The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents the simulation and harmonic analysis of a charging station model developed in “Modeling and protection of electric vehicle charging station”, which was adapted with the electrical parameters of the distribution system of Cuenca city, with The purpose of quantifying the amount of harmonics that this type of stations can produce in the network. The simulation resulted, that the...
The number of elderly people in the world is growing rapidly. For this reason, is necessary more tools for the care, entertainment, and interaction of this part of population. This paper presents the architecture that will take SAFER (“Smart Assistance platform For EldeRly care”). The objective of this platform is providing, in an integrated way, a set of smart services that improve the quality of...
In this paper we present a case study emphasizing the proposal of a telecare system which might be implemented in the first attention level belonging to health centers of Periurban zones of Lima city. Concretely, the system relies entirely in an algorithm which is based on a mathematical scheme that models the behavior of the glucose in type 2 diabetes patients under episodes of binge eating disorder...
This paper presents an algorithm implemented in real time in a laboratory robot, designed to trace and detect the color of an object in an indoor environment using the Kalman filter. The image capture is done by a kinect camera installed in the robot. The algorithm is programmed into a single board computer, BeagleBone Black that uses the ROS — OpenCV system in image processing.
A Matlab program to simulate the Line Following Robot was developed as a didactic tool to learn the theory of fuzzy control. The Simulink environment is used to model the dynamics of mobile and the fuzzy controller, and a Script is used to model the line form and the deviation of the mobile from the line. The Simulator allows evaluating the performance of Proportional-Derivative (PD) Fuzzy Control...
This work describes the implementation of a wireless sensor network (WSN) to locate an acoustic source in two dimensions. The network is made up of three sensor nodes located at the corners of a right triangle; a fourth node in the vicinity of the array acts as a base station providing connection to a notebook; the acoustic source is assumed to be within the rectangular area defined by the three sensors...
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The Data Register and Variable Monitoring System is designed and builded for obtain data from several sensors that measure values of variables from water flow in forest and plantation basins, such as water level of water stream, conductivity, water pH, water temperature, environment temperature and air humidity. This data is conditioned and registered at permanent and removable SD memory stick. The...
Fruit of a collaboration between two international research institutions, the paper presents the ongoing activity to foster the provisioning of South America drainage datasets, by means of Open Data principles and tools. We discuss how those environmental data sources may be published and shared for the benefit of public and private organizations and advantage of multi-sectorial research disciplines...
Camera-enabled sensors deployed for visual monitoring will cover a region of the target field, providing information for many innovative applications based on wireless sensing. Actually, some areas of the monitored field may have more relevance than others, according to the characteristics of the applications, which may indicate that such areas need better coverage to avoid blind spots and achieve...
This paper presents the modeling, simulation of a double-stage evaporation process to obtain Bioethanol from sugarcane juice; the model was validated with data from a plant located in Peru. So is the calculation of a Nonlinear Control and optimization following the Extended Prediction Self-Adaptive Control approach, because it has less computational load. The results achieved the control of juice...
The estimation of states it is a problem that although it has not been considered of great relevance in the distribution networks along the history, has taken importance because of the need to know the systems operational states by the great advances of the networks in terms of new technologies and a constant growth in the long term. This paper presents a work focused on the selection of the number...
During last period, the energy harvested from solar power cells have arisen exponentially, being every day more important, because it is a clean energy presented in almost all over the globe. However, in order to track the maximum power point to maximize the drained energy, different algorithms are implemented to impose certain current and voltage at the solar module output. The maximum power point...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
The use of sensing technologies in industrial environments has opened many possibilities for monitoring and control applications, driving much research efforts in the last years. Among the challenging issues related to industrial wireless sensor networks, efficient nodes deployment is a major concern since it can directly impact the way sensors operate, which has demanded proper solutions. When sensing...
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
The liberalization of power markets has led to changes in the electricity pricing mechanism. Under this new paradigm, the introduction of competition in the generation segment entails a price determination according to an economic dispatch of generating units. However, transmission constraints usually imply a subsequent alteration of the supply costs, above those purely due to the power production...
This article introduces a dynamic model for dissolved oxygen content in an aquaculture system of whiteleg shrimp. Additionally, a non-linear controller has been designed for hourly control. This time frequency is necessary because of the time required to reach the predicted levels of oxygen. The dynamic model has incorporated a shrimp growth model calibrated with real data. The results show how the...
Intrusion Detection Systems (IDSs) are signature-based software tools that provide mechanisms for detection and analysis of network intrusions. Using an experimental scenario and real traffic collected at a higher education institution in Brazil, we evaluate the performance of Snort and Suricata IDSs for detection of current Distributed Denial-of-Services attack (Slowloris). Our study has found the...
This paper proposes to investigate the energy efficiency and the economic impact provided by lighting retrofit in popular housing, verifying the qualitative analysis of light emitting diode lamps replacing compact fluorescents by the evaluation of electrical and lighting parameters. The study evaluated proposal by the Housing Agency of the State of Goiás, Brazil, which will replace conventional light...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.