Bio: Diego López-de-Ipiña is an academic researcher from University of Deusto. The author has contributed to research in topics: Remote laboratory & The Internet. The author has an hindex of 26, co-authored 218 publications receiving 2481 citations.
Papers published on a yearly basis
TL;DR: The main characteristics of a Remote Laboratory are presented, the software technologies to implement the client and server sides in a WebLab are analyzed, and a Service Oriented Laboratory Architecture-based approach is suggested for the design of future Remote Laboratories.
Abstract: Remote Laboratories or WebLabs constitute a first-order didactic resource in engineering faculties. However, in many cases, they lack a proper software design, both in the client and server side, which degrades their quality and academic usefulness. This paper presents the main characteristics of a Remote Laboratory, analyzes the software technologies to implement the client and server sides in a WebLab, and correlates these technologies with the characteristics to facilitate the selection of a technology to implement a WebLab. The results obtained suggest the adoption of a Service Oriented Laboratory Architecture-based approach for the design of future Remote Laboratories so that client-agnostic Remote Laboratories and Remote Laboratory composition are enabled. The experience with the real Remote Laboratory, WebLab-Deusto, is also presented.
TL;DR: The proposed vision is achieved by providing a common access mechanism to the heterogeneous data sources offered by the city, which reduces the complexity of accessing the city’s data whilst bringing citizens closely to a prosumer role and allowing to integrate legacy data into the cities’ data ecosystem.
Abstract: Smart Cities use Information and Communication Technologies (ICT) to manage more efficiently the resources and services offered by a city and to make them more approachable to all its stakeholders (citizens, companies and public administration). In contrast to the view of big corporations promoting holistic “smart city in a box” solutions, this work proposes that smarter cities can be achieved by combining already available infrastructure, i.e., Open Government Data and sensor networks deployed in cities, with the citizens’ active contributions towards city knowledge by means of their smartphones and the apps executed in them. In addition, this work introduces the main characteristics of the IES Cities platform, whose goal is to ease the generation of citizen-centric apps that exploit urban data in different domains. The proposed vision is achieved by providing a common access mechanism to the heterogeneous data sources offered by the city, which reduces the complexity of accessing the city’s data whilst bringing citizens closely to a prosumer (double consumer and producer) role and allowing to integrate legacy data into the cities’ data ecosystem.
TL;DR: This paper presents an approach to using data-driven techniques to evolve knowledge-driven activity models with a user's behavioral data and includes a novel clustering process where initial incomplete models developed through knowledge engineering are used to detect action clusters which represent activities and aggregate new actions.
Abstract: We combine knowledge- and data-driven approaches for activity modeling.We develop a novel clustering algorithm that uses prior domain expert knowledge.A new learning algorithm to model activities from extracted clusters.We model a pervasive home environment with real users' inputs for experiments.Automatically learn 100% of activity variations performed by users. Knowledge-driven activity recognition is an emerging and promising research area which has already shown very interesting features and advantages. However, there are also some drawbacks, such as the usage of generic and static activity models. This paper presents an approach to using data-driven techniques to evolve knowledge-driven activity models with a user's behavioral data. The approach includes a novel clustering process where initial incomplete models developed through knowledge engineering are used to detect action clusters which represent activities and aggregate new actions. Based on those action clusters, a learning process is then designed to learn and model varying ways of performing activities in order to acquire complete and specialized activity models. The approach has been tested with real users' inputs, noisy sensors and demanding activity sequences. Initial results have shown that complete and specialized activity models are properly learned with success rates of 100% at the expense of learning some false positive models.
••19 Nov 2008
TL;DR: This work proposes to adapt Near Field Communications (NFC), applying it to an Alzheimer's day centre, and finds that with a simple interaction, which involves touching tags with mobile phones, it is possible to manage the information easily.
Abstract: Alzheimer's disease makes great demands on care by caregivers, since they cannot distract their attention from patients while they are managing records at the same time. For this reason, technologies to complement this process need to be considered. In this work we propose to adapt Near Field Communications (NFC), applying it to an Alzheimer's day centre. With a simple interaction, which involves touching tags with mobile phones, it is possible to manage the information easily. In addition, a complement for Alzheimer care visualization activities at home and monitoring is presented.
••08 Jun 2011
TL;DR: BlindShopping, an RFID and QR-code based mobile solution to enable accessible shopping for blind people, only demanding inexpensive off-the-shelf technology and limiting the deployment effort from the supermarket is presented.
Abstract: Achieving blind people autonomous shopping in a supermarket is a real challenge. Without help from another person is very hard or impossible for them to reach to a specific supermarket section and browse through its products. Besides, once there, they cannot identify the products and their features (e.g. price, brand and due date) to decide whether they want to buy them or not. This work presents BlindShopping, an RFID and QR-code based mobile solution to enable accessible shopping for blind people, only demanding inexpensive off-the-shelf technology and limiting the deployment effort from the supermarket.
20 Jan 2017
TL;DR: The Grounded Theory: A Practical Guide through Qualitative Analysis as mentioned in this paper, a practical guide through qualitative analysis through quantitative analysis, is a good starting point for such a study.
Abstract: การวจยเชงคณภาพ เปนเครองมอสำคญอยางหนงสำหรบทำความเขาใจสงคมและพฤตกรรมมนษย การวจยแบบการสรางทฤษฎจากขอมล กเปนหนงในหลายระเบยบวธการวจยเชงคณภาพทกำลงไดรบความสนใจ และเปนทนยมเพมสงขนเรอยๆ จากนกวชาการ และนกวจยในสาขาสงคมศาสตร และศาสตรอนๆ เชน พฤตกรรมศาสตร สงคมวทยา สาธารณสขศาสตร พยาบาลศาสตร จตวทยาสงคม ศกษาศาสตร รฐศาสตร และสารสนเทศศกษา ดงนน หนงสอเรอง “ConstructingGrounded Theory: A Practical Guide through Qualitative Analysis” หรอ “การสรางทฤษฎจากขอมล:แนวทางการปฏบตผานการวเคราะหเชงคณภาพ” จะชวยใหผอานมความรความเขาใจถงพฒนาการของปฏบตการวจยแบบสรางทฤษฎจากขอมล ตลอดจนแนวทาง และกระบวนการปฏบตการวจยอยางเปนระบบ จงเปนหนงสอทควรคาแกการอานโดยเฉพาะนกวจยรนใหม เพอเปนแนวทางในการนำความรความเขาใจไประยกตในงานวจยของตน อกทงนกวจยผเชยวชาญสามารถอานเพอขยายมโนทศนดานวจยใหกวางขวางขน
01 Jan 2009
TL;DR: A brief overview of the status of the Convention as at 3 August 2007 is presented and recent efforts of the United Nations and agencies to disseminate information on the Convention and the Optional Protocol are described.
Abstract: The present report is submitted in response to General Assembly resolution 61/106, by which the Assembly adopted the Convention on the Rights of Persons with Disabilities and the Optional Protocol thereto. As requested by the Assembly, a brief overview of the status of the Convention as at 3 August 2007 is presented. The report also contains a brief description of technical arrangements on staff and facilities made necessary for the effective performance of the functions of the Conference of States Parties and the Committee under the Convention and the Optional Protocol, and a description on the progressive implementation of standards and guidelines for the accessibility of facilities and services of the United Nations system. Recent efforts of the United Nations and agencies to disseminate information on the Convention and the Optional Protocol are also described.
TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Abstract: Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.
TL;DR: The most notable addition has been that Builder interface, allowing users to create studies with minimal or no programming, while also allowing the insertion of Python code for maximal flexibility.
Abstract: PsychoPy is an application for the creation of experiments in behavioral science (psychology, neuroscience, linguistics, etc.) with precise spatial control and timing of stimuli. It now provides a choice of interface; users can write scripts in Python if they choose, while those who prefer to construct experiments graphically can use the new Builder interface. Here we describe the features that have been added over the last 10 years of its development. The most notable addition has been that Builder interface, allowing users to create studies with minimal or no programming, while also allowing the insertion of Python code for maximal flexibility. We also present some of the other new features, including further stimulus options, asynchronous time-stamped hardware polling, and better support for open science and reproducibility. Tens of thousands of users now launch PsychoPy every month, and more than 90 people have contributed to the code. We discuss the current state of the project, as well as plans for the future.
TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Abstract: With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.