Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Carlos Catania"'
Autor:
Federico Williamson, Nadhir Naciff, Carlos Catania, Gonzalo dos Santos, Nicolás Amigo, Eduardo M. Bringa
Publikováno v:
Journal of Materials Research and Technology, Vol 33, Iss , Pp 5263-5276 (2024)
This work proposes a computationally efficient approach for estimating the magnetization of Fe0.7Ni0.3 body-centered cubic (bcc) nanoparticles (NPs) at room temperature using machine-learning algorithms, in terms of the average magnetic moment per at
Externí odkaz:
https://doaj.org/article/02fb81d3377e484b9d78f8c8a9672d7d
Publikováno v:
Food Technology and Biotechnology, Vol 47, Iss 2, Pp 192-201 (2009)
Malolactic fermentation has important consequences for the quality of wine. The present study analyzes the effect of timing of inoculation with bacteria on the performance of alcoholic and malolactic fermentation in Malbec musts from a warm climate w
Externí odkaz:
https://doaj.org/article/fda82e1b123146338e49ed199fda57a2
Autor:
Aldo Biondolillo, Celeste Arancibia, Carlos Catania, Miguel Cirrincione, Marisol Cortez, Luisa Doldi, Liliana Martinez, Susana Matus, Norberto Richardi
Publikováno v:
BIO Web of Conferences, Vol 3, p 01014 (2014)
It is not overstated that Argentinean viticulture identifies with Malbec, the vine which long ago was introduced in the country from France and which has marvelously naturalized here. However, the variety Malbec has many different expressions, depend
Externí odkaz:
https://doaj.org/article/63ed19fabc7141788946404f8376555d
Autor:
Carlos Catania, Rodrigo González
Publikováno v:
Computers & Electrical Engineering. 76:1-12
Compensation of errors from MicroElectroMechanical Systems (MEMS) inertial sensors is mandatory for real-world applications. Recently, several machine learning methods focused on dealing with nonlinear behaviors have been proposed to increase MEMS in
Publikováno v:
VizSEC
Labeling a real network dataset is specially expensive in computer security, as an expert has to ponder several factors before assigning each label. This paper describes an interactive intelligent system to support the task of identifying hostile beh
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030207861
CACIC
CACIC
A Domain Generation Algorithm (DGA) is an algorithm to generate domain names in a deterministic but seemly random way. Malware use DGAs to generate the next domain to access the Command & Control (C&C) communication server. Given the simplicity of th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb7589fdd141c5aa4895f7ea3a255905
https://doi.org/10.1007/978-3-030-20787-8_23
https://doi.org/10.1007/978-3-030-20787-8_23
Publikováno v:
Journal of Information Security and Applications. 49:102388
In the field of network security, the process of labeling a network traffic dataset is specially expensive since expert knowledge is required to perform the annotations. With the aid of visual analytic applications such as RiskID, the effort of label
Autor:
Rodrigo González, Carlos Catania
Publikováno v:
PLANS
The moving average (MA) filter is a smoothing filter well-known in the digital signal processing community. The MA filter has only one configuration parameter, N, which is the order of the filter and is used to adjust the smoothing effect of an MA fi
Publikováno v:
KES
The problem of the transportation of patients from or to some health care center given a number of vehicles of different kinds can be considered as a common Vehicle Routing Problem (VPR). However, in the authors' particular case, the logistics behind
Publikováno v:
ESIDA@IUI
This paper presents a graphical interface to identify hostile behavior in network logs. The problem of identifying and labeling hostile behavior is well known in the network security community. There is a lack of labeled datasets, which make it diffi