Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
data processing » image processing (Expander búsqueda)
text processing » meat processing (Expander búsqueda), event processing (Expander búsqueda), fruit processing (Expander búsqueda)
parallel » paralelo (Expander búsqueda)
data processing » image processing (Expander búsqueda)
text processing » meat processing (Expander búsqueda), event processing (Expander búsqueda), fruit processing (Expander búsqueda)
parallel » paralelo (Expander búsqueda)
1
artículo
Technological advances have allowed to collect and store large volumes of data over the years. Besides, it is significant that today's applications have high performance and can analyze these large datasets effectively. Today, it remains a challenge for data mining to make its algorithms and applications equally efficient in the need of increasing data size and dimensionality [1]. To achieve this goal, many applications rely on parallelism, because it is an area that allows the reduction of cost depending on the execution time of the algorithms because it takes advantage of the characteristics of current computer architectures to run several processes concurrently [2]. This paper proposes a parallel version of the FuzzyPred algorithm based on the amount of data that can be processed within each of the processing threads, synchronously and independently.
2
objeto de conferencia
The present work was supported by grant 234-2015-FONDECYT (Master Program) from Cienciactiva of the National Council for Science, Technology and Technological Innovation (CONCYTEC-PERU) and the Office Research of Universidad Nacional de Ingeniería (VRI - UNI).
3
artículo
Publicado 2022
Enlace
Enlace
The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization al...
4
tesis de grado
Publicado 2013
Enlace
Enlace
At present one comes observing that the use of the rice husk represents an energetic alternative for the volumes of production that generate the rice mills what guarantees the sustainability of the resource as for availability of raw material. Through this research work was able to determine the efficiency of the rice husks for the burned clay brick, for which 05 companies were chosen that brick makers have closed furnaces and used in a 100% rice husks located in Rioja and Moyobamba province, the evaluation was carried out for six (06) months with a frequency of one (01) burning per month, in total there were six (06) consecutive assessments, registering information as quantity of rice husk used by burning, quantity in % and kg, ashes generation, broken bricks, raw bricks, between other own characteristics of the system of burning and ovens; in a parallel manner data was recorded for the...
5
tesis de grado
Publicado 2021
Enlace
Enlace
El objetivo de esta investigación fue determinar el efecto de la merma en el costo de producción de las planchas de caucho de la empresa RR&PF OLIVARES S.A.C en un periodo correspondiente a octubre y noviembre. Asimismo, se identificó el punto de inspección donde se genera la merma y en base a ello, se buscó determinar el valor correcto de las mermas. Por otro lado, el marco metodológico permitió llevar a cabo la recolección de información durante el proceso investigativo. Para ello, mediante el instrumento de medición utilizado que fue un modelo de cuestionario, se recogió datos e información relevante proveniente de los trabajadores que laboran en las áreas de producción y contabilidad. Posteriormente a la aplicación del instrumento, se procede al procesamiento de los datos obtenidos e interpretación de los resultados respectivos en base a los objetivos planteados. En c...