Buscar
Mostrando ítems 1-10 de 35
Development of a Fuzzy Logic-Based Solar Charge Controller for Charging Lead–Acid Batteries
(Springer, 2020)
Acceso restringido
The design and implementation of a solar charge controller for lead–acid batteries is intended to supplement a component of the water purification module of the water treatment unit for natural disaster relief. This unit ...
Early childhood online education in the COVID-19 context. Behavioral Patterns for User Interface Design
(IEEE, 2020)
Acceso restringido
The outcomes from the lived experience descriptions show that tested indicators for the evaluation of both MOOCs and preschool education are insufficient or inexact for the assessment of our current condition. Most of the ...
Pedagogical participatory experiences to promote Public Interest Technology from volunteer work
(IEEE, 2020)
Acceso restringido
Public Interest Technologies allow practices and learning opportunities for the sustainable improvement of living conditions. Our analysis of participatory pedagogical experiences, from the perspective of student volunteer ...
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)
Acceso restringido
Child malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)
Acceso restringido
Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...
Software Curriculum Transformation at the University Level
(IEEE, 2020)
Acceso restringido
Many software-related degrees exist, and a diversity of programs makes it difficult for candidates to choose where they wish to study. Selecting the wrong program costs students time, money, and considerable effort. Though ...
Use of the sensors of a latest generation mobile phone for the three-dimensional reconstruction of an archaeological monument: The survey of the Intihuatana stone in Machu Picchu (Peru')
(Institute of Physics Publishing, 2020)
Acceso abierto
The survey of archaeological monuments presents particular needs and difficulties. Such surveys must in fact be as complete, geometrically correct and accurately geo-referenced as possible. These needs, however, often face ...
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
Semantic Segmentation of Weeds and Crops in Multispectral Images by Using a Convolutional Neural Networks Based on U-Net
(Springer, 2020)
Acceso restringido
A first step in the process of automating weed removal in precision agriculture is the semantic segmentation of crops, weeds and soil. Deep learning techniques based on convolutional neural networks are successfully applied ...