Mostrando 5 resultados de: 5
Filtros aplicados
Subtipo de publicación
Article(5)
Publisher
Universidad y Sociedad(5)
Área temáticas
Ciencias de la computación(3)
Economía de la tierra y la energía(3)
Física aplicada(3)
Métodos informáticos especiales(1)
Área de conocimiento
Energía(3)
Ciencias de la computación(1)
Ingeniería electrónica(1)
Minería de datos(1)
Política energética(1)
Origen
google(2)
Design of an isolated hybrid system to supply hacienda quirola
ArticleAbstract: Renewable energies are a very important alternative for the generation of electricity, since they doPalabras claves:Automatic irrigation system, Homer, Hybrid system, Photovoltaic generator, renewable energiesAutores:Juan Carlos Pisco Vanegas, TORRES QUIJIJE ANGEL IVANFuentes:scopusImage processing system and its influence on residential energy consumption management
ArticleAbstract: Electricity has become an indispensable resource for the development of humanity for all the benefitPalabras claves:Classifiers, Computer Vision, Detection methods, Illumination systemsAutores:Bryan Del Valle Villacís, José Guillén Sánchez, José Luis Tubay, TORRES QUIJIJE ANGEL IVANFuentes:scopusSimulation of a yagi uda antenna using optimization methods based on genetic algorithms
ArticleAbstract: The article is about the optimization methods used in AG (genetic algorithms) for the design of antePalabras claves:Directivity, Genetic Algorithms, Optimization, Radiation patterns, Yagi uda antennaAutores:Bolívar Agustín Díaz-Chang, Ingrid Estefanía Cela Jaramillo, Jonathan Alexander Macías Rivera, TORRES QUIJIJE ANGEL IVANFuentes:scopusReal-time monitoring of residential electricity consumption that allows its proper management
ArticleAbstract: The poor reading of the meter that records the electrical consumption or excess of electrical consumPalabras claves:Energy efficiency, internet of things, Supervision, telemetryAutores:Iván Guillermo Vera García, Juan Carlos Pisco Vanegas, Roger Steven Pérez Parraga, TORRES QUIJIJE ANGEL IVANFuentes:googlescopusSTUDY OF DATA MINING TECHNIQUES FOR THE DETECTION OF ATTACKS IN THE NSL-KDD DATA SET
ArticleAbstract: The present investigation begins with a referential study of similar works based on scenarios for thPalabras claves:Data Mining, intrusion detection, NSL-KDD datasetAutores:Amilkar Yudier Puris Cáceres, Andrés Florencia Toala, Bryon Wladimir Oviedo Bayas, Emilio Zhuma, Hernández Palacios R., TORRES QUIJIJE ANGEL IVANFuentes:googlescopus