標題: Titlebook: I+D for Smart Cities and Industry; Proceedings of RITAM Marcelo Zambrano Vizuete,Miguel Botto-Tobar,Ana Za Conference proceedings 2023 The [打印本頁] 作者: nourish 時間: 2025-3-21 17:22
書目名稱I+D for Smart Cities and Industry影響因子(影響力)
書目名稱I+D for Smart Cities and Industry影響因子(影響力)學科排名
書目名稱I+D for Smart Cities and Industry網絡公開度
書目名稱I+D for Smart Cities and Industry網絡公開度學科排名
書目名稱I+D for Smart Cities and Industry被引頻次
書目名稱I+D for Smart Cities and Industry被引頻次學科排名
書目名稱I+D for Smart Cities and Industry年度引用
書目名稱I+D for Smart Cities and Industry年度引用學科排名
書目名稱I+D for Smart Cities and Industry讀者反饋
書目名稱I+D for Smart Cities and Industry讀者反饋學科排名
作者: Occipital-Lobe 時間: 2025-3-21 21:54 作者: A簡潔的 時間: 2025-3-22 01:34
Learning Model Predictive Control in a Virtual Environment Through a Practical Case: A Continuous Stirred tank reactor (CSTR). The control algorithm was developed from a linearity process to regulate the CSTR at the operation point. The MPC optimization took the temperature in the jacket and the molar concentration as the control objectives. The final version of the virtual platform presented flex作者: Connotation 時間: 2025-3-22 07:24 作者: debase 時間: 2025-3-22 10:04
CFD Evaluation of an Adaptable Protective Cabinet for Patients with Infectious-Contagious Diseasestact with infected patients, their blood or their secretions. In this sense, the objective of this study is to analyze the design and manufacture of a prototype of a safe cabin for patient care, in order to protect the lives of health personnel and the need to adapt to the coronavirus crisis. In thi作者: 規(guī)范要多 時間: 2025-3-22 16:45 作者: 艦旗 時間: 2025-3-22 17:43 作者: 煉油廠 時間: 2025-3-22 22:31
Evaluation of Data Acquisition System for PES Membranes Permeability Analysis in Water Treatmente are limited studies related to the technology of automatic data acquisition systems (DAQ) for the analysis of pore fouling based on the permeability of the membranes. Thus, the objective of this research was to evaluate a DAQ system through its implementation in permeability tests of polyethersulf作者: 做作 時間: 2025-3-23 04:33
Design and Implementation of a Three-Phase Analyzer in a Free Software Platform for Power Quality Mefrom basic quantities such as voltage, current or power to complex parameters such as harmonic content or power factor. Energy analyzers are too expensive instruments due to the high technological development involved in their manufacture. For this reason, this article shows an alternative in which 作者: 代替 時間: 2025-3-23 06:24
Electrical Consumption Optimization Based on Clustering of Consumers’ Data Applying K-Means Algoritheeds for preparing the actual electrical infrastructure to reach higher demands. In this paper, the optimization of consumer’s data is performed through metaheuristic methods. The first step was to determine the higher electricity consumers from K-means algorithm. After identifying the data to be op作者: regale 時間: 2025-3-23 09:58
Reliability of Wind and Solar Energy in the Electric Generation System Using Computational Methodsy. The renewable resource data used correspond to the province of Loja in Ecuador, where the Villonaco Wind Farm is currently operating and thermosolar and photovoltaic energy projects are being developed, where the peak demand data of 30.27?MW was used. To verify the reliability of renewable energi作者: CRAFT 時間: 2025-3-23 14:45 作者: 針葉樹 時間: 2025-3-23 18:37
Photovoltaic Generation Potential for?Vehicles with?Solar Panels renewable and clean energies. Here is exposed as a case study the city of Cuenca that receives constant solar radiation and without significant variations throughout the year. This research consists of the development of a measurement system to obtain the average radiation, through the installation作者: nascent 時間: 2025-3-23 22:11
Evaluation of Capacity Curves in Generators, Transformers, and Transmission Lines for the Analysis oators, transformers, and transmission lines have their operating limits based on geometric locations that are defined according to the mathematical models that determine their mode of operation in each case. The advantage of using the proposed tool is that it has a direct visual information that ind作者: 脆弱帶來 時間: 2025-3-24 05:52
Changes of Land Use and Land Cover in Hotspots Within the Western Amazon: The Case of the Yasuní Bioof geographic information systems. The study area comprises the southern zone of the Diversity and Life Zone (DLZ), located in the Yasuní Biosphere Reserve, within the western Amazonian lowland. The processes for conducting the LULC in the DLZ included 1) data collection and analysis, 2) remote sens作者: NIL 時間: 2025-3-24 09:44 作者: FIN 時間: 2025-3-24 11:27 作者: Bravado 時間: 2025-3-24 16:52 作者: rods366 時間: 2025-3-24 19:22 作者: CLEAR 時間: 2025-3-25 02:24 作者: nonchalance 時間: 2025-3-25 03:54
Diego González,Oscar Gonzales,Christian Ortega,Christian Llumiquinga,Homero Torresy. However, when oriented to distributed resource-constrained edge devices, existing federated learning schemes still suffer from heterogeneity challenge. Hierarchical federated learning divides devices into clusters based on their resources to enhance training efficiency. In addition, there are als作者: 改正 時間: 2025-3-25 09:59
Oscar Gonzales,Diego González,Christian Llumiquinga,Christian Ortega,Mauricio Roseroance. However, with the development of the blockchain industry, various financial fraud activities have also emerged on the blockchain. Effective regulation is a necessary condition for the healthy development of the blockchain ecosystem. A comprehensive blockchain anti-fraud prototype system is a s作者: FAR 時間: 2025-3-25 14:20 作者: 按時間順序 時間: 2025-3-25 19:04
Lesly Cadena,Xavier David Rógel,Nelson Sotomayoraper proposes a blockchain-based on-chain and off-chain dual-trusted carbon emission trading system with reputation mechanism (BoodCET). We employ the Internet of Things technology, BigchainDB storage, and supervision by the Ministry of Ecology Environment for the “collection - storage - calculation作者: 疏忽 時間: 2025-3-25 23:20
Abraham Loja,Alan Cuenca,Elizabeth Armas,Jerson Colchame based on the RLWE (learning with errors from ring) commitment scheme and further apply the proposed LRS scheme to blockchain to construct an anonymous post-quantum cryptocurrency model. Concretely, we first prove through setting parameters reasonably, we can make a RLWE-based commitment scheme to作者: 雄偉 時間: 2025-3-26 01:13
David Trajano Basantes Montero,Bryan Rafael Rosero Ortiz,Daniel Isaías Barzallo Nú?ez,Luis Miguel Qu This paper proposes an information encryption mechanism based on QR code to solve the problem of information leakage in data communication. The error correction mechanism of the QR code allows it to record information normally even if it is partially damaged. Taking advantage of this feature, this 作者: 兩種語言 時間: 2025-3-26 04:49 作者: 行為 時間: 2025-3-26 08:29
Ricardo Rosero,Oscar Gonzales,Christian Llumiquinga,Anabel Portero,Gabriel Vásquezlockchain technology, its security has become a bottleneck restricting the development. In order to solve the problem, the blockchain structure characteristic can be used to build a security detection model. Taking 51% attack detection as an example, the relationship among attack state, attack inten作者: 彎腰 時間: 2025-3-26 12:49 作者: 宮殿般 時間: 2025-3-26 19:03
Alan Cuenca,Henry Miniguano,Santiago Illescas,Livio Miniguano,Darwin Cuasapazent decreases, attackers generally use encrypted traffic for camouflage to avoid network intrusion detection. Existing malicious traffic detection methods mainly focus on extracting traffic features at the single-flow level, but they have lost their effectiveness due to frequent malware updates and 作者: 手段 時間: 2025-3-26 23:32 作者: 傻 時間: 2025-3-27 03:21 作者: 含糊其辭 時間: 2025-3-27 07:04
Freddy Tamayo,Ricardo Rosero,Mauricio Rosero,Christian Llumiquinga,Cristina Chamorromutability, smart contracts still exhibit various vulnerabilities that hackers can exploit, resulting in significant losses. Numerous smart contracts on various blockchains, including Ethereum, have been attacked due to various vulnerabilities. The inefficiency of detecting these vulnerabilities has作者: Mhc-Molecule 時間: 2025-3-27 12:52 作者: echnic 時間: 2025-3-27 17:41
Jhenny Cayambe,Bolier Torres,Francisco Cabrera,Carlos G. H. Díaz-Ambrona,Theofilos Toulkeridis,Marcoy phishing scams. It forces us to explore more efficient countermeasures and perspectives for better solution. Since graph modeling provides rich information for possible downstream tasks, we use a surrounding graph to model the transaction data of a target address, aiming to analyze the identity of作者: Narcissist 時間: 2025-3-27 18:31 作者: Muscularis 時間: 2025-3-28 01:17
CFD Evaluation of an Adaptable Protective Cabinet for Patients with Infectious-Contagious Diseasesisualization and understanding of the behavior of sneezing within a cabin contributes to improving the designs of protection cabinets and reducing the spread of pathogenic particles as much as possible. Getting a maximum velocity . 14.4?m/s in 0.25?s.作者: 尖酸一點 時間: 2025-3-28 03:26 作者: Extort 時間: 2025-3-28 08:08
Reliability of Wind and Solar Energy in the Electric Generation System Using Computational Methodsgration of non-conventional renewable energies into the electric system. It concludes that wind, solar thermoelectric, and photovoltaic technologies not only improve the reliability of the system but also provide power that can be used to meet the demand of other sectors.作者: Liberate 時間: 2025-3-28 10:54 作者: 不能根除 時間: 2025-3-28 16:46
Photovoltaic Generation Potential for?Vehicles with?Solar Panelse opportunities of the implementation of photovoltaic panels on vehicles. Existing studies consider only fixed panels on buildings, but as evidenced in this study, having panels moving on the streets of the city, the situation is different from the above mentioned. Electric mobility is accompanied b作者: 發(fā)酵 時間: 2025-3-28 20:59
Evaluation of Capacity Curves in Generators, Transformers, and Transmission Lines for the Analysis oisturbance appears, all these operations presented by the EPS have to be studied in a timely manner by an analysis of permanent stability or safety of operation of the system for its correct operation. The proposed tool, for its evaluation, was carried out in the IEEE 39-bus system, carrying out an 作者: CUMB 時間: 2025-3-28 22:53
Changes of Land Use and Land Cover in Hotspots Within the Western Amazon: The Case of the Yasuní Bioile the forest decreased by 0.93%. Therefore, we may state that the LUCL allows different local and international actors to contribute in agri-environmental and conservation decisions in order to minimize deforestation within the study area.作者: Tractable 時間: 2025-3-29 04:36
2367-3370 nd the dissemination of results from R&D projects that have been developed both within and outside of Ecuador over the last few years..978-3-031-11294-2978-3-031-11295-9Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: 熟練 時間: 2025-3-29 09:52 作者: 喪失 時間: 2025-3-29 12:07
which means that there are no conflict transactions so that all transactions can be processed in parallel. 2) The content of each block only exists in a constant number of random nodes, which ensures that the overall storage and bandwidth costs will not increase rapidly as the number of nodes incre作者: instate 時間: 2025-3-29 16:47 作者: sulcus 時間: 2025-3-29 20:14
Paulina Lara,Ximena Vaca,Ivannova Jumbo-Jaramilloonsideration, we propose TASMG to model Ethereum transaction records as a temporal-amount network and then present TAW to effectively embed accounts via their transaction records, which integrates temporal and amount information of the proposed network. Experimental results demonstrate the superiori作者: inflame 時間: 2025-3-30 03:40
ee (AST) analysis to extract code gadgets with sliding windows to locate the function that may contain code vulnerabilities. We evaluate the effectiveness of our framework in vulnerability detection with F1-score. Our results indicate that . achieves high Micro-F1 (0.9591) and Macro-F1 (0.9293), out作者: 防銹 時間: 2025-3-30 04:42 作者: Breach 時間: 2025-3-30 09:04 作者: 圍裙 時間: 2025-3-30 14:22
Bruno Vallecilla Amores,Diana Belén Peralta-Zurita,Jaime Vinicio Molina Osejos,Edison Corrales Segovkchain transaction patterns and detecting illegal transaction behavior using new heuristic learning methods and graph neural network methods to detect frequent frauds. The system monitors and detects fraudulent activities such as phishing, ICO, price manipulation, money laundering, and illegal fundr作者: d-limonene 時間: 2025-3-30 19:36