Luis Orozco-Barbosa

Luis Orozco-Barbosa
University of Castilla-La Mancha · Instituto de Investigación en Informática de Albacete

Ph.D. Université Paris VI

About

296
Publications
28,818
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,280
Citations
Introduction
Edge computing focusing on the planning, modelling and performance evaluation of IoT network mechanisms

Publications

Publications (296)
Chapter
This study presents an investigation into the use of Dubins trajectories for runway approach procedures and their 4D tracking by aircraft. The study proposes a method to generate a fictitious aircraft that will follow the Dubins trajectory, providing a 4D reference for real aircraft to follow. It explores an innovative approach for 4D trajectory tr...
Article
Full-text available
In recent years, the development of Natural Language Processing (NLP) text-to-face encoders and Generative Adversarial Networks (GANs) has enabled the synthesis and generation of facial images from textual description. However, most encoders have been developed for the English language. This work presents the first study of three text-to-face encod...
Article
Full-text available
WiFi is a widely used wireless technology for data transmission. WiFi can also play a crucial role in simultaneously broadcasting content to multiple devices in multimedia transmission for venues such as classrooms, theaters, and stadiums, etc. Broadcasting allows for the efficient dissemination of information to all devices connected to the networ...
Article
In this article, we present a parameterized Colored Petri Net (CPN) model of the IEEE 802.11e protocol for wireless communications with mobile stations. CPNs provide a graphical model for the modeling and analysis of concurrent systems, which can be parameterized by the use of constants, and thus they allow us to create more flexible models. Our CP...
Article
Full-text available
Most wireless communication technologies addressed to the Internet of Things (IoT) applications face the bottleneck of dense and large-scale use cases. One solution to this problem is a periodic channel reservation strategy, in which only a small group of stations can compete for channel access during a given period. The IEEE 802.11ah standard, a.k...
Article
Full-text available
The widespread deployment of sensors interconnected by wireless links and the management and exploitation of the data collected have given rise to the Internet of Things (IoT) concept. In this paper, we undertake the design and implementation of a wireless multi-sensor platform following the fog computing paradigm. Our main contributions are the in...
Article
Full-text available
The growing interest in the use of IoT technologies has generated the development of numerous and diverse applications. Many of the services provided by the applications are based on knowledge of the localisation and profile of the end user. Thus, the present work aims to develop a system for indoor localisation prediction using Bluetooth-based fin...
Article
Full-text available
The IEEE 802.11ah standard, marketed as Wi-Fi Halow, introduces a new channel access mechanism called the Restricted Access Window (RAW), aiming to provide connectivity for the Internet of Things (IoT) applications over broad areas. RAW aspires to alleviate the contention by splitting the channel access into periods and allocating each period to a...
Article
IEEE 802.11ah is a new Wi-Fi standard for sub-1Ghz communications, aiming to address the challenges of the Internet of Things (IoT). Significant changes in the legacy 802.11 standards have been proposed to improve the network performance in high contention scenarios, the most important of which is the Restricted Access Window (RAW) mechanism. This...
Article
Full-text available
This paper introduces a general stochastic game analysis of a network scenario consisting of a mix of cooperative and non-cooperative players (i.e., users) under incomplete game information. Users access a shared channel using the Slotted ALOHA mechanism combined with ZigZag Decoding (SAZD). Cooperative players seek to optimize the global utility o...
Article
Full-text available
Energy-harvesting sensor networks promise unlimited operation throughout time, benefiting ongoing monitoring applications. However, most energy sources, such as sunlight, vary over time and do not guarantee constant power delivery to a device. In addition, these devices lack a battery with the necessary capacity to store enough energy to operate wh...
Article
Full-text available
Wireless sensor networks (WSNs) have increased in popularity since they play a relevant role in many applications, such as environmental monitoring, fire detection, and health care, to mention a few. These applications periodically collect data that is relayed to a single sink employing a many-to-one communication pattern. This pattern requires ene...
Article
Full-text available
Smart City initiatives across the globe have spurred increasing demand for high-skilled workers. The digital transformation, one of the main building blocks of the Smart City movement, is calling for a workforce prepared to develop novel business processes. Problem-solving, critical and analytical thinking are now the essential skills being looked...
Article
Full-text available
The study of artificial learning processes in the area of computer vision context has mainly focused on achieving a fixed output target rather than on identifying the underlying processes as a means to develop solutions capable of performing as good as or better than the human brain. This work reviews the well-known segmentation efforts in computer...
Article
The great popularity of smartphones, together with the increasingly important aim of providing context-aware services, has spurred interest in developing indoor tracking systems. Accurate tracking and localization systems are seen as key services for most context-aware applications. Research projects making use of radio signals detected by radio in...
Article
Full-text available
Wireless technologies are continuously evolving, including features such as the extension to mid- and long-range communications and the support of an increasing number of devices. However, longer ranges increase the probability of suffering from hidden terminal issues. In the particular case of Wireless Local Area Networks (WLANs), the use of Quali...
Chapter
The proliferation of embedded systems, wireless technologies, and Internet protocols have made it possible for the Internet-of-things (IoT) to bridge the gap between the physical and the virtual world and thereby enabling monitoring and control of the physical environment by data processing systems. IoT refers to the inter-networking of everyday ob...
Article
Full-text available
In recent years, we have witnessed an exponential growth in the use wearable and Internet of Things devices to provide friendly and tangible interfaces for ubiquitous services. The digital transformation of private and public organizations has been largely spurred by the widespread use of mobile devices, such as smartphones, tablets and virtual rea...
Article
Full-text available
Since the introduction of the original IEEE 802.11 medium access mechanism, the definition of the multicast access mechanism has been the subject of numerous amendments and standardization efforts. Over the past few years, the need for a reliable multicast mechanism has been spurred due to the increasing demand for audio/video services. It is widel...
Article
Increasing school dropout rates are a problem in many educational systems, with student disengagement being one significant factor. Learning analytics (LA) is a new field with a key role in educational institutions in the coming years. It may help make strategic decisions to reduce student disengagement. The use of technology in educational environ...
Chapter
Wi-Fi-based indoor localization mechanisms have attracted many research efforts in recent years due to the widespread use of this technology. All robots in indoor scenarios use this technology to provide Internet connection for Cloud services in speech understanding or human-robot interaction. However, this technology can also be used to provide lo...
Article
Full-text available
To demonstrate and promote the use of fog computing and complex event processing relative to the smart city context, this paper proposes a suite of applications developed to address gender-based violence, which is a significant problem in many jurisdictions. To better protect victims, we propose the open-source Surveillance and Alarm for gender VIo...
Article
Full-text available
With the growing development of smartphones equipped with Wi-Fi technology and the need of inexpensive indoor location systems, many researchers are focusing their efforts on the development of Wi-Fi-based indoor localization methods. However, due to the difficulties in characterizing the Wi-Fi radio signal propagation in such environments, the dev...
Article
Full-text available
The development of Internet of Things (IoT) benefits from: (a) the connections between devices equipped with multiple sensors; (b) wireless networks; and (c) processing and analysis of the gathered data. The growing interest in the use of IoT technologies has led to the development of numerous diverse applications, many of which are based on the kn...
Thesis
Full-text available
The development of wireless networks and devices equipped with multiple sensors, and their connection to storage centres and data processing through the Internet, has led to the implementation of Internet of Things (IoT). The growing interest in the use of IoT technologies has generated the development of numerous and diverse applications. The prop...
Article
Full-text available
In IEEE 802.11 networks a data packet is delivered simultaneously to multiple receivers through the multicast paradigm. The standard defines a simple mechanism that does not implement any error-recovery mechanism, thus, the reliability of the service provided to the multicast users is penalized. This issue is more important as the number of collisi...
Article
Full-text available
Over the past few years, we have witnessed the widespread deployment of wireless sensor networks and distributed data management facilities: two main building blocks of the Internet of things (IoT) technology. Due to the spectacular increase on the demand for novel information services, the IoT-based infrastructures are more and more characterized...
Chapter
There is no doubt that the introduction of IoT-assisted applications will become an invaluable asset to optimize farm performance. Through the data collected by sensors deployed in the fields together with other sources of information and facilities, farmers will have at their disposal a set of tools allowing them to make informed decisions on the...
Chapter
Recent developments in wireless systems and sensor technologies have spurred the interest on the design and development of Wireless Body Area Networks (WBANs). The performance of such systems will very much rely on protocols capable of dealing with the stringent QoS requirements of the end applications. Towards this end, numerous studies are being...
Conference Paper
Full-text available
The increasing interest on deploying ubiquitous context-based services has spurred the need of developing indoor localization mechanisms. Such systems should take advantage of the large amount of wireless networks and radio interfaces already incorporated in most mobile consumer devices. Among the existing radio interfaces, Bluetooth Low Energy (BL...
Article
Full-text available
Bluetooth Low Energy (BLE) 4.0 beacons will play a major role in the deployment of energy-efficient indoor localization mechanisms. Since BLE4.0 is highly sensitive to fast fading impairments, numerous ongoing studies are currently exploring the use of supervised learning algorithm as an alternative approach to exploit the information provided by t...
Article
Full-text available
Nowadays, there is a great interest in developing accurate wireless indoor localization mechanisms enabling the implementation of many consumer-oriented services. Among the many proposals, wireless indoor localization mechanisms based on the Received Signal Strength Indication (RSSI) are being widely explored. Most studies have focused on the evalu...
Conference Paper
Full-text available
Smart cities have emerged as a key and strategic concept towards the development of sustainable and user friendly cities. Towards this end, the use of novel information-and –communications technologies should set the basis on developing solutions enabling a better use of resources while improving a wide spectrum of services. Furthermore, smart citi...
Article
In the last few years, in an attempt to further motivate students to learn a foreign language, there has been an increasing interest in task-based teaching techniques, which emphasize communication and the practical use of language, thus moving away from the repetitive grammar-translation methods. Within this approach, the significance of situating...
Article
Full-text available
The accurate localization of end-users and resources is seen as one of the main pillars toward the successful implementation of context-based applications. While current outdoor localization mechanisms fulfill most application requirements, the design of accurate indoor localization mechanisms is still an open issue. Most research efforts are focus...
Article
Full-text available
This work describes the implementation of a cost-effective assistive mobile application aiming to improve the quality of life of visually impaired people. Taking into account the architectural adaptations being done in many cities around the world, such as tactile sidewalks, the mobile application provides support to guide the visually impaired thr...
Article
Full-text available
The integration of protocols from different layers enables efficient wireless communications. Wireless sensor networks (WSNs) represent the core of the internet of things (IoT). The growing number of nodes composing these networks requires effective node synchronisation and a correct network organisation in order to ensure data delivery to the dest...
Conference Paper
Nowadays, advances in technology enable us to easily assist patients with mobility impairment, so they may remain safe and comfortable at home. However, not everyone has experience using new technology. Their human-machine interfaces may become difficult to use, especially for people with motor limitations and little experience with the technology....
Conference Paper
Ubiquitous computing involves computers and technology that blend seamlessly into day to day living. In this way, the real and digital worlds have joined, offering interaction mechanisms which are more natural and tangible. However, the diversity of end-users has increased, that is, end-users have a wide range of skills, knowledge, disabilities, li...
Article
Full-text available
This paper introduces a hierarchical Wireless Random Access scheme based on power control where intelligence is split among the mobile users in order to drive the outcome of the system towards an efficient point. The hierarchical game is obtained by introducing a special user who plays the role of altruistic leader whereas the other users assume th...
Article
Since the first version of the IEEE 802.11, the standard committee has included a set of transmission rates aiming to accommodate the wide variety of requirements of end-user devices and channel operating conditions. Traditionally, the sender increases the data transmission rate upon receiving various consecutive acknowledgement packets while the d...
Conference Paper
Full-text available
The following work is an application proposal based on machine learning algorithms for a possible solution for the public safety problem in a South American city. The aim of this application is to reduce the threat risk of the physical integrity of pedestrians by geolocating, in real-time, safer places to walk. In this context for a city, San Isidr...
Article
Full-text available
During the past few years, the development of wireless sensor network technologies has spurred the design of novel protocol paradigms capable of meeting the needs of a wide broad of applications while taking into account the inherent constraints of the underlying network technologies, e.g. limited energy and computational capacities. Geographic rou...
Article
Full-text available
The proliferation of wireless sensor networks is one of the main hardware components enabling the creation of the Internet of Things. As sensor nodes are being deployed in a wide variety of indoor and outdoor environments, they are in general battery-powered devices. In fact, power provisioning is one of the main challenges faced by engineers when...
Conference Paper
Full-text available
Integration of algorithms and protocols from different layers will make possible the deployment of large-scale wireless sensor networks. The growing number of nodes that comprises within these networks requires a correct organization and an efficient node synchronization to ensure data reliability. In this study, we focus on the integration of fuzz...
Conference Paper
Video communications require the use of networks capable of optimally allocating resources and adapting dynamically themselves to the changing operating conditions. When a video stream has to be delivered to various receivers, the appropriate service to accomplish the delivery process is the multicast communication service. In the particular case o...
Conference Paper
Full-text available
In the context of Smart City environments, wireless sensor networking is playing a major role when enabling the utilization of networked infrastructures to introduce or improve a wide variety of services to be available to the citizens. How nodes communicate with each other is a key issue in these types of networks. This work presents a simple but...
Article
The IEEE 802.16 standard defines a contention bandwidth request mechanism offering QoS-aware broadband access through a wireless medium. According to the standard, the Base Station (BS) is responsible for granting the requests issued by the Subscriber Stations (SSs). The SSs communicate their requests to the BS by placing their requests into the up...
Conference Paper
The IEEE 802.16 standard is one of the BWA (Broadband Wireless Access) standards, which could provide Quality of Service (QoS) support to applications with end-to-end delay, jitter and/or maximum loss rate requirements. Its Medium Access Control (MAC) layer is centralized basis, where the Base Station (BS) is responsible for assigning the needed ba...
Article
ZigBee is the primary standard solution for wireless sensor networks, implementing the Ad hoc On-Demand Distance Vector (AODV) protocol in the network layer and supported by the standard IEEE 802.15.4. This study is focused on mesh topologies and the critical problems encountered when AODV is executed in conjunction with the Carrier Sense Multiple...
Article
Full-text available
We present a team analysis of a slotted random wireless channel access mechanism. Under the proposed scheme, denoted wireless random access mechanism with multiple power levels (MPL-WRA), each mobile station contends for a transmission opportunity following the principles of a slotted access mechanism incorporating a random transmitting power value...
Conference Paper
The IEEE 802.11 standard specifies a set of transmission rates among which the sender may select the most suitable one based on the channel conditions. Traditionally, the sender increases the data transmission rate upon receiving the various consecutive acknowledgement packets while the data transmission rate is decreased on the absence of acknowle...
Article
During the past few years, the development of video services over wireless networks has been driven by Quality of Service (QoS) parameters and service level agreements. Even though QoS parameters, such as packet losses, jitter and delays are good indicators of the service provided by the underlying network services to the applications, they fall sh...
Conference Paper
With the deployment of Audio-Video (AV) services and the flexibility offered by wireless networks, there is more and more an increasing interest on defining more reliable multicast mechanisms. Towards this end, the IEEE Task Group aa (TGaa) is currently working on the definition of the IEEE802.11aa amendment. The standardization efforts in this are...
Article
Full-text available
In this paper, we present a game analysis of the Binary Exponential Backoff (BEB), a popular bandwidth allocation mechanism used by a large number of distributed wireless technologies. A Markov chain analysis is used to obtain equilibrium retransmission probabilities and throughput. Numerical results show that when the arrival probability increases...
Article
Full-text available
Abstract—In this letter, we introduce a novel Multicast Collision Prevention (MCP) mechanism for IEEE 802.11 WLANs. The proposed MCP mechanism has been designed following the operation principles of the IEEE 802.11 standard. Our analysis shows that the proposed MCP mechanism effectively improves the reliability and efficiency of the multicast mecha...
Article
In the IEEE 802.11 networks a data packet is delivered to multiple receivers through the multicast paradigm. Since multicast has not a feedback scheme, the reliability of the service provided to the user is penalized. This issue is more important as the network load or the coverage area increases. These two facts cause collisions or corrupted deliv...
Conference Paper
The content of an Radio Frequency IDentification (RFID) tag should be protected from unauthorized access and only trusted readers should be able to modify the data on the tag. Providing security for RFID systems is a challenging task mainly due to the hardware limitations and economical constraints of RFID systems. In this work, we focus on the pro...
Conference Paper
Full-text available
Recent advances in communication networks have spurred interest on the definition of efficient self-configuration protocols. Such mechanisms are particularly of interest on the rapid deployment of wireless sensor networks whose nodes are characterized by their low computational and energy resources according to the green networking principles. In t...
Conference Paper
Full-text available
ZigBee in conjunction with IEEE 802.15.4 is considered the de facto standard for WSNs. The routing protocol for ZigBee mesh networks is AODV, an on-demand routing protocol which has been extensively used. However, it presents critical problems when it is used in large dense networks, mainly related to the high number of messages necessary to perfor...