- Distributed systems and fault tolerance
- Software System Performance and Reliability
- Multimedia Communication and Technology
- Service-Oriented Architecture and Web Services
- Mobile Agent-Based Network Management
- Educational Outcomes and Influences
- Autonomous Vehicle Technology and Safety
- Advanced Malware Detection Techniques
- Peer-to-Peer Network Technologies
- Cryptographic Implementations and Security
- ECG Monitoring and Analysis
- Stress and Burnout Research
- Advanced Neural Network Applications
- Blockchain Technology Applications and Security
- Robotic Path Planning Algorithms
- Adversarial Robustness in Machine Learning
- Asphalt Pavement Performance Evaluation
- Chaos-based Image/Signal Encryption
- Infrastructure Maintenance and Monitoring
- Video Surveillance and Tracking Methods
- Industrial Vision Systems and Defect Detection
- Hydrological Forecasting Using AI
- Health and Lifestyle Studies
- Occupational Health and Safety in Workplaces
- Advanced Software Engineering Methodologies
Universidad Michoacana de San Nicolás de Hidalgo
2016-2025
Consejo Nacional de Humanidades, Ciencias y Tecnologías
2020-2024
Instituto Tecnológico Superior de Xalapa
2016-2018
Instituto Tecnologico Superior de Misantla
2016-2017
Johns Hopkins University
2016
Instituto Tecnologico de Veracruz
2010-2016
National Polytechnic School
2014
National Institute of Astrophysics, Optics and Electronics
2009-2010
University of Chile
2010
One-stage production of carbohydrate-enriched microalgae biomass in wastewater is a promising option to obtain biofuels. Understanding the interaction water quality parameters such as nutrients, carbon, internal carbohydrates, and microbial composition culture crucial for efficient operation viable large-scale cultivation. Bioprocess models are an essential tool studying simultaneous effect complex factors on carbohydrate accumulation, optimizing process, reducing operational costs. In this...
Automobiles have increased urban mobility, but traffic accidents also increased. Therefore, road safety is a significant concern involving academics and government. Transit studies are the main supply for studying accidents, congestion, flow traffic, allowing understanding of flow. They require special equipment (sensors) to measure car’s speed. With technological advances, artificial intelligence, videos, it possible estimate speed in real-time without modifying installed infrastructure. We...
Abstract Eutrophication is one of the most relevant concerns due to risk water supply and food security. Nitrogen phosphorus chemical species concentrations determined magnitude eutrophication. These analyses are even more in basins with intensive agriculture agrochemical discharges. However, analyzing these nutrients labor intensive, as sampling intercalibration laboratory requires considerable financial human resources. Currently, artificial intelligence allows modeling phenomena variables...
Adversarial attacks deliberately modify deep learning inputs, mislead models, and cause incorrect results. Previous adversarial on sentiment analysis models have demonstrated success in misleading these models. However, most existing applied a generalized approach to input modifications, without considering the characteristics objectives of different levels. Specifically, for aspect-based analysis, there is lack attack methods that inputs accordance with evaluated aspects. Consequently,...
The sale of second-hand vehicles is a popular trade worldwide, and vehicle fraud currently common issue, mainly because buyers can lack complete view the historical transactions related to their new acquisition. This work presents distributed architecture for stakeholders register over vehicle’s life cycle in blockchain network. involves non-fungible token (NFT) linked physical motorized after tokenization process, which denote as NFT-Vehicle. NFT-Vehicle hierarchical smart contract designed...
This paper introduces a novel, to the best of our knowledge, method estimate and compensate nonlinear gamma factor introduced by optical system in fringe projection profilometry. We propose determine this indirectly adjusting least-squares plane estimated phase coming from reference plane. only require minimal set three sinusoidal images factor. value can be used rectify computational legacy data also generate project new patterns for which we perform inverse compensation. Experimental...
In recent years, advancements in deep learning (DL) have been leveraged civil engineering, but further exploration is necessary to apply DL techniques asphalt research. These advances involve employing computer vision tasks and machine approaches solve current challenges develop innovative solutions for the conservation monitoring of roads. laboratory, Hamburg-Wheel Tracking (HWT) test simulates expected vehicle traffic evaluates permanent deformation, such as rutting mixtures. Current works...
Complex business processes are based on Web services composition (WSC).Services dramatically reduces the cost and risks of building new applications.Although has been widely researched, several issues related to dependability still need be addressed.In this aspect, one primary concern is provide fault handling mechanisms.Over last decade, diverse works tackling tolerance for WSC have appeared; most them checkpointing paradigm.Some oriented towards orchestration others choreography.In work,...
In this paper, a comparative study of predicting student dropout risks at the ITSM-Mexico (Instituto Tecnologico Superior de Misantla-Mexico) using SQL server is presented. This system uses personal and academic information from students ITSM. The four algorithms: logistic regression, clustering, decision trees neuronal network, these take account in database control school institute. results show that regression algorithm has good agreement with experimental results.
The electrocardiogram records the heart’s electrical activity and generates a significant amount of data. analysis these data helps us to detect diseases disorders via heart bio-signal abnormality classification. In unbalanced-data contexts, where classes are not equally represented, optimization configuration classification models highly complex, reflecting on use computational resources. Moreover, performance depends approach parameter estimation generate model with high accuracy,...
Damage to the rocks of historic built heritage needs be addressed facilitate their conservation and restoration; most serious damage is caused by environmental conditions human activities. Buildings constructed with ignimbrite blocks bonded lime mortar in Morelia, México, a UNESCO World Heritage site, were studied. The mainly occurs facades, on surfaces union exposed climatic factors such as sun, rain, wind, temperature changes, due actions humans vehicles emitting polluting gases; pigeon...
In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes information. However, after several years’ research, previous works have demonstrated that are vulnerable strategically modified inputs called adversarial examples. Adversarial examples generated by performing perturbations data input imperceptible humans but can fool models’ understanding lead false...
In recent years, the frequent appearance of obstacles on roads has been increasing. Opportune obstacle detection is crucial in driver-assistance systems to prevent traffic incidents. Artificial vision used design advanced systems. Driver-assistance allows avoiding coll isions or (mortal) accidents by offering technologies that alert driver about potential problems. an open problem a dynamic environment; therefore, it necessary identify static objects and moving objects, known as obstacles,...
The facility location problem (FLP) is a complex optimization that has been widely researched and applied in industry. In this research, we proposed two innovative approaches to complement the limitations of traditional methods, such as heuristics, metaheuristics, genetic algorithms. first approach involves utilizing crowdsourcing through video game players obtain improved solutions, filling gap existing research on for FLP. second leverages machine learning techniques, specifically...
In the educational field, reading comprehension is connected to learning achievement, and through it, one can interpret, retain, organize value what has been read. It an essential ability for understanding processing of information in learning. Furthermore, it skill developing sustainable education. this sense, development needs advanced at elementary school order teach learn future knowledge areas such as climate change, disaster risk reduction, biodiversity, poverty consumption....
Currently, cryptographic algorithms are widely applied to communications systems guarantee data security. For instance, in an emerging automotive environment where connectivity is a core part of autonomous and connected cars, it essential secure both inside outside the vehicle. The AES algorithm has been protect onboard networks Hardware implementations use techniques such as iterative, parallel, unrolled, pipeline architectures. Nevertheless, does not communication, because previous works...
The evolution of business software technologies is constant and becoming increasingly complex which leads to a great probability software/hardware failures. Business processes are built based on web services as they allow the creation functionalities. To attack problem failures presented by use services, organizations extrapolating autonomic computing paradigm their it enables them detect, diagnose, repair problems improving dependability. Sophisticated solutions that increase system...
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required these applications are confidentiality, authentication, integrity, nonrepudiation, which can be achieved using hash functions. A cryptographic function that provides a higher level security is SHA-3. However, in real modern applications, hardware implementations...
The preservation of temporal dependencies among different media data, such as text, still images, video and audio, which have simultaneous distributed sources origin, is an open research area important issue for emerging multimedia systems, Teleimmersion, Telemedicine, IPTV. Although there are several works oriented to satisfy in they far from resolving the problem. In this paper we propose a logical synchroniza- tion model able specify at runtime any kind relationship data involved...
Object detection is a technologically challenging issue, which useful for safety in outdoor environments, where this object, frequently, represents an obstacle that must be avoided. Although several object methods have been developed recent years, they usually tend to produce poor results being mainly affected by sunlight, light intensity, shadows, and limited computational resources. This open problem the main motivation exploring challenge of developing low-cost solutions, with...
The ability to estimate soil temperature (Ts) from satellite information is highly useful, since this one of the main input variables in various models designed for estimating biophysical parameters.A comparative analysis made Split-Window algorithms used data provided by Advanced Very High Resolution Radiometer (AVHRR) sensor on board satellites National Oceanic and Atmospheric Administration (NOAA).The compared are those proposed by: Prata Platt (1991); Uliveri et al. (1992); Sobrino...
Companies, organizations and individuals use Web services to build complex business functionalities. must operate properly in the unreliable Internet infrastructure even presence of failures. To increase system dependability, organizations, including service providers, adapt their systems autonomic computing paradigm. Strategies can vary from having one all (S-CHOP, self-configuration, self-healing, self-optimization self-protection) features. Regarding an almost identical tool is...
Obstacle–Avoidance robots have become an essential field of study in recent years. This paper analyzes two cases that extend reactive systems focused on obstacle detection and its avoidance. The scenarios explored get data from their environments through sensors generate information for the models based artificial intelligence to obtain a decision. main contribution is discussion aspects allow comparing both approaches, such as heuristic approach implemented, requirements, restrictions,...