Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Miguel Angel Prada"'
Autor:
Juan Jose Fuertes, Miguel Angel Prada, Jose Ramon Rodriguez-Ossorio, Raul Gonzalez-Herbon, Daniel Perez, Manuel Dominguez
Publikováno v:
IEEE Access, Vol 9, Pp 144395-144405 (2021)
A new industrial production model based on digitalization, system interconnection, virtualization and data exploitation, has emerged. Upgrade of production processes towards this Industry 4.0 model is one of the critical challenges for the industrial
Externí odkaz:
https://doaj.org/article/1c05204500f44f1cb4d3fbd9a1077b89
Autor:
Miguel Angel Prada, Manuel Dominguez, Jose Lopez Vicario, Paulo Alexandre Vara Alves, Marian Barbu, Michal Podpora, Umberto Spagnolini, Maria J. Varanda Pereira, Ramon Vilanova
Publikováno v:
IEEE Access, Vol 8, Pp 212818-212836 (2020)
This paper presents a web-based software tool for tutoring support of engineering students without any need of data scientist background for usage. This tool is focused on the analysis of students' performance, in terms of the observable scores and o
Externí odkaz:
https://doaj.org/article/56f873fff3964f9d8aec8549d9c3a8e0
Publikováno v:
NORCAS
This work presents the digital design of a trusted virtual sensor. The virtual sensor implements a piecewise-affine (PWA)-based model to estimate the sensed variable. The measurement is authenticated with the keyed-hash message authentication code (H
Autor:
Serafín Alonso, Antonio Morán, Miguel Ángel Prada, Perfecto Reguera, Juan José Fuertes, Manuel Domínguez
Publikováno v:
Energies, Vol 12, Iss 5, p 827 (2019)
Large buildings cause more than 20% of the global energy consumption in advanced countries. In buildings such as hospitals, cooling loads represent an important percentage of the overall energy demand (up to 44%) due to the intensive use of heating,
Externí odkaz:
https://doaj.org/article/87b0a47078b84378bdd3f6a172de4cbf
Publikováno v:
Sensors, Vol 18, Iss 8, p 2429 (2018)
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for
Externí odkaz:
https://doaj.org/article/4c75388cfa5a40bd9165102fd8068f19