- Fault Detection and Control Systems
- Advanced Control Systems Optimization
- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- Neural Networks and Applications
- Energy Load and Power Forecasting
- Advanced Malware Detection Techniques
- Advanced Battery Technologies Research
- Building Energy and Comfort Optimization
- Fuzzy Logic and Control Systems
- Advanced Control Systems Design
- Solar Radiation and Photovoltaics
- EEG and Brain-Computer Interfaces
- Barrier Structure and Function Studies
- Anesthesia and Sedative Agents
- Experimental Learning in Engineering
- Advanced Data Processing Techniques
- Genetic and phenotypic traits in livestock
- Mineral Processing and Grinding
- E-Learning and Knowledge Management
- Neuroinflammation and Neurodegeneration Mechanisms
- Metaheuristic Optimization Algorithms Research
- Smart Grid Security and Resilience
- Particle physics theoretical and experimental studies
- Internet Traffic Analysis and Secure E-voting
Universidade da Coruña
2016-2025
Universidad de La Laguna
2024
Universidad Complutense de Madrid
1991-2023
Contextual Change (United States)
2023
Virtual Power Solutions (Portugal)
2023
National Training Service
2023
Weatherford College
2021-2022
CITIC Group (China)
2021-2022
Universidad de León
2022
National University of Distance Education
2011-2020
Clay authigenesis mostly concerns: (a) the formation of clays by direct precipitation from solution, called “neoformation” and (b) development transformation precursor minerals. Precipitation solution implies that a new mineral structure crystallizes, so prior is not inherited. Transformation detrital minerals, process also termed “neoformation addition”, can be conducted whether throughout on pre-existing natural surfaces or reaction surfaces. Both processes have been recognized as...
Abstract One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, difficult detect by traditional cyber‐attack detection systems. MitM on internet things systems take advantage special features protocols and cause system disruptions, making them invisible legitimate elements. In this work, an intrusion (IDS), where intelligent models can be deployed, approach type attack considering network alterations. Therefore, paper presents a novel method develop...
Global solar broadband irradiance on a planar surface is measured at weather stations by pyranometers. In the case of present research, radiation values from nine meteorological MeteoGalicia real-time observational network, captured and stored every ten minutes, are considered. this kind record, lack data and/or presence wrong adversely affects any time series study. Consequently, when occurs, imputation process must be performed in order to replace missing with estimated values. This paper...
With the progress and evolution of IoT, which has resulted in a rise both number devices their applications, there is growing malware attacks with higher complexity. Countering spread IoT networks vital aspect cybersecurity, where mathematical modeling proven to be potent tool. In this study, we suggest an approach enhance security by installing updates on nodes. The proposed method employs physically informed neural network estimate parameters related propagation. A numerical case study...
This investigation is the result of a multicenter research project between Catholic University Leuven and Madrid with purpose studying histometrically ultrastructurally periimplant marginal tissue reactions in medium‐term Brånemark implants. 12 patients were selected distributed according to predefined clinical radiological parameters into infection group (A) non‐periimplant (B). Biopsies taken from these analyzed by means microscopy (LM), histometry (HM) transmision electron (TEM). With LM...
This paper analyses the effect of caponisation at 8 weeks on growth and carcass meat characteristics Castellana Negra chickens slaughtered 29 weeks. Caponisation did not result in weight improvements as compared with uncastrated birds. No changes were observed rate or parameters determining point inflection curve (sexual maturity). Regarding characteristics, castration resulted a wider breast angle heavier pectoral muscles caponised birds than birds, but no differences thigh drumstick...
The hotel industry is an important energy consumer that needs efficient management methods to guarantee its performance and sustainability. new role of hotels as prosumers increases the difficulty in design these methods. Also, scenery more complex renewable systems are present mix. greatly depends on use reliable predictions for load. This paper presents a methodology predict load based intelligent techniques. model proposed hybrid topology implemented with combination clustering techniques...
This research proposes the analysis and subsequent characterisation of Android malware families by means low dimensional visualisations using reduction techniques. The well-known Malgenome data set, coming from Malware Genome Project, has been thoroughly analysed through following six dimensionality techniques: Principal Component Analysis, Maximum Likelihood Hebbian Learning, Cooperative Curvilinear Isomap Self Organizing Map. Results obtained enable a clear visual structure this...
<p>Los avances tecnológicos en general, y el ámbito de la industria particular, conllevan desarrollo optimización las actividades que ella tienen lugar. Para alcanzar este objetivo, resulta vital importancia detectar cualquier tipo anomalía su fase más incipiente, contribuyendo, entre otros, al ahorro energético económico, a una reducción del impacto ambiental. En un contexto se fomenta emisión gases contaminantes, energías alternativas, especialmente energía eólica, juegan papel...
Abstract The travelling salesman problem (TSP) belongs to the class of NP-hard problems, in which an optimal solution cannot be obtained within a reasonable computational time for large-sized problems. To address TSP, we propose hybrid algorithm, called GA-TCTIA-LBSA, genetic algorithm (GA), tour construction and improvement algorithms (TCTIAs) list-based simulated annealing (LBSA) are used. TCTIAs introduced generate first population, after that, search is continued with GA. premature...
The digitalization of shipbuilding processes has become an important trend in modern naval construction, enabling more efficient design, assembly, and maintenance operations. A key aspect this digital transformation is traceability, which ensures that every component step the process can be accurately tracked managed. Traceability critical for quality assurance, safety, operational efficiency, especially when it comes to identifying addressing defects may arise during construction. In...
The aim of this study is to predict the energy generated by a solar thermal system. To achieve this, hybrid intelligent system was developed based on local regression models with low complexity and high accuracy. Input data divided into clusters using Self Organization Maps; model will then be created for each cluster. Different techniques were tested best one chosen. novel empirically verified real dataset obtained bioclimatic house.
The Argon Dark Matter (ArDM) experiment consists of a liquid argon (LAr) time projection chamber (TPC) sensitive to nuclear recoils resulting from scattering hypothetical Weakly Interacting Massive Particles (WIMPs) on targets. With an active target 850 kg, ArDM represents important milestone in the quest for with LAr. We present experimental apparatus currently installed underground at Laboratorio Subterraneo de Canfranc (LSC), Spain. show first data recorded during single-phase...
Abstract This research describes a novel approach for fault detection in industrial processes, by means of unsupervised and projectionist techniques. The proposed method includes visual tool the faults, its final aim is to optimize system performance consequently obtaining increased economic savings, terms energy, material, maintenance. To validate new proposal, two datasets with different levels complexity (in quantity quality information) have been used evaluate five well‐known intelligent...