{"id":44,"date":"2020-11-11T20:36:07","date_gmt":"2020-11-11T19:36:07","guid":{"rendered":"https:\/\/blogs.etsii.urjc.es\/frav\/?page_id=44"},"modified":"2022-06-08T12:41:40","modified_gmt":"2022-06-08T11:41:40","slug":"lineas-de-investigacion","status":"publish","type":"page","link":"https:\/\/blogs.etsii.urjc.es\/frav\/lineas-de-investigacion\/","title":{"rendered":"L\u00edneas de investigaci\u00f3n"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Biometr\u00eda facial en fronteras<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:26% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"841\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/biometria-facial.png\" alt=\"\" class=\"wp-image-238 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/biometria-facial.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/biometria-facial-260x300.png 260w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">Los sistemas biom\u00e9tricos permiten verificar la identidad de un sujeto en un proceso autom\u00e1tico muy fiable y poco intrusivo. Son fundamentales para agilizar el control del flujo de personas a trav\u00e9s de una frontera.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-subtle-background-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Detecci\u00f3n de ataques de presentaci\u00f3n<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 26%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"835\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-presentacion.png\" alt=\"\" class=\"wp-image-240 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-presentacion.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-presentacion-262x300.png 262w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">Estos m\u00e9todos deben determinar si un usuario hostil de un sistema biom\u00e9trico est\u00e1 tratando de suplantar la identidad de un usuario genuino mediante el uso de fotograf\u00edas, v\u00eddeos, m\u00e1scaras, maquillaje y otras artima\u00f1as.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Detecci\u00f3n de ataques de morphing<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:26% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"841\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-morphing.png\" alt=\"\" class=\"wp-image-239 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-morphing.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/deteccion-ataques-morphing-260x300.png 260w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">Se trata de un tipo de ataque de presentaci\u00f3n de dif\u00edcil detecci\u00f3n, en el cual se combinan las caracter\u00edsticas biom\u00e9tricas de dos personas en el pasaporte electr\u00f3nico para enga\u00f1ar al sistema biom\u00e9trico de control de fronteras.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-subtle-background-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Visi\u00f3n artificial<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 26%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"834\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/vision-artificial.png\" alt=\"\" class=\"wp-image-243 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/vision-artificial.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/vision-artificial-262x300.png 262w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">La visi\u00f3n por computador es la aplicaci\u00f3n de algoritmos de inteligencia artificial a im\u00e1genes o v\u00eddeos en los que se realizan tareas de detecci\u00f3n, segmentaci\u00f3n, extracci\u00f3n y clasificaci\u00f3n de formas de manera autom\u00e1tica.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Videovigilancia inteligente<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:26% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"841\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/videovigilancia-inteligente.png\" alt=\"\" class=\"wp-image-242 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/videovigilancia-inteligente.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/videovigilancia-inteligente-260x300.png 260w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">Las c\u00e1maras inteligentes aplican algoritmos de aprendizaje autom\u00e1tico y visi\u00f3n artificial en entornos de seguridad, como la detecci\u00f3n de conductas sospechosas o de objetos abandonados.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-subtle-background-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"has-text-align-center wp-block-heading\">Sistemas bioinspirados<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 26%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"841\" src=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/sistemas-bioinspirados.png\" alt=\"\" class=\"wp-image-241 size-full\" srcset=\"https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/sistemas-bioinspirados.png 729w, https:\/\/blogs.etsii.urjc.es\/frav\/wp-content\/uploads\/sites\/6\/2022\/06\/sistemas-bioinspirados-260x300.png 260w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-large-font-size\">La computaci\u00f3n bioinspirada utiliza modelos inform\u00e1ticos basados en principios biol\u00f3gicos y de la Naturaleza para resolver problemas del mundo real. Los sistemas biom\u00e9tricos son una de las m\u00faltiples aplicaciones posibles.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":12,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":15,"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/pages\/44\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/blogs.etsii.urjc.es\/frav\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}