Araceli Queiruga-Dios

Araceli Queiruga-Dios
Universidad de Salamanca · Department of Applied Mathematics

phD

About

114
Publications
67,472
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
533
Citations
Additional affiliations
September 2007 - present
Universidad de Salamanca
Position
  • Research Assistant

Publications

Publications (114)
Article
This paper presents a case study whose central axis is the inclusion of the subject of education for sustainable development (ESD) in the undergraduate study plan of the environmental engineering degree at the Santo Tomas University, Colombia (USTA). This study is based on a diagnosis developed from a survey conducted among students from USTA and 4...
Article
Full-text available
One of the objectives of the United Nations and the European Commission is to encourage the implementation of education plans and strategies to develop entrepreneurial competence. This refers to the ability to identify needs or discover opportunities and to act on them in order to create value for society. This paper aims to demonstrate the impact...
Conference Paper
Higher education students are usually not familiar with active learning, especially students from degrees not related to education. This is not the case of primary and secondary education students, that have been involved in several active methodologies during their studies. This paper presents a game-based learning proposal that was implemented du...
Conference Paper
user-centred identifier enables verifiable and decentralized digital identity, and lead users to control and to generate their own identifiers using systems they trust. This is how Self-Sovereign Identity works. This paper presents the case of universities, where several different agents need their own identifier and shows a digital identity mathem...
Article
Full-text available
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot. These wearables usually do not have cryptographic protocols to guarantee data security. This study analyzes the existing security in these devices, and simulate malware pro...
Chapter
For the development of society, the training of upright professionals is required, especially in environmental matters. Therefore, it is necessary to apply training processes that involve the construction of competencies, to face the solution of the problems that currently arise. For this, academic spaces are required with methodologies that apply...
Chapter
Sustainable development (SD) is a great global commitment in economic, social, and environmental terms of the century XXI. This model integrates conventional developmental models that seek economic growth, but at the same time encourages human development, all within the framework of respect and sustainable use of natural resources. This integrativ...
Article
Full-text available
There are many computational applications and engines used in mathematics, with some of the best-known arguably being Maple, Mathematica, MATLAB, and Mathcad. However, although they are very complete and powerful, they demand the use of commercial licences, which can be a problem for some education institutions or in cases where students desire to...
Article
Full-text available
Sustainable development (SD) is a global commitment, in the economic, social, and environmental terms of the 21st century. The SD integrates conventional development models that seek economic growth and human development, within the framework of respect and sustainable use of natural resources. This challenge must involve all levels of society. Hig...
Article
Purpose In education concerning environmental issues, there are two predominant currents in the world, environmental education (EE) and education for sustainable development (ESD). ESD is the formal commitment and therefore promoted by the United Nations, to ensure that countries achieve sustainable development. In contrast, EE was the first educat...
Article
Full-text available
Service-learning (SL) helps engineering students to be involved in community activities and to be motivated by their studies. Although several reviews and research studies have been published about SL, it is not widespread in sciences and engineering at the university level. The purpose of this research is to analyze the different community service...
Article
Full-text available
Sophomore students from the Chemical Engineering undergraduate Degree at the University of Salamanca are involved in a Mathematics course during the third semester and in an Engineering Thermodynamics course during the fourth one. When they participate in the latter they are already familiar with mathematical software and mathematical concepts abou...
Article
Full-text available
One important health problem that could affect diabetics is diabetic foot syndrome, as risk of ulceration, neuropathy, ischemia and infection. Unnoticed minor injuries, subsequent infection and ulceration may end in a foot amputation. Preliminary studies have shown a relationship between increased skin temperature and asymmetries between the same r...
Chapter
Blockchain technology is one of the greatest innovations of the last decade as it allows new possibilities for the development of projects in fields such as services, industry, arts, economy, and logistics, among others. In the area of education, blockchain technology is still in its early stages. A large part of existing implementations focus on c...
Article
Full-text available
Difficulties in the curricular units (CU) of the mathematical science area, particularly those related to differential and integral calculus (DIC), are often found among students of engineering degrees, leading to high failure rates. A research work was developed with the objective of finding the reasons that lead the students to fail in the CU of...
Conference Paper
Since the beginning of the 21st century, Environmental Education (EE) is being transformed into a more complex model, where different environmental, social, and economic factors are taken into account. This model is called Education for Sustainable Development (ESD), which seeks to create the foundations to achieve sustainable development. In Highe...
Article
Full-text available
Traceability and monitoring of industrial processes are becoming more important to assure the value of final products. Blockchain technology emerged as part of a movement linked to criptocurrencies and the Internet of Things, providing nice-to-have features such as traceability, authenticity and security to sectors willing to use this technology. I...
Article
Full-text available
Environmental education (EE) has become the only tool for environmental sustainability in training processes in Colombia, for basic cycles in primary and secondary, as well as university education. EE tends to transform human actions in nature, based on multidisciplinary knowledge that supports decision-making. Its goal is to generate a change in s...
Article
Full-text available
Environmental education has become an important tool for human development, especially in basic cycles such as primary and secondary school. It tends to transform human actions towards nature, based on multidisciplinary knowledge that supports decision-making, generating a change in social behavior, and achieving recovery, conservation and preserva...
Chapter
Diabetic foot is one of the main complications of diabetes in the whole world. Its symptoms and problems get worse over time and may include numbness, tingling, loss of sensation and pain in the limbs. Our goal is to develop a smart sock able to control some measures such us temperature or humidity and tells the patient whether ulcers may appear. A...
Article
In this work a novel model to simulate advanced malware spreading is introduced and analyzed. It is an individual-based model such that the dynamics of the malware outbreak is governed by means of a cellular automaton. The network topologies considered are complex random networks and each device is endowed at every step of time with one of the foll...
Article
Full-text available
Wireless Sensor Networks (WSNs) are a set of sensor devices deployed in a given area that form a network without a pre-established architecture. Recently, malware has increased as a potential vulnerability for the Internet of Things, and consequently for these networks. The spread of malware on wireless sensor networks has been studied from differe...
Article
Full-text available
Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the...
Chapter
This article presents a Breakout played with students of the Master in Teaching of Compulsory Secondary Education and Higher Secondary School, at the University of Salamanca, as part of their training as future teachers. Both the difficulties and the advantages that this type of educational activities bring out are analyzed. Moreover, some possibil...
Chapter
Full-text available
Currently, zero-day malware is a major problem as long as these specimens are a serious cyber threat. Most of the efforts are focused on designing efficient algorithms and methodologies to detect this type of malware; unfortunately models to simulate its behavior are not well studied. The main goal of this work is to introduce a new individual-base...
Chapter
Full-text available
Malware is a potential vulnerability for the Internet of Things; it is for this reason that spread of malware on Wireless Sensor Networks has been studied from different perspectives. However, the individual characteristics have not been considered in most of the proposed models. Consequently, Agent-Based Models can be used, as a mathematical tool,...
Chapter
This chapter presents some applications of first-order differential equations and systems of first-order differential equations. Fundamentally, the chapter is divided in three sections: the first section includes a quick theoretical journey through the basic notions associated with the topic of the chapter, with special emphasis on what is known as...
Chapter
This chapter contains some programs and specific software that could help lecturers to solve some of the proposed problems. Algorithms and mathematical contents are included in corresponding chapters in the book.
Conference Paper
Full-text available
En los últimos años la enseñanza y el aprendizaje de las matemáticas en ingeniería, así como la evaluación de las competencias de matemáticas que un ingeniero necesitará en su labor profesional, ha cobrado gran importancia. Las destrezas y herramientas matemáticas que utilizará un ingeniero son diferentes a las de un matemático, puesto que la forma...
Conference Paper
Environmental education has become an important tool for human formation, especially in basic cycles such as primary and secondary school, which tends to transform human actions on nature, based on multidisciplinary knowledge that supports decision-making, generating a change in social behavior achieving recovery, conservation and preservation of t...
Chapter
In 2017, we proposed a European project: Rules_Math, in order to find new rules to assess mathematical competencies. This proposal was a consequence of what we were facing separately in our daily classes. We teach mathematics in several engineering schools, and we want to change the way of teaching and learning for engineering students. Some univer...
Article
Full-text available
One of the diseases that could affect diabetic patients is the diabetic foot problem. Unnoticed minor injuries and subsequent infection can lead to ischemic ulceration, and may end in a foot amputation. Preliminary studies have shown that there is a positive relationship between increased skin temperature and the pre–ulceration phase. Hence, we hav...
Conference Paper
The role of engineering is closely related to its role in society. An Industrial Engineer use to be involved in supervising the work of a team; in negotiations; and always may have special responsibilities to ensure that work is safe, and that work do not damage the environment. We have analyzed the specific case of ethics in industrial engineering...
Article
We have been working, for some years, in the application of mathematics to different engineering problems with the main goal of improving our students’ motivation and make possible for them to connect and apply what they learn in Calculus classes to other engineering subjects. We describe a case study with students of Electrotechnical Engineering f...
Conference Paper
The design and development of wearable biosensor systems for health monitoring has garnered lots of attention in the scientific community and the industry during the last years. The Internet of Things (IoT) enables added value services by connecting smart objects in a secure way in different applications, such as transport, health, building, energy...
Conference Paper
Malware infection in a wireless sensor network (WSN) can represent a potential vulnerability due to the low level of security that these networks exhibit. Consequently, it is very important to study the behavior of the propagation of malware in a WSN. This work aims to design a novel agent-based model to simulate malware spreading. It will provide...
Conference Paper
Advanced persistent threats (APTs) are the new type of cyber attacks that have drastically change the information security landscape. They seek to gather very sensitive information from specific and high-level objectives. The great majority of security tools do not allow handling such an intrusion in a proper way. Consequently, this study aims to a...
Conference Paper
With the general objective of highlighting the changes produced in the teaching of mathematics in European engineering studies, this paper presents examples of the University of Salamanca (Spain) and Gazi University (Turkey). The use of technological tools for the teaching and learning of Calculus or Algebra has allowed a change in the objectives a...
Article
Full-text available
In this work, we address the problem of solving nonlinear general Klein–Gordon equations (nlKGEs). Different fourth- and sixth-order, stable explicit and implicit, finite difference schemes are derived. These new methods can be considered to approximate all type of Klein–Gordon equations (KGEs) including phi-four, forms I, II, and III, sine-Gordon,...
Conference Paper
There are a great variety of specimens of malware: computer viruses, computer worms, trojans, etc. Nowadays, malware is one of the most important computer security problem and the source of great financial losses. Consequently, it is necessary to design tools that allow one to simulate the behavior of malware propagation. These tools are based on m...
Article
Full-text available
In recent years, several methods for monitoring processes and different types of activities have been developed as characteristic of the connected industry and Internet of Things (IoT). [...]
Article
Full-text available
The textile industry is characterized by the economic activity whose objective is the production of fibres, yarns, fabrics, clothing and textile goods for home and decoration, as well as technical and industrial purposes. Within manufacturing, the Textile is one of the oldest and most complex sectors which includes a large number of sub-sectors cov...
Conference Paper
Mathematical models to study to simulate the spread of malware are widely studied today. Malware spreading in Wireless Sensor Networks (WSNs) has special relevance as these networks consist on hundreds or even thousands of autonomous devices (sensors) able to monitor and to communicate with one another. Malware attacks on WSNs have become a critica...
Article
Full-text available
The main goal of this work is to propose a new framework to design a novel family of mathematical models to simulate malware spreading in wireless sensor networks (WSNs). An analysis of the proposed models in the scientific literature reveals that the great majority are global models based on systems of ordinary differential equations such that the...
Poster
Full-text available
En el planteamiento de este Proyecto de Innovación y Mejora Docente subyace la preocupación que comparte el equipo de trabajo por tratar de motivar a todos aquellos estudiantes que no habiendo superado la asignatura en la primera y segunda convocatoria, se matriculan en años sucesivos. Esto conlleva que en muchas ocasiones no asistan a clase, gener...
Conference Paper
Foot temperature monitoring is of great importance in diabetic patients, as they are prone to complications such as peripheral neuropathy and vascular insufficiency. In recent years, the study of different non-invasive procedures to monitor healthy indicators is growing, due to the advances in mobile devices, micro-sensors, and also wireless sensor...
Article
In the present manuscript, higher-order methods are derived to solve a SEIR model for malware propagation. They are obtained using extrapolation techniques combined with nonstandard finite difference (NSFD) schemes used in Jansen and Twizell (2002). Thus, the new algorithms are more efficient computationally, and are dynamically consistent with the...
Article
The textile industry is characterized by the economic activity whose objective is the production of fibres, yarns, fabrics, clothing and textile goods for home and decoration,as well as technical and industrial purposes. Within manufacturing, the Textile is one of the oldest and most complex sectors which includes a large number of sub-sectors cove...
Conference Paper
In this paper, we make a pedagogical proposal to study the basic elements of circulation in architecture undergraduate degrees, using the Minecraft game as a tool. The theoretical basis for the proposal are Vygotsky’s sociointeractional theory and Ausubel’s theory of meaningful learning. We find ourselves reflecting on Information and Communication...
Article
In the present manuscript, higher-order methods are derived to solve a MSEIR model. They are obtained using extrapolation techniques combined with nonstandard finite difference (NSFD) schemes used in Anguelov et al. (2014). Thus, the new algorithms are more efficient computationally, and are dynamically consistent with the continuous model: they re...
Conference Paper
Engineering students learn Mathematics solving real-life problems with the help of mathematical tools and the already acquired competencies and knowledge. Moreover, the use of realistic mathematics education method allows the integration of daily, real and realistic experiences to master Mathematics. The proposed teaching and learning method, is th...
Conference Paper
Cyber-Physical Systems (CPS) is an emergent approach of physical processes, computer and networking, that focuses on the interaction between cyber and physical elements. These systems monitor and control the physical infrastructures, that is why they have a high impact in industrial automation. The implementation and operation of CPS just like the...
Conference Paper
Full-text available
Los dispositivos móviles están equipados con numerosos sensores (presión, temperatura, aceleración, giróscopo, campo magnético…) que junto con las aplicaciones adecuadas los convierten en instrumentos de medida de magnitudes físicas en cualquier momento y situación [1,2]. Así se abre para el profesor un amplio campo a las demostraciones y experienc...
Article
In this paper, we discuss the problem of solving nonlinear Klein–Gordon equations (KGEs), which are especially useful to model nonlinear phenomena. In order to obtain more exact solutions, we have derived different fourth- and sixth-order, stable explicit and implicit finite difference schemes for some of the best known nonlinear KGEs. These new hi...
Chapter
In this work a novel mathematical model to simulate malware spreading in wireless sensor networks is introduced. This is an improvement of the global model (based on a system of delayed ordinary differential equations) proposed by Zhu and Zhao in 2015 ([15]). Specifically, our model follows the individual-based paradigm which allows us to consider...
Chapter
Textile Engineering relies increasingly on the use of computer models that seek to predict the properties and performance of certain textile structures. Those models have been using different computational tools to represent fabrics in a suitable computing environment and also to predict its final properties. Among others, the mathematical models t...
Article
Full-text available
Numerical methods are tools for approximating solutions to problems that may have complicated developments or cannot be solved analytically. In engineering courses, students must address problems related other disciplines such as structural or rock mechanics, biology, chemistry or physics. Prior to solving these problems it is important to define a...
Article
Full-text available
In recent years, the University of Salamanca together with other 45 European universities have changed our university qualifications, resulting in substantial changes in the system of education. In this case study, we detail the particular case of the subject of Design and Calculation of Machines of the Degree in Mechanical Engineering, which is gi...
Conference Paper
The mobile devices, and especially the smartphones, are exposed to the malicious effects of malware. In this sense the study, simulation and control of epidemic processes due to malware is an important issue. The main goal of this work is to introduce a new mathematical model to study the spread of a mobile computer worm. Its dynamic is governed by...
Article
Full-text available
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme (ECIES), which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a sp...