Freddy Tapia Leon

Freddy Tapia Leon
Universidad Autónoma de Madrid | UAM · Department of Computer Engineering

PhD Candidate

About

42
Publications
25,029
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
151
Citations
Citations since 2017
39 Research Items
151 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
Additional affiliations
September 2012 - September 2013
Universidad Autónoma de Madrid
Position
  • Open Data and Semantic Web
January 2012 - April 2016
Universidad Autónoma de Madrid
Position
  • Student
January 2002 - present
Universidad de las Fuerzas Armadas-ESPE
Position
  • Professor (Associate)

Publications

Publications (42)
Chapter
This work aims to design and implement an organizational model that supports the macro processes of an academic institution in response to computer incidents to raise the level of information security. This study intends to include the research, development, and innovation (R&D&I) in an academic CSIRT. To achieve this, we developed a systematic lit...
Conference Paper
This work aims to design and implement an organizational model that supports the macro processes of an academic institution in response to computer incidents to raise the level of information security. This study intends to include the research, development, and innovation (R&D&I) in an academic CSIRT. To achieve this, we developed a systematic lit...
Chapter
Full-text available
In Ecuador in recent years there has been a strong investment in the field of health, due to the increase of patients and medical specialties, along with a deficit in the handling and distribution of information due to lack of trained staff or little optimization and control of the technological resources, generating problems in the administration...
Article
Full-text available
Pages: 806-815 Resumen: La realidad aumentada es una tecnología que se encuentra en auge en los últimos años como una alternativa a las aplicaciones ya existentes, ya que presenta una nueva experiencia en lo que se refiere a información y visualización de objetos inmersos en el entorno. En la presente investigación se utiliza realidad aumentada par...
Article
Full-text available
Currently, organizations face the need to create scalable applications in an agile way that impacts new forms of production and business organization. The traditional monolithic architecture no longer meets the needs of scalability and rapid development. The efficiency and optimization of human and technological resources prevail; this is why compa...
Article
Full-text available
The use of collaborative tools has notably increased recently. It is common to see distinct users that need to work simultaneously on shared documents. In most cases, large companies provide tools whose implementations have been a very complicated and expensive task. Likewise, their platform deployment requirements should be robust hardware infrast...
Chapter
Full-text available
Athletic performance seeks to enhance the physical and mental state of the athlete, and it is implicit to systematize sports training; for this reason, managing the monitoring of the physical state of athletes implies relating variables such as initial physical performance, hydration, types of nutrition, and training to take successful strategic ac...
Chapter
The growth of cities and the advancement of technology demands the development of solutions that can help and reduce emerging problems. One of these problems is the control of the population and urban planning based on population count, flow, and density analysis. This paper proposes an approach that could help cities to gather population data in a...
Article
During the last few years, the development of home automation has increased thanks to the use of Internet of Things (IoT) capabilities provided by emerging technologies such as Raspberry Pi. This allows us to automate tasks at home or monitor specific parameters. This article proposes an improvement in the interaction between the smart home automat...
Chapter
Full-text available
Nowadays, the contaminated and poor air quality that is inhaled by the city-population in industrialized cities around the world, has led to one of the main causes of premature death due to respiratory diseases. Therefore, the improvement of air quality becomes a priority. In this sense, the current study aimed to design and implement a visual anal...
Conference Paper
Full-text available
Organizations should face cybersecurity attacks that can strongly affect their operational processes, business image, and security of critical information. Establishing security mechanisms helps to reduce possible weaknesses that can be exploited by attackers; however, they will not always be sufficient, and an attack can be successful. Therefore,...
Conference Paper
Full-text available
Organizations should face cybersecurity attacks that can strongly affect their operational processes, business image, and security of critical information. Establishing security mechanisms helps to reduce possible weaknesses that can be exploited by attackers; however, they will not always be sufficient, and an attack can be successful. Therefore,...
Article
Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort, health or well-being, and that may cause serious environmental damage. In this regard, this study aims to analyze large data sets generated by real-time wireless sensor networks that determine different air pollutants. Business Intelligence and Data...
Chapter
Full-text available
The present research work aims to predict the personality of a user’s Facebook profile. To do this, we have identified the attributes that are extracted from Facebook, with which the prediction of personality was possible. The data was extracted using the Graph API of Facebook, which was implemented in a web page. To achieve the knowledge base of m...
Chapter
Full-text available
The technology trend is to become an inseparable part of the users daily experiences. In this article will be discussed about the implementation of an application that can be a fundamental tool to guide disability people. The application is based on the geolocation of the user and it destination, this generates the optimal path from a database that...
Chapter
Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort, health or well-being, and that may cause serious environmental damage. In this regard, this study aims to analyze large data sets generated by real-time wireless sensor networks that determine different air pollutants. Business Intelligence and Data...
Chapter
Full-text available
The present study proposes the implementation of an algorithm to determine the degree of reliability of Business to Consumer Facebook fan pages, to mitigate possible cheating, scams or fraud. We use data mining to filter information from comments expressed by online stores’ customers. The experiment determines a word dictionary to find matches usin...
Chapter
Full-text available
Comparative analysis of the performance of hardware resources, between Monolithic Architecture and Micro services Architecture, using virtualization technology based on development and production environments. Today, the new trend is the development and/or deployment of applications in the Cloud, in this aspect, monolithic applications have flexibi...
Chapter
Full-text available
Air pollution continues to grow at an alarming rate, decreasing the quality of life around the world. As part of preventive measures, this paper presents the design and implementation of a secure and low-cost real-time air pollution monitoring system. In such sense, a three-layer architecture system was implemented. The first layer contains sensors...
Chapter
Full-text available
The present study aims to automate the manual process of disseminating information from an Academic Computer Security Incident Response Team (A-CSIRT) with the purpose to identify cybersecurity threats and cyber-attacks in real time. In order to realize such attempt, we have applied a quantitative and qualitative evaluation of two traffic analysis...
Chapter
Full-text available
The design of virtual scenarios and organic models, through the use of virtual reality with the inclusion of photorealism, with all these components can develop a process of handling reactions to phobias that generates an immersive experience similar to reality, obtaining as a result an alternative treatment to arachnophobia, this contribution of h...
Conference Paper
Full-text available
The development of new voice-controlled home assistant devices such as Amazon Echo and Google Home has allowed the interaction between users and devices in a more human and familiar way. With this background, this project aims to use Amazon Echo, Alexa, and complementary technologies to implement a smart home environment by controlling external dev...
Article
Full-text available
Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT research and develops new security tools. Therefore, our study focuses on the design of an integral model based on Business Intelligence (BI), which provides reactive and proactive services in a CSIRT, in order to alert and reduce any suspicious or malicious...
Conference Paper
Full-text available
This research handles the analysis and migration of data from a public university, which are stored in relational databases RDB to a Resource Description Framework RDF metadata. For this purpose, we have mapped each of the tables that comprised the database deployment to RDF, by mean of standardized vocabularies or related to the Semantic Web devel...
Thesis
Full-text available
With refrigeration costs, network infrastructure, storage, equipment management and maintenance of data centers, it is necessary an efficient usability of infrastructure. IT managers must do more with fewer budgets to respond efficiently to customers and market demands. Virtualization offers interesting benefits to address the issue of costs in the...

Network

Cited By

Projects

Projects (3)
Archived project
Este proyecto de tesis propone el desarrollo de un método eficiente de integración entre aplicaciones colaborativas y los servicios de la nube, donde el principal objetivo es analizar los algoritmos existentes y optimizarlos para que soporten una mayor concurrencia sobre modelos de datos compartidos. Se aplicará esta metodología en aplicaciones que dependan de una alta concurrencia por parte de un gran número de usuarios. Para esto se desarrollará un algoritmo de sincronización que permita explotar de mejor forma los servicios distribuidos que están en la nube (computación, datos y red).