Search
Now showing items 61-66 of 66
Approach for the classification of polliniferous vegetation using multispectral imaging and neural networks
(Corporación Universidad de la Costa, 2020)
Beekeeping has suffered a serious deterioration in the regions of the world. The possibility of nectar-polliniferous resources has decreased and, therefore, the feeding of bees, with the consequent decrease in production. ...
Model and simulation of a distribution logistic system for learning
(Procedia Computer Science, 2019)
Computer-based simulation is one of the most extensively used tools of Information and Communication Technologies (ICT). This technique allows to simulate the operation of different kinds of facilities or processes in the ...
Computational analysis of third-grade liquid flow with cross diffusion effects: application to entropy modeling
(Corporación Universidad de la Costa, 2020)
The key goal of this current study is to analyze the entropy generation with cross diffusion effects. The third-grade type non-Newtonian fluid model is used in this study. The current flow problem is modelled with stretching ...
Influence of knowledge management between the bank and the local socioeconomic development: correlational analysis
(Universidad de la Costa, 2019)
Knowledge management in the bank applied to the requirements of the Local Socioeconomic development (LSED) is a topic without concrete results about the implemented strategies. Given the situation, this study seeks to ...
Methodology for processing time series using machine learning
(Corporación Universidad de la Costa, 2020)
There are currently countless applications that can be cited in different areas of research and industry, where the data are represented in the form of time series. In the last few years, a dramatic explosion in the amount ...
Information security in WSN applied to smart metering networks based on cryptographic techniques
(Corporación Universidad de la Costa, 2020-12-04)
The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being ...