Inicio  /  Ingeniería   /  Vol: 27 Núm: May-Aug Par: 0 (2022)  /  Artículo
ARTÍCULO
TITULO

Validation of a Digital Photographic Protocol for Macroscopic Analysis of Wood Anatomy and Colorimetry of Tree Species in Costa Rica

Juan Carlos Valverde    
Dagoberto Arias    
Geovanni Figueroa    
Erick Mata    
Nelson Zamora    

Resumen

No disponible

 Artículos similares

       
 
Nikola Andelic and Sandi Baressi ?egota    
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this... ver más
Revista: Information

 
Irina A. Novikova, Polina A. Bychkova, Dmitriy A. Shlyakhta and Alexey L. Novikov    
Numerous studies of the digitalization of higher education show that university students? attitudes toward digital educational technologies (DETs) are one of the important psychological factors that can hinder or facilitate the optimal implementation of ... ver más
Revista: Computers

 
Luís Vicente, Fernando Carreira, Francisco M. Campos, Mário J. G. C. Mendes, João M. F. Calado and Gamboa Carvalho    
The washing of road tankers is currently still a manual process that requires an operator to place the washing head into the tanks. To increase productivity and operator safety, it is essential to implement automated systems with Fault Detection and Isol... ver más
Revista: Applied Sciences

 
Ali Mirzazade, Cosmin Popescu and Björn Täljsten    
The aim of this study was to find strains in embedded reinforcement by monitoring surface deformations. Compared with analytical methods, application of the machine learning regression technique imparts a noteworthy reduction in modeling complexity cause... ver más
Revista: Infrastructures

 
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences