Ángel Manuel Guerrero-Higueras

Ángel Manuel Guerrero-Higueras
Universidad de León | UNILEON

About

49
Publications
13,435
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
266
Citations

Publications

Publications (49)
Article
Understanding why a robot's behaviour was triggered is a growing concern to get human‐acceptable social robots. Every action, expected and unexpected, should be able to be explained and audited. The formal model proposed here deals with different information levels, from low‐level data, such as sensors' data logging; to high‐level data that provide...
Chapter
This paper focuses on the effectiveness of the gait-based authentication of users by using a camera. The authentication is possible as walking movement is considered a behavioural biometric technology, so it is inherent and individual to each human being. People can be successfully identified by walking 4 m in a corridor in the most natural way. Di...
Chapter
Providing an efficient logging engine to determine the causes of an event is needed to enforce humans trust in computing systems. This fact becomes increasingly challenging in robotics, where unexpected decisions can have unpredictable consequences in sensitive environments, endangering human interests. In order to analyze the causes of an incident...
Chapter
Malicious traffic detection allows for preventing cybersecurity-related threats. Machine learning algorithms are commonly used to detect such traffic in computer networks by analyzing packets. In wide-area networks, such as RedCAYLE (Red de Ciencia y Tecnología de Castilla y León), it is not possible to analyze every packet routed. So we pose that...
Article
Full-text available
Convolutional Neural Networks are usually fitted with manually labelled data. The labelling process is very time-consuming since large datasets are required. The use of external hardware may help in some cases, but it also introduces noise to the labelled data. In this paper, we pose a new data labelling approach by using bootstrapping to increase...
Article
Full-text available
This paper proposes a novel system for managing visual attention in social robots. This system is based on a client/server approach that allows integration with a cognitive architecture controlling the robot. The core of this architecture is a distributed knowledge graph, in which the perceptual needs are expressed by the presence of arcs to stimul...
Article
Full-text available
Nowadays, working in groups is very usual and popular in most professional environments. Thus, students, as potential workers, need to acquire teamwork competence in their educational institutions. However, when the students are working in groups, it is easy assessing their final result but not so much evaluating how each of them, individually, is...
Chapter
Instant Messaging tools are a part of our technified daily life. Tools such as WhatsApp or Telegram have millions of users that send continuously billion of messages. This can be used in different context and one of them is in Education. An important part of education is students’ interaction and specially how they interact when working together as...
Article
Students’ acquisition of teamwork competence has become a priority for educational institutions. The development of teamwork competence in education generally relies in project-based learning methodologies and challenges. The assessment of teamwork in project-based learning involves, among others, assessing students’ participation and the interacti...
Chapter
Containerization solutions have spread widely in the industry due to their ease of deployment, agility, and portability. However, its adoption is not without challenges and difficulties in the field of security. This paper presents an overview of the vulnerabilities present in the application containerization solutions, paying special attention to...
Article
Full-text available
Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining access is network attacks. Tools based on machine learning are effective in detecting these attacks. How...
Article
Full-text available
Machine learning algorithms are becoming more and more useful in many fields of science, including many areas where computational methods are rarely used. High-performance Computing (HPC) is the most powerful solution to get the best results using these algorithms. HPC requires various skills to use. Acquiring this knowledge might be intimidating a...
Article
Full-text available
Parallel Programming skills may require a long time to acquire. “Think in parallel” is a skill that requires time, effort, and experience. In this work, we propose to facilitate the students’ learning process in parallel programming by using instant messaging. Our aim was to find out whether students’ interaction through instant messaging tools is...
Article
Full-text available
Many social robots deployed in public spaces hide hybrid cognitive architectures for dealing with daily tasks. Mostly, two main blocks sustain these hybrid architectures for robot behavior generation: deliberative and behavioral-based mechanisms. Robot Operating System offers different solutions for implementing these blocks, however, some issues a...
Article
Full-text available
Facing long-term autonomy with a cognitive architecture raises several difficulties for processing symbolic and sub-symbolic information under different levels of uncertainty, and deals with complex decision-making scenarios. For reducing environment uncertainty and simplify decision-making process, this paper establishes a method for translating r...
Article
Full-text available
Socially assistive robots have been used in the care of elderly or dependent people, particularly with patients suffering from neurological diseases, like autism and dementia. There are some proposals, but there are no standardized mechanisms for assessing a particular robot’s suitability for specific therapy. This paper reports the evaluation of a...
Article
Full-text available
Version control systems’ usage is a highly demanded skill in information and communication technology professionals. Thus, their usage should be encouraged by educational institutions. This work demonstrates that it is possible to assess if a student can pass a computer science-related subject by monitoring its interaction with a version control sy...
Chapter
Understanding why a particular robot behavior was triggered is a cornerstone for having human-acceptable social robots. Thus, every robot action should be explained in order to audit, recognize, and control expected and unexpected behaviors using usual sources of information provided by robot software components. Enabling intelligibility goes throu...
Conference Paper
Parallel Programming skills may require long time to acquire. "Think in parallel" is a skill which requires time, effort, and experience. In this work, we propose to facilitate the learning process in parallel programming by using instant messaging by students. Our aim is to find out if students' interaction through instant messaging is beneficial...
Conference Paper
Full-text available
Machine Learning and Deep Learning algorithms have become a great revolution in many research fields such as Robotics and Artificial Intelligence. They have applications in such different areas as Meteorology, Cybersecurity, Biology, etc.; though their use in these areas is not so extended. High-performance Computing (HPC) is the most powerful solu...
Conference Paper
Version Control Systems are commonly used by Information and communication technology professionals. They allow monitoring the single activity of different people working in the same project through all the project's lifetime. Thus, Version Control Systems are also used by educational institutions. The aim of this work is to demonstrate that the ac...
Article
Full-text available
The tracking of people is an indispensable capacity in almost any robotic application. A relevant case is the @home robotic competitions, where the service robots have to demonstrate that they possess certain skills that allow them to interact with the environment and the people who occupy it; for example, receiving the people who knock at the door...
Chapter
In our present professional and educational contexts one of the key competences to assess is the teamwork competence. However, this require not only to explore the development of the competence by a group but how it is acquired by each of its members. In order to do so it is necessary to analyze several issues and one of the most relevant is studen...
Article
Full-text available
Tracking people has many applications, such as security or safe use of robots. Many onboard systems are based on Laser Imaging Detection and Ranging (LIDAR) sensors. Tracking peoples' legs using only information from a 2D LIDAR scanner in a mobile robot is a challenging problem because many legs can be present in an indoor environment, there are fr...
Chapter
Service robots sometimes behave in unexpected ways and may put economic interests or human safety in risk. This can be accepted in research environments, but it is not going to be tolerated in everyday use of robots. In addition, regulations for the deployment of autonomous robots (from home assistants to autonomous cars) are increasing. These regu...
Conference Paper
Version Control Systems are commonly used by Information and Communication Technology professionals. These systems allow monitoring programmers activity working in a project. Thus, Version Control Systems are also used by educational institutions. The aim of this work is to demonstrate that the academic success of students may be predicted by monit...
Article
Full-text available
In human–robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines), personal, and safety information (i.e., images of children, home habits, alarm codes, etc.). Howe...
Chapter
Cybersecurity in autonomous systems is a growing concern. Currently most research robotic systems are built using ROS framework, along with other commercial software. The goal of this paper is to improve ROS security features by using encrypted communications and semantic rules to ensure a correct behavior. To encrypt communications, Advanced Encry...
Conference Paper
Nowadays students live in the digital age and they do not only should learn to speak, write or develop specific skills. Students needs to be successful in their context and a possible way to achieve this is by developing the computational thinking. In the last few years there are several initiatives to promote computational thinking and to define a...
Article
Cyber-security for robotic systems is a growing concern. Many mobile robots rely heavily on Real Time Location Systems to operate safely in different environments. As a result, Real Time Location Systems have become a vector of attack for robots and autonomous systems, a situation which has not been studied well. This article shows that cyber-attac...
Article
Real Time Location Systems (RTLSs) are critical components of many mobile robots that rely on them to safely operate in different environments, and their cyber-security is a growing concern. The goal of this paper is to demonstrate that there are statistically meaningful differences in the data provided by beacon-based RTLSs between the case when t...
Article
Full-text available
The Atmospheric Physics Group of the University of León in Spain has used Meteosat Second Generation satellite data to develop tools that allow for the detection and nowcasting (very short-term forecasting) of precipitation and hailstorms in the region of Castile-León. One of the direct applications has been the creation of high spatial-temporal re...
Conference Paper
1. Meteorological data is mainly obtained from forecasting and observation. Forecasting models provide information on the state of the atmosphere in the future, which has to be validated using data from observation systems. These include weather station networks, hail sensors, disdrometers, radiosondes, radar and satellites. The spatial and tempora...
Article
Full-text available
The integration of various public and private observation networks into the Observation Network of Castile-León (ONet_CyL), Spain, allows us to monitor the risks in real-time. One of the most frequent risks in this region is severe precipitation. Thus, the data from the network allows us to determine the area where precipitation was registered and...
Article
Full-text available
The location of Castilla y León within the Iberian Peninsula and its territorial extension make its meteorological risks diverse. The integration of various observation networks, both public and private, in the Observation Network of Castilla y León, allows us to follow the risks in real-time. One of the most frequent risks in the winter season is...
Article
Evaluating the meteorological alert chain, or, how information is transmitted from the meteorological forecasters to the final users, passing through risk managers, is a useful tool that benefits all the links of the chain, especially the meteorology researchers and forecasters. In fact, the risk managers can help significantly to improve meteorolo...
Article
Forecasting hailstorms is an important challenge. Improving these forecasts is of vital importance to reduce the risks that this phenomenon causes to the environment and the population. This paper presents a methodology for the characterization of hailstorms in different scales by means of: the definition of the synoptic environment favorable to co...
Article
Full-text available
Meteorological data proceeds from two sources mainly: forecasting and observation. Forecasting models give information about the atmosphere state in the future. This information has to be validated using data from observation systems. Observations systems includes weather stations networks, hail sensors, disdrometers, radiosondes, radar, satellites...
Poster
Full-text available
La situación de Castilla y León dentro de la Península Ibérica, emplazada en el cuadrante noroccidental, determina, en gran medida, las condiciones climáticas de su territorio, sobre todo en las zonas montañosas. Debemos señalar que las nevadas son uno de los principales riesgos meteorológicos en Castilla y León. Así, de media, en algunas zonas de...
Article
The location of Castile and León, inside the Iberian Peninsula, in the Northwestern quadrant, determines, in large measure, the climatic conditions of its territory, granting it very characteristic traits, mostly in the mountainous areas. It is important to note that during a large part of the year, the region is under the influence of Jet Stream,...
Article
The Community of Castile-León is located in the NW of the Iberian Peninsula. One of the most frequent meteorological risks in the Community during the summer is hailstorms. On average, in the Province of León, there are 42 days with storms, almost half of them being hailstorms. However, the spatial variability of the storms is very elevated. The ma...
Article
In the region of Castile-Leon, in the northwest of Spain, the study of weather risks is extremely complex because of the topography, the large land area of the region and the variety of climatic features involved. Therefore, as far as the calibration and validation of the necessary tools for the identification and nowcasting of these risks are conc...

Network

Cited By

Projects

Project (1)
Project
Hardening of ROS (Robotic Operating Systems) Detection of vectors of attack for autonomous systems