Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
Computer Networks(1)
Electric Power Systems Research(1)
International Journal of Innovative Computing, Information and Control(1)
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST(1)
Área temáticas
Física aplicada(3)
Ciencias de la computación(1)
Dirección general(1)
Métodos informáticos especiales(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Comunicación(2)
Aprendizaje automático(1)
Ciencias de la computación(1)
Robótica(1)
A Diffusive Propagation Model for Molecular Communications: Analysis and Implementation in NS-3
Conference ObjectAbstract: In this research, the analysis and implementation of a diffusive propagation model for molecular comPalabras claves:Amplitude detection, Brownian motion, CSK modulation, Diffusive propagation model, IEEE 1906.1-2015, Intersymbolic interference, Molecular communications, Ns-3Autores:Astudillo-Salinas F., Eddy Zuniga-Gomez, Luis Tello-Oquendo, Paul Calderon-CalderonFuentes:scopusDEPLOYMENT OF A HIGH-SPEED COMMUNICATION NETWORK TO ENABLE REAL-TIME CONTROL OF A LOWER LIMB ROBOTIC EXOSKELETON
ArticleAbstract: This paper presents a practical approach to deploying a real-time communication network applied to aPalabras claves:CAN network, High-speed communications, Lower limb robotic exoskeleton, PDO, SDOAutores:Andrés Fabricio Córdova, Astudillo-Salinas F., Hernan Morales, Luis Ismael Minchala Ávila, Zhang H.Fuentes:scopusSecurity constrained AC dynamic transmission expansion planning considering reactive power requirements
ArticleAbstract: The Transmission Network Expansion Planning problem (TNEP) can be modeled either as a static, a pseuPalabras claves:Dynamic transmission expansion planning, metaheuristics, Non-convex optimization, Reactive power planning, RENEWABLE ENERGYAutores:Astudillo-Salinas F., Castro C.A., Edgar G. Morquecho, Ergun H., Hertem D.V., Santiago Torres ContrerasFuentes:scopusReal-time bot infection detection system using DNS fingerprinting and machine-learning
ArticleAbstract: In today's cyberattacks, botnets are used as an advanced technique to generate sophisticated and cooPalabras claves:Anomaly detection, Bot detection, BOTNET, DNS-based bot detection, ELK stack, Isolation forests, Machine learning, Random ForestsAutores:Astudillo-Salinas F., Bernal P., Luis Tello-Oquendo, Vicente QuezadaFuentes:scopus