- Vehicular Ad Hoc Networks (VANETs)
- Mobile Ad Hoc Networks
- Coding theory and cryptography
- Opportunistic and Delay-Tolerant Networks
- Cellular Automata and Applications
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- DNA and Biological Computing
- Bluetooth and Wireless Communication Technologies
- Security in Wireless Sensor Networks
- Algorithms and Data Compression
- User Authentication and Security Systems
- Indoor and Outdoor Localization Technologies
- graph theory and CDMA systems
- Quantum Computing Algorithms and Architecture
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Video Surveillance and Tracking Methods
- IoT and GPS-based Vehicle Safety Systems
- RFID technology advancements
- Privacy-Preserving Technologies in Data
- Context-Aware Activity Recognition Systems
- Cooperative Communication and Network Coding
Universidad de La Laguna
2015-2024
Universidad de Salamanca
2022
Instituto Nacional de las Mujeres
2022
Instituto Universitario de Ciencias de la Educación
2022
This paper introduces a cutting-edge approach that combines facial recognition and drowsiness detection technologies with Internet of Things capabilities, including 5G/6G connectivity, aimed at bolstering vehicle security driver safety. The delineated two-phase project is tailored to strengthen measures address accidents stemming from distraction fatigue. initial phase centered on for authentication before initiation. Following successful authentication, the subsequent harnesses continuous...
Huge losses and serious threats to ecosystems are common consequences of forest fires. This work describes a fire controller based on fuzzy logic decision-making methods aiming at enhancing prevention, detection, fighting systems. In the proposal, environmental monitoring several dynamic risk factors is performed with wireless sensor networks analysed proposed fuzzy-based controller. With respect this, meteorological variables, polluting gases oxygen level measured in real time estimate...
Current trade is being heavily influenced by emerging technologies. Despite many technological advances, logistics management at a standstill about the improvements communication systems. Updating information during whole process an essential element in such systems but trust that even more important. For this reason, providing mechanism can be verified and allows increasing level of stakeholders could contribute to improvement logistic process. The main aim paper show analysis current state...
Communication media have become the primary way of interaction thanks to discovery and innovation many new technologies. One most widely used communication systems today is video streaming, which constantly evolving. Such communications are a good alternative face-to-face meetings, therefore very useful for coping with problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability connectivity....
Quantum computing is an emerging and quickly expanding domain that captivates scientists engineers. Recognizing the limitations of conventional educational approaches in adequately preparing individuals for their incursion this area, research introduces a novel board game called "Qubit: The Game", whose objective twofold: 1) to foster enthusiasm quantum 2) enhance comprehension fundamental notions within discipline. This document provides explanations regarding rationale behind selecting...
This paper describes the design and analysis of a new scheme for authenticated exchange confidential information in insecure environments within Internet Things, which allows receiver message to authenticate sender compute secret key shared with it. The proposal is based on concept non-interactive zero-knowledge proof, so that single communication, relevant data may be inferred verify legitimacy sender. Besides, uses idea under Diffie–Hellman protocol establishment key. has been fully...
This work presents a system to detect small boats (pateras) help tackle the problem of this type perilous immigration. The proposal makes extensive use emerging technologies like Unmanned Aerial Vehicles (UAV) combined with top‐performing algorithm from field artificial intelligence known as Deep Learning through Convolutional Neural Networks. improves current detection systems based on image processing application filters thanks fact that network learns distinguish aforementioned objects...
Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on network members. The main contribution of this paper is efficient public key scheme that suitable for fully self-organized mobile where all nodes play identical roles. Our approach implies the operations creating, storing, distributing, revoking nodes' keys are carried out locally by...
Vehicular Ad Hoc NETworks (VANETs) are likely to be deployed in the near future. Then, they will become platform for much of relayed information Internet Things. This paper proposes a new system based on 1-hop clustering reduce number VANET communications dense road traffic scenarios while maintaining security by combining public-key with secret-key cryptography. The proposed distributed architecture creates dynamic virtual backbone network, formed Cluster-Heads and cluster-gateways, so that...
A vehicular ad hoc network (VANET) is a wireless that provides communications between nearby vehicles. Among the different types of information can be made available to vehicles through VANETs, road traffic most important one. This work part an experimental development communication platform oriented applications allow improving efficiency and safety, managing monitoring traffic, encouraging cooperative driving, offering pedestrian services other added-value uses. The proposed system...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals strengthening global supply chains: first, to promote efficient and secure movement of goods, second foster a resilient chain. Internet Things (IoT), particular Radio Frequency Identification (RFID) technology, can be used realize these goals. For product identification, tracking real-time awareness, RFID tags are attached goods. As tagged goods move along chain from...
This work proposes an adaptive recommendation mechanism for smart parking that takes advantage of the popularity smartphones and rise Internet Things. The proposal includes a centralized system to forecast available indoor spaces, low-cost mobile application obtain data actual predicted occupancy. described scheme uses from both sources bidirectionally so is fed with obtained distributed based on smartphones, vice versa. different wireless technologies provide receive useful recommendations...