Regresar
Mostrando 10 resultados de: 48
Filtros aplicados
Área temáticas
Ciencias de la computación(20)
Métodos informáticos especiales(12)
Funcionamiento de bibliotecas y archivos(11)
Programación informática, programas, datos, seguridad(8)
Escuelas y sus actividades; educación especial(4)
Computer vision-based method for automatic detection of crop rows in potato fields
Conference ObjectAbstract: This work presents an adaptation and validation of a method for automatic crop row detection from imPalabras claves:Autonomous guidance, Computer Vision, Crop row detection, image segmentationAutores:Diego Hernán Peluffo-Ordóñez, Garrido Fernando, Granda P., Iván García-Santillán, Marco R. Pusdá-Chulde, Pedro Granda, Víctor Caranqui-SánchezFuentes:googlescopusBiomechanics of Soft Tissues: The Role of the Mathematical Model on Material Behavior
Conference ObjectAbstract: Mechanical properties of the soft tissues and an accurate mathematical model are important to reprodPalabras claves:FEA, Hyperelastic mathematical models, Soft tissues behaviorAutores:Bini F., Campana F., Carlos Bustamante-Orellana, Guachi Robinson, Lorena Guachi-Guachi, Marinozzi F., Novelli S.Fuentes:scopusAnalysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador
Conference ObjectAbstract: The analysis of the appropriate bandwidths was made based on the electoral processes in countries wiPalabras claves:bandwidth, Electoral Process, Electoral processes, Protocols security, Security InformationAutores:Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusA Deep Learning Approach for Symmetric-Key Cryptography System
Conference ObjectAbstract: Cryptography is the art and science of protecting information form intruders of data by making the iPalabras claves:Autoencoder neural network, Cryptography, Cryptography system, Symmetric encryptionAutores:Francisco Quinga-Socasi, Luis Zhinin-Vera, Oscar ChangFuentes:googlescopusA New Approach to Supervised Data Analysis in Embedded Systems Environments: A Case Study
Conference ObjectAbstract: Nowadays, the implementation of embedded systems with sensors for massive data collection has becomePalabras claves:Data Analysis, Embedded Systems, sensor dataAutores:Diego Hernán Peluffo-Ordóñez, Javier E. Revelo-Fuelagán, Luis Suárez-Zambrano, Pamela E. Godoy-Trujillo, Paul D. Rosero-MontalvoFuentes:scopusA Wise Up Visual Robot Driven by a Self-taught Neural Agent
Conference ObjectAbstract: This paper presents a biological inspired robot capable of learning by itself high level Tic-Tac-ToePalabras claves:Clever robots, Neural networks, Self-taught agentsAutores:Luis Zhinin-Vera, Oscar ChangFuentes:googlescopusA knowledge-based recommender agent to choosing a competition system
Conference ObjectAbstract: In this paper, we present a knowledge-based recommender agent, which is part of a multiagent systemPalabras claves:Autores:Corchado J.M., Gil González A.B., Moreno-García M.N., Salamanca R.E., Vivian Félix López-BatistaFuentes:scopusA multiagent system for efficient portfolio management
Conference ObjectAbstract: In this work we present a multiagent system to draw up an optimum portfolio. By using a distributedPalabras claves:Autores:Alonso L., Alonso N., Moreno-García M.N., Vivian Félix López-BatistaFuentes:scopusA new approach of service platform for water optimization in lettuce crops using wireless sensor network
Conference ObjectAbstract: Wireless sensor network is implemented and communicated with the cloud through IPv6. The entire systPalabras claves:CLOUD COMPUTING, Irrigation, PRECISION AGRICULTURE, WSNAutores:Alexandra E. Jácome-Ortega, Alexandra Jácome, Carlos Vásquez-Ayala, Diego Hernán Peluffo-Ordóñez, Edgar D. Jaramillo-Vinueza, Edgar Maya-Olalla, Hernán Mauricio Domínguez-Limaico, Marcelo Zambrano-Vizuete, Paul D. Rosero-MontalvoFuentes:googlescopusCryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City
Conference ObjectAbstract: It was analyzed the information of databases, encryption algorithms, and information security that aPalabras claves:Cryptographic Algorithms, Database risks, information security, Security scheme, smart cityAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Salazar R., Segundo Moisés Toapanta ToapantaFuentes:scopus