154 research outputs found

    Multispectral image analysis for the detection of diseases in coffee production

    Get PDF
    Coffee is produced in Latin America, Africa and Asia, and is one of the most traded agricultural products in international markets. The coffee agribusiness has been diversified all over the world and constitutes an important source of employment, income and foreign exchange in many producing countries. In recent years, its global supply has been affected by adverse weather factors and pests such as rust, which has been reflected in a highly volatile international market for this product [1]. This paper shows a method for the detection of coffee crops and the presence of pests and diseases in the production of these crops, using multispectral images from the Landsat 8 satellite

    Design and simulation of vehicle controllers through genetic algorithms

    Get PDF
    Genetic Programming (GP) is a population-based evolutionary technique, which, unlike a Genetic Algorithm (GA) does not work on a fixed-length data structure, but on a variable-length structure and aims to evolve functions, models or programs, rather than finding a set of parameters. There are different histories of driver development, so different proposals of the use of PG to evolve driver structures are presented. In the case of an autonomous vehicle, the development of a steering controller is complex in the sense that it is a non-linear system, and the control actions are very limited by the maximum angle allowed by the steering wheels. This paper presents the development of an autonomous vehicle controller with Ackermann steering evolved by means of Genetic Programming

    Low-Cost information transfer system between vehicles on roads

    Get PDF
    The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely

    Methodology for processing time series using machine learning

    Get PDF
    There are currently countless applications that can be cited in different areas of research and industry, where the data are represented in the form of time series. In the last few years, a dramatic explosion in the amount of time series ha occurred, so their analysis plays a very important role, since it permits to understand the phenomena described. A "time series" is a set of data of a certain phenomenon or equation, sequentially recorded. An alternative that allows to know the behavior and dynamics of a set of time series has been presented in the problem of classification, however, it is necessary to mention that most of the phenomena found in real life do not have a classification and that is why the unsupervised classification has brought great interest. Classification is organizing and categorizing objects into different, unlabeled classes or groups, which must be coherent or homogeneous [1][2]. This research proposes a methodology for obtaining the unsupervised classification of a set of time series using an unsupervised approach

    Information security in WSN applied to smart metering networks based on cryptographic techniques

    Get PDF
    The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System

    Unsupervised learning algorithms applied to grouping problems

    Get PDF
    One of the tasks of great interest within process mining is the discovery of business process models, which consists of using an event log as input and producing a business process model by analyzing the data contained in the log and applying a process mining method, task and/or technique. The discovery allows the identification of the behaviors contained in the cases of the event log in order to detect possible deviations and/or validate that the business process is executed according to the business requirements. This paper presents an approach based on unsupervised learning techniques for the grouping of traces to generate simpler and more understandable models. The algorithms implemented for clustering are K-means, hierarchical agglomerative and density-based spatial clustering of applications with noise (DBSCAN)

    Search for optimal routes on roads applying metaheuristic algorithms

    Get PDF
    The design of efficient routes for vehicles visiting a significant number of destinations is a critical factor for the competitiveness of many companies. The design of such routes is known as the vehicle routing problem. Indeed, efficient vehicle routing is one of the most studied problems in the areas of logistics and combinatorial optimization. The present study presents a memetic algorithm that evolves using a mechanism inspired by virus mutations. Additionally, the algorithm uses Taboo Search as an intensification mechanism

    CTR prediction of internet ads using artificial organic networks

    Get PDF
    For advertising networks to increase their revenues, priority must be given to the most profitable ads. The most important factor in the profitability of an ad is the click-through-rate (CTR) which is the probability that a user will click on the ad on a Web page. To predict the CTR, a number of supervised rating models have been trained and their performance is compared to artificial organic networks (AON). The conclusion is that these networks are a good solution to predict the CTR of an ad

    Vanet heterogeneous networks with wireless technology variation according to the capacity of users in urban areas

    Get PDF
    As of late, traffic blockage, street mishaps, and ecological contamination brought about by traffic, alongside the need to associate and utilize constant applications, have become issues of worldwide intrigue. Different on-screen characters, for example, vehicle producers, the scholarly community, and government offices have begun to invest a ton of energy together towards the acknowledgment of the idea of huge scope vehicular interchanges. One of the primary methodologies in this kind of system is the advancement of remote advances and their assorted organizations, concentrating on the association with the Internet through WiFi systems, cell systems, or specially appointed vehicular systems. VANETs are essentially intended to give data trade through Vehicle to Vehicle (V2V) and Vehicle to foundation (V2I) interchanges, permitting ceaseless network and being exceptionally utilized for short-range correspondence, with high transmission speed through which it is proposed that clients keep up an association and distinguish occasions about clog or street conditions. This exploration presents a vehicular situation that tries to acquire a sufficient presentation while executing a heterogeneous network in a few segments of the city of Bogotá, Colombia

    Prediction of the corn grains yield through artificial intelligence

    Get PDF
    Currently, the determination of the quality of the cereals is done manually by grain classifier experts prior to the marketing stage. In this paper we present a web software tool that allows determining the quality level of a corn sample automatically from an image of it. Image processing algorithms were implemented to correct distortions caused mainly by the capture process. The K-Means classification algorithm was used and a function was developed to calculate the hectolitre weight in relation to the sample area. The results obtained by the application for grades 1 and 2, are close to those measured by the experts. However, those for grade 3 have not been similar since the subsamples selected were not representative
    • …
    corecore