The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose and demonstrate a low-cost magneto-mechanical fiber micro-positioner for optical coupling, with a square-millimeter working range and a resolution of a few microns per pixel. We demonstrate the functionality of the positioner as a beam pattern imaging system for a 14” Dobsonian telescope as it is compact enough to be mounted instead of a small-telescopes eye-piece. The aim is to use this...
An application of artificial vision and artificial neural networks techniques in face recognition, is presented. In order to do that, a set of images (frontal face photos) with different lighting conditions, gestures, accessories and distances is used. A stepwise algorithm allows to achieve a satisfactory results, obtaining the correct identification of images inside and outside the data set.
Currently the use of quad-rotors that perform the navigation indoors requires large and stationary equipment such as the cameras, as well as a specific space to install these equipment and thus to track the position of the vehicle. Another disadvantage lies in the fact that the quad-rotor can only navigate in the space limited by this vision technology. This work proposes the use of an optical flow...
This paper presents an algorithm implemented in real time in a laboratory robot, designed to trace and detect the color of an object in an indoor environment using the Kalman filter. The image capture is done by a kinect camera installed in the robot. The algorithm is programmed into a single board computer, BeagleBone Black that uses the ROS — OpenCV system in image processing.
This paper presents the design and implementation of a controller that works with Fuzzy Logic, which allows to control the flow of a fluid in a training station of flow. The controller with Fuzzy Logic is implemented using two different low-cost boards: Arduino UNO and Raspberry Pi3. The purpose of this work is to analyze the behavior of these two boards when they are used with an advanced control...
The imminent arrival of advanced technologies in the field of telecommunications would give impulse to upgrade coherently the content of the topics of the last year of the electrical and network engineering program. For instance, the new topics based on the so-called nanocommunications networks might play a crucial role in the field of the medicine. It would demand to implement dedicate networks to...
The water tank system is widely used for demonstration purposes in control engineering. This paper describes a training system for process automation, an ideal way to teach and learn about important aspects of automation. We present the implementation of a micro plant incorporating intelligent instruments. We also describe a set of teaching tools to facilitate the learning of concepts related to linear...
A Matlab program to simulate the Line Following Robot was developed as a didactic tool to learn the theory of fuzzy control. The Simulink environment is used to model the dynamics of mobile and the fuzzy controller, and a Script is used to model the line form and the deviation of the mobile from the line. The Simulator allows evaluating the performance of Proportional-Derivative (PD) Fuzzy Control...
The continuous development of Internet of Things brings new tools in different areas of robotics, for example in the robotics of services. This document presents a low-cost alternative for a mobile explorer robot that uses open hardware and software, whose design is intended to incorporate cameras, sensors and other peripherals to be able to inspect its environment in addition to being controlled...
This work describes the implementation of a wireless sensor network (WSN) to locate an acoustic source in two dimensions. The network is made up of three sensor nodes located at the corners of a right triangle; a fourth node in the vicinity of the array acts as a base station providing connection to a notebook; the acoustic source is assumed to be within the rectangular area defined by the three sensors...
Cyber-Physical Systems (CPSs) may fail during runtime on supporting decision making if they are not capable of detecting and correcting their own failures. Thus, it has been proposed that CPSs should be self-aware, context-aware and goal-aware. In this paper we present preliminary results about how an architecture built over the Extensible Messaging and Presence Protocol (XMPP) may implement a distributed...
Code smells are a metaphor to describe symptoms in the code that may provoke maintainability problems. Code smell detection and remove have a closer relationship to refactoring which has been a well-known and disseminated practice for improving software maintenance and reuse. In 2013 a study for knowing about the position and knowledge of developers was conducted from Norway. This study covered developers...
This paper presents the use of a new concept: Internet of Things (IoT), applied to the fermentation process of Cocoa at the Piura's mountain range. A prototype was designed and built with sensors that record the variables of temperature, oxygen and carbon dioxide during the process and send this information to the Internet. Finally a system has been developed that receives this information, visualizes...
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The Data Register and Variable Monitoring System is designed and builded for obtain data from several sensors that measure values of variables from water flow in forest and plantation basins, such as water level of water stream, conductivity, water pH, water temperature, environment temperature and air humidity. This data is conditioned and registered at permanent and removable SD memory stick. The...
The analytical evaluation of the Pocklington's integro-differential equation for thin wires has been solved by the Method of Moments in many different versions. However, the least square procedure proposed here is a variant that uses only real algebra and is slightly more complex and computer intensive as opposed to using the Method of the Moments. Good convergence for the current is obtained and...
Agile software development methods introduced a new approach for software development compared to traditional methods and they have become increasingly popular. While traditional methods focus on disciplined processes and rigid practices, agile methods emphasizes on individuals, communication and product. Capability Maturity Model Integration (CMMI) was introduced as a process improvement model in...
Fruit of a collaboration between two international research institutions, the paper presents the ongoing activity to foster the provisioning of South America drainage datasets, by means of Open Data principles and tools. We discuss how those environmental data sources may be published and shared for the benefit of public and private organizations and advantage of multi-sectorial research disciplines...
This paper tackles the problem of finding the list of solutions with strictly increasing cost for the Semi-Assignment Problem. Four different algorithms are described and compared. The first two algorithms are based on a mathematical model and on a modification of Murty's algorithm, which was designed to find the list of solutions for the classical assignment problem. The third approach is a heuristic...
This paper presents a speech interface to extract domain-specific information from a tourism semantic website as a way to avoid complicated and unfriendly SPARQL queries. First, we present a user-oriented website with a semantic knowledge model of tourism. This model is also known as ontology, represents a common understanding of domain in which semantics of data is machine understandable. Second,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.