María D. R-Moreno

María D. R-Moreno
University of Alcalá | UAH

About

138
Publications
46,285
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
953
Citations
Introduction
Experienced Full Professor in Computer Sciences with a demonstrated history of project management, education management and industry collaboration. I have been Principal Investigator of 21 research projects (public and private) and I have had engineering roles in more than 17 industrial and research projects. I have published 38 international journals: 31 indexed (half of them in the first quarter), and 10 not-indexed, 3 book chapters and 97 international conferences. I have 2 National patents and 1 American patent. I have supervised 33 Bachelor & Master theses and 5 PhD theses. I have lectured at all levels in academia, from high school to Bachelor, Master and PhD levels with over 3,000 teaching hours.
Skills and Expertise

Publications

Publications (138)
Article
Full-text available
This paper considers the time of use (TOU) pricing scheme to propose a consumer aware pricing policy (CAPP), where each customer receives a separate electricity pricing signal. These pricing signals are obtained based on individualized load demand patterns to optimally manage the flexible load demand. The main objective of CAPP is to reduce the pea...
Article
Today, much of the interaction between clients and providers has moved to the Internet. Some tricksters have also learned to benefit from this new situation. New improved cons, tricks and deceptions can be found on-line. Many of these deceptions are only profitable if they are done at a large scale. In order to achieve these large numbers of intera...
Chapter
Emergency Departments (ED) in hospitals around the world are a critical service in medical care of patients. Being able to predict the number of patients every day, week or month could be of great help to the healthcare system, and especially in the current situation. In this paper we present some results in forecasting the admissions, the inpatien...
Article
Full-text available
Buildings are one of the main consumers of energy in cities, which is why a lot of research has been generated around this problem. Especially, the buildings energy management systems must improve in the next years. Artificial intelligence techniques are playing and will play a fundamental role in these improvements. This work presents a systematic...
Article
Full-text available
Measuring the consumption of electronic devices is a difficult and sensitive task. Data acquisition (DAQ) systems are often used to determine such consumption. In theory, measuring energy consumption is straight forward, just by acquiring current and voltage signals we can determine the consumption. However, a number of issues arise when a fine ana...
Article
Full-text available
Predictive maintenance has lately proved to be a useful tool for optimizing costs, performance and systems availability. Furthermore, the greater and more complex the system, the higher the benefit but also the less applied: Architectural, computational and complexity limitations have historically ballasted the adoption of predictive maintenance on...
Article
Full-text available
Most of the studies about control, automation, optimization and supervision of building HVAC systems are about the steady-state regime, i.e. when the equipment is already working on their setpoints. In this work, it is defined an approach for multi-HVAC systems to reach the setpoint at the startup, so that other steady statebased strategies can smo...
Preprint
Full-text available
Measuring the consumption of electronic devices is a difficult and sensitive task. Data AcQuisition (DAQ) systems are often used to determine such consumption. In theory, measuring energy consumption is straightforward, just by acquiring current and voltage signals we can determine the consumption. However, a number of issues arise when a ne analys...
Article
CAPTCHAs are security mechanisms that try to prevent automated abuse of computer services. Many CAPTCHAs have been proposed but most have known security flaws against advanced attacks. In order to avoid a kind of oracle attacks in which the attacker learns about ground truth labels via active interactions with the CAPTCHA service as an oracle, Kwon...
Article
The articles in this special section focus on intelligent systems for space missions and vehicles. Information technology has progressively grown in importance to space exploration efforts and today it often dominates the cost and schedule of space mission projects. These papers aim to emphasize current and emerging IT practice and challenges for f...
Article
Full-text available
Autonomous control in robotics hold promising solutions for a broad number of applications. However, autonomous controllers require highly expertise on heterogeneous technologies, such as Artificial Intelligence Planning & Scheduling, behaviour modelling, intelligent execution and the hardware to control. Connecting these technologies entails sever...
Article
The latest progresses in medicine are helping people live longer and better. An ageing population is a sign of a developed society with an advanced health care system. Improved life expectancy should be welcomed as a major achievement, but it should not cause a financial or social burden. In this scenario, it is critical to support older and handic...
Article
Cooperation in heterogeneous robotics teams is getting attention from multiple areas, such as surveillance, search and rescue, or space exploration. Heterogeneous robots teams can exploit advantages of each robotic platform, allowing us to operate simultaneously on-ground, air and in water environments, which is usually not suitable for homogeneous...
Article
Full-text available
In this paper, we consider the scenario of exploring a planetary surface with a system formed by an Unmanned Aerial Vehicle (UAV) and an Unmanned Ground Vehicle (UGV). The goal is to reach a set of target points minimizing the travelling distance. Some expected key problems in planetary explorations are the UGVs functionality constraints to reach s...
Article
Full-text available
Wireless Sensor Networks (WSNs) are becoming increasingly popular since they can gather information from different locations without wires. This advantage is exploited in applications such as robotic systems, telecare, domotic or smart cities, among others. To gain independence from the electricity grid, WSNs devices are equipped with batteries, th...
Article
Full-text available
Due to recent booming of unmanned air vehicles (UAVs) technologies, these are being used in many fields involving complex tasks. Some of them involve a high risk to the vehicle driver, such as fire monitoring and rescue tasks, which make UAVs excellent for avoiding human risks. Mission planning for UAVs is the process of planning the locations and...
Conference Paper
One of the most notable consequences of aging is the loss of motor function abilities, making elderly people specially susceptible to falls, which is of the most remarkable concerns in elder care. Thus, several solutions have been proposed to detect falls, however, none of them achieved a great success mainly because of the need of wearing a record...
Conference Paper
Full-text available
Over the last decades the population in developed countries is becoming increasingly older, while the life expectancy is growing supported on medical advances. In despite of such progress, how to support older adults to continue living independently and retaining their current lifestyle is becoming a social problem. Through the careful placement of...
Article
Human Interactive Proofs (HIPs ¹ 1Human Interaction Proof, or also Human Interactive Proof. or CAPTCHAs ² 2Completely Automated Public Turing test to tell Computers and Humans Apart.) have become a first-level security measure on the Internet to avoid automatic attacks or minimize their effects. All the most widespread, successful or interesting CA...
Article
Planning is the problem of choosing and organizing a sequence of actions that when applied in a given initial state results in a goal state. However, in real problems unexpected action outcomes may occur and the initial state of the world may not be known with certainty. Incremental contingency planning considers potential failures in a plan and at...
Article
Full-text available
Autonomous navigation is a research topic that has received considerable attention in robotics. Generally, it is a two step process: (i) generate a global route to the goal and (ii) local motion of the robot along the route. The focus of this paper is on the first part of the process. Some common techniques used are based on heuristic search algori...
Article
The fast technological improvements in unmanned aerial vehicles (UAVs) has created new scenarios where a swarm of UAVs could operate in a distributed way. This swarm of vehicles needs to be controlled from a set of ground control stations, and new reliable mission planning systems, which should be able to handle the large amount of variables and co...
Article
Full-text available
CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks in which attackers can use them as oracles. Kwon and Cha presented recently a novel algorithm that intends to avoid such learning attacks and "detect all bots". They add uncertainties to the grading of challenges, and also...
Conference Paper
From the last few years the interest and repercussion on Unmanned Aerial Vehicle (UAV) technologies have been extended from pure military applications to industrial and societal applications. One of the basic tasks to any UAV problems is related to the Mission Planning. This problem is particularly complex when a set of UAVs is considered. In the f...
Conference Paper
An important issue when planning the tasks that a mobile robot has to reach is the path that it has to follow. In that sense, classical path planning algorithms focus on minimizing the total distance, generally assuming a flat terrain. Newer approaches also include traversability cost maps to define the terrain characteristics. However, this approa...
Conference Paper
Incremental Contingency Planning is a framework that considers all potential failures in a plan and attempts to avoid them by incrementally adding contingency branches to the plan in order to improve the overall probability. The planner focuses its attempts on the higher probability outcomes. Precautionary planning is a form of incremental continge...
Chapter
The loss of motor function in the elderly makes this population group prone to accidental falls. Actually, falls are one of the most notable concerns in elder care. Not surprisingly, there are several technical solutions to detect falls, however, none of them has achieved great acceptance. The popularization of smartwatches provides a promising too...
Article
Due to the complexity of theoretical approaches in evolutionary computation (EC), research has being largely performed on experimental basis. One popular measure used by the EC community is the success rate (SR), which is used alone or as part of more complex measures such as Koza’s computational effort in genetic programming. A common practice in...
Article
Most of the robotic systems are designed to move and perform tasks in a variety of environments. Some of these environments are controllable and well-defined, and the tasks to be performed are generally everyday ones. However, exploration missions also enclose hard constraints such as driving vehicles to many locations in a surface of several kilom...
Chapter
Finding the most efficient and safe path between locations is a ubiquitous problem that occurs in smart phone GPS applications, mobile robotics and even video games. Mobile robots in particular must often operate in any type of terrain. The problem of finding the shortest path on a discretized, continuous terrain has been widely studied, and many a...
Chapter
Full-text available
It is increasingly common that computational devices with significant computing power are underexploited. Some of the reasons for that are due to frequent idle-time or to the low computational demand of the tasks they perform, either sporadically or in their regular duty. The exploitation of this (otherwise-wasted) computational power is a cost-eff...
Article
Background: The Electrolysis Percutaneous Intratissue (EPI®) is a novel technique that provokes a local inflammatory process, allowing the phagocytises and affected tissue to repair. Objectives: The work is aimed to: a) verify the effectiveness of the EPI® when there is shoulder pain, b) locate where the EPI® should be applied, c) and find the poss...
Article
Full-text available
Human interactive proofs (HIPs) are a basic security measure on the Internet to avoid several types of automatic attacks. A variety of designs have been proposed. Here, the authors focus on a new type of HIP, based on a puzzle completion scheme that has been created to increase security and usability: the Capy CAPTCHA (Completely Automated Public T...
Article
Run-time analysis is a method that characterizes the run-time behaviour of an algorithm. It has been successfully used to analyse metaheuristics and stochastic local search algorithms. Some studies on genetic programming and related stochastic search algorithms suggested the existence of a rationale behind the run-time behaviour which could be expl...
Conference Paper
This paper presents and evaluates an integrated power-aware, model-based autonomous control architecture for managing the execution of rover actions in the context of planetary mission exploration. The proposed solution is embedded within an application scenario of reference which consists on a rover-based mission concept aimed at collecting Mars s...
Article
Human interactive proofs (HIPs) are a basic security measure on the Internet to avoid automatic attacks. There is an ongoing effort to find a HIP that is secure enough yet easy for humans. Recently, a new HIP has been designed aiming at higher security: the Civil Rights Completely Automated Public Turing test to tell Computers and Humans Apart (CAP...
Conference Paper
Mission Planning Problem for a large number of Unmanned Air Vehicles (UAV) consists of a set of locations to visit in different time windows, and the actions that the vehicle can perform based on its features such as the sensors, speed or fuel capacity. After formulating this problem as a Constraint Satisfaction Problem (CSP), we try to search the...
Article
Full-text available
In this article we present our recent work on the simulation of a hexapod robot called PTinto. This robot is a prototype that has been designed to test the six legs locomotion system in the surrounding areas of the Tinto River (Huelva-Spain), which scientists have considered that could potentially have many similarities to the Mars surface. This ki...
Article
Full-text available
Human Interactive Proofs (HIPs) are a basic security measure on the Internet to avoid several types of automatic attacks. Recently, a new HIP has been designed to increase security: the Civil Rights CAPTCHA. It employs the empathy capacity of humans to further strengthen the security of a well known OCR CAPTCHA, Securimage. In this paper, we analys...
Chapter
Full-text available
The Multi-UAV Cooperative Mission Planning Problem (MCMPP) is a complex problem which can be represented with a lower or higher level of complexity. In this paper we present a MCMPP which is modelled as a Constraint Satisfaction Problem (CSP) with 5 increasing levels of complexity. Each level adds additional variables and constraints to the problem...
Article
John R. Koza defined several metrics to measure the performance of an Evolutionary Algorithm that have been widely used by the Genetic Programming community. Despite the importance of these metrics, and the doubts that they have generated in many authors, their reliability has attracted little research attention, and is still not well understood. T...
Article
One of the first approaches to proposed to prevent automated attacks on Internet were the Human Interactive Proofs (HIPs). Since their invention, a variety of designs have been proposed, yet most of them have been successfully attacked. In this paper we focus on a new HIP, based on a puzzle solving scheme, created to increase both security and usab...
Article
The cognitive psychology has focused on understanding how humans think and solve problems. As analogy, the robotics systems have used this research to try to make robots more "intelligent" imitating cognitive models. How things are perceived and transformed in mental structures, and how they are retained, is still an open question, although a lot o...
Article
Thanks to the advances in Artificial Intelligence (AI), and in particular in automated planning & scheduling and execution, goal-oriented controllers have being developed to test degrees of autonomy for robotics systems in challenging scenarios. Despite these efforts, there is a lack of methodology for approaching the design of deliberative systems...
Article
Full-text available
Path-planning is a well-known studied problem in Artificial Intelligence. Given two points in a map, path-planning algorithms search for a path that joins those two points, avoiding obstacles. It is a challenging problem with important practical applications in a wide range of applications: autonomous mobile robotics, logistics or video games, just...
Article
Radio Frequency IDentification (RFID) has been used in a wide variety of applications such as highway toll collection, building access control, animal tracking, remote keyless entry for automobiles and tracking assets. For example, RFID in libraries, with a modest investment, can improve the capabilities of both librarians and users. This paper pre...
Conference Paper
Full-text available
Mission Planning is a classical problem that has been traditionally studied in several cases from Robotics to Space missions. This kind of problems can be extremely difficult in real and dynamic scenarios. This paper provides a first analysis for mission planning to Unmanned Air Vehicles (UAVs), where sensors and other equipment of UAVs to perform...
Conference Paper
The technological advances have enabled the development of many arenas. In this sense, one of the main research topics that is gained importance and visibility is Monitoring. In a general way, it consists of observing an event, situation or process in order to check its quality and discover anomalies. Monitoring/simulating the data helps to detect...
Conference Paper
The problem of Mission Planning for a large number of Unmanned Air Vehicles (UAV) can be formulated as a Temporal Constraint Satisfaction Problem (TCSP). It consists on a set of locations that should visit in different time windows, and the actions that the vehicle can perform based on its features such as the payload, speed or fuel capacity. In th...
Article
Full-text available
Social networks surfaced as communication and socialization tools. The vast amount of data these networks generate has led to a growing need of automatic knowledge extraction. The popular nature of these services is ideal for trends discovery. In particular, Twitter offers an open environment where people all around the world share information and...
Article
This paper presents recent results on applying advanced autonomous reasoning capabilities for a planetary rover concept for synthesizing complete command plans that involve a wide assortment of mission requirements. Our solution exploits AI scheduling techniques to manage complex temporal and resource constraints within an integrated power-aware de...
Conference Paper
Full-text available
On April 16, 2013 two bombs detonated in the Boston Marathon, with the dramatic result of three people killed and more than 180 people injured. The strong social impact that this event produced in the public opinion has been impressed on the social networks that stored opinions, comments, analysis, pictures and other materials. The availability of...
Article
Full-text available
The path-planning problem for autonomous mobile robots has been addressed by classical search techniques such as A* or, more recently, Theta* or S-Theta*. However, research usually focuses on reducing the length of the path or the processing time. The common practice in the literature is to report the run-time/length of the algorithm with means and...
Article
Development of real planning and scheduling applications often requires the ability to handle uncertainty. Often this uncertainty is represented using probability information on the initial conditions and on the outcomes of actions. In this paper, we describe a novel probabilistic plan graph heuristic that computes information about the interaction...
Conference Paper
Full-text available
Social networks have opened to companies and politicians' new ways to understand what the clients and citizens are looking for. That is, companies need to understand what is happening in the market in order to be competitive. And politicians need to better understand what the people are worried about if they want to comply with the wishes of their...
Conference Paper
The Web has an enormous influence on our everyday life. Thus, more efficient intelligent approaches and technologies are needed to make the most of the Web's unlimited potential. Intelligence can be achieved by making the Web knowing its own structures and content and by applying intelligent techniques to effectively access the resources. Semantic...
Article
Full-text available
Since the late nineties, Radio Frequency IDentification (RFID) manages library catalogs, loans, returns and security. RFID, with a moderate investment, improve the capabilities of both, librarian and user. This paper presents a new use for RFID to determine where a book is located and the shortest route to it in libraries with multiple levels and r...
Article
The logistic sector raises a number of highly challenging problems. Probably one of the most important ones is the shipping planning, i.e. plan the routes that the shippers have to follow to deliver the goods. In this article, we present an artificial intelligence-based solution that has been designed to help a logistic company to improve its route...
Conference Paper
Full-text available
The path-planning problem for autonomous mobile robots has been addressed by classical search techniques such as A* or, more recently, Theta*. However, research usually focuses on reducing the length of the path or the processing time. Applying these advances to autonomous robots may result in the obtained “short” routes being less suitable for the...
Conference Paper
Run-time analysis is a type of empirical tool that studies the time consumed by running an algorithm. This type of analysis has been successfully used in some Artificial Intelligence (AI) fields, in paticular in Metaheuristics. This paper is an attempt to bring this tool to the path-planning community. In particular, we analyse the statistical prop...
Conference Paper
Full-text available
Searching for optimal paths over grids has been widely discussed using search algorithms such as A*. It is an efficient but restricted to artificial heading changes method. Lately, some algorithms have tried to obtain better paths, such as A* Post Smoothed or Theta*. These two variants of A* get an any-angle path avoiding its main limitation but at...
Article
Virtual Worlds (VWs) platforms and applications provide a practical implementation of the Metaverse concept. These applications, as highly inmersive and interactive 3D environments, have become very popular in social networks and games domains. The existence of a set of open platforms like OpenSim or OpenCobalt have played a major role in the popul...
Article
Organizations need diverse information systems to deal with the increasing requirements in information storage and processing, yielding the creation of information islands and therefore an intrinsic difficulty to obtain a global view. Being able to provide such an unified view of the -likely heterogeneous-information available in an organization is...
Conference Paper
Many planning and scheduling applications require the ability to deal with uncertainty. Often this uncertainty can be characterized in terms of probability distributions on the initial conditions and on the outcomes of actions. These distributions can be used to guide a planner towards the most likely plan for achieving the goals. This work is focu...
Conference Paper
Full-text available
This paper presents recent results on applying robust state-of-the-art AI Planning and Scheduling (P&S) techniques to mobile space robotic domains. We introduce an adaptation of an advanced constraint-based, resource driven reasoner for deciding feasible sequences of movements for a mobile robot in charge of executing a set of mission exploration-r...
Conference Paper
Full-text available
In this article we present a cognitive architecture and we describe some algorithms for simulating the movement of an hexapod robot (a six legs spider) who has been designed and built at the Astrobiology Center (CAB) in Madrid (Spain). The robot is called Ptinto and it was created with the purpose of exploring the Tinto river and the surrounding ar...