• Biometry, the safe key 

      Fraile Hurtado, María; Herrero Langreo, Miguel; Menéndez de Miguel, Pilar; Delgado Villanueva, Valerio (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)
      Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?
    • Evaluación de Riesgos y Planificación Preventiva en el Módulo Avanzado de Industrialización de Edertek 

      Benitez-Espada, Manuel (22/09/2019)
      En el presente Trabajo Fin de Máster se plantean como objetivos la actualización de la evaluación de riesgos del puesto de Técnico de Baja Presión dentro del área de fusión en el Módulo Avanzado de Industrialización (IMA) ...
    • Knowledge management as a tool for improving business processes: an action research approach 

      Martínez-Martínez, Aurora; Cerdá Suárez, Luis Manuel (1); Sánchez Montero, Roberto; Asensio del Arco, Eva (1) (Journal of Industrial Engineering and Management, 2018)
      Purpose: The aim of this study is to investigate the importance of Knowledge Management as a tool for improving business processes in a different context from the industrial organizations, as an archaeological museum. ...
    • Mejora en el cumplimiento del lavado de Manos del Personal de Enfermería en el Servicio de Hospitalización 

      García-Gómez, Myriam (15/09/2019)
      La seguridad del paciente es un elemento fundamental de la calidad asistencial y para garantizarla es esencial que los profesionales de la salud mantengan una adecuada higiene de manos. La adherencia por parte del personal ...
    • Review: machine learning techniques applied to cybersecurity 

      Martínez Torres, Javier (1); Iglesias Comesaña, Carla; García-Nieto, Paulino J. (International Journal of Machine Learning and Cybernetics, 10/2019)
      Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ...
    • Security Framework for Agent-Based Cloud Computing 

      Venkateshwaran, K.; Malviya, Anu; Dikshit, Utkarsha; Venkatesan, S. (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2015)
      Agent can play a key role in bringing suitable cloud services to the customer based on their requirements. In agent based cloud computing, agent does negotiation, coordination, cooperation and collaboration on behalf of ...
    • WoT model for authenticity contents in virtual learning platforms 

      Gaona-Garcia, Paulo A.; Soto-Carrión, Jesús (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2009)
      The following research proposal seeks to bring a model of security software on virtual learning platforms LCMS under all SCORM specifications to ensure the authenticity of content created under concepts of digital signature ...