- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- E-Learning and Knowledge Management
- Business, Innovation, and Economy
- Business Process Modeling and Analysis
- Advanced Wireless Communication Technologies
- Smart Grid Security and Resilience
- Physical Unclonable Functions (PUFs) and Hardware Security
- Information Retrieval and Search Behavior
- Metaheuristic Optimization Algorithms Research
- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Green IT and Sustainability
- Cryptographic Implementations and Security
- Software Engineering Techniques and Practices
- Distributed and Parallel Computing Systems
- Air Quality Monitoring and Forecasting
- Water Quality Monitoring Technologies
- IoT-based Smart Home Systems
- Wireless Communication Security Techniques
- Network Security and Intrusion Detection
- Higher Education Teaching and Evaluation
- Advanced Software Engineering Methodologies
- Personal Information Management and User Behavior
Universidad Politécnica de Madrid
2015-2024
Universidad de Valladolid
2024
Universidad Carlos III de Madrid
2005-2023
ORCID
2021
Universidad Complutense de Madrid
2011-2013
Centro Tecnológico de Investigación, Desarrollo e Innovación en tecnologías de la Información y las Comunicaciones (TIC)
2009
Water is a vital resource for life, and the economy. Nowadays, one of most serious challenges to solve manage water scarcity. Current management ICT systems are supported by specific vendor equipment, without considering any interoperability standards. The lack standardization among producer's equipment hinders proper monitoring control systems, resulting in low efficiency distribution consumption, system's maintenance improvement, failure identification. In this paper we propose smart model...
These days, a sizable number of meta-heuristic algorithms are utilized to address many problems with numerous variables and huge complexity. One the most popular swarm intelligence-based methods is chimp optimization algorithm inspired by chimps’ individual intelligence sexual motivation in their group hunting. This paper proposes weighted tackle two main issues large-scale numerical problems, such as low convergence speed local optima trapping solve high-dimensional problems. The difference...
Removing redundant features and improving classifier performance necessitates the use of meta-heuristic deep learning (DL) algorithms in feature selection classification problems. With maturity DL tools, many data-driven polarimetric synthetic aperture radar (POLSAR) representation models have been suggested, most which are based on convolutional neural networks (DCNNs). In this paper, we propose a hybrid approach new multi-objective binary chimp optimization algorithm (MOBChOA) DCNN for...
Resource consumption in residential areas requires novel contributions the field of consumer information management and collaborative mechanisms for exchange resources, order to optimize overall community. We propose an authorization system facilitate access resource trading, based on blockchain technology. Our proposal is oriented Smart communities, evolution Community Energy Management Systems, which communities are involved monitoring coordination consumption. The proposed environment...
Vehicle-to-grid (V2G) technology has become a promising concept for the near future smart grid eco-system. V2G improves resiliency by enabling two-way communication and electricity flows while reducing greenhouse gases emission. practicality stability is strongly based on exchanged data between electrical vehicles (EVs) server (GS). However, using protocols to exchange vital information leads being vulnerable against various types of attack. To prevent well-known attacks in network, this...
The Internet of Things (IoT) has become one the most important concepts in various aspects our modern life recent years. However, critical challenge for world-wide use IoT is to address its security issues. One tasks challenges detect intrusion network. Although machine/deep learning-based solutions have been repeatedly used network through years, there still considerable potential improve accuracy and performance classifier (intrusion detector). In this paper, we develop a novel training...
Backscatter communication (BC) is a promising technology for low-power and low-data-rate applications, though the signal detection performance limited since backscattered usually much weaker than original signal. When poor, backscatter device (BD) may not be able to accurately detect interpret incoming signal, leading errors degraded quality. This can result in data loss, slow transfer rates, reduced reliability of link. paper proposes novel approach improve systems using evolutionary deep...
Abstract This research introduces the Quantum Chimp Optimization Algorithm (QChOA), a pioneering methodology that integrates quantum mechanics principles into (ChOA). By incorporating non-linearity and uncertainty, QChOA significantly improves ChOA’s exploration exploitation capabilities. A distinctive feature of is its ability to displace ’chimp,’ representing potential solution, leading heightened fitness levels compared current top search agent. Our comprehensive evaluation includes...
Abstract This paper introduces the Quantum Chimp Optimization Algorithm (QU-ChOA), which integrates (ChOA) with quantum mechanics principles to enhance optimization capabilities. The study evaluates QU-ChOA across diverse domains, including benchmark tests, IEEE CEC-06–2019 100-Digit Challenge, real-world problems from IEEE-CEC-2020, and dynamic scenarios IEEE-CEC-2022. Key findings highlight QU-ChOA’s competitive performance in both unimodal multimodal functions, achieving an average...
Irrigation communities, especially in rural areas whose economy depends on agriculture, face a critical problem with the increasing water crisis. In this paper it is proposed control system to efficiently manage and coordinate use of these communities. Blockchain technologies are employed support trust among community members commercial resource constrained devices communicating network compose hardware platform. A first implementation an evaluation system's performance also presented.
In this paper, we explore the communication performance of vehicle-to-vehicle (V2V) networks assisted by a reconfigurable intelligent surface (RIS) and simultaneous transmitting reflecting omni-surface (STAR-IOS) under non-orthogonal multiple access (NOMA) orthogonal (OMA) schemes. particular, consider that RIS is close to transmitter vehicle while STAR-IOS near receiver vehicles. addition, it assumed exploits energy-splitting (ES) protocol for fading channels between follow composite...
For many years, researchers have explored power allocation (PA) algorithms driven by models in wireless networks where multiple-user communications with interference are present.Nowadays, data-driven machine learning methods become quite popular analyzing communication systems, which among them deep reinforcement (DRL) has a significant role solving optimization issues under certain constraints.To this purpose, paper, we investigate the PA problem k-user multiple access channels (MAC), k...
Nowadays, manufacturing processes have become highly complex. Besides, more and more, governmental institutions require companies to implement systems trace a product's life (especially for foods, clinical materials or similar items). In this paper, we propose new framework, based on cyber-physical systems, developing traceability in small (which because of their size cannot other commercial products). We general theoretical study the requirements these relation reference architecture both...
The rapid evolution of communication technologies and the emergence sixth-generation (6G) networks have introduced unprecedented opportunities for ultra-reliable, low-latency, energy-efficient communication. However, integration advanced like non-orthogonal multiple access (NOMA) wireless powered (WPCNs) brings significant challenges, particularly in terms energy constraints security vulnerabilities. Traditional antenna systems orthogonal schemes struggle to meet increasing demands...
The rapid evolution of MOOCs in recent years has produced a change the education students and development professional skills. There is an increasing pressure on universities to establish procedures for recognition certification student participation MOOCs. In order guarantee that evaluation are line with quality traditionally established university, proposal enhanced peer assessment required allow more precise review students' tasks assessments provided by his colleagues, considering...
Security has become a main concern for the smart grid to move from research and development industry. Central this security paradigm is concept of resistance threats, whether emanating an active adversary seeking disrupt operations or passive entity covertly intercepting sensitive data. In dynamic landscape, meters (SMs) stand as sentinels at edge grid, silently gathering transmitting invaluable Yet, very placement often leaves them vulnerable in unprotected areas, underscoring paramount...