This page has only limited features, please log in for full access.
Background Pegboard tests are a powerful technique used by health and education professionals to evaluate manual dexterity and fine motor speed, both in children and adults. Using traditional pegboards in tests, the total time that, for example, a 4-year-old child needs for inserting pegs in a pegboard, with the left or right hand, can be measured. However, these measurements only allow for studying the variability among individuals, whereas no data can be obtained on the intraindividual variability in inserting and removing these pegs with one and the other hand. Objective The aim of this research was to study the intraindividual variabilities in fine manual motor skills of 2- to 3-year-old children during playing activities, using a custom designed electronic pegboard. Methods We have carried out a pilot study with 39 children, aged between 25 and 41 months. The children were observed while performing a task involving removing 10 pegs from 10 holes on one side and inserting them in 10 holes on the other side of a custom-designed sensor-based electronic pegboard, which has been built to be able to measure the times between peg insertions and removals. Results A sensor-based electronic pegboard was successfully developed, enabling the collection of single movement time data. In the piloting, a lower intraindividual variability was found in children with lower placement and removal times, confirming Adolph et al’s hypothesis. Conclusions The developed pegboard allows for studying intraindividual variability using automated wirelessly transmitted data provided by its sensors. This novel technique has been useful in studying and validating the hypothesis that children with lower movement times present lower intraindividual variability. New research is necessary to confirm these findings. Research with larger sample sizes and age ranges that include additional testing of children’s motor development level is currently in preparation.
Diego Rivera; Antonio García; Jose Eugenio Ortega; Bernardo Alarcos; Kevin Van Der Meulen; Juan R Velasco; Cristina Del Barrio; Wu-Chen Su; Bjarne Worm; Alessia Paglialonga. Intraindividual Variability Measurement of Fine Manual Motor Skills in Children Using an Electronic Pegboard: Cohort Study. JMIR mHealth and uHealth 2019, 7, e12434 .
AMA StyleDiego Rivera, Antonio García, Jose Eugenio Ortega, Bernardo Alarcos, Kevin Van Der Meulen, Juan R Velasco, Cristina Del Barrio, Wu-Chen Su, Bjarne Worm, Alessia Paglialonga. Intraindividual Variability Measurement of Fine Manual Motor Skills in Children Using an Electronic Pegboard: Cohort Study. JMIR mHealth and uHealth. 2019; 7 (8):e12434.
Chicago/Turabian StyleDiego Rivera; Antonio García; Jose Eugenio Ortega; Bernardo Alarcos; Kevin Van Der Meulen; Juan R Velasco; Cristina Del Barrio; Wu-Chen Su; Bjarne Worm; Alessia Paglialonga. 2019. "Intraindividual Variability Measurement of Fine Manual Motor Skills in Children Using an Electronic Pegboard: Cohort Study." JMIR mHealth and uHealth 7, no. 8: e12434.
The growth of the Internet of Things (IoT) has favored the emergence of new applications and services. Consequently, new challenges in data security and protection have arisen because many IoT systems collect sensitive data that could be the target of attacks and intrusion attempts. Such is the case of smart toy platforms, where the loss of personal data is particularly serious because it involves children and therefore user privacy requires special protection. In this paper, we propose a series of security mechanisms to protect an IoT smart toy platform designed to help child development professionals in the early detection of psychomotor delays. Protecting information is crucially important in this environment, as a successful attack could be used to extract personal and health-related information. We have designed and built specific security mechanisms for the system by identifying the main threats in each submodule of the system, and then neutralizing or minimizing them. Due to the smart toys’ hardware restrictions, a specific encryption and authentication mechanism is proposed and presented here. All the mechanisms have been validated on the platform, and have proved to be a feasible and secure solution for this sensitive environment.
Diego Rivera; Antonio Garcia; Maria Luisa Martin Ruiz; Bernardo Alarcos; Juan Ramon Velasco; Ana Gomez Oliva. Secure Communications and Protected Data for a Internet of Things Smart Toy Platform. IEEE Internet of Things Journal 2019, 6, 3785 -3795.
AMA StyleDiego Rivera, Antonio Garcia, Maria Luisa Martin Ruiz, Bernardo Alarcos, Juan Ramon Velasco, Ana Gomez Oliva. Secure Communications and Protected Data for a Internet of Things Smart Toy Platform. IEEE Internet of Things Journal. 2019; 6 (2):3785-3795.
Chicago/Turabian StyleDiego Rivera; Antonio Garcia; Maria Luisa Martin Ruiz; Bernardo Alarcos; Juan Ramon Velasco; Ana Gomez Oliva. 2019. "Secure Communications and Protected Data for a Internet of Things Smart Toy Platform." IEEE Internet of Things Journal 6, no. 2: 3785-3795.
Autonomous devices able to evaluate diverse situations without external help have become especially relevant in recent years because they can be used as an important source of relevant information about the activities performed by people (daily habits, sports performance, and health-related activities). Specifically, the use of this kind of device in childhood games might help in the early detection of developmental problems in children. In this paper, we propose a method for the detection and classification of movements performed with an object, based on an acceleration signal. This method can automatically generate patterns associated with a given movement using a set of reference signals, analyze sequences of acceleration trends, and classify the sequences according to the previously established patterns. This method has been implemented, and a series of experiments has been carried out using the data from a sensor-embedded toy. For the validation of the obtained results, we have, in parallel, developed two other classification systems based on popular techniques, i.e., a similarity search based on Euclidean distances and machine-learning techniques, specifically a support vector machine model. When comparing the results of each method, we show that our proposed method achieves a higher number of successes and higher accuracy in the detection and classification of isolated movement signals as well as in sequences of movements.
Diego Rivera; Luis Cruz-Piris; Susel Fernandez; Bernardo Alarcos; Antonio Garcia; Juan R. Velasco. A Novel Method for Automatic Detection and Classification of Movement Patterns in Short Duration Playing Activities. IEEE Access 2018, 6, 53409 -53425.
AMA StyleDiego Rivera, Luis Cruz-Piris, Susel Fernandez, Bernardo Alarcos, Antonio Garcia, Juan R. Velasco. A Novel Method for Automatic Detection and Classification of Movement Patterns in Short Duration Playing Activities. IEEE Access. 2018; 6 ():53409-53425.
Chicago/Turabian StyleDiego Rivera; Luis Cruz-Piris; Susel Fernandez; Bernardo Alarcos; Antonio Garcia; Juan R. Velasco. 2018. "A Novel Method for Automatic Detection and Classification of Movement Patterns in Short Duration Playing Activities." IEEE Access 6, no. : 53409-53425.
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique De La Hoz; Juan R. Velasco. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources. Sensors 2018, 18, 917 .
AMA StyleLuis Cruz-Piris, Diego Rivera, Ivan Marsa-Maestre, Enrique De La Hoz, Juan R. Velasco. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources. Sensors. 2018; 18 (3):917.
Chicago/Turabian StyleLuis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique De La Hoz; Juan R. Velasco. 2018. "Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources." Sensors 18, no. 3: 917.
Over the last decades, wearable systems have gained interest for monitoring of physiological variables, promoting health, and improving exercise adherence in different populations ranging from elite athletes to patients. In this paper, we present a wearable system for the continuous real-time monitoring of respiratory frequency (fR), heart rate (HR), and movement cadence during physical activity. The system has been experimentally tested in the laboratory (by simulating the breathing pattern with a mechanical ventilator) and by collecting data from one healthy volunteer. Results show the feasibility of the proposed device for real-time continuous monitoring of fR, HR, and movement cadence both in resting condition and during activity. Finally, different synchronization techniques have been investigated to enable simultaneous data collection from different wearable modules.
Fabrizio Taffoni; Diego Rivera; Angelica La Camera; Andrea Nicolò; Juan Ramón Velasco; Carlo Massaroni. A Wearable System for Real-Time Continuous Monitoring of Physical Activity. Journal of Healthcare Engineering 2018, 2018, 1 -16.
AMA StyleFabrizio Taffoni, Diego Rivera, Angelica La Camera, Andrea Nicolò, Juan Ramón Velasco, Carlo Massaroni. A Wearable System for Real-Time Continuous Monitoring of Physical Activity. Journal of Healthcare Engineering. 2018; 2018 ():1-16.
Chicago/Turabian StyleFabrizio Taffoni; Diego Rivera; Angelica La Camera; Andrea Nicolò; Juan Ramón Velasco; Carlo Massaroni. 2018. "A Wearable System for Real-Time Continuous Monitoring of Physical Activity." Journal of Healthcare Engineering 2018, no. : 1-16.
Note: In lieu of an abstract, this is an excerpt from the first page.Excerpt Toys are key elements in the development of children.
Diego Rivera; Maria Luisa Martin Ruiz; María Angeles Gutiérrez García; Juan R. Velasco. Verifying Sensors in Smart Toys Designed to Help Professionals in the Early Detection of Psychomotor Developmental Disorders. Proceedings 2017, 1, 800 .
AMA StyleDiego Rivera, Maria Luisa Martin Ruiz, María Angeles Gutiérrez García, Juan R. Velasco. Verifying Sensors in Smart Toys Designed to Help Professionals in the Early Detection of Psychomotor Developmental Disorders. Proceedings. 2017; 1 (8):800.
Chicago/Turabian StyleDiego Rivera; Maria Luisa Martin Ruiz; María Angeles Gutiérrez García; Juan R. Velasco. 2017. "Verifying Sensors in Smart Toys Designed to Help Professionals in the Early Detection of Psychomotor Developmental Disorders." Proceedings 1, no. 8: 800.
The growth of the Internet has generated new types of services based on novel data sources. Among these services, the use of sensors and actuators to create hybrid services that allow humans to interact with the physical environment in a natural way is especially remarkable. These services compose what is called the Internet of Things (IoT). One of the biggest challenges is the protection and access control to the sensors and actuators exposed to the Internet, becoming a critical factor in IoT scenarios. We propose the abstraction of the IoT communication elements as Resources that can be protected using conventional access control schemes. To achieve this, we propose using User-Managed Access (UMA), an existent OAuth2 profile originally developed for the protection of Internet services. To validate our proposal, we have selected MQTT, one of the simplest message-based communication protocols used in IoT environments. We have developed a prototype implementation and a use case using a developer board based on the MCU ESP8266 as an IoT device. The performed tests have been focused on validating the proposed solution in terms of the correctness of the access control system, energy consumption and communication delays.
Luis Cruz-Piris; Diego Rivera; German Lopez-Civera; Enrique De La Hoz; Ivan Marsa-Maestre; Juan R. Velasco. Protecting Sensors in an IoT Environment by Modelling Communications as Resources. Proceedings 2017, 1, 801 .
AMA StyleLuis Cruz-Piris, Diego Rivera, German Lopez-Civera, Enrique De La Hoz, Ivan Marsa-Maestre, Juan R. Velasco. Protecting Sensors in an IoT Environment by Modelling Communications as Resources. Proceedings. 2017; 1 (8):801.
Chicago/Turabian StyleLuis Cruz-Piris; Diego Rivera; German Lopez-Civera; Enrique De La Hoz; Ivan Marsa-Maestre; Juan R. Velasco. 2017. "Protecting Sensors in an IoT Environment by Modelling Communications as Resources." Proceedings 1, no. 8: 801.
In this paper, we describe the design considerations and implementation of a smart toy system, a technology for supporting the automatic recording and analysis for detecting developmental delays recognition when children play using the smart toy. To achieve this goal, we take advantage of the current commercial sensor features (reliability, low consumption, easy integration, etc.) to develop a series of sensor-based low-cost devices. Specifically, our prototype system consists of a tower of cubes augmented with wireless sensing capabilities and a mobile computing platform that collect the information sent from the cubes allowing the later analysis by childhood development professionals in order to verify a normal behaviour or to detect a potential disorder. This paper presents the requirements of the toy and discusses our choices in toy design, technology used, selected sensors, process to gather data from the sensors and generate information that will help in the decision-making and communication of the information to the collector system. In addition, we also describe the play activities the system supports.
Diego Rivera; Antonio García H.; Bernardo Alarcos; Juan R. Velasco; José Eugenio Ortega; Isaías Martínez-Yelmo. Smart Toys Designed for Detecting Developmental Delays. Sensors 2016, 16, 1953 .
AMA StyleDiego Rivera, Antonio García H., Bernardo Alarcos, Juan R. Velasco, José Eugenio Ortega, Isaías Martínez-Yelmo. Smart Toys Designed for Detecting Developmental Delays. Sensors. 2016; 16 (11):1953.
Chicago/Turabian StyleDiego Rivera; Antonio García H.; Bernardo Alarcos; Juan R. Velasco; José Eugenio Ortega; Isaías Martínez-Yelmo. 2016. "Smart Toys Designed for Detecting Developmental Delays." Sensors 16, no. 11: 1953.
Intelligent transportation systems are a set of technological solutions used to improve the performance and safety of road transportation. A crucial element for the success of these systems is the exchange of information, not only between vehicles, but also among other components in the road infrastructure through different applications. One of the most important information sources in this kind of systems is sensors. Sensors can be within vehicles or as part of the infrastructure, such as bridges, roads or traffic signs. Sensors can provide information related to weather conditions and traffic situation, which is useful to improve the driving process. To facilitate the exchange of information between the different applications that use sensor data, a common framework of knowledge is needed to allow interoperability. In this paper an ontology-driven architecture to improve the driving environment through a traffic sensor network is proposed. The system performs different tasks automatically to increase driver safety and comfort using the information provided by the sensors.
Susel Fernandez; Rafik Hadfi; Takayuki Ito; Ivan Marsa-Maestre; Juan R. Velasco. Ontology-Based Architecture for Intelligent Transportation Systems Using a Traffic Sensor Network. Sensors 2016, 16, 1287 .
AMA StyleSusel Fernandez, Rafik Hadfi, Takayuki Ito, Ivan Marsa-Maestre, Juan R. Velasco. Ontology-Based Architecture for Intelligent Transportation Systems Using a Traffic Sensor Network. Sensors. 2016; 16 (8):1287.
Chicago/Turabian StyleSusel Fernandez; Rafik Hadfi; Takayuki Ito; Ivan Marsa-Maestre; Juan R. Velasco. 2016. "Ontology-Based Architecture for Intelligent Transportation Systems Using a Traffic Sensor Network." Sensors 16, no. 8: 1287.
Sensor networks are a concept that has become very popular in data acquisition and processing for multiple applications in different fields such as industrial, medicine, home automation, environmental detection, etc. Today, with the proliferation of small communication devices with sensors that collect environmental data, semantic Web technologies are becoming closely related with sensor networks. The linking of elements from Semantic Web technologies with sensor networks has been called Semantic Sensor Web and has among its main features the use of ontologies. One of the key challenges of using ontologies in sensor networks is to provide mechanisms to integrate and exchange knowledge from heterogeneous sources (that is, dealing with semantic heterogeneity). Ontology alignment is the process of bringing ontologies into mutual agreement by the automatic discovery of mappings between related concepts. This paper presents a system for ontology alignment in the Semantic Sensor Web which uses fuzzy logic techniques to combine similarity measures between entities of different ontologies. The proposed approach focuses on two key elements: the terminological similarity, which takes into account the linguistic and semantic information of the context of the entity’s names, and the structural similarity, based on both the internal and relational structure of the concepts. This work has been validated using sensor network ontologies and the Ontology Alignment Evaluation Initiative (OAEI) tests. The results show that the proposed techniques outperform previous approaches in terms of precision and recall.
Susel Fernandez; Ivan Marsa-Maestre; Juan R. Velasco; Bernardo Alarcos. Ontology Alignment Architecture for Semantic Sensor Web Integration. Sensors 2013, 13, 12581 -12604.
AMA StyleSusel Fernandez, Ivan Marsa-Maestre, Juan R. Velasco, Bernardo Alarcos. Ontology Alignment Architecture for Semantic Sensor Web Integration. Sensors. 2013; 13 (9):12581-12604.
Chicago/Turabian StyleSusel Fernandez; Ivan Marsa-Maestre; Juan R. Velasco; Bernardo Alarcos. 2013. "Ontology Alignment Architecture for Semantic Sensor Web Integration." Sensors 13, no. 9: 12581-12604.
J.A. Fernandez-Prieto; Joaquín Cañada Bago; M.A. Gadeo-Martos; Juan R. Velasco. Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads. Applied Soft Computing 2012, 12, 1875 -1883.
AMA StyleJ.A. Fernandez-Prieto, Joaquín Cañada Bago, M.A. Gadeo-Martos, Juan R. Velasco. Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads. Applied Soft Computing. 2012; 12 (7):1875-1883.
Chicago/Turabian StyleJ.A. Fernandez-Prieto; Joaquín Cañada Bago; M.A. Gadeo-Martos; Juan R. Velasco. 2012. "Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads." Applied Soft Computing 12, no. 7: 1875-1883.
Susel Fernandez; Juan R. Velasco; Iván Marsá-Maestre; Miguel A. Lopez-Carmona. FuzzyAlign - A Fuzzy Method for Ontology Alignment. Proceedings of the International Conference on Knowledge Engineering and Ontology Development 2012, 98 -107.
AMA StyleSusel Fernandez, Juan R. Velasco, Iván Marsá-Maestre, Miguel A. Lopez-Carmona. FuzzyAlign - A Fuzzy Method for Ontology Alignment. Proceedings of the International Conference on Knowledge Engineering and Ontology Development. 2012; ():98-107.
Chicago/Turabian StyleSusel Fernandez; Juan R. Velasco; Iván Marsá-Maestre; Miguel A. Lopez-Carmona. 2012. "FuzzyAlign - A Fuzzy Method for Ontology Alignment." Proceedings of the International Conference on Knowledge Engineering and Ontology Development , no. : 98-107.
Over the past few years, Intelligent Spaces (ISs) have received the attention of many Wireless Sensor Network researchers. Recently, several studies have been devoted to identify their common capacities and to set up ISs over these networks. However, little attention has been paid to integrating Fuzzy Rule-Based Systems into collaborative Wireless Sensor Networks for the purpose of implementing ISs. This work presents a distributed architecture proposal for collaborative Fuzzy Rule-Based Systems embedded in Wireless Sensor Networks, which has been designed to optimize the implementation of ISs. This architecture includes the following: (a) an optimized design for the inference engine; (b) a visual interface; (c) a module to reduce the redundancy and complexity of the knowledge bases; (d) a module to evaluate the accuracy of the new knowledge base; (e) a module to adapt the format of the rules to the structure used by the inference engine; and (f) a communications protocol. As a real-world application of this architecture and the proposed methodologies, we show an application to the problem of modeling two plagues of the olive tree: prays (olive moth, Prays oleae Bern.) and repilo (caused by the fungus Spilocaea oleagina). The results show that the architecture presented in this paper significantly decreases the consumption of resources (memory, CPU and battery) without a substantial decrease in the accuracy of the inferred values.
Manuel Angel Gadeo-Martos; Jose Angel Fernandez-Prieto; Joaquin Canada-Bago; Juan Ramón Velasco. An Architecture for Performance Optimization in a Collaborative Knowledge-Based Approach for Wireless Sensor Networks. Sensors 2011, 11, 9136 -9159.
AMA StyleManuel Angel Gadeo-Martos, Jose Angel Fernandez-Prieto, Joaquin Canada-Bago, Juan Ramón Velasco. An Architecture for Performance Optimization in a Collaborative Knowledge-Based Approach for Wireless Sensor Networks. Sensors. 2011; 11 (10):9136-9159.
Chicago/Turabian StyleManuel Angel Gadeo-Martos; Jose Angel Fernandez-Prieto; Joaquin Canada-Bago; Juan Ramón Velasco. 2011. "An Architecture for Performance Optimization in a Collaborative Knowledge-Based Approach for Wireless Sensor Networks." Sensors 11, no. 10: 9136-9159.
J.A. Fernandez-Prieto; J. Canada-Bago; M.A. Gadeo-Martos; Juan R. Velasco. Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads. Applied Soft Computing 2011, 11, 3744 -3752.
AMA StyleJ.A. Fernandez-Prieto, J. Canada-Bago, M.A. Gadeo-Martos, Juan R. Velasco. Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads. Applied Soft Computing. 2011; 11 (4):3744-3752.
Chicago/Turabian StyleJ.A. Fernandez-Prieto; J. Canada-Bago; M.A. Gadeo-Martos; Juan R. Velasco. 2011. "Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads." Applied Soft Computing 11, no. 4: 3744-3752.
Nonmonotonic utility spaces are found in multi‐issue negotiations where the preferences on the issues yield multiple local optima. These negotiations are specially challenging because of the inherent complexity of the search space and the difficulty of learning the opponent’s preferences. Most current solutions successfully address moderately complex preference scenarios, while solutions intended to operate in highly complex spaces are constrained by very specific preference structures. To overcome these problems, we propose the Region‐Based Multi‐issue Negotiation Protocol (RBNP) for bilateral automated negotiation. RBNP is built upon a nonmediated recursive bargaining mechanism which efficiently modulates a region‐based joint exploration of the solution space. We empirically show that RBNP produces outcomes close to the Pareto frontier in reasonable negotiation times, and show that it provides a significantly better performance when compared to a generic Similarity‐Based Multi‐issue Negotiation Protocol (SBNP), which has been successfully used in many negotiation models. We have paid attention to the strategic issues, proposing and evaluating several concession mechanisms, and analyzing the equilibrium conditions. Results suggest that RBNP may be used as a basis to develop negotiation mechanisms in nonmonotonic utility spaces.
Miguel A. Lopez-Carmona; Iván Marsá-Maestre; Enrique De La Hoz; Juan R. Velasco. A REGION-BASED MULTI-ISSUE NEGOTIATION PROTOCOL FOR NONMONOTONIC UTILITY SPACES. Computational Intelligence 2011, 27, 166 -217.
AMA StyleMiguel A. Lopez-Carmona, Iván Marsá-Maestre, Enrique De La Hoz, Juan R. Velasco. A REGION-BASED MULTI-ISSUE NEGOTIATION PROTOCOL FOR NONMONOTONIC UTILITY SPACES. Computational Intelligence. 2011; 27 (2):166-217.
Chicago/Turabian StyleMiguel A. Lopez-Carmona; Iván Marsá-Maestre; Enrique De La Hoz; Juan R. Velasco. 2011. "A REGION-BASED MULTI-ISSUE NEGOTIATION PROTOCOL FOR NONMONOTONIC UTILITY SPACES." Computational Intelligence 27, no. 2: 166-217.
Juan R. Velasco; Yacine Ghamri-Doudane; Marc Roelands; Dries De Roeck; Rob Moonen; Lieven Trappeniers; Miguel A. A. Lopez-Carmona; Iván Marsá-Maestre; Emmanuel Marilly; Noel Crespi. Do-it-yourself creation of pervasive, tangible applications. Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction 2011, 1 .
AMA StyleJuan R. Velasco, Yacine Ghamri-Doudane, Marc Roelands, Dries De Roeck, Rob Moonen, Lieven Trappeniers, Miguel A. A. Lopez-Carmona, Iván Marsá-Maestre, Emmanuel Marilly, Noel Crespi. Do-it-yourself creation of pervasive, tangible applications. Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction. 2011; ():1.
Chicago/Turabian StyleJuan R. Velasco; Yacine Ghamri-Doudane; Marc Roelands; Dries De Roeck; Rob Moonen; Lieven Trappeniers; Miguel A. A. Lopez-Carmona; Iván Marsá-Maestre; Emmanuel Marilly; Noel Crespi. 2011. "Do-it-yourself creation of pervasive, tangible applications." Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction , no. : 1.
Mario Vega Barbas; Juan R. Velasco. INTELLIGENT MULTI-DEVICE USER INTERFACES. Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems 2011, 309 -312.
AMA StyleMario Vega Barbas, Juan R. Velasco. INTELLIGENT MULTI-DEVICE USER INTERFACES. Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems. 2011; ():309-312.
Chicago/Turabian StyleMario Vega Barbas; Juan R. Velasco. 2011. "INTELLIGENT MULTI-DEVICE USER INTERFACES." Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems , no. : 309-312.
Fuzzy constraints have been used in several automated multi-attribute negotiation models. It is recognized that fuzzy constraints represent an efficient way of capturing requirements and preferences, and an useful mechanism for representing trade-offs. Most approaches are mainly focused on using constraints as a framework for describing preferences, and few works focus on using them as an element in the communication process itself in order to elaborate efficient negotiation strategies. This paper proposes and evaluates a set of strategies for offer generation and for the construction of offer relaxation requests in constraint-based negotiation models. To deploy the strategies, a fuzzy constraint based model for non-mediated bilateral automated purchase negotiations has been used. Fuzzy constraints are used both to represent preferences and to express offers. A set of locutions and decision mechanisms which trigger them are fully specified, where each agent may decide its degree of cooperation and its degree of expressiveness. Expressiveness is based on the propagation of constraints and relaxation requests. The paper analyzes which combination of different agents' attitudes allow to improve the negotiation processes. Experimental evaluation confirms the advantage of an expressive approach based on the propagation of constraints. In addition, this paper studies how applying a clustering algorithm to the seller's catalogue of products instead of managing single products may contribute to an improvement in the duration of the negotiation dialogues, and to a significant improvement on the utility of the deals that are achieved. These results support the usefulness of the proposed negotiation strategies.
Miguel A. Lopez-Carmona; Ivan Marsa-Maestre; Juan R. Velasco; Enrique de la Hoz; Bernardo Alarcos. Strategies for offer generation and relaxation in fuzzy constraint-based negotiation models. Multiagent and Grid Systems 2010, 6, 503 -525.
AMA StyleMiguel A. Lopez-Carmona, Ivan Marsa-Maestre, Juan R. Velasco, Enrique de la Hoz, Bernardo Alarcos. Strategies for offer generation and relaxation in fuzzy constraint-based negotiation models. Multiagent and Grid Systems. 2010; 6 (5-6):503-525.
Chicago/Turabian StyleMiguel A. Lopez-Carmona; Ivan Marsa-Maestre; Juan R. Velasco; Enrique de la Hoz; Bernardo Alarcos. 2010. "Strategies for offer generation and relaxation in fuzzy constraint-based negotiation models." Multiagent and Grid Systems 6, no. 5-6: 503-525.
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.
Miguel Angel Lopez-Carmona; Ivan Marsa-Maestre; Enrique De La Hoz; Juan R. Velasco. Using RFID to Enhance Security in Off-Site Data Storage. Sensors 2010, 10, 8010 -8027.
AMA StyleMiguel Angel Lopez-Carmona, Ivan Marsa-Maestre, Enrique De La Hoz, Juan R. Velasco. Using RFID to Enhance Security in Off-Site Data Storage. Sensors. 2010; 10 (9):8010-8027.
Chicago/Turabian StyleMiguel Angel Lopez-Carmona; Ivan Marsa-Maestre; Enrique De La Hoz; Juan R. Velasco. 2010. "Using RFID to Enhance Security in Off-Site Data Storage." Sensors 10, no. 9: 8010-8027.
This work presents a new approach for collaboration among sensors in Wireless Sensor Networks. These networks are composed of a large number of sensor nodes with constrained resources: limited computational capability, memory, power sources, etc. Nowadays, there is a growing interest in the integration of Soft Computing technologies into Wireless Sensor Networks. However, little attention has been paid to integrating Fuzzy Rule-Based Systems into collaborative Wireless Sensor Networks. The objective of this work is to design a collaborative knowledge-based network, in which each sensor executes an adapted Fuzzy Rule-Based System, which presents significant advantages such as: experts can define interpretable knowledge with uncertainty and imprecision, collaborative knowledge can be separated from control or modeling knowledge and the collaborative approach may support neighbor sensor failures and communication errors. As a real-world application of this approach, we demonstrate a collaborative modeling system for pests, in which an alarm about the development of olive tree fly is inferred. The results show that knowledge-based sensors are suitable for a wide range of applications and that the behavior of a knowledge-based sensor may be modified by inferences and knowledge of neighbor sensors in order to obtain a more accurate and reliable output.
Joaquin Canada-Bago; Jose Angel Fernandez-Prieto; Manuel Angel Gadeo-Martos; Juan Ramón Velasco. A New Collaborative Knowledge-Based Approach for Wireless Sensor Networks. Sensors 2010, 10, 6044 -6062.
AMA StyleJoaquin Canada-Bago, Jose Angel Fernandez-Prieto, Manuel Angel Gadeo-Martos, Juan Ramón Velasco. A New Collaborative Knowledge-Based Approach for Wireless Sensor Networks. Sensors. 2010; 10 (6):6044-6062.
Chicago/Turabian StyleJoaquin Canada-Bago; Jose Angel Fernandez-Prieto; Manuel Angel Gadeo-Martos; Juan Ramón Velasco. 2010. "A New Collaborative Knowledge-Based Approach for Wireless Sensor Networks." Sensors 10, no. 6: 6044-6062.