Tópicos Sugeridos dentro de su búsqueda.
https://purl.org/pe-repo/ocde/ford#2.02.04 158 https://purl.org/pe-repo/ocde/ford#5.02.04 55 Ingeniería de Sistemas 43 https://purl.org/pe-repo/ocde/ford#2.00.00 43 Computación 38 Computer sciences 38 http://purl.org/pe-repo/ocde/ford#2.02.04 34 más ...
Mostrando 1 - 20 Resultados de 1,232 Para Buscar 'para computer based', tiempo de consulta: 1.35s Limitar resultados
1
artículo
Securing a reliable source of food for the ever-growingpopulation is one of the big challenges for humanity.Demand for aquatic foods will continue to grow andproduction process in aquaculture needs improvement. Alow-cost Internet of Things based system for monitoringhatching and growth of Rainbow trout (Oncorhynchusmykiss) is designed and implemented in a rural area in Peru.Three-layer architecture with sensors and underwatercamera based on raspberry pi, Wi-Fi and satelliteconnection to Internet sends data to cloud services forstorage and analysis. The system reduced drastically themanual and time-consuming monitoring tasks relatedto traditional aquaculture and the data collected will beused to establish optimal growth conditions parametersand future growth predictions.
2
tesis de grado
Agriculture is one of the most important economic activities in Peru. Furthermore, the Peruvian mango is the most important fruit as an export product on the European market due to its good quality. Three varieties of mango are cultivated in Peru: Haden, Kent and Tommy Atkins, each of them presents different characteristics; however, the production of this fruit is affected because manual processes are still used for its production, which generates a delay in the process due to the inaccuracy of the labour. The present study aims to develop the simulation of an automated grading system for Peruvian mangoes based on computer vision. On the other hand, to establish the process development, the transfer learning principle was analysed and a flow diagram of the system was made. The simulation of the system environment was obtained through the Factory IO software, together with the image proc...
3
tesis de grado
Lemon exports are of great influence in Peru, since there is a great demand from countries such as the USA, Belgium and Holland. For this reason, the agricultural sector is one of the essential factors for the economic development of the country, since it generates S/29,553 million annually throughout the national territory. On the other hand, Peru offers two types of lemons, for example: the Tahitian lemon and the subtle lemon; however, due to its characteristics, the Tahitian lemon is the one that is sent as an export product worldwide. Currently, the selection process of this fruit is done manually, since there are not enough industrial optimizations in its process. Therefore, the present study aims to carry out the simulation of an automated grading system for Tahitian lemon based on computer vision. The selection parameters for the image processing were established as the levels of ...
4
tesis de maestría
The aim of this Master's Thesis was to develop a naturally controllable BCI that can predict motion trajectories from the imagination of motor execution. The approach to reach this aim was to nd a correlation between movement and brain data, which can subsequently be used for the prediction of movement trajectories only by brain signals. To nd this correlation, an experiment was carried out, in which a participant had to do triggered movements with its right arm to four di erent targets. During the execution of the movements, the kinematic and EEG data of the participant were recorded. After a preprocessing stage, the velocity of the kinematic data in x and y directions, and the band power of the EEG data in di erent frequency ranges were calculated and used as features for the calculation of the correlation by a multiple linear regression. When applying the resulting regression paramete...
5
tesis de maestría
The aim of this Master's Thesis was to develop a naturally controllable BCI that can predict motion trajectories from the imagination of motor execution. The approach to reach this aim was to nd a correlation between movement and brain data, which can subsequently be used for the prediction of movement trajectories only by brain signals. To nd this correlation, an experiment was carried out, in which a participant had to do triggered movements with its right arm to four di erent targets. During the execution of the movements, the kinematic and EEG data of the participant were recorded. After a preprocessing stage, the velocity of the kinematic data in x and y directions, and the band power of the EEG data in di erent frequency ranges were calculated and used as features for the calculation of the correlation by a multiple linear regression. When applying the resulting regression paramete...
6
artículo
Fish larvae counting is a technique applied in aquaculture to determine the efficiency of the induction stage and to know the number of fertilized larvae. For this reason, the research aims to improve the count of larvae under 3 fundamental pillars: precision, error and time. For this, we carried out an experimental investigation under a completely randomized design with two counting systems: traditional and artificial vision; each one with 10 repetitions, with 2000 larvae; Later, we carried out the count by means of artificial vision using a camera that captured images of a fish tank with moving fish. The results show that the proposed method is feasible for counting larvae, with 92.65% accuracy, 7.41% error and an average time of 61 seconds per repetition in relation to the traditional counting system: accuracy 64.44%, error 35.61% and time 2009.3 s. The developed system can be replica...
7
artículo
In order to facilitate 3D object processing, it is common to use high-level representations such as local descriptors that are usually computed using defined neighborhoods. K-rings, a technique to define them, is widely used by several methods. In this work, we propose a model for the distributed computation of local descriptors over 3D triangular meshes, using the concept of k-rings. In our experiments, we measure the performance of our model on huge meshes, evaluating the speedup, the scalability, and the descriptor computation time. We show the optimal configuration of our model for the cluster we implemented and the linear growth of computation time regarding the mesh size and the number of rings. We used the Harris response, which describes the saliency of the object, for our tests.
8
artículo
In order to facilitate 3D object processing, it is common to use high-level representations such as local descriptors that are usually computed using defined neighborhoods. K-rings, a technique to define them, is widely used by several methods. In this work, we propose a model for the distributed computation of local descriptors over 3D triangular meshes, using the concept of k-rings. In our experiments, we measure the performance of our model on huge meshes, evaluating the speedup, the scalability, and the descriptor computation time. We show the optimal configuration of our model for the cluster we implemented and the linear growth of computation time regarding the mesh size and the number of rings. We used the Harris response, which describes the saliency of the object, for our tests.
9
artículo
Pokémon Double Battles present a complex decision-making environment that has traditionally relied on manual data analysis. This paper introduces an automated system leveraging computer vision and deep learning to extract structured gameplay data from battle footage. Our approach integrates You Only Look Once (YOLO) for Pokémon sprite recognition along with Tesseract-based optical character recognition (OCR) for extracting move and status text. The study introduces a custom-built image dataset generated through the augmentation of publicly available Pokémon sprites, which is then used to train a YOLO model for sprite recognition. The system was tested across multiple controlled and real-world gameplay scenarios, achieving high accuracy in Pokémon recognition and action tracking. Additionally, a JSON-based gameplay notation system is proposed to structure battle sequences, thus improv...
10
artículo
Different Machine Learning techniques have been used in order to identify the wishes of patients with neurodegenerative diseases. For this purpose, a database of electroencephalographic (EEG) signals was used, which were filtered and processed. The determination of the wills of patients was achieved through the identification of brain waves P300, these signals are presented in the brain in response to an unexpected stimulus and among its many applications is the implementation of the so-called Brain-Computer Interface .
11
artículo
Different Machine Learning techniques have been used in order to identify the wishes of patients with neurodegenerative diseases. For this purpose, a database of electroencephalographic (EEG) signals was used, which were filtered and processed. The determination of the wills of patients was achieved through the identification of brain waves P300, these signals are presented in the brain in response to an unexpected stimulus and among its many applications is the implementation of the so-called Brain-Computer Interface .
12
artículo
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses differen...
13
artículo
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses differen...
14
artículo
Graduated motor imagery is the technique used in rehabilitation therapies, for the treatment of chronic pain and in most cases for movement disorders, the technique consists in strategically presenting therapies that correspond to laterality perception, mirror therapies and motor imagery. In the present work a mechanism was designed that facilitates the patient to learn about the movement mechanisms and the way in which the movement interacts with the extremities of the upper and lower limbs, the design is based on being able to use 24 images of the upper limbs and lower, these images are grouped into two groups with a different background, one dark and the other light, these images are grouped and sequentially arranged in a video, each image has a duration of 2 seconds in the video, after this time the image, at the time each image is displayed, the patient raises his hand that correspo...
15
artículo
This article reports the state-of-the-art of the implementation of finite element modeling for clay masonry walls under lateral loads. Important work had been developed at CIMID Laboratory of Structures in clay walls under lateral loads and, according to the review, nowadays, researches mainly report experimental tests with their numerical nonlinear models. This process is important to validate and complement their results. Bench-mark model developed in 1994 at Chiba University had been selected to evaluate all work developed at CISMID in these recently years.  The evaluation uses three variables: 1) The study evaluated include experimental results for masonry walls, (2) The study evaluated use nonlinear models for interaction between mortar and bricks, and (3) The study evaluated record their results with graphics showing the failure process. Finally, evaluate these models with fin...
16
tesis de grado
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud and other adversarial tactics, including malware, data leaks or denial of service. There have been significant research advances in the development of accurate botnet detection methods underpinned on supervised analysis but assessing the accuracy and performance of such detection methods requires a clear evaluation model in the pursuit of enforcing proper defensive strategies. In order to contribute to the mitigation of botnets, this paper introduces a novel evaluation scheme grounded on supervised machine learning algorithms that enable the detection and discrimination of different botnets families on real operational environments. The proposal relies on observing, u...
17
artículo
This research was carried out within the framework of the design of professional profiles by competencies in one of the areas of significant studies, such as Computer Science, whose objective was to build the professional profile of the graduate of the Professional Career of Systems and Computer Engineering of the Santo Domingo de Guzmán University. This research arises from the need to review the current design of the professional profile of the graduate in this study program and compare it with the professional labor demands of this new Peruvian society, through occupational analysis and based on the vision of the professional related to this career. The study was located within the post-positivist paradigm and its qualitative approach, from hermeneutics and using the grounded theory, the method used was the continuous comparative, as informants we worked with the students of the last...
18
artículo
This research was carried out within the framework of the design of professional profiles by competencies in one of the areas of significant studies, such as Computer Science, whose objective was to build the professional profile of the graduate of the Professional Career of Systems and Computer Engineering of the Santo Domingo de Guzmán University. This research arises from the need to review the current design of the professional profile of the graduate in this study program and compare it with the professional labor demands of this new Peruvian society, through occupational analysis and based on the vision of the professional related to this career. The study was located within the post-positivist paradigm and its qualitative approach, from hermeneutics and using the grounded theory, the method used was the continuous comparative, as informants we worked with the students of the last...
19
artículo
The main objective of this paper is the development of a speech and text recognition system to improve security in user identification. For the development of the system, deep learning methodologies and several Python libraries were implemented, including Speech_recognition, Pyttsx3, and Librosa, among others. The system was evaluated in a controlled environment using 50 speech samples, obtaining an accuracy of 74%. The results indicated that 61.53% of the errors were due to failures in voice identification and 30.76% were due to discrepancies in matching the generated text. These findings underscore the overall effectiveness of the system, although they also point to the need to adjust the similarity thresholds and improve the recognition algorithms to increase their accuracy and robustness. It is concluded that the system presents a promising solution for biometric voice authentication...
20
objeto de conferencia
Presentación que se llevó a cabo durante el IV Congreso Internacional de Computación y Telecomunicaciones COMTEL 2012 del 24 al 26 de octubre de 2012 en Lima, Perú. COMTEL, es un certamen organizado por la Facultad de Ingeniería de Sistemas, Cómputo y Telecomunicaciones de la Universidad Inca Garcilaso de la Vega, que congrega a profesionales, investigadores y estudiantes de diversos países con el fin de difundir e intercambiar conocimientos, mostrar experiencias académicas-científicas y soluciones para empresas en las áreas de Computación, Telecomunicaciones y disciplinas afines.