Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 18 de 18
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 24(6)2024 Mar 13.
Artículo en Inglés | MEDLINE | ID: mdl-38544113

RESUMEN

Cruise ships and other naval vessels include automated Internet of Things (IoT)-based evacuation systems for the passengers and crew to assist them in case of emergencies and accidents. The technical challenges of assisting passengers and crew to safety during emergencies include various aspects such as sensor failures, imperfections in the sound or display systems that are used to direct evacuees, the timely selection of optimum evacuation routes for the evacuees, as well as computation and communication delays that may occur in the IoT infrastructure due to intense activities during an emergency. In addition, during an emergency, the evacuees may be confused or in a panic, and may make mistakes in following the directions offered by the evacuation system. Therefore, the purpose of this work is to analyze the effect of two important aspects that can have an adverse effect on the passengers' evacuation time, namely (a) the computer processing and communication delays, and (b) the errors that may be made by the evacuees in following instructions. The approach we take uses simulation with a representative existing cruise ship model, which dynamically computes the best exit paths for each passenger, with a deadline-driven Adaptive Navigation Strategy (ANS). Our simulation results reveal that delays in the evacuees' reception of instructions can significantly increase the total time needed for passenger evacuation. In contrast, we observe that passenger behavior errors also affect the evacuation duration, but with less effect on the total time needed to evacuate passengers. These findings demonstrate the importance of the design of passenger evacuation systems in a way that takes into account all realistic features of the ship's indoor evacuation environment, including the importance of having high-performance data processing and communication systems that will not result in congestion and communication delays.

2.
Sensors (Basel) ; 23(13)2023 Jul 06.
Artículo en Inglés | MEDLINE | ID: mdl-37448032

RESUMEN

The Internet of Things (IoT) is transforming almost every industry, including agriculture, food processing, health care, oil and gas, environmental protection, transportation and logistics, manufacturing, home automation, and safety. Cost-effective, small-sized batteries are often used to power IoT devices being deployed with limited energy capacity. The limited energy capacity of IoT devices makes them vulnerable to battery depletion attacks designed to exhaust the energy stored in the battery rapidly and eventually shut down the device. In designing and deploying IoT devices, the battery and device specifications should be chosen in such a way as to ensure a long lifetime of the device. This paper proposes diffusion approximation as a mathematical framework for modelling the energy depletion process in IoT batteries. We applied diffusion or Brownian motion processes to model the energy depletion of a battery of an IoT device. We used this model to obtain the probability density function, mean, variance, and probability of the lifetime of an IoT device. Furthermore, we studied the influence of active power consumption, sleep time, and battery capacity on the probability density function, mean, and probability of the lifetime of an IoT device. We modelled ghost energy depletion attacks and their impact on the lifetime of IoT devices. We used numerical examples to study the influence of battery depletion attacks on the distribution of the lifetime of an IoT device. We also introduced an energy threshold after which the device's battery should be replaced in order to ensure that the battery is not completely drained before it is replaced.


Asunto(s)
Internet de las Cosas , Fenómenos Físicos , Difusión , Agricultura , Funciones de Verosimilitud
3.
Health Informatics J ; 27(2): 14604582211021459, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34142613

RESUMEN

BACKGROUND: The increase of healthcare digitalization comes along with potential information security risks. Thus, the EU H2020 KONFIDO project aimed to provide a toolkit supporting secure cross-border health data exchange. METHODS: KONFIDO focused on the so-called "User Goals", while also identifying barriers and facilitators regarding eHealth acceptance. Key user scenarios were elaborated both in terms of threat analysis and legal challenges. Moreover, KONFIDO developed a toolkit aiming to enhance the security of OpenNCP, the reference implementation framework. RESULTS: The main project outcomes are highlighted and the "Lessons Learned," the technical challenges and the EU context are detailed. CONCLUSIONS: The main "Lessons Learned" are summarized and a set of recommendations is provided, presenting the position of the KONFIDO consortium toward a robust EU-wide health data exchange infrastructure. To this end, the lack of infrastructure and technical capacity is highlighted, legal and policy challenges are identified and the need to focus on usability and semantic interoperability is emphasized. Regarding technical issues, an emphasis on transparent and standards-based development processes is recommended, especially for landmark software projects. Finally, promoting mentality change and knowledge dissemination is also identified as key step toward the development of secure cross-border health data exchange services.


Asunto(s)
Telemedicina , Atención a la Salud , Humanos
4.
Sensors (Basel) ; 21(9)2021 Apr 29.
Artículo en Inglés | MEDLINE | ID: mdl-33946909

RESUMEN

The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the Cloud. However, the massive numbers of IoT devices that are being deployed raise concerns about the power consumption of such systems as the number of IoT devices and Fog servers increase. Thus, in this paper, we describe a software-defined network (SDN)-based control scheme for client-server interaction that constantly measures ongoing client-server response times and estimates network power consumption, in order to select connection paths that minimize a composite goal function, including both QoS and power consumption. The approach using reinforcement learning with neural networks has been implemented in a test-bed and is detailed in this paper. Experiments are presented that show the effectiveness of our proposed system in the presence of a time-varying workload of client-to-service requests, resulting in a reduction of power consumption of approximately 15% for an average response time increase of under 2%.

5.
Sensors (Basel) ; 21(4)2021 Feb 06.
Artículo en Inglés | MEDLINE | ID: mdl-33561957

RESUMEN

Common software vulnerabilities can result in severe security breaches, financial losses, and reputation deterioration and require research effort to improve software security. The acceleration of the software production cycle, limited testing resources, and the lack of security expertise among programmers require the identification of efficient software vulnerability predictors to highlight the system components on which testing should be focused. Although static code analyzers are often used to improve software quality together with machine learning and data mining for software vulnerability prediction, the work regarding the selection and evaluation of different types of relevant vulnerability features is still limited. Thus, in this paper, we examine features generated by SonarQube and CCCC tools, to identify those that can be used for software vulnerability prediction. We investigate the suitability of thirty-three different features to train thirteen distinct machine learning algorithms to design vulnerability predictors and identify the most relevant features that should be used for training. Our evaluation is based on a comprehensive feature selection process based on the correlation analysis of the features, together with four well-known feature selection techniques. Our experiments, using a large publicly available dataset, facilitate the evaluation and result in the identification of small, but efficient sets of features for software vulnerability prediction.

6.
SN Comput Sci ; 2(1): 23, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-33437964

RESUMEN

The Conference on Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks (EQSEM) was held as a virtual conference on October 20-21, 2020. This paper summarises the objectives and proceedings of this conference. It then briefly presents the keynotes and other papers which were presented. Then, in the context of the EU-funded research project SDK4ED which motivated this conference, we outline several solutions that are being developed for managing the potential inter-dependencies and corresponding trade-offs between design-time and runtime qualities in software applications, and review the key functionalities that have been implemented within the SDK4ED integrated platform as of this writing. Then, we briefly introduce four papers among those presented at the EQSEM Conference that are included in this issue of the journal SN Computer Science, presenting relevant research achievements of the SDK4ED Project on software maintainability, reliability, and energy efficiency.

7.
J Biomed Inform ; 94: 103183, 2019 06.
Artículo en Inglés | MEDLINE | ID: mdl-31009760

RESUMEN

Health data exchange is a major challenge due to the sensitive information and the privacy issues entailed. Considering the European context, in which health data must be exchanged between different European Union (EU) Member States, each having a different national regulatory framework as well as different national healthcare structures, the challenge appears even greater. Europe has tried to address this challenge via the epSOS ("Smart Open Services for European Patients") project in 2008, a European large-scale pilot on cross-border sharing of specific health data and services. The adoption of the framework is an ongoing activity, with most Member States planning its implementation by 2020. Yet, this framework is quite generic and leaves a wide space to each EU Member State regarding the definition of roles, processes, workflows and especially the specific integration with the National Infrastructures for eHealth. The aim of this paper is to present the current landscape of the evolving eHealth infrastructure for cross-border health data exchange in Europe, as a result of past and ongoing initiatives, and illustrate challenges, open issues and limitations through a specific case study describing how Italy is approaching its adoption and accommodates the identified barriers. To this end, the paper discusses ethical, regulatory and organizational issues, also focusing on technical aspects, such as interoperability and cybersecurity. Regarding cybersecurity aspects per se, we present the approach of the KONFIDO EU-funded project, which aims to reinforce trust and security in European cross-border health data exchange by leveraging novel approaches and cutting-edge technologies, such as homomorphic encryption, photonic Physical Unclonable Functions (p-PUF), a Security Information and Event Management (SIEM) system, and blockchain-based auditing. In particular, we explain how KONFIDO will test its outcomes through a dedicated pilot based on a realistic scenario, in which Italy is involved in health data exchange with other European countries.


Asunto(s)
Registros Electrónicos de Salud , Viaje , Seguridad Computacional , Unión Europea , Humanos , Italia , Privacidad
8.
BMC Med Inform Decis Mak ; 18(1): 85, 2018 10 16.
Artículo en Inglés | MEDLINE | ID: mdl-30326890

RESUMEN

BACKGROUND: Increased digitalization of healthcare comes along with the cost of cybercrime proliferation. This results to patients' and healthcare providers' skepticism to adopt Health Information Technologies (HIT). In Europe, this shortcoming hampers efficient cross-border health data exchange, which requires a holistic, secure and interoperable framework. This study aimed to provide the foundations for designing a secure and interoperable toolkit for cross-border health data exchange within the European Union (EU), conducted in the scope of the KONFIDO project. Particularly, we present our user requirements engineering methodology and the obtained results, driving the technical design of the KONFIDO toolkit. METHODS: Our methodology relied on four pillars: (a) a gap analysis study, reviewing a range of relevant projects/initiatives, technologies as well as cybersecurity strategies for HIT interoperability and cybersecurity; (b) the definition of user scenarios with major focus on cross-border health data exchange in the three pilot countries of the project; (c) a user requirements elicitation phase containing a threat analysis of the business processes entailed in the user scenarios, and (d) surveying and discussing with key stakeholders, aiming to validate the obtained outcomes and identify barriers and facilitators for HIT adoption linked with cybersecurity and interoperability. RESULTS: According to the gap analysis outcomes, full adherence with information security standards is currently not universally met. Sustainability plans shall be defined for adapting existing/evolving frameworks to the state-of-the-art. Overall, lack of integration in a holistic security approach was clearly identified. For each user scenario, we concluded with a comprehensive workflow, highlighting challenges and open issues for their application in our pilot sites. The threat analysis resulted in a set of 30 user goals in total, documented in detail. Finally, indicative barriers of HIT acceptance include lack of awareness regarding HIT risks and legislations, lack of a security-oriented culture and management commitment, as well as usability constraints, while important facilitators concern the adoption of standards and current efforts for a common EU legislation framework. CONCLUSIONS: Our study provides important insights to address secure and interoperable health data exchange, while our methodological framework constitutes a paradigm for investigating diverse cybersecurity-related risks in the health sector.


Asunto(s)
Informática Médica/organización & administración , Seguridad Computacional , Recolección de Datos , Europa (Continente) , Humanos , Flujo de Trabajo
9.
Sensors (Basel) ; 14(8): 15142-62, 2014 Aug 18.
Artículo en Inglés | MEDLINE | ID: mdl-25196014

RESUMEN

Emergency navigation systems for buildings and other built environments, such as sport arenas or shopping centres, typically rely on simple sensor networks to detect emergencies and, then, provide automatic signs to direct the evacuees. The major drawbacks of such static wireless sensor network (WSN)-based emergency navigation systems are the very limited computing capacity, which makes adaptivity very difficult, and the restricted battery power, due to the low cost of sensor nodes for unattended operation. If static wireless sensor networks and cloud-computing can be integrated, then intensive computations that are needed to determine optimal evacuation routes in the presence of time-varying hazards can be offloaded to the cloud, but the disadvantages of limited battery life-time at the client side, as well as the high likelihood of system malfunction during an emergency still remain. By making use of the powerful sensing ability of smart phones, which are increasingly ubiquitous, this paper presents a cloud-enabled indoor emergency navigation framework to direct evacuees in a coordinated fashion and to improve the reliability and resilience for both communication and localization. By combining social potential fields (SPF) and a cognitive packet network (CPN)-based algorithm, evacuees are guided to exits in dynamic loose clusters. Rather than relying on a conventional telecommunications infrastructure, we suggest an ad hoc cognitive packet network (AHCPN)-based protocol to adaptively search optimal communication routes between portable devices and the network egress nodes that provide access to cloud servers, in a manner that spares the remaining battery power of smart phones and minimizes the time latency. Experimental results through detailed simulations indicate that smart human motion and smart network management can increase the survival rate of evacuees and reduce the number of drained smart phones in an evacuation process.


Asunto(s)
Redes de Comunicación de Computadores/instrumentación , Tecnología Inalámbrica/instrumentación , Algoritmos , Industria de la Construcción/instrumentación , Suministros de Energía Eléctrica , Urgencias Médicas , Humanos , Reproducibilidad de los Resultados , Factores de Tiempo
10.
Sensors (Basel) ; 14(8): 15387-99, 2014 Aug 20.
Artículo en Inglés | MEDLINE | ID: mdl-25140633

RESUMEN

We present a novel direction based shortest path search algorithm to guide evacuees during an emergency. It uses opportunistic communications (oppcomms) with low-cost wearable mobile nodes that can exchange packets at close range of a few to some tens of meters without help of an infrastructure. The algorithm seeks the shortest path to exits which are safest with regard to a hazard, and is integrated into an autonomous Emergency Support System (ESS) to guide evacuees in a built environment. The algorithm proposed that ESSs are evaluated with the DBES (Distributed Building Evacuation Simulator) by simulating a shopping centre where fire is spreading. The results show that the directional path finding algorithm can offer significant improvements for the evacuees.


Asunto(s)
Planificación en Desastres , Desastres , Urgencias Médicas , Trabajo de Rescate/métodos , Algoritmos , Comunicación , Humanos
11.
Int J Data Min Bioinform ; 10(2): 175-88, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25796737

RESUMEN

Gene Regulatory Networks (GRN) provide systematic views of complex living systems, offering reliable and large-scale GRNs to identify disease candidate genes. A reverse engineering technique, Bayesian Model Averaging-based Networks (BMAnet), which ensembles all appropriate linear models to tackle uncertainty in model selection that integrates heterogeneous biological data sets is introduced. Using network evaluation metrics, we compare the networks that are thus identified. The metric 'Random walk with restart (Rwr)' is utilised to search for disease genes. In a simulation our method shows better performance than elastic-net and Gaussian graphical models, but topological quantities vary among the three methods. Using real-data, brain tumour gene expression samples consisting of non-tumour, grade III and grade IV are analysed to estimate networks with a total of 4422 genes. Based on these networks, 169 brain tumour-related candidate genes were identified and some were found to relate to 'wound', 'apoptosis', and 'cell death' processes.


Asunto(s)
Biomarcadores de Tumor/genética , Neoplasias Encefálicas/genética , Perfilación de la Expresión Génica/métodos , Redes Reguladoras de Genes/genética , Predisposición Genética a la Enfermedad/genética , Proteínas de Neoplasias/genética , Reconocimiento de Normas Patrones Automatizadas/métodos , Algoritmos , Marcadores Genéticos/genética , Humanos , Reproducibilidad de los Resultados , Sensibilidad y Especificidad , Transducción de Señal/genética
12.
IEEE Trans Nanobioscience ; 11(3): 259-65, 2012 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-22987132

RESUMEN

Gene regulatory networks provide the systematic view of molecular interactions in a complex living system. However, constructing large-scale gene regulatory networks is one of the most challenging problems in systems biology. Also large burst sets of biological data require a proper integration technique for reliable gene regulatory network construction. Here we present a new reverse engineering approach based on Bayesian model averaging which attempts to combine all the appropriate models describing interactions among genes. This Bayesian approach with a prior based on the Gibbs distribution provides an efficient means to integrate multiple sources of biological data. In a simulation study with maximum of 2000 genes, our method shows better sensitivity than previous elastic-net and Gaussian graphical models, with a fixed specificity of 0.99. The study also shows that the proposed method outperforms the other standard methods for a DREAM dataset generated by nonlinear stochastic models. In brain tumor data analysis, three large-scale networks consisting of 4422 genes were built using the gene expression of non-tumor, low and high grade tumor mRNA expression samples, along with DNA-protein binding affinity information. We found that genes having a large variation of degree distribution among the three tumor networks are the ones that see most involved in regulatory and developmental processes, which possibly gives a novel insight concerning conventional differentially expressed gene analysis.


Asunto(s)
Teorema de Bayes , Biología Computacional/métodos , Redes Reguladoras de Genes , Modelos Genéticos , Encéfalo/metabolismo , Química Encefálica/genética , Neoplasias Encefálicas/genética , Neoplasias Encefálicas/metabolismo , Bases de Datos Genéticas , Perfilación de la Expresión Génica , Humanos , Modelos Lineales , Procesos Estocásticos , Terminología como Asunto
13.
Artículo en Inglés | MEDLINE | ID: mdl-22144531

RESUMEN

Gene expression models play a key role to understand the mechanisms of gene regulation whose aspects are grade and switch-like responses. Though many stochastic approaches attempt to explain the gene expression mechanisms, the Gillespie algorithm which is commonly used to simulate the stochastic models requires additional gene cascade to explain the switch-like behaviors of gene responses. In this study, we propose a stochastic gene expression model describing the switch-like behaviors of a gene by employing Hill functions to the conventional Gillespie algorithm. We assume eight processes of gene expression and their biologically appropriate reaction rates are estimated based on published literatures. We observed that the state of the system of the toggled switch model is rarely changed since the Hill function prevents the activation of involved proteins when their concentrations stay below a criterion. In ScbA-ScbR system, which can control the antibiotic metabolite production of microorganisms, our modified Gillespie algorithm successfully describes the switch-like behaviors of gene responses and oscillatory expressions which are consistent with the published experimental study.


Asunto(s)
Algoritmos , Regulación Bacteriana de la Expresión Génica , Redes Reguladoras de Genes , Modelos Genéticos , Procesos Estocásticos , Proteínas Bacterianas/genética , Biología Computacional , Proteínas de Unión al ADN/genética , Streptomyces coelicolor/genética
14.
Phys Rev E Stat Nonlin Soft Matter Phys ; 82(6 Pt 1): 061112, 2010 Dec.
Artículo en Inglés | MEDLINE | ID: mdl-21230649

RESUMEN

N searchers are sent out by a source in order to locate a fixed object which is at a finite distance D, but the search space is infinite and D would be in general unknown. Each of the searchers has a finite random lifetime, and may be subject to destruction or failures, and it moves independently of other searchers, and at intermediate locations some partial random information may be available about which way to go. When a searcher is destroyed or disabled, or when it "dies naturally," after some time the source becomes aware of this and it sends out another searcher, which proceeds similarly to the one that it replaces. The search ends when one of the searchers finds the object being sought. We use N coupled brownian motions to derive a closed form expression for the average search time as a function of D which will depend on the parameters of the problem: the number of searchers, the average lifetime of searchers, the routing uncertainty, and the failure or destruction rate of searchers. We also examine the cost in terms of the total energy that is expended in the search.

15.
BMC Genomics ; 10 Suppl 3: S26, 2009 Dec 03.
Artículo en Inglés | MEDLINE | ID: mdl-19958490

RESUMEN

BACKGROUND: The steady-state behaviour of gene regulatory networks (GRNs) can provide crucial evidence for detecting disease-causing genes. However, monitoring the dynamics of GRNs is particularly difficult because biological data only reflects a snapshot of the dynamical behaviour of the living organism. Also most GRN data and methods are used to provide limited structural inferences. RESULTS: In this study, the theory of stochastic GRNs, derived from G-Networks, is applied to GRNs in order to monitor their steady-state behaviours. This approach is applied to a simulation dataset which is generated by using the stochastic gene expression model, and observe that the G-Network properly detects the abnormally expressed genes in the simulation study. In the analysis of real data concerning the cell cycle microarray of budding yeast, our approach finds that the steady-state probability of CLB2 is lower than that of other agents, while most of the genes have similar steady-state probabilities. These results lead to the conclusion that the key regulatory genes of the cell cycle can be expressed in the absence of CLB type cyclines, which was also the conclusion of the original microarray experiment study. CONCLUSION: G-networks provide an efficient way to monitor steady-state of GRNs. Our method produces more reliable results then the conventional t-test in detecting differentially expressed genes. Also G-networks are successfully applied to the yeast GRNs. This study will be the base of further GRN dynamics studies cooperated with conventional GRN inference algorithms.


Asunto(s)
Biometría/métodos , Expresión Génica , Redes Reguladoras de Genes , Modelos Genéticos , Ciclo Celular , Regulación Fúngica de la Expresión Génica , Probabilidad , Saccharomycetales/química , Saccharomycetales/citología , Saccharomycetales/genética , Procesos Estocásticos
16.
Neural Comput ; 20(9): 2308-24, 2008 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-18386985

RESUMEN

Large-scale distributed systems, such as natural neuronal and artificial systems, have many local interconnections, but they often also have the ability to propagate information very fast over relatively large distances. Mechanisms that enable such behavior include very long physical signaling paths and possibly saccades of synchronous behavior that may propagate across a network. This letter studies the modeling of such behaviors in neuronal networks and develops a related learning algorithm. This is done in the context of the random neural network (RNN), a probabilistic model with a well-developed mathematical theory, which was inspired by the apparently stochastic spiking behavior of certain natural neuronal systems. Thus, we develop an extension of the RNN to the case when synchronous interactions can occur, leading to synchronous firing by large ensembles of cells. We also present an O(N3) gradient descent learning algorithm for an N-cell recurrent network having both conventional excitatory-inhibitory interactions and synchronous interactions. Finally, the model and its learning algorithm are applied to a resource allocation problem that is NP-hard and requires fast approximate decisions.


Asunto(s)
Modelos Neurológicos , Redes Neurales de la Computación , Neuronas/fisiología , Dinámicas no Lineales , Animales
17.
Phys Rev E Stat Nonlin Soft Matter Phys ; 76(3 Pt 1): 031903, 2007 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-17930267

RESUMEN

We introduce a probability model for gene regulatory networks, based on a system of Chapman-Kolmogorov equations that represent the dynamics of the concentration levels of each agent in the network. This unifying approach includes the representation of excitatory and inhibitory interactions between agents, second-order interactions which allow any two agents to jointly act on other agents, and Boolean dependencies between agents. The probability model represents the concentration or quantity of each agent, and we obtain the equilibrium solution for the joint probability distribution of each of the concentrations. The result is an exact solution in "product form," where the joint equilibrium probability distribution of the concentration for each gene is the product of the marginal distribution for each of the concentrations. The analysis we present yields the probability distribution of the concentration or quantity of all of the agents in a network that includes both logical dependencies and excitatory-inhibitory relationships between agents.


Asunto(s)
Regulación de la Expresión Génica , Genes Reguladores , Modelos Genéticos , Modelos Estadísticos , Probabilidad
18.
IEEE Trans Syst Man Cybern B Cybern ; 36(6): 1247-54, 2006 Dec.
Artículo en Inglés | MEDLINE | ID: mdl-17186801

RESUMEN

Packet routing in networks requires knowledge about available paths, which can be either acquired dynamically while the traffic is being forwarded, or statically (in advance) based on prior information of a network's topology. This paper describes an experimental investigation of path discovery using genetic algorithms (GAs). We start with the quality-of-service (QoS)-driven routing protocol called "cognitive packet network" (CPN), which uses smart packets (SPs) to dynamically select routes in a distributed autonomic manner based on a user's QoS requirements. We extend it by introducing a GA at the source routers, which modifies and filters the paths discovered by the CPN. The GA can combine the paths that were previously discovered to create new untested but valid source-to-destination paths, which are then selected on the basis of their "fitness." We present an implementation of this approach, where the GA runs in background mode so as not to overload the ingress routers. Measurements conducted on a network test bed indicate that when the background-traffic load of the network is light to medium, the GA can result in improved QoS. When the background-traffic load is high, it appears that the use of the GA may be detrimental to the QoS experienced by users as compared to CPN routing because the GA uses less timely state information in its decision making.


Asunto(s)
Algoritmos , Cognición , Redes de Comunicación de Computadores , Simulación por Computador , Genética
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA