Search
Now showing items 71-80 of 490
Smoke detection for static cameras
(01/28/2015)
This paper describes the smoke detection for static cameras. The background subtraction was used to determine moving objects. Color characteristics were utilized to distinguish smoke regions and other scene members. Separate ...
Airflow and insulation effects on simultaneous syngas and biochar production in a top-lit updraft biomass gasifier
(2017-10-11)
The objective of this study was to understand the effect of airflow and insulation on syngas and biochar generations of rice hulls and woodchips in a top-lit updraft gasifier. Biochar yield decreased with increasing airflow. ...
La efectividad de la formación en ambientes virtuales de aprendizaje en la educación superior
(Revista Campus VirtualesRevista Campus Virtuales, 07/01/2016)
La educación virtual está posicionada a nivel mundial como una alternativa útil para
todo aquel que no tiene acceso a universidades tradicionales por situación económicas, familiar o
ubicación geográfica, pero actualmente ...
Reuse of use cases diagrams: an approach based on ontologies and semantic web technologies
(2012-07-04)
Software reuse is defined as the use of any artifact, or part thereof, created before, on a new Project. This practice has significant benefits in reducing costs and increasing quality and productivity in software development. ...
Simple and efficient method for calibration of a camera and 2D laser rangefinder
(2014-04-07)
In the last few years, the integration of cameras and laser rangefinders has been applied to a lot of researches on robotics, namely autonomous navigation vehicles, and intelligent transportation systems. The system based ...
Adsorption of Cu ions onto a 1.10 phenanthroline-grafted Brazilian bentonite
(2003-02-01)
The grafting, by chemical adsorption, of molecular 1.10-phenanthroline (OP) onto some Brazilian bentonite (montmorillonites) was studied to improve their adsorptive capacities to remove Cu ions from synthetic wastewater. ...
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ...
Survival Engineering and the Game of Knowledge: A Ludic Form of Teaching and Learning in Engineering
(The Future of Higher Education in the Middle East and Africa, 03/27/2018)
Within the engineering pedagogy, it must be remembered that students learn in many different ways: seeing, hearing, thinking, acting, drawing analogies, and building mathematical models in the area of science and technology. ...
Frame retransmission using a modified VST-TDMA access protocol in Picocell/WPAN
(2017 IEEE 9th Latin-American Conference on Communications (LATINCOM)2017 IEEE 9th Latin-American Conference on Communications (LATINCOM), 12/28/2017)
The VST-TDMA access protocol has shown to have many advantages over existing protocols in centralized (star) wireless network architectures. As most data-link layer protocols, it does not have a recovery feature as data ...
Wide tunable filters using a recirculating delay line with multi-reflections
(05/01/2002)
A ring resonator with multiple reflections as a tunable filter is proposed and analyzed in this paper. A coupler and two identical Bragg gratings are used to implement the internal reflections so an active filter with a ...