107 results on '"Javier Berrocal"'
Search Results
2. Elastic Data Analytics for the Cloud-to-Things Continuum
- Author
-
Sergio Laso, Javier Berrocal, Pablo Fernandez, Jose Maria Garcia, Jose Garcia-Alonso, Juan M. Murillo, Antonio Ruiz-Cortes, and Schahram Dustdar
- Subjects
Computer Networks and Communications - Published
- 2022
- Full Text
- View/download PDF
3. Towards dynamic and heterogeneous social IoT environments
- Author
-
Daniel Flores-Martin, Javier Berrocal, José García-Alonso, and Juan M. Murillo
- Subjects
Computational Mathematics ,Numerical Analysis ,Computational Theory and Mathematics ,Software ,Computer Science Applications ,Theoretical Computer Science - Abstract
Nowadays, there are millions of smart devices connected to the Internet. The purpose of these devices is to make people’s lives easier. Thanks to the collaboration among them, the possibilities that the Internet of Things brings can grow exponentially. However, many manufacturers develop closed protocols and devices to protect their market share, limiting in many ways this collaboration. This paper presents a conceptual architecture that improves the proactive collaboration between IoT devices regardless of the protocols developed by their manufacturers. This architecture aims to identify entities in smart environments, describe their features and interfaces, and identify strategies fostering their collaborations. As a result, devices from different manufacturers can communicate to create a collaborative environment in a simple, efficient, and affordable way. This architecture has been evaluated in a real and a simulated environment, to validate its feasibility and efficiency.
- Published
- 2022
- Full Text
- View/download PDF
4. Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks
- Author
-
Jaime Galán-Jiménez, Marco Polverini, Francesco G. Lavacca, Juan Luis Herrera, and Javier Berrocal
- Subjects
Electrical and Electronic Engineering - Abstract
Software-defined networking (SDN) is a paradigm that provides flexibility and programmability to computer networks. By introducing SDN nodes in a legacy IP network topology, network operators can benefit on higher control over the infrastructure. However, this migration is not a fast or straightforward process. Furthermore, to provide an adequate quality of service in hybrid IP/SDN networks, the coordination of both IP and SDN paradigm is fundamental. In this paper, this coordination is used to solve two optimization problems that are typically solved separately: (i) traffic load balancing and (ii) power consumption minimization. Each of these problems has opposing objectives, and thus, their joint consideration implies striking a balance between them. Therefore, this paper proposes the Hybrid Spreading Load Algorithm (HSLA) heuristic that jointly faces the problems of balancing traffic by minimizing link utilization and network’s power consumption in a hybrid IP/SDN network. HSLA is evaluated over differently sized topologies using different methods to select which nodes are migrated from IP to SDN. These evaluations reveal that alternative approaches that only address one of the objectives are outperformed by HSLA.
- Published
- 2022
- Full Text
- View/download PDF
5. QoS-Aware Fog Node Placement for Intensive IoT Applications in SDN-Fog Scenarios
- Author
-
Juan Luis Herrera, Jaime Galan-Jimenez, Luca Foschini, Paolo Bellavista, Javier Berrocal, and Juan M. Murillo
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Signal Processing ,Computer Science Applications ,Information Systems - Published
- 2022
- Full Text
- View/download PDF
6. Edge computing
- Author
-
Jorge Pérez, Jessica Díaz, Javier Berrocal, Ramón López-Viana, and Ángel González-Prieto
- Subjects
Computational Mathematics ,Numerical Analysis ,Computational Theory and Mathematics ,Software ,Computer Science Applications ,Theoretical Computer Science - Abstract
IoT edge computing is a new computing paradigm “in the IoT domain” for performing calculations and processing at the edge of the network, closer to the user and the source of the data. This paradigm is relatively recent, and, together with cloud and fog computing, there may be some confusion about its meaning and implications. This paper aims to help practitioners and researchers better understand what the industry thinks about what IoT edge computing is, and the expected benefits and challenges associated with this paradigm. We conducted a survey using a semi-structured in-depth questionnaire to collect qualitative data from relevant stakeholders from 29 multinational companies and qualitatively analyzed these data using the Constructivist Grounded Theory (Charmaz) method. Several researchers participated in the coding process (collaborative coding). To ensure consensus on the constructs that support the theory and thus improve the rigor of qualitative research, we conducted an intercoder agreement analysis. From the analysis, we have derived a substantive and analytic theory of what companies perceive about IoT edge computing, its benefits and challenges. The theory is substantive in that the scope of validity refers to the 29 surveys processed and analytic in that it analyzes “what is” rather than explaining causality or attempting predictive generalizations. A public repository with all the data related to the information capture process and the products resulting from the analysis of this information is publicly available. This study aims to strengthen the evidence and support practitioners in making better informed decisions about why companies are adopting edge computing and the current challenges they face. Additionally, the testing theory phase shows that the results are aligned with the ISO/IEC TR 30164 standard.
- Published
- 2022
- Full Text
- View/download PDF
7. Quantum Software as a Service Through a Quantum API Gateway
- Author
-
Jose Garcia-Alonso, Javier Rojo, David Valencia, Enrique Moguel, Javier Berrocal, and Juan Manuel Murillo
- Subjects
Computer Networks and Communications - Published
- 2022
- Full Text
- View/download PDF
8. A self-sustainable opportunistic solution for emergency detection in ageing people living in rural areas
- Author
-
Manuel Jesús-Azabal, Javier Berrocal, Vasco N. G. J. Soares, José García-Alonso, and Jaime Galán-Jiménez
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Abstract
There are contexts where communication with TCP/IP protocol is not possible due to the lack of infrastructure or a reliable and continuous data transmission. In this cases, alternatives such as Opportunistic Networks (OPPNets) are valid. Such challenging conditions are common in rural areas and are a significant obstacle for the deployment of eHealth technologies for older adults. Considering this context, the present work introduces Interest-based System for Communication in Isolated Areas (ISCA), an OPPNet architecture for remote monitoring and emergency detection in ageing people who live alone. For this, the energetic requirements are considered, providing efficient and sustainable operation. The proposal makes use of a routing algorithm based on interests which enables asynchronous communication among entities. ISCA is evaluated over a realistic scenario and compared with similar state-of-the-art solutions. Experimental results show that ISCA notably improves the delivery probability with an enhancement of 52.25% in comparison to the second best alternative and provides a suitable average latency. Moreover, it also achieves better performance in terms of overhead and hops number compared to the other studied protocols
- Published
- 2023
- Full Text
- View/download PDF
9. Continuous QoS-aware adaptation of Cloud-IoT application placements
- Author
-
Juan Luis Herrera, Javier Berrocal, Stefano Forti, Antonio Brogi, and Juan M. Murillo
- Subjects
Computational Mathematics ,Numerical Analysis ,Computational Theory and Mathematics ,Software ,Computer Science Applications ,Theoretical Computer Science - Abstract
Cloud-Internet of Things computing paradigms call for novel and efficient methodologies to decide where to place application services in continuity with Continuous Integration/Continuous Deployment pipelines and infrastructure monitoring. In this article, we present Continuous Adaptation (CA), a new DevOps practice for (1) detecting runtime changes in the application requirements or the infrastructure that, due to their change in resource consumption or their effects on the Quality of Service (QoS), can affect the validity and dependability of the current application placement, and for (2) locally intervening on them by suggesting new placements that ensure all (functional and non-functional) application requirements are met. We assess a prototype of CA, , and analyze its performance over a motivating use case. adapts the application placement to environmental changes through the use of continuous reasoning, reducing the size of the problem to be solved to optimize its performance. The evaluation shows that is able to obtain nearly optimal QoS up to $$4.2\times $$ 4.2 × faster than alternative techniques, also minimizing the cost of service migration.
- Published
- 2023
- Full Text
- View/download PDF
10. Knowledge Sharing in Proactive WoT Multi-environment Models
- Author
-
Rubén Rentero-Trejo, Jaime Galán-Jiménez, José García-Alonso, Javier Berrocal, and Juan Manuel Murillo
- Published
- 2023
- Full Text
- View/download PDF
11. Energy-efficient deployment of IoT applications in remote rural areas using UAV networks
- Author
-
Jaime Galan-Jimenez, Alejandro Gonzalez Vegas, and Javier Berrocal
- Published
- 2022
- Full Text
- View/download PDF
12. Hybrid Random Forest Survival Model to Predict Customer Membership Dropout
- Author
-
Pedro Sobreiro, Domingos Martinho, Javier Berrocal, and Jose Garcia-Alonso
- Subjects
machine learning ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,customer dropout ,Electrical and Electronic Engineering ,survival analysis - Abstract
Dropout prediction is a problem that must be addressed in various organizations, as retaining customers is generally more profitable than attracting them. Existing approaches address the problem considering a dependent variable representing dropout or non-dropout, without considering the dynamic perspetive that the dropout risk changes over time. To solve this problem, we explore the use of random survival forests combined with clusters, in order to evaluate whether the prediction performance improves. The model performance was determined using the concordance probability, Brier Score and the error in the prediction considering 5200 customers of a Health Club. Our results show that the prediction performance in the survival models increased substantially in the models using clusters rather than that without clusters, with a statistically significant difference between the models. The model using a hybrid approach improved the accuracy of the survival model, providing support to develop countermeasures considering the period in which dropout is likely to occur. info:eu-repo/semantics/publishedVersion
- Published
- 2022
- Full Text
- View/download PDF
13. Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution
- Author
-
Manuel Jimenez-Lazaro, Javier Berrocal, and Jaime Galan-Jimenez
- Published
- 2022
- Full Text
- View/download PDF
14. Improving the Energy Efficiency of Software-Defined Networks through the Prediction of Network Configurations
- Author
-
Manuel Jiménez-Lázaro, Juan Luis Herrera, Javier Berrocal, and Jaime Galán-Jiménez
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,SDN ,machine learning ,logistic regression ,energy efficiency ,Electrical and Electronic Engineering - Abstract
During the last years, huge efforts have been conducted to reduce the Information and Communication Technology (ICT) sector energy consumption due to its impact on the carbon footprint, in particular, the one coming from networking equipment. Although the irruption of programmable and softwarized networks has opened new perspectives to improve the energy-efficient solutions already defined for traditional IP networks, the centralized control of the Software-Defined Networking (SDN) paradigm entails an increase in the time required to compute a change in the network configuration and the corresponding actions to be carried out (e.g., installing/removing rules, putting links to sleep, etc.). In this paper, a Machine Learning solution based on Logistic Regression is proposed to predict energy-efficient network configurations in SDN. This solution does not require executing optimal or heuristic solutions at the SDN controller, which otherwise would result in higher computation times. Experimental results over a realistic network topology show that our solution is able to predict network configurations with a high feasibility (>95%), hence improving the energy savings achieved by a benchmark heuristic based on Genetic Algorithms. Moreover, the time required for computation is reduced by a factor of more than 500,000 times.
- Published
- 2022
- Full Text
- View/download PDF
15. Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks
- Author
-
Jaime Galan-Jimenez, Alejandro Gonzalez Vegas, and Javier Berrocal
- Published
- 2022
- Full Text
- View/download PDF
16. Quality of Service-Adaptive Industrial Internet of Things leveraging Edge Computing and Deep Reinforcement Learning : The Deep QoS-Adaptive Learning Environment (DeQALE) Architecture
- Author
-
Juan Luis Herrera, Javier Berrocal, Jaime Galan-Jimenez, Jose Garcia-Alonso, and Juan Manuel Murillo
- Published
- 2022
- Full Text
- View/download PDF
17. Blockchains’ federation for enabling actor-centered data integration
- Author
-
Javier Rojo, Juan Hernandez, Luca Foschini, Paolo Bellavista, Javier Berrocal, Juan M. Murillo Rodriguez, and Jose Garcia-Alonso
- Published
- 2022
- Full Text
- View/download PDF
18. Deep Reinforcement Learning Based Method for the Rule Placement Problem in Software-Defined Networks
- Author
-
Manuel Jimenez-Lazaro, Javier Berrocal, and Jaime Galan-Jimenez
- Published
- 2022
- Full Text
- View/download PDF
19. The Internet of Bodies Needs a Human Data Model
- Author
-
Jose Garcia-Alonso, Javier Berrocal, Niko Mäkitalo, Juan Manuel Murillo, Tommi Mikkonen, Aleksandr Ometov, Petri Ihantola, Daniel Flores-Martin, Tampere University, Electrical Engineering, Empirical Software Engineering research group, Department of Computer Science, Department of Education, Mind and Matter, and Maker@STEAM
- Subjects
IoT ,Schedule ,Monitoring ,Computer Networks and Communications ,Computer science ,Internet of Things ,THINGS ,Cloud computing ,02 engineering and technology ,Human Data Model ,computer.software_genre ,Data modeling ,Scheduling (computing) ,Internet of Bodies ,0202 electrical engineering, electronic engineering, information engineering ,Sensors ,business.industry ,213 Electronic, automation and communications engineering, electronics ,Data models ,Computational modeling ,020206 networking & telecommunications ,113 Computer and information sciences ,Data science ,Human-Computer Interaction ,Medical services ,Software framework ,Internet of Wearable Things ,Data model ,IoB ,The Internet ,business ,computer - Abstract
Today, the number of interconnected devices and the amount of personal information gathered by them increases tremendously resulting in the need for development tools to harness its potential. New devices are continually being introduced in the daily life of people, and they are already producing an unprecedented amount of data related to people's well-being. However, taking advantage of such information to create innovative Internet of Bodies solutions heavily relies on manually gathering the needed information from several sources on services and the devices involved. In this paper, we present a novel Human Data Model - a new tool to combine personal information from several sources, perform computations over that information, and proactively schedule computer-human interactions. Developers that use the proposed model would obtain an opportunity to create the Internet of Bodies solutions using high-level abstractions of the users' personal information and taking advantage of the distributed approach of the model. acceptedVersion
- Published
- 2020
- Full Text
- View/download PDF
20. How Fog Computing Can Support Latency/Reliability‐sensitive <scp>IoT</scp> Applications: An Overview and a Taxonomy of State‐of‐the‐art Solutions
- Author
-
Isam Mashhour Al Jawarneh, Alessandro Zanni, Paolo Bellavista, Javier Berrocal, Antonio Corradi, Sajal K. Das, Luca Foschini, Bellavista, Paolo, Berrocal, Javier, Corradi, Antonio, Das, Sajal K., Foschini, Luca, Al Jawarneh, Isam Mashhour, and Zanni, Alessandro
- Subjects
three-layered architecture ,business.industry ,Fog computing ,Computer science ,reliability-sensitive IoT application ,fog computing ,Latency (engineering) ,Internet of Things ,business ,latency ,Reliability engineering - Abstract
The Internet of Things (IoT) paradigm is leading to the deployment of an extensive number of smart devices capable of assisting companies and people in their daily activities. For this paradigm to be effective, these devices must exchange a huge amount of information and be coordinated in unpredictable, dynamic, and very complex scenarios. So far, cloud computing has centralized data storage and offered coordination of devices. However, as the number of deployed smart devices increases and the requirements of IoT solutions are more stringent, cloud computing hardly meets them. Fog computing has emerged as a middle layer between end‐devices and cloud environments to support the requirements of IoT applications that cannot be met by the current edge‐cloud model. A great effort has been devoted during the past few years to the development of this fog vision. Most of these solutions focused on improving specific characteristics, but not on supporting all the key requirements of an IoT solution. Thus, a deep investigation of these solutions to understand how they can be connected and coordinated to meet these necessities is essential. In this paper, we distinguish the most vital necessities that IoT solutions present to accomplish a right operation. Also, by analyzing the available solutions, we propose a novel global architectural model for fog computing meeting the recognized demands. We also provide a novel scientific taxonomy for breaking down the overviewed solutions. We conclude by analyzing the most essential recommendations in Fog computing for IoT, thereby distinguishing open issues and research frontiers that must be prioritized in order to have a totally developed fog computing environment, ready to meet the IoT solutions' prerequisites.
- Published
- 2020
- Full Text
- View/download PDF
21. A Pre-Filtering Approach for Incorporating Contextual Information Into Deep Learning Based Recommender Systems
- Author
-
Isam Mashhour Al Jawarneh, Luca Foschini, Rebecca Montanari, Paolo Bellavista, Juan Manuel Murillo, Javier Berrocal, Antonio Corradi, AL JAWARNEH ISAM MASHHOUR HASAN, Bellavista P., Corradi A., Foschini L., Montanari R., Berrocal J., and Murillo J.M.
- Subjects
General Computer Science ,Computer science ,Context (language use) ,02 engineering and technology ,Recommender system ,context awarene ,020204 information systems ,context awareness ,0202 electrical engineering, electronic engineering, information engineering ,Collaborative filtering ,Context awareness ,General Materials Science ,Context model ,business.industry ,General Engineering ,020207 software engineering ,Deep learning ,Data science ,Metadata ,collaborative filtering ,Task analysis ,The Internet ,apache spark ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,recommender systems ,business ,lcsh:TK1-9971 - Abstract
Depending on the Internet as the main source of information regarding all aspects of our life is becoming a trend. People seek relevant information, suggestions, and recommendations in an overloaded online world and through social ties regarding their daily activities, including places to visit and restaurants to try new food. The wide variety of choices that are available online causes information overloading, which thereby complicates the selection process. Traditional recommender systems are mostly dependent on a conventional model that is based on user-item-rating interaction without considering contextual information. We claim that new generations of recommendation systems able to exploit context in an innovative and efficient way is important and may statistically yield more significant rating predictions. However, only few research works have focused on how to effectively and efficiently exploit context metadata in Deep Learning (DL)-based recommendations. The main reason lies, perhaps most significantly, in the fact that most current DL algorithms are not intrinsically designed to incorporate contextual tags. In this paper, we provide a significant contribution for filling this gap by designing a hybrid algorithm that retrofits and repurposes a pre-filtering contextual incorporation method and feeds the new dimension to a DL-based neural collaborative filtering method, thus preserving and recovering the benefits of both without their limitations. The paper also reports quantitative results that show that our method outperforms the baselines by statistically significant margins.
- Published
- 2020
22. Early Evaluation of Mobile Applications’ Resource Consumption and Operating Costs
- Author
-
Alejandro Pérez-Vereda, Javier Berrocal, Pablo Fernandez, Juan Manuel Murillo, Carlos Canal, Antonio Ruiz-Cortés, Juan Hernández, Jose Garcia-Alonso, Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, Universidad de Sevilla. TIC205: Ingeniería del Software Aplicada, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Junta de Andalucía, Ministerio de Ciencia e Innovación (MICIN). España, Interreg V-A España-Portugal (POCTEP), and Junta de Extremadura
- Subjects
Software architectures ,Mobile applications ,Services lifecycle ,General Computer Science ,Computer science ,General Engineering ,Software engineering process ,General Materials Science ,Resource consumption ,Environmental economics - Abstract
The explosive growth of the mobile application market in recent years has led to a large concomitant mobile software industry whose components are, in many cases, startups and small-size software providers. The success of these applications and the firms behind them depends on a subtle balance between different dimensions mainly affected by their architectural design, such as user satisfaction, resource consumption, operating costs, and timing. The present communication describes a framework with a specific set of practices for identifying the boundaries of different architectural designs —in this article we apply it to estimate both the smartphone’s resource consumption and the operating costs in the cloud— and thus help in the architectural decision-making process. This will enable mobile software developers to predict at early stages which architectural design best suits their business model in accordance with the number of users and the expected use of the application and even provide an advance alert of when architectural choices will need to be reviewed, obviating the need for costly architectural re-design in further phases Ministerio de Ciencia, Innovación y Universidades RTI2018-094591-B-I00 Ministerio de Ciencia, Innovación y Universidades PGC2018-094905-B-I00 Junta de Andalucía APOLO (US-1264651) Ministerio de Ciencia e Innovación HORATIO (RTI2018-101204–B–C21) Ministerio de Ciencia, Innovación y Universidades RED2018-102654-T Interreg V-A España-Portugal (POCTEP) 0499-4IE-PLUS-4-E Junta de Andalucía UMA18-FEDERJA-180 Junta de Extremadura GR18112 Junta de Extremadura IB18030
- Published
- 2020
- Full Text
- View/download PDF
23. FoodScan: Food Monitoring App by Scanning the Groceries Receipts
- Author
-
Jose Garcia-Alonso, Beatriz Sainz-De-Abajo, Sergio Laso-Mangas, Jose Javier Berrocal-Olmeda, and Isabel de la Torre-Díez
- Subjects
Calorie ,General Computer Science ,Computer science ,Control (management) ,Healthy eating ,food intake monitoring ,02 engineering and technology ,MHealth ,Monitoring food intake ,elderly ,03 medical and health sciences ,0302 clinical medicine ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,030212 general & internal medicine ,Marketing ,business.industry ,automatic dietary assessment ,General Engineering ,Healthy diet ,Work (electrical) ,Knowledge base ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Rural area ,business ,android ,Mobile device ,Web scraping ,lcsh:TK1-9971 - Abstract
In the mobile device market there is a large number of applications to help people monitor intake or provide suggestions to lose weight and manage a healthy diet. However, the vast majority of these apps consume a lot of time by having to introduce food one by one. This paper presents the work to develop and pilot test a new Android application, FoodScan, aimed at people over 70, specially those from rural environments or with limited technical knowledge, to manage their food from the items that appear on their grocery receipts, avoiding the obligation to introduce one by one those foods, and generating recommendations. To achieve this final objective, specific objectives have been completed as indicated in the methods section. We conducted a review of current calorie control applications to learn about their weaknesses and strengths. Different algorithms were tested to expedite the introduction of food into the application and the most suitable for the FoodScan application was selected. Likewise, several options were taken into account to create the knowledge base of food, taking into account dietary recommendations for people over 70 years. Once developed, a pilot evaluation was carried out with a convenience sample of 109 volunteers in rural areas of Caceres and Valladolid (Spain) and Alentejo (Portugal). They tested FoodScan for a month after which they completed a user satisfaction survey. 93 % (101/109) believed that the app was easy to download and install, 66 % (72/109) thought that it was easy to use, 47 % (51/109) noted that the charts with the recommendations helped them with diet control and 49 % (53/109) indicated that FoodScan helped them improve healthy eating habits. One-month pilot evaluation data suggested that most users found the app somewhat helpful for monitoring food intake, easy to download and easy to use.
- Published
- 2020
24. Early Evaluation of Mobile Applications’ Resource Consumption and Operating Costs
- Author
-
Javier Berrocal, Jose Garcia-Alonso, Pablo Fernandez, Alejandro Perez-Vereda, Juan Hernandez, Carlos Canal, Juan Manuel Murillo, and Antonio Ruiz-Cortes
- Subjects
J9 mobile applications ,D218 software engineering process ,M2 services lifecycle ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,D211 software architectures ,lcsh:TK1-9971 - Abstract
The explosive growth of the mobile application market in recent years has led to a large concomitant mobile software industry whose components are, in many cases, startups and small-size software providers. The success of these applications and the firms behind them depends on a subtle balance between different dimensions mainly affected by their architectural design, such as user satisfaction, resource consumption, operating costs, and timing. The present communication describes a framework with a specific set of practices for identifying the boundaries of different architectural designs -in this article we apply it to estimate both the smartphone's resource consumption and the operating costs in the cloud- and thus help in the architectural decision-making process. This will enable mobile software developers to predict at early stages which architectural design best suits their business model in accordance with the number of users and the expected use of the application and even provide an advance alert of when architectural choices will need to be reviewed, obviating the need for costly architectural re-design in further phases.
- Published
- 2020
25. Open Issues Automating Multi-Environment IoT Systems
- Author
-
Ruben Rentero-Trejo, Jose Garcia-Alonso, Juan Manuel Murillo, and Javier Berrocal
- Published
- 2022
- Full Text
- View/download PDF
26. Deploying Next Generation IoT Applications Through SDN-Enabled Fog Infrastructures
- Author
-
Juan Luis Herrera, Javier Berrocal, and Juan M. Murillo
- Published
- 2022
- Full Text
- View/download PDF
27. Contigo: Monitoring People’s Activity App for Anomalies Detection
- Author
-
Juan M Murillo, Javier Berrocal, Sergio Laso Mangas, and Daniel Flores-Martin
- Published
- 2022
- Full Text
- View/download PDF
28. Social Events Analyzer (SEA): A Toolkit for Mining Social Workflows by Means of Federated Process Mining
- Author
-
Juan M Murillo, Jose Garcia-Alonso, Javier Berrocal, Carlos Canal, Javier Rojo, and Juan Hernandez
- Published
- 2022
- Full Text
- View/download PDF
29. Quantum Service-Oriented Architectures: From Hybrid Classical Approaches to Future Stand-Alone Solutions
- Author
-
David Valencia, Enrique Moguel, Javier Rojo, Javier Berrocal, Jose Garcia-Alonso, and Juan M. Murillo
- Published
- 2022
- Full Text
- View/download PDF
30. A SLR on Customer Dropout Prediction
- Author
-
Pedro Sobreiro, Domingos Dos Santos Martinho, Jose G. Alonso, and Javier Berrocal
- Subjects
machine learning ,General Computer Science ,systematic review ,General Engineering ,Customers ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,dropout prediction ,TK1-9971 - Abstract
Dropout prediction is a problem that is being addressed with machine learning algorithms; thus, appropriate approaches to address the dropout rate are needed. The selection of an algorithm to predict the dropout rate is only one problem to be addressed. Other aspects should also be considered, such as which features should be selected and how to measure accuracy while considering whether the features are appropriate according to the business context in which they are employed. To solve these questions, the goal of this paper is to develop a systematic literature review to evaluate the development of existing studies and to predict the dropout rate in contractual settings using machine learning to identify current trends and research opportunities. The results of this study identify trends in the use of machine learning algorithms in different business areas and in the adoption of machine learning algorithms, including which metrics are being adopted and what features are being applied. Finally, some research opportunities and gaps that could be explored in future research are presented. info:eu-repo/semantics/publishedVersion
- Published
- 2022
31. SOWCompact: A federated process mining method for social workflows
- Author
-
Javier Rojo, Jose Garcia-Alonso, Javier Berrocal, Juan Hernández, Juan Manuel Murillo, and Carlos Canal
- Subjects
Information Systems and Management ,Minería de datos - Congresos ,Artificial Intelligence ,Control and Systems Engineering ,Social workflows ,Process mining ,Pattern discovery ,Federated process mining ,Software ,Computer Science Applications ,Theoretical Computer Science - Abstract
The growing informatization of the environment allows modeling people’s behavior as a social workflow, where both individual actions and interactions with other people are captured. This modelling includes actions that are part of an individual’s routine, as well as less frequent events. Although infrequent actions may provide relevant information, it is routine behaviors that characterize users. However, the extraction of this knowledge is not simple. There are problems when analyzing together large amounts of traces from many users, resulting into a social workflow that does not clearly depict their behavior, either individually or as a group. Tools that allow grouping/filtering of users with a common behavior pattern are needed, to analyze each of these groups separately. This study presents the federated process mining and an associated tool, SOWCompact. Its potential is validated through the case study called activities of daily living (ADL). Using federated process mining, along with current process mining techniques, more compact processes using only the social workflow’s most relevant information are obtained, while allowing the analysis of these social workflows. Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
- Published
- 2022
32. Towards Proactive Context-Aware IoT Environments by Means of Federated Learning
- Author
-
Rubén Rentero-Trejo, Daniel Flores-Martin, Jaime Galán-Jiménez, José García-Alonso, Juan Manuel Murillo, and Javier Berrocal
- Published
- 2021
- Full Text
- View/download PDF
33. Optimal Deployment of Fog Nodes, Microservices and SDN Controllers in Time-Sensitive IoT Scenarios
- Author
-
Juan Luis Herrera, Jaime Galan-Jimenez, Paolo Bellavista, Luca Foschini, Jose Garcia-Alonso, Juan M. Murillo, Javier Berrocal, Herrera, Juan Lui, Galan-Jimenez, Jaime, Bellavista, Paolo, Foschini, Luca, Garcia-Alonso, Jose, Murillo, Juan M., and Berrocal, Javier
- Subjects
Software Defined Networking (SDN) ,micro services architecture ,Internet of Things (IoT) - Abstract
The application of Internet of Things (IoT)-based solutions to intensive domains has enabled the automation of real-world processes. The critical nature of these domains requires for very high Quality of Service (QoS) to work properly. These applications often use computing paradigms such as fog computing and software architectures such as the Microservices Architecture (MSA). Moreover, the need for transparent service discovery in MSAs, combined with the need for network scalability and flexibility, motivates the use of Software-Defined Networking (SDN) in these infrastructures. However, optimizing QoS in these scenarios implies an optimal deployment of microservices, fog nodes, and SDN controllers. Moreover, the deployment of each of the different elements affects the optimality of the others, which calls for a joint solution. In this paper, we motivate the joining of these three optimization problems into a single effort and we present Umizatou, a holistic deployment optimization solution that makes use of Mixed Integer Linear Programming. Finally, we evaluate Umizatou over a healthcare case study, showing its scalability in topologies of different sizes.
- Published
- 2021
- Full Text
- View/download PDF
34. Using Federated Learning to Achieve Proactive Context-Aware IoT Environments
- Author
-
Jose Garcia-Alonso, Rubén Rentero-Trejo, Juan Manuel Murillo, Jaime Galán-Jiménez, Daniel Flores-Martin, and Javier Berrocal
- Subjects
Computer Networks and Communications ,business.industry ,Process (engineering) ,Computer science ,Usability ,Context (language use) ,Federated learning ,Task (project management) ,Personalization ,Human–computer interaction ,business ,Internet of Things ,Mobile device ,Software ,Information Systems - Abstract
The Internet of Things (IoT) is more present in our daily lives than ever before, turning everyday physical objects into smart devices. However, these devices often need excessive human interaction before reaching their best performance, making them time-consuming and reducing their usability. Nowadays, Artificial Intelligence (AI) techniques are being used to process data and to find ways to automate different behaviours. However, achieving learning models capable of handling any situation is a challenging task, worsened by time training restrictions. This paper proposes a Federated Learning solution to manage different IoT environments and provide accurate predictions, based on the user’s preferences. To improve the coexistence between devices and users, this approach makes use of other users’ previous behaviours in similar environments, and proposes predictions for newcomers to the federation. Also, for existing participants, it provides a closer personalization, immediate availability and prevents most manual interactions. The approach has been tested with synthetic and real data and identifies the actions to be performed with 94% accuracy on regular users.
- Published
- 2021
- Full Text
- View/download PDF
35. Predicting Response Time in SDN-Fog Environments for IIoT Applications
- Author
-
Guilherme Werneck de Oliveira, Rodrigo Toscano Ney, Juan Luis Herrera, Daniel Macedo Batista, R. Hirata, Jaime Galan-Jimenez, Javier Berrocal, Juan Manuel Murillo, Aldri Luiz Dos Santos, and Michele Nogueira
- Published
- 2021
- Full Text
- View/download PDF
36. On the tradeoff between load balancing and energy-efficiency in hybrid IP/SDN networks
- Author
-
Juan Luis Herrera, Jaime Galán-Jiménez, Javier Berrocal, Francesco Giacinto Lavacca, and Marco Polverini
- Subjects
Optimization problem ,Computer science ,computer.internet_protocol ,business.industry ,Heuristic (computer science) ,Quality of service ,Load balancing (computing) ,Network topology ,Internet protocol suite ,Traffic engineering ,business ,computer ,Computer network ,Efficient energy use - Abstract
The flexibility and programmability provided by the Software-Defined Networking (SDN) paradigm allow network operators to upgrade their legacy IP network infrastructures with the aim of improving their control over the network. However, the full migration from IP to SDN is not straightforward, at least, in the short term. Thus, transitory network infrastructures combining IP and SDN nodes (named hybrid IP/SDN networks) are required to coexist, while the correct coordination between paradigms is crucial to maintain the required Quality of Service. In this paper, two optimization problems that are normally solved separately due to their opposite nature: i) traffic load balancing and ii) the reduction of network power consumption, are jointly considered. In particular, an heuristic named Hybrid Spreading Load Algorithm (HSLA), is proposed to jointly minimize the Maximum Link Utilization (MLU) and the network power consumption during the transition from IP to SDN networks. Simulations over topologies of different size considering diverse selection methods for the replacement of the nodes reveal that HSLA outperforms other state-of-the-art approaches that specifically tackle only one objective, either the traffic load balancing or the reduction of the network power consumption.
- Published
- 2021
- Full Text
- View/download PDF
37. Identification and Visualization of a Patient’s Medical Record via Mobile Devices without an Internet Connection
- Author
-
Sergio Laso, Daniel Flores-Martin, Juan Luis Herrera, Jaime Galán-Jiménez, and Javier Berrocal
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,mobile application ,nearby connection ,facial recognition ,personal healthcare ,Electrical and Electronic Engineering - Abstract
Nowadays, people’s medical records are crucial when it comes to providing treatments, discovering pathologies, or keeping track of health status. Advances in technology have allowed these records to be increasingly digitized, to the point that they can be consulted by specialists from anywhere. This also allows people to report their health status, allergies, or treatments. However, knowing a person’s medical history is a delicate and complex process, and accessing these digitized data is not always possible due to problems with network connectivity or physical communication with the person. In this work, we propose a solution for medical staff to obtain a patient’s medical history through facial recognition, and without the need for an internet connection. This proposal is based on the development of an architecture that allows connecting nearby mobile devices of doctors and patients without an internet connection to obtain the desired information using facial recognition as an authentication method. The architecture has been validated with the development of a mobile application that, by focusing on the patient’s face with the camera of the doctor’s mobile device, makes it possible to obtain the patient’s medical information. With this proposal, it is possible to obtain the medical history of a person in dangerous situations or where the connectivity is limited or non-existent, in a simple and fast way.
- Published
- 2022
- Full Text
- View/download PDF
38. Context-aware privacy-preserving access control for mobile computing
- Author
-
Juan Luis Herrera, Hsiao-Yuan Chen, Javier Berrocal, Juan M. Murillo, and Christine Julien
- Subjects
Hardware and Architecture ,Computer Networks and Communications ,Software ,Computer Science Applications ,Information Systems - Published
- 2022
- Full Text
- View/download PDF
39. Improving Resource Consumption in Context- Aware Mobile Applications Through Alternative Architectural Styles
- Author
-
Juan Hernández, Guadalupe Ortiz, Javier Berrocal, Alfonso Garcia-de-Prado, and Ingeniería Informática
- Subjects
resource consumption ,General Computer Science ,Computer science ,mobile computing ,Mobile computing ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Filter (software) ,Task (project management) ,0202 electrical engineering, electronic engineering, information engineering ,Context awareness ,General Materials Science ,Multimedia ,business.industry ,General Engineering ,020207 software engineering ,Internet computing ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Internet of Things ,business ,computer ,Mobile device ,lcsh:TK1-9971 - Abstract
Over the last years, the Internet of Things has fostered a growing interest in context-aware mobile applications; this fact is mainly due to highly favoring information provision from multiple Internetconnected devices. To identify user context, these applications collect information from the user and his/her environment and typically lter app information, so that the user receives only the interesting and relevant information. However, such a task usually implies further resource consumption on user mobile devices, not only regarding battery usage but also in terms of network traf c. Accordingly, although context-aware applications can improve user experiences in their daily lives, they must ensure the maintenance of lowlevel resource consumption; otherwise, the applications are promptly replaced by less consuming ones, and therefore, removed from the mobile market. In this paper, we evaluate and discuss several architectural styles for context-aware mobile applications, as well as, providing a set of guidelines to decide on the right architecture for a particular app depending on its characteristics. The use of such guidelines when choosing the right architectural style can strongly in uence the resource consumption of context-aware mobile applications. Following these guidelines, user satisfaction of a context-aware mobile application may be improved, thus guaranteeing the app success.
- Published
- 2019
40. Mist and Edge Storage: Fair Storage Distribution in Sensor Networks
- Author
-
Alfonso Galan-Benitez, Javier Berrocal, and Marino Linaje
- Subjects
General Computer Science ,business.industry ,Computer science ,General Engineering ,distributed storage ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Mist computing ,edge computing ,sensor networks ,Sensor node ,Server ,Computer data storage ,Distributed data store ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Cloud storage ,Wireless sensor network ,Edge computing ,Computer network - Abstract
Sensor/Actuator devices are currently being massively adopted, often as nodes of larger sensor networks. These sensor networks are typically dedicated to context acquisition (e.g., get temperature) as well as providing acting services (e.g., open the blinds). However, regarding their own data storage, data is usually sent to Fog/Cloud servers. Fog/Cloud storage solutions provide several advantages over sensor network storage solutions, but also some drawbacks. For instance, in Cloud environments, privacy and legal issues may appear, while in Fog, additional costly hardware must be purchased and maintained, at least a server with redundant storage or many servers when distributed data storage is required. Nowadays, sensor nodes count in thousands around us, and they have significantly increased their storage and computational capabilities over the past few years. Therefore, traditional Fog/Cloud storage solutions could be combined or even replaced by Mist/Edge storage solutions for many use cases. A principal contribution of this paper is a novel data distribution and replication storage solution for wireless sensor networks, the first to consider sensor node heterogeneity to find the optimal storage replication according to node capabilities. The solution has been carefully planned and implemented to run even in very low-end microcontrollers, that lives in many of our surrounding smart devices. Other contributions include data comparing Mist/Edge and Amazon S3 regular storage, showing that there remains plenty of room for research into Mist/Edge storage, as well as into the industry itself.
- Published
- 2019
- Full Text
- View/download PDF
41. Privacy-Aware and Context-Sensitive Access Control for Opportunistic Data Sharing
- Author
-
Hsiao-Yuan Chen, Juan Luis Herrera, Javier Berrocal, Juan Manuel Murillo, and Christine Julien
- Subjects
Information privacy ,business.industry ,Computer science ,Dynamic data ,Control (management) ,Level of detail (writing) ,Access control ,Context (language use) ,Cloud computing ,Computer security ,computer.software_genre ,Data sharing ,business ,computer - Abstract
Opportunistic data sharing allows users to receive real-time, dynamic data directly from peers. These systems not only allow large-scale cooperative sensing but they also empower users to fully control what information is sensed, stored, and shared, enhancing an individual's control over their own potentially private data. While there exist context-aware frameworks that allow individual users to define when and what shared information peers can consume, these approaches have limited expressiveness and do not allow data owners to modulate the granularity of the information released depending on a particular peer or situation. In addition, these frameworks do not consider the consuming peers' privacy, i.e., how much information they have to provide to get access to some desired data. In this paper, we present PADEC, a context-sensitive, privacy-aware framework that allows users to define rich access control rules over their resources and to attach levels of granularity to each rule in order to precisely define who has access to what data when and at what level of detail. Our evaluation shows that PADEC is more expressive than other access control mechanisms and protects the provider’s privacy up to 90% more.
- Published
- 2021
- Full Text
- View/download PDF
42. Optimizing Response Time in SDN-Edge Environments for Time-Strict IoT Applications
- Author
-
Juan Luis Herrera, Jaime Galán-Jiménez, Javier Berrocal, and Juan Manuel Murillo
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Linear programming ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Quality of service ,Response time ,Cloud computing ,Network topology ,Computer Science Applications ,Computer Science - Networking and Internet Architecture ,Hardware and Architecture ,Server ,Signal Processing ,Scalability ,business ,Edge computing ,Information Systems - Abstract
The rise of the Internet of Things (IoT) has opened new research lines that focus on applying IoT applications to domains further beyond basic user-grade applications, such as Industry or Healthcare. These domains demand a very high Quality of Service (QoS), mainly a very short response time. In order to meet these demands, some works are evaluating how to modularize and deploy IoT applications in different nodes of the infrastructure (edge, fog, cloud), as well as how to place the network controllers, since these decisions affect the response time of the application. Some works in the literature have approached this problem by providing separate plans for deployment and placing of controllers. However, this approach makes sub-optimal decisions, that complicate guaranteeing the demanded response time. To guarantee an optimal response time, it is crucial to solve the problem in a single effort that considers both, the networking and computing dimensions. In this work, we analyze the influences between the response time of computing and networking in edge computing environments with SDN networks, merging both optimization efforts into a single one and proposing a solution to the joint problem. Our evaluation shows that our proposal can shorten response time by up to 28.97%, Submitted to IEEE Internet of Things Journal
- Published
- 2021
43. SMOTE: A Tool to Proactively Manage Situations in WoT Environments
- Author
-
Javier Berrocal, Jose Garcia-Alonso, Daniel Flores-Martin, and Juan Manuel Murillo
- Subjects
050101 languages & linguistics ,Computer science ,Situation management ,05 social sciences ,Multitude ,02 engineering and technology ,Proactivity ,Web of Things ,Human–computer interaction ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Smart environment ,State (computer science) - Abstract
The growing number of devices in the Web of Things (WoT) allows larger and more complex smart environments. These environments aim to provide the desired state for the people, adapting the devices to their preferences. The characteristics of the environment, the people and the devices generate a multitude of interconnections and behaviours in specific situations. However, managing these situations is not straightforward because of their changing nature. Tools are needed to identify and automate these interactions according to the desired conditions. In this demo we present SMOTE (Situation Management fOr SmarT Environments), a tool for proactively managing situations in WoT environments, improving the management of different entities and reducing the effort for adapting devices to people’s preferences.
- Published
- 2021
- Full Text
- View/download PDF
44. Service Oriented Computing for Humans as Service Providers
- Author
-
Sergio Laso, Javier Berrocal, Juan Manuel Murillo, Carlos Canal, and Jose Garcia-Alonso
- Subjects
business.industry ,computer.internet_protocol ,Computer science ,Service choreography ,Information technology ,Cloud computing ,Service-oriented architecture ,Microservices ,Service provider ,computer.software_genre ,World Wide Web ,Web service ,business ,computer ,Mobile device - Abstract
For the past twenty years, Service Oriented Computing has changed the way in which information technology was understood. The approach involves not only technological advances that have influenced the development of Software Engineering, such as Service Oriented Architecture, Web services, Service Choreography, or Microservices. In addition, it has also provided the pillars for the development of Cloud Computing, which has transformed how the business in Information and Communication Technology is developed. In that context, this work focuses on how Service Oriented Computing can also drive the integration of humans in the Internet of Things and Crowd Sensing loops by enabling them to act as service providers. The key to this is the deployment of services on mobile devices, in particular smartphones. The enormous penetration of these devices in today’s society, together with the personal nature of the information they handle, open a new horizon for the development of services. Through them individuals are able to make personal information available to others. This paper depicts Human Microservices, an architecture that allows humans to be considered as service providers, and discusses the open challenges in the field that conforms one of the next frontiers for Service Oriented Computing.
- Published
- 2021
- Full Text
- View/download PDF
45. Hybrid Classical-Quantum Software Services Systems: Exploration of the Rough Edges
- Author
-
Javier Berrocal, Jose Garcia-Alonso, Juan Manuel Murillo, David Valencia, Enrique Moguel, and Javier Rojo
- Subjects
Software ,Computer science ,business.industry ,business ,Quantum ,Computational science - Published
- 2021
- Full Text
- View/download PDF
46. Virtual environment for evaluating the QoS of distributed mobile applications
- Author
-
Juan Manuel Murillo, Pablo Fernandez, Javier Berrocal, Sergio Laso, Antonio Ruiz-Cortés, Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, Universidad de Sevilla. TIC205: Ingeniería del Software Aplicada, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Ministerio de Economía y Competitividad (MINECO). España, Interreg V-A España-Portugal (POCTEP), Junta de Extremadura, and Junta de Andalucía
- Subjects
Ubiquitous computing ,Computer science ,media_common.quotation_subject ,Distributed computing ,Quality of Service ,Cloud computing ,02 engineering and technology ,Distributed Mobile Applications ,computer.software_genre ,Virtual Environment ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Production (economics) ,Quality (business) ,DevOps ,media_common ,business.industry ,Quality of service ,05 social sciences ,020206 networking & telecommunications ,Software deployment ,Virtual machine ,business ,computer ,050203 business & management - Abstract
The increasing capabilities of end devices has led to a wider distribution of the computation and the massive deployment of distributed mobile applications. The success of these applications is highly dependent on the Quality of Service they provide. This quality is especially difficult to assess due to the large number of entities involved and their heterogeneity. Current tools are usually focused on evaluating the QoS provided by a single entity. Nevertheless, the QoS of distributed applications not only depend on the QoS of each entity, the interactions among entities has also to be evaluated. Therefore, new techniques are required to perform a comprehensive evaluation of the expected QoS of these applications before their production deployment. This paper presents a framework, called Perses, for launching virtual environments to simulate and test the execution of distributed mobile applications. This simulation provides results of the QoS achieved. Moreover, the framework has been integrated into a DevOps methodology in order to automate its execution. Video showcase- https://youtu.be/wpIApe_sPFE. Ministerio de Ciencia, Innovación y Universidades RTI2018-101204-B-C21 (HORATIO) Ministerio de Economía y Competitividad BELI (TIN2015-70560-R) Interreg V-A España-Portugal (POCTEP) 0499-4IE-PLUS-4-E Ministerio de Ciencia, Innovación y Universidades TIN2016-81978-REDT Junta de Extremadura GR18112 Junta de Extremadura IB18030 Junta de Andalucía APOLO (US-1264651)
- Published
- 2021
47. Detecting and Monitoring Depression Symptoms According to People’s Behaviour Through Mobile Devices
- Author
-
Daniel Flores-Martin, Sergio Laso, Javier Berrocal, and Juan Manuel Murillo
- Subjects
Identification (information) ,Computer science ,business.industry ,Intervention (counseling) ,Health care ,Internet privacy ,Disease ,Set (psychology) ,business ,Psychological barriers ,Mobile device ,Depression (differential diagnoses) - Abstract
The symptoms of depression cause patients to face psychological barriers that dictate the search for treatment. Also, people’s daily behavior allows us to identify different symptoms of depression in combination with intelligent devices that accompany us in almost any situation and contain a large number of sensors. In this sense, mobile devices can be used to monitor people’s behavior and, thus, identify if people could have diseases such as depression. However, current technologies or applications require constant user intervention to provide an approximate diagnosis of possible symptoms, which is a major barrier for patients. This work presents a set of applications designed for mobile devices that passively detect the symptoms of depression, reducing possible obstacles in the identification of this disease. This detection is based on information obtained from mobile devices, such as device use, locations and text message content. In addition, this information can be monitored by experts in the field of health, with the aim of providing a more complete diagnosis. Therefore, thanks to the analysis of this information and the use of the developed applications, the detection of these symptoms is transparent to the person and can also be monitored by specialized health professionals.
- Published
- 2021
- Full Text
- View/download PDF
48. A Self-sustainable DTN Solution for Isolation Monitoring in Remote Areas
- Author
-
Jose Garcia-Alonso, Jaime Galán-Jiménez, Javier Berrocal-Olmeda, and Manuel Jesús-Azabal
- Subjects
education.field_of_study ,business.product_category ,Isolation (health care) ,Population ,Context (language use) ,Loneliness ,Energy consumption ,Risk analysis (engineering) ,eHealth ,medicine ,Internet access ,Business ,Rural area ,medicine.symptom ,education - Abstract
Global population is facing a widespread ageing. In next decades, the increasing percentage of people over sixty-five will be significant, which will impact society in several ways. The health system will be one of the sectors specially involved, exploiting the technology as a perfect allied. However, a big percentage of adults live in rural areas where almost 40% of inhabitants are seniors and technological infrastructure is often insufficient. Thus, factors like isolation, loneliness and lack of eHealth solutions conform a difficult context for this population sector. In this paper, a solution to provide isolation monitoring to elders living alone in places with lack of Internet connectivity is proposed. The proposed architecture allows the detection of emergencies in elderly’s homes through presence patterns monitoring. Thus, potential home accidents or health emergencies can be detected. Furthermore, this model has been validated through simulations with the analysis of the required energy consumption, delivery probability and latency, obtaining a significant good performance.
- Published
- 2021
- Full Text
- View/download PDF
49. Fog Node Placement in IoT Scenarios with Stringent QoS Requirements: Experimental Evaluation
- Author
-
Paolo Bellavista, Javier Berrocal, Juan Luis Herrera, Luca Foschini, Jose Garcia-Alonso, Jaime Galán-Jiménez, Herrera J.L., Bellavista P., Foschini L., Garcia-Alonso J., Galan-Jimenez J., and Berrocal J.
- Subjects
Flexibility (engineering) ,business.industry ,Computer science ,Node (networking) ,Quality of service ,Industrial Internet of Things (IIoT) ,Software-Defined Networking (SDN) ,Internet of Things (IoT) ,Scalability ,Key (cryptography) ,The Internet ,Enhanced Data Rates for GSM Evolution ,business ,Computer network ,Jitter - Abstract
Leveraging the Internet of Things (IoT) in intensive domains, such as in the Industrial Internet of Things (IIoT) or Internet of Medical Things (IoMT), provides automation and sensing solutions for complex environments through the interconnection of different sensors and actuators. However, these scenarios usually demand to meet stringent Quality of Service (QoS) requirements to work properly. Fog computing, a paradigm that brings computation and storage closer to the edge, and Software-Defined Networking (SDN), a networking paradigm that enables for network scalability and flexibility, can be combined. To do so, fog nodes that integrate both, computation resources and SDN capabilities, are leveraged to meet these stringent needs. Clearly, the placement of such fog nodes plays a key role in the achieved QoS. In this paper, an optimal fog node placement formulation is evaluated in an emulated fog and SDN environment. Results show that an optimal fog node placement can achieve a reduction of up to 59% in the network latency with a minimal jitter compared with other well-known placement methods.
- Published
- 2021
50. Factores asociados a la duración del hemofiltro en técnicas continuas de depuración extracorpórea en el paciente ingresado en cuidados intensivos
- Author
-
Francisco Javier Berrocal Tomé, Mónica Maqueda Palau, Cristina Moreno Jiménez, and Ainoha De-Dios Guerra
- Subjects
Advanced and Specialized Nursing ,dispositivo de acceso vascular ,cuidados críticos ,Nephrology ,velocidad del flujo sanguíneo ,anticoagulantes ,hemofiltración - Abstract
Resumen Objetivos: Determinar la vida media de los hemofiltros en el paciente crítico ingresado en la unidad de cuidados intensivos y los principales factores asociados a su duración. Metodología: Estudio descriptivo observacional transversal, realizado en una Unidad de Cuidados Intensivos de adultos polivalente. Se estudiaron los hemofiltros colocados en 67 pacientes mayores de 18 años, entre enero y noviembre de 2019. Variables: edad, sexo, peso, unidad de ingreso, velocidad de flujo sanguíneo, fracción de filtrado, débito horario, anticoagulación del sistema, tiempo de tromboplastina activada (TTPA), indicación médica de la terapia, causa de la retirada, localización del catéter, hora de inicio y finalización de la terapia. Resultados: La edad media de los pacientes fue de 62,66 años (±9,95), 81 (71,64%) hombres. Se analizaron un total de 238 hemofiltros con una vida media de 26,28 horas (±22,8). El 80,1 % de los catéteres fueron femorales, el 19% yugulares y el 0,8% subclavios. Se empleó como terapia de anticoagulación, heparina sódica en un 45,8%, citratos en el 20,2% y en un 34% no se utilizó anticoagulación. La velocidad media de flujo sanguíneo fue de 190,08 ml/min (±53,48). Se encontró relación estadística entre las variables flujo sanguíneo (rs=0,208; p=0,001), localización del catéter y duración del hemofiltro (p=0,03). Conclusiones: La vida media del hemofiltro fue de 26 horas. La velocidad del flujo sanguíneo y localización del catéter son factores que repercuten en la duración del hemofiltro.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.