- Vehicular Ad Hoc Networks (VANETs)
- Face recognition and analysis
- Face and Expression Recognition
- Biometric Identification and Security
- Traffic Prediction and Management Techniques
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Semantic Web and Ontologies
- Human Mobility and Location-Based Analysis
- Transportation Planning and Optimization
- Service-Oriented Architecture and Web Services
- Energy Efficient Wireless Sensor Networks
- Adversarial Robustness in Machine Learning
- Educational Technology in Learning
- Digital Games and Media
- Data Management and Algorithms
- E-Learning and Knowledge Management
- Urbanism, Landscape, and Tourism Studies
- Evacuation and Crowd Dynamics
- Opportunistic and Delay-Tolerant Networks
- Artificial Intelligence in Games
- Sharing Economy and Platforms
- Digital Marketing and Social Media
- Diverse Aspects of Tourism Research
- Digital Media Forensic Detection
Universidad Politécnica de Madrid
2016
Universidad de Zaragoza
2012-2015
Currently, the number of vehicles increases every year, raising probability having accidents. When an accident occurs, wireless technologies enable to share warning messages with other by using vehicle (V2V) communications, and emergency services infrastructure (V2I) communications. Regarding Road Side Units (RSUs) act similarly LAN access points, can provide communications infrastructure. Since RSUs are usually very expensive install, authorities limit their number, especially in suburbs...
Wireless technologies are making the development of new applications and services in vehicular environments possible since they enable mobile communication between vehicles (V2V), as well infrastructure nodes (V2I). Usually, V2V communications dedicated to transmission small messages mainly focused on improving traffic safety. Instead, V2I allow users access Internet benefit from higher level applications. The combination both V2I, known V2X communications, can increase benefits even...
Road traffic is experiencing a drastic increase, and vehicular congestion becoming major problem, especially in metropolitan environments throughout the world. Additionally, modern Intelligent Transportation Systems (ITS) communications, high amount of information that can be generated processed by vehicles will significantly increase message redundancy, channel contention, collisions, thus reducing efficiency dissemination processes. In this work, we present V2X architecture to estimate...
The tourism sector in the province of Teruel (Aragon, Spain) is increasing rapidly. Although number domestic and foreign tourists continuously growing, there are some tourist attractions spread over a wide geographical area, which only visited by few people at specific times year. Additionally, having human guides everywhere speaking different languages unfeasible. An integrated solution based on smart interactive Embodied Conversational Agents (ECAs) combined with ontologies would overcome...
In a near future, vehicles will be provided with variety of new sensors capable gathering information from their surroundings. These also sharing the harvested via Vehicular Ad hoc NETworks (VANETs) nearby vehicles, or emergency services in case an accident. Hence, distributed applications based on VANETs need to agree `common understanding' context for interoperability, and therefore, it is necessary create standard structure which enables data interoperability among all different entities...
Vehicle density is one of the main metrics used for assessing road traffic conditions. In this paper, we present a solution to estimate vehicles that has been specially designed Vehicular Networks. Our proposal allows Intelligent Transportation Systems continuously vehicular by accounting number beacons received per Road Side Unit, as well roadmap topology. Simulation results indicate our approach accurately estimates density, and therefore automatic controlling systems may use it predict...
This paper summarises the Competition on Presentation Attack Detection ID Cards (PAD-IDCard) held at 2024 International Joint Conference Biometrics (IJCB2024). The competition attracted a total of ten registered teams, both from academia and industry. In end, participating teams submitted five valid submissions, with eight models to be evaluated by organisers. presented an independent assessment current state-of-the-art algorithms. Today, no evaluation cross-dataset is available; therefore,...
The rapid evolution of digital image manipulation techniques poses significant challenges for content verification, with models such as stable diffusion and mid-journey producing highly realistic, yet synthetic, images that can deceive human perception. This research develops evaluates convolutional neural networks (CNNs) specifically tailored the detection these manipulated images. study implements a comparative analysis three progressively complex CNN architectures, assessing their ability...
A critical issue, especially in urban areas, is the occurrence of traffic accidents, since it could generate jams. Additionally, these jams will negatively affect to rescue process, increasing emergency services arrival time, which can determine difference between life or death for injured people involved accident. In this paper, we propose four different approaches addressing congestion problem, comparing them obtain best solution. Using V2I communications, are able accurately estimate...
Recent advances in facial recognition technology have achieved outstanding performance, but unconstrained face remains an ongoing issue. Facial-image-quality-evaluation algorithms evaluate the quality of input samples, providing crucial information about accuracy decisions. By doing so, this can lead to improved results challenging scenarios. In recent years, significant progress has been made assessing images. The computation scores become highly precise and closely correlated with model...
Nowadays, protection of personal data is an important issue when developing software. In 1999, the Organic Law Personal Data (LOPD) was passed in Spain. According to this Law, every computer application which works with has be adapted accordance LOPD requirements. However, there no doubt that many currently improperly managed, especially by education centers and professors. This article presents GADM (Gestor de Alumnos para Dispositivos Móviles), ad-hoc free software specially designed help...
Virtual applications through mobile platforms are one of the most critical and ever-growing fields in AI, where ubiquitous real-time person authentication has become after breakthrough all services provided via devices. In this context, face verification technologies can provide reliable robust user authentication, given availability cameras these devices, as well their widespread use everyday applications. The rapid development deep Convolutional Neural Networks resulted many accurate...