- IoT and Edge/Fog Computing
- Entrepreneurship Studies and Influences
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Innovation and Knowledge Management
- Smart Agriculture and AI
- Business and Management Studies
- Innovation Diffusion and Forecasting
- Innovation and Socioeconomic Development
- Digital Transformation in Industry
- Big Data and Business Intelligence
- Complex Systems and Decision Making
- User Authentication and Security Systems
- Impact of AI and Big Data on Business and Society
- Augmented Reality Applications
- Big Data Technologies and Applications
- Smart Grid Security and Resilience
- E-Learning and Knowledge Management
- COVID-19 epidemiological studies
- Advanced Malware Detection Techniques
- Quantum Computing Algorithms and Architecture
- Ethics and Social Impacts of AI
- University-Industry-Government Innovation Models
- Chaos-based Image/Signal Encryption
- Virtual Reality Applications and Impacts
Universidad Politécnica de Cartagena
2022-2024
Universidad Católica San Antonio de Murcia
2024
European Association of Social Psychology
2008
This study explores the process of creating avatars for Virtual Reality and metaverse environments using a variety specialized applications, including VRChat, Ready Player Me, VRoidStudio, Mixamo, Convai, MetaHuman. By evaluating these platforms, research identifies strengths limitations each tool in terms customization, integration, overall user experience. The practical implementation focuses on avatar creation within Unity Unreal Engine, highlighting technical aspects rigging, animation,...
Abstract Agritech uses advanced technologies to boost the efficiency, sustainability, and productivity of farming. The Internet Things (IoT) in agriculture has brought sensors networked technology gather analyse environmental crop data, enabling precision farming that optimises resource usage increases yields. Yet, current agricultural methods suffer from unsecured decentralised data management, causing inefficiencies complicating traceability across supply chain. integration IoT with...
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum (PQC) as solution protect digital systems in the era. We provide an in-depth analysis various quantum-resistant algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The...
The COVID-19 pandemic has recently brought attention to several acute human needs. However, it also demonstrated how crisis can spark innovation in the context of information asymmetry and uncertainty. It raised importance early warning systems (EWS) prevent similar future events prepare governments, organizations, individuals advance. Such efforts innovating under uncertainty resemble process entrepreneurs face when creating new ventures launching products services. Moreover, increasing...
This work looks at the decision process of entrepreneurs when they create a new businessin an atmosphere uncertainty and without clear objectives, using notion 'effectuation'. The effectualapproach suggests that, company is just beginning, emphasize howmuch can afford to lose try as many different strategies combinations resource possible,given resources that are already under their control. objective this article, therefore, toexamine if, what extent, build companies in real world effectuation.
Abstract Communication architectures based on the Internet of Things (IoT) are increasingly frequent. Commonly, these solutions used to carry out control and monitoring activities. It is easy find cases for manufacturing, prediction maintenance, Smart Cities, etc., where sensors deployed capture data that sent cloud through edge devices or gateways. Then processed provide useful information perform additional actions if required. As crucial as deploying verify their operation. In this...
The scientific community is focusing on developing 6G solutions beyond the 5G communications network, which will use Artificial Intelligence (AI) at all levels of architecture. potential benefits AI automate and optimize network operation, boost cognitive capability a fully AI-enabled This paper proposes framework for solving current problem orchestrating cooperative control autonomous vehicles using 6G, identifies new challenges, requirements, improvements to deploy future Connected...
Novo modelo propõe uma inversão na forma tradicional de se compreender e ensinar o empreendedorismo. Em vez focar nas causas para abrir um novo negócio, surge atenção especial aos efeitos das ações já tomadas
Entrepreneurship has been gaining momentum is Europe over the last years as a way to reduce unemployment levels, and in line with take-off of digital economy world. education still an open research area, many courses being launched almost all universities. We describe our experience running summer school mentoring teams created context EU-XCeL project, ICT focused project funded by European Union's Horizon 2020 Research Innovation Programme. From this experience, we extract some conclusions...
Abstract Cyberthreats continue their expansion, becoming more and complex varied. However, credentials passwords are still a critical point in security. Password cracking can be powerful tool to fight against cyber criminals if used by cybersecurity professionals red teams, for instance, evaluate compliance with security policies or forensic investigations. For particular systems, one crucial step the password-cracking process is comparison matchmaking between password-guess hashes real...