgresiones informáticas más comunes es el Spoofing, que se basa en sustituir la identidad de un individuo o institución de confianza con el fin de engañar a otro. La razón de este estudio es obtener la autentificación inmediata de las personas al hacer uso de llamadas telefónicas para evitar situaciones de Spoofing mediante sustitución de voz. Ello implica, para las empresas, el uso de los coeficientes cepstrales en la escala de Mel (MFCC) que sirven como entrada para un clasificador de identidad y no permiten obtener anomalías en los audios; asimismo...
3
artículo
Computer crimes in the telematic systems of company’s harm society because they cause a climate of uncertainty in customers, who have the perception that the computer system, in charge of managing the service or product to be consumed, is not so secure as to trust its money or make transactions remotely. One of the most widespread computer crimes is Spoofing, which consists of impersonating the identity of a person or entity. The objective is to implement a voice recognition system as a mobile application to identify cases of voice impersonation by Spoofing through telephone calls. For this purpose, the Mel scale cepstral coefficients (MFCC) were used as a classifier for cleaning anomalies in the audios, as well as back-propagation neural networks for the user identification system that works together within a mobile application. In the tests carried out, the proposed system had a succ...