17 research outputs found
Evaluación y rediseño de una aplicación móvil y sus recursos asociados para formación, bienestar y monitorización de pacientes frágiles.
Las estrategias digitales dentro de los servicios de la salud son una realidad en desarrollo con alto potencial. Es a través de la eHealth (electronic Health), o la específica mHealth (mobile Health), que se están popularizando medios dedicados al seguimiento y vía de contacto entre pacientes y profesionales de la salud; de manera acentuada tras la situación social vivida con la COVID-19. Este preludio ha sido el idóneo para centrar los objetivos del estudio, pudiendo aprovechar estas funcionalidades para ayudar a mejorar la calidad de vida de unos usuarios que pueden quedar olvidados en el espectro digital, la población más adulta. El presente estudio no trabaja la conceptualización desde un punto inicial de un producto, sino que se centra en el rediseño y optimización de una primera aproximación del mismo, terminando de desarrollar además aquellos contenidos propios pertinentes. El proceso de diseño utilizado en el desarrollo ha sido aquel que se centra en la perspectiva del usuario, haciéndole partícipe del proceso de diseño y realizando de forma conjunta las evaluaciones correspondientes. No solo se contempla en este diseño colaborativo al usuario final y objetivo de la aplicación, sino también las necesidades del perfil profesional que, inherentemente, realiza un seguimiento de estos pacientes. En definitiva, se ha podido desarrollar una plataforma que resulta usable, intuitiva e interesante a estos usuarios mayores de 65 años y que incluso tienen un menor nivel de digitalización, como se indica en los resultados detallados de este informe.<br /
Diseño de una plataforma web para el seguimiento de pacientes a través de datos recogidos con pulseras de actividad
La mHealth está emergiendo rápidamente como un medio importante para el control de enfermedades crónicas, que son la principal causa de muerte e incapacidad del mundo. Además, la necesidad de repensar las estructuras tradicionales de los servicios de salud y las posibilidades del uso mixto de los wereables y las apps para ayudar a mejorar la calidad de vida de la gente, han motivado la realización de este estudio piloto. En este contexto, el proyecto actual presenta el diseño de la interfaz, diseño gráfico y testeo del prototipo funcional de una nueva aplicación móvil Android de mHealth para el seguimiento integral y monitorización de pacientes crónicos llamada Tuende. Esta monitorización se lleva a cabo a través de la combinación de datos recogidos con pulseras de actividad compatibles con Google Fit e información subjetiva de la percepción de la enfermedad aportada por el paciente. Este rasgo diferenciador con el resto de aplicaciones del mercado posibilita que el paciente tome una parte activa en su cuidado, involucrándose en su tratamiento, lo que favorece una mejor adaptación a este. Además, toda esta información permite a los profesionales sanitarios poder ofrecer una atención personalizada, ajustando los tratamientos según las necesidades de cada paciente. Algunas de las funciones más relevantes que la plataforma incorpora son: la interacción social entre usuarios de la aplicación que, junto con el uso de las mecánicas de gamificación por desafíos, ayudará al paciente a estar motivado en el uso de la plataforma, sin percibir las tareas como una obligación, y la comunicación telemática entre el paciente y el personal sanitario, ofreciendo una alternativa más eficiente y asequible de los servicios de atención sanitaria. El proceso de diseño centrado en el usuario a través de la evaluación de las iteraciones del prototipo ha permitido desarrollar una plataforma intuitiva, fácil de usar y accesible a cualquier usuario que sepa manejar un dispositivo móvil con cierta soltura, como indican los resultados de los test con usuarios.<br /
Smart Green Communication Protocols Based on Several-Fold Messages Extracted from Common Sequential Patterns in UAVs
[EN] Green communications can be crucial for saving energy in UAVs and enhancing their autonomy. The current work proposes to extract common sequential patterns of communications to gather each common pattern into a single several- fold message with a high-level compression. Since the messages of a pattern are elapsed from each other in time, the current approach performs a machine learning approach for estimating the elapsed times using off-line training. The learned predictive model is applied by each UAV during flight when receiving a several-fold compressed message. We have explored neural networks, linear regression and correlation analyses among others. The current approach has been tested in the domain of surveillance. In specific-purpose fleets of UAVs, the number of transmissions was reduced by 13.9 percent.This work was mainly done during the stay of the first author at the Institute of Technology Blanchardstown (now called Technological University Dublin), with the support from the "Universidad de Zaragoza," " Fundacion Bancaria Ibercaja," and "Fundacion CAI" in the "Programa Ibercaja-CAI de Estancias de Investigacion" with reference IT1/18. This work also acknowledges the research project "Construccion de un framework para agilizar el desarrollo de aplicaciones moviles en el ambito de la salud" funded by the University of Zaragoza and the Foundation Ibercaja with grant reference JIUZ-2017-TEC-03. We also acknowledge "CITIES: Ciudades inteligentes totalmente integrales, eficientes y sotenibles" (ref. 518RT0558) funded by CYTED ("Programa Iberoamericano de Ciencia y Tecnologia para el Desarrollo") and "Diseno colaborativo para la promocion del bienestar en ciudades inteligentes inclusivas" (TIN2017-88327-R) funded by the Spanish Council of Science, Innovation and Universities from the Spanish Government. This work has been partially supported by the "Ministerio de Economia y Competitividad" in the "Programa Estatal de Fomento de la Investigacion Cientifica y Tecnica de Excelencia, Subprograma Estatal de Generacin de Conocimiento" within the project under Grant TIN2017-84802-C2-1-P.García-Magariño, I.; Gray, G.; Lacuesta Gilaberte, R.; Lloret, J. (2020). Smart Green Communication Protocols Based on Several-Fold Messages Extracted from Common Sequential Patterns in UAVs. IEEE Network. 34(3):249-255. https://doi.org/10.1109/MNET.001.190041724925534
ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles
[EN] Fuel has been the main source of energy for cars for many years, but the non-renewable resources are limited in the planet. In this context, electric vehicles (EVs) are increasingly replacing the previous kind of cars. However, as the number of EVs increases, some challenges arise such as the reduction of waiting times in the queues of fast charging stations. The current work addresses this challenge by means of social coordination mechanisms. In particular, this work presents an agent-based simulation framework for simulating the effects of different coordination policies in the route planning of EV drivers for charging their vehicles on their trips. In this manner, researchers and professionals can test different coordination mechanisms for this purpose. This framework has been experienced by simulating an adaptive strategy based on the implicit communication through booking systems in the charging stations. This strategy was compared with another common strategy, which was used as the control mechanism. This comparison was done by simulating several scenarios in two Spanish cities (i.e. Madrid and Zaragoza). The experimental results show that the current approach was useful to propose a route planning strategy that had statistically significant improvements in the reduction of waiting times in charging stations and also in the global trip times. In addition, the evolutions of pathfinding execution times and the numbers of interchanged messages did not show any overloading pattern over the time. (C) 2018 Elsevier B.V. All rights reservedWe acknowledge the research project "Construccion de un framework para agilizar el desarrollo de aplicaciones mviles en el ambito de la salud" funded by University of Zaragoza and Foundation Ibercaja with grant reference JIUZ-2017-TEC-03. This work has been supported by the program "Estancias de movilidad en el extranjero Jose Castillejo para jovenes doctores" funded by the Spanish Ministry of Education, Culture and Sport with reference CAS17/00005. We also acknowledge support from "Universidad de Zaragoza", "Fundacion Bancaria Ibercaja" and "Fundacion CAI" in the "Programa Ibercaja-CAI de Estancias de Investigacion" with reference IT1/18. This work acknowledges the research project "Desarrollo Colaborativo de Soluciones AAL" with reference TIN2014-57028-R funded by the Spanish Ministry of Economy and Competitiveness. It has also been supported by "Organismo Autonomo Programas Educativos Europeos" with reference 2013-1-CZ1-GRU06-14277. We also acknowledge support from project "Sensores vestibles y tecnologa movil como apoyo en la formacin y practica de mindfulness: prototipo previo aplicado a bienestar" funded by University of Zaragoza with grant number UZ2017-TEC-02.García-Magariño, I.; Palacios-Navarro, G.; Lacuesta Gilaberte, R.; Lloret, J. (2018). ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles. Computer Networks. 138:119-135. https://doi.org/10.1016/j.comnet.2018.03.01411913513
A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network
[EN] Spontaneous ad hoc cloud computing networks let us perform complex tasks in a distributed manner by sharing computing resources. This kind of infrastructure is based on mobile devices with limited processing and storage capacity. Nodes with more processing capacity and energy in a spontaneous network store data or perform computing tasks in order to increase the whole computing and storage capacity. However, these networks can also present some problems of security and data vulnerability. In this paper, we present a secure spontaneous mobile ad hoc cloud computing network to make estimations using several information sources. The application is able to create users and manage encryption methods to protect the data sent through the network. The proposal has been simulated in several scenarios. The results show that the network performance depends mainly on the network size and nodes mobility.Sendra, S.; Lacuesta Gilaberte, R.; Lloret, J.; Macias Lopez, EM. (2017). A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network. Journal of Internet Technology. 18(7):1485-1498. https://doi.org/10.6138/JIT.2017.18.7.20141221S1485149818
Test bench to test protocols and algorithms for multimedia delivery
Nowadays, the study of Quality of Service (QoS) in multimedia streaming is generally carried out by simulators. However, the results of these tests are not quite real. This forces researchers to work with approximations. In this paper, we implement a test bench to test the performance and assess the protocols and algorithms for multimedia delivery. This test bench let us evaluate the network parameters performance, by manipulating the devices under controlled conditions, and allow us to identify different application cases. We can confirm that the designed test bench gives us more real measures than a simulators, which allows us to do many types of tests with low cost.Jimenez, JM.; Lloret, J.; Díaz Santos, JR.; Lacuesta Gilaberte, R. (2017). Test bench to test protocols and algorithms for multimedia delivery. En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Verlag. 124-134. doi:10.1007/978-3-319-49580-4_12S124134Lloret, J., Garcia, M., Atenas, M., Canovas, A.: A QoE management system to improve the IPTV network. Int. J. Commun Syst 24(1), 118–138 (2011)Garcia, M., Canovas, A., Edo, M., Lloret, J.: A QoE management system for ubiquitous IPTV devices. In: The Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2009, Sliema, Malta, 11–16 October 2009Álvarez, A., Pozueco, L., Cabrero, S., García Pañeda, X., García, R., Melendi, D., Díaz Orueta, G.: Adaptive streaming: a subjective catalog to assess the performance of objective QoE metrics. Netw. Protoc. Algorithms 6(2), 123–136 (2014)Jimenez, J.M., Romero, O., Rego, A., Dilendra, A., Lloret, J.: Study of multimedia delivery over software defined networks. Netw. Protoc. Algorithms 7(4), 37–62 (2015)Recomendation UIT/T G.1010: End-user multimedia QoS categories (2001). https://www.itu.int/rec/T-REC-G.1010-200111-I/enRecomendation UIT‑R M.1079-2: Performance and quality of service requirements for International Mobile Telecommunications-2000 (IMT-2000) access networks. https://www.itu.int/dms_pubrec/itu-r/rec/m/R-REC-M.1079-2-200306-I!!PDF-E.pdfGarcia, M., Lloret, J., Edo, M., Lacuesta, R.: IPTV distribution network access system using WiMAX and WLAN technologies. In: Proceedings of the 4th Edition of the UPGRADE-CN Workshop on Use of P2P GRID and Agents for the Development of Content Networks, Munich, Germany, 11–13 June 2009Atenas, M., Sendra, S., Garcia, M., Lloret, J.: IPTV performance in IEEE 802.11 n WLANs. In: IEEE GLOBECOM Workshops 2010, Miami, USA, pp. 929–933, December 2010Cisco Systems Inc. Cisco’s Visual Networking Index Forecast Projects Nearly Half the World’s Population Will Be Connected to the Internet by 2017. http://newsroom.cisco.com/press-release-content?articleId=1197391Lu, X., Tao, S., El Zarki, M., Guérin, R.: Quality based Adaptive Video Over the Internet. Department of ESE, University of Pennsylvania, Philadelphia, PA 19104 (2003)Lee, T.K., Chai, T.Y., Ngoh, L.H., Shao, X., Teo, J.C.M., Zhou, L.: An IMS-based testbed for real-time services integration and orchestration. In: IEEE Asia-Pacific Services Computing Conference (APSCC 2009), Singapore, 7–11 December 2009Mu, M., Mauthe, A., Casson, J., Tyson, G., Garcia, F.: LA1 TestBed: evaluation testbed to assess the impact of network impairments on video quality. In: 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops (TridentCom 2009), Washington, DC, 6–8 April 2009Kuwadekar, A., Al-Begain, K.: User centric quality of experience testing for video on demand over IMS. In: First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN 2009), Indore, India, 23–25 July 2009Downline Guide, Big Buck Bunny, Sunflower version. http://bbb3d.renderfarming.net/download.htmlFFmpeg. http://www.ffmpeg.org/about.htmlSullivan, G.J., Wiegand, T.: Video compression - from concepts to the H.264/AVC standard. Proc. IEEE 93(1), 18–31 (2005)Estepa, A.J., Estepa, R., Vozmediano, J., Carrillo, P.: Dynamic VoIP codec selection on smartphones. Netw. Protoc. Algorithms 6(2), 22–37 (2014
Un estudio sobre aplicaciones móviles y gamificación en el ámbito de la salud: aplicación al seguimiento de pacientes de cáncer
Análisis del estado de la cuestión en cuanto a aplicaciones móviles relacionadas con la salud y el cáncer. Análisis de la utilidad de la gamificación en el ámbito de la salud. Propuesta de diseño aplicable a una aplicación de teléfono inteligente
Diseño de un sistema ciberfísico aplicado al ámbito de la salud.
Los Sistemas Ciber-Físicos (CPS) tienen la capacidad de coordinar el tratamiento de datos y sistemas de comunicación con el seguimiento y control de las entidades que se encuentran en el entorno físico. Los ejemplos de CPS incluyen sistemas de conducción autónoma, sistemas de monitorización médica, modelos de consumo energético inteligente, sistemas de control de procesos, monitorización de procesos de fabricación, monitorización de infraestructuras y carreteras, sistemas de robótica, domótica y pilotos automáticos aeronáuticos. Estos sistemas están formados por un conjunto de dispositivos como: sensores, unidades de procesamiento, dispositivos de comunicación y en muchos casos servicios en la nube. Debido a la naturaleza de los distintos tipos de hardware un CPS puede estar formado por múltiples dispositivos con diferentes arquitecturas, protocolos e interfaces y en una gran parte de los casos los CPS son sistemas híbridos y distribuidos.Esta tesis presenta el diseño de un CPS centrado en el entorno de la salud. El CPS consta de un armario inteligente de cocina. Este armario posee internamente una placa de procesamiento Raspberry PI que se encarga de recopilar las aperturas y los cierres que se efectúen en este. La función principal del armario es estimar síntomas de aparición de enfermedades neurodegenerativas como el Alzheimer.La tesis también presenta otros elementos en la elaboración de un CPS como medidas de seguridad para evitar ataques de denegación de servicios (DoS) de tal manera que el normal funcionamiento no se vea comprometido. Otro elemento que se tiene en cuenta es la manera de interactuar con el usuario, el cual es objeto de estudio según el tipo de usuario que esté usando el CPS. Finalmente se propone un modelo de consumo energético, el cual se basa en la rutina del usuario para efectuar un consumo de energía en los momentos más álgidos del día en relación a la rutina diaria del usuario.El CPS fue evaluado en un entorno acondicionado y controlado con 23 participantes voluntarios. La fase de evaluación se realizó en 2 pasos en los cuales los voluntarios tuvieron que memorizar y extraer alimentos según el examinador iba indicando, en cada paso se usaron 15 tipos de alimentos distintos. Una vez que se realizaron todas las extracciones cada voluntario tuvo que realizar un test bien conocido de caras y nombres. En este test los participantes deben recordar una cara asociada a un determinado nombre. Un total de 30 caras y nombres son visionados por los voluntarios de manera que cada pareja debe ser memorizado. La etapa final del test de caras y nombres consistió en preguntar a qué cara le pertenece un nombre de 4 posibles. Una vez los resultados de ambos test fueron obtenidos, se contrastaron mediante varios test estadísticos. El resultado arrojó una correlación estadísticamente significativa, esto significa que al ser el test de caras y nombres un test bien conocido y comprobado para medir la memoria, el CPS presentado también posee la misma características.Finalmente, en la tesis se expone cómo los componentes interactivos, eléctricos y de seguridad son diseñados y acoplados para obtener el CPS propuesto.Esta Tesis Doctoral se presenta como compendio de publicaciones editadas, de acuerdo al extracto de 25/06/2020 del Consejo de Gobierno de la Universidad de Zaragoza por el que se aprueba el Reglamento Sobre Tesis Doctorales (Título IV, Capítulo III, artículo 20).<br /
A spontaneous ad hoc network to share www access
In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.Authors want to give thanks to the anonymous reviewers for their valuable suggestions, useful comments, and proofreading of this paper. This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant no. TIN2008-06441-C02-01, and by the "Ayudas complementarias para proyectos de I+D para grupos de calidad de la Generalitat Valenciana" (ACOMP/2010/005).Lacuesta Gilaberte, R.; Lloret, J.; García Pineda, M.; Peñalver Herrero, ML. (2010). A spontaneous ad hoc network to share www access. EURASIP Journal on Wireless Communications and Networking. 2010:1-16. https://doi.org/10.1155/2010/232083S1162010Preuß S, Cap CH: Overview of spontaneous networking-evolving concepts and technologies. In Rostocker Informatik-Berichte. Volume 24. Fachbereich Informatik der Universit at Rostock; 2000:113-123.Gallo S, Galluccio L, Morabito G, Palazzo S: Rapid and energy efficient neighbor discovery for spontaneous networks. Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 2004, Venice, ItalyLatvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wireless Communications 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Zarate Silva VH, De Cruz Salgado EI, Quintana FR: AWISPA: an awareness framework for collaborative spontaneous networks. Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference (FIE '06), October 2006 1-6.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine 2001, 39(6):176-181. 10.1109/35.925687Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), August 1994 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, Ad Hoc Networking. Addison-Wesley Longman Publishing, Boston, Mass, USA; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003Park V, Corson MS: IETF MANET Internet Draft "draft-ietf-MANET-tora-spe03.txt". Novemmer 2000.Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Gilaberte RL, Herrero LP: IP addresses configuration in spontaneous networks. Proceedings of the 9th WSEAS International Conference on Computers, July 2005, Athens, GreeceViana AC, Dias de Amorim M, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Alvarez-Hamelin JI, Carneiro Viana A, Dias De Amorim M: Architectural considerations for a self-configuring routing scheme for spontaneous networks.,Tech. Rep. 1 October 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '07), October 2007, Valencia, SpainFoulks EF: Social network therapies and society: an overview. Contemporary Family Therapy 1985, 3(4):316-320.Wang Y, Wu H: DFT-MSN: the delay/fault-tolerant mobile sensor network for pervasive information gathering. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006Kindberg T, Zhang K: Validating and securing spontaneous associations between wireless devices. In Proceedings of the 6th Information Security Conference (ISC '03), 2003. Springer; 44-53.Al-Jaroodi J: Routing security in open/dynamic mobile ad hoc networks. The International Arab Journal of Information Technology 2007, 4(1):17-25.Stajano F, Anderson RJ: The resurrecting duckling: security issues for ad-hoc wireless networks. Proceedings of the 7th International Workshop on Security Protocols, April 1999 172-194.Zhou L, Haas ZJ: Securing ad hoc networks. IEEE Network 1999, 13(6):24-30. 10.1109/65.806983Hauspie M, Simplot-Ryl I: Cooperation in ad hoc networks: enhancing the virtual currency based models. Proceedings of the 1st International Conference on Integrated Internet Ad Hoc and Sensor Networks (InterSense '06), May 2006, Nice, FranceWang X, Dai F, Qian L, Dong H: A way to solve the threat of selfish and malicious nodes for ad hoc networks. Proceedings of the International Symposium on Information Science and Engieering (ISISE '08), December 2008, Shanghai, China 1: 368-370.Kargl F, Klenk A, Weber M, Schlott S: Sensors for detection of misbehaving nodes in MANETs. Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA '04), July 2004, Dortmund, Germany 83-97.Kargl F, Geiss A, Scholott S, Weber M: Secure dynamic source routing. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS '05), January 2005, Big Island, Hawaii, USAGokhale S, Dasgupta P: Distributed authentication for peer-to-peer networks. Proceedings of the Symposium on Applications and the Internet Workshops, January 2003 347-353.Capkun S, Buttyán L, Hubaux J-P: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2003, 2(1):52-64. 10.1109/TMC.2003.1195151Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, 1999, Berlin, Germany, Lecture Notes in Computer Science. Volume 1796. Springer; 172-194.Balfanz D, Smetters DK, Stewart P, Wong HC: Talking to strangers: authentication in ad-hoc wireless networks. Proceedings of the International Symposium on Network and Distributed Systems Security (NDSS '02), February 2002, San Diego, Calif, USABarbara D, Imielinski T: Sleepers and workaholics: caching strategies in mobile environments. Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1994 1-12.Cao G: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering 2003, 15(5):1251-1265. 10.1109/TKDE.2003.1232276Hu Q, Lee D: Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing 1998, 1(1):39-50. 10.1023/A:1019012927328Jing J, Elmagarmid A, Helal A, Alonso R: Bit-sequences: an adaptive cache invalidation method in mobile client/server environments. Mobile Networks and Applications 1997, 2(2):115-127. 10.1023/A:1013616213333Kahol A, Khurana S, Gupta S, Srimani P: An efficient cache management scheme for mobile environment. Proceedings of the 20th International Conference on Distributied Computing System (ICDCS '00), April 2000, Taipei, Taiwan 530-537.Kazar M: Synchronization and caching issues in the Andrew file system. Proceedings of USENIX Conference, February 1988, Dallas, Tex, USA 27-36.Roussopoulos M, Baker M: CUP: controlled update propagation in peer-to-peer networks. Proceedings of USENIX Annual Technical Conference, June 2003, San Antonio, Tex, USASandberg S, Kleiman S, Goldberg D, Walsh D, Lyon B: Design and implementation of the sun network file system. Proceedings of USENIX Summer Conference, June 1985, Portland, Ore, USA 119-130.Wu K, Yu PS, Chen M: Energy-efficient caching for wireless mobile computing. Proceedings of the 12th IEEE International Conference on Data Engineering, February-March 1996, New Orleans, La, USA 336-343.Yeung MKH, Kwok Y-K: Wireless cache invalidation schemes with link adaptation and downlink traffic. IEEE Transactions on Mobile Computing 2005, 4(1):68-83.Wessels D, Claffy K: Internet cache protocol (IC) v.2. http://www.ietf.org/rfc/rfc2186.txtFan L, Cao P, Almeida J, Broder AZ: Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking 2000, 8(3):281-293. 10.1109/90.851975Dykes SG, Robbins KA: A viability analysis of cooperative proxy caching. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 3: 1205-1214.Wessels D, Claffy K: RFC 2186: Internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Wessels D, Claffy K: RFC 2187: application of internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Ren Q, Dunhan MH: Using semantic caching to manage location dependent data in mobile computing. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, Boston, Mass, USA 210-221.Lim S, Lee W-C, Cao G, Das CR: Cache invalidation strategies for internet-based mobile ad hoc networks. Computer Communications 2007, 30(8):1854-1869. 10.1016/j.comcom.2007.02.020Park B-N, Lee W, Lee C: QoS-aware internet access schemes for wireless mobile ad hoc networks. Computer Communications 2007, 30(2):369-384. 10.1016/j.comcom.2006.09.004Hara T: Effective replica allocation in ad hoc networks for improving data accessibility. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 1568-1576.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless converage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Can P, Irani S: Cost-aware WWW proxy caching algorithms. Proceedings of the USENIX Symposium on lnternet Technology and Systems, December 1997Rizzo L, Vicisano L: Replacement policies for a proxy cache. IEEE/ACM Transactions on Networking 2000, 8(2):158-170. 10.1109/90.842139Williams S, Abrams M, Strandridge CR, Abdulla G, Fox EA: Removal policies in network caches for world-wide web documents. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 1996, Palo Alto, Calif, USA 293-305.Hara T: Replica allocation in ad hoc networks with period data update. Proceedings of the 3rd International Conference on Mobile Data Management (MDM '02), July 2002, Edmonton, Canada 79-86.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Sailhan F, Issarny V: Cooperative caching in ad hoc networks. Proceedings of the 4th International Conference on Mobile Data Management (MDM '03), January 2003, Melbourne, Australia, Lecture Notes in Computer Science 2574: 13-28.Yin L, Cao G: Supporting cooperative caching in ad hoc networks. IEEE Transactions on Mobile Computing 2006, 5(1):77-89.Karumanchi G, Muralidharan S, Prakash R: Information dissemination in partitionable mobile ad hoc networks. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (SRDS '99), October 1999, Lausanne, Switzerland 4-13.Corson MS, Macker JP, Cirincione GH: Internet-based mobile ad hoc networking. IEEE Internet Computing 1999, 3(4):63-70. 10.1109/4236.780962Lim S, Lee W-C, Cao G, Das CR: A novel caching scheme for improving internet-based mobile ad hoc networks performance. Ad Hoc Networks 2006, 4(2):225-239. 10.1016/j.adhoc.2004.04.013Opnet Modeler http://www.opnet.com/solutions/network_rd/modeler_wireless.htmlLacuesta R, Lloret J, Garcia M, Peñalver L: Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. Journal of Network and Computer Applications. In pres
Aplicación del aprendizaje basado en problemas (PBL) bajo un enfoque multidisciplinar: una experiencia práctica
Convergence process to European Higher Education Space involves using actives methods of teaching, that develops in students longlife learning, and make possible that they acquire abilities, skills, values and competences demands in professional word. One of these actives methods in learning is Problem Based Learning (PBL). This paper shows the experience done with these methods in the Escuela Universitaria Politécnica de Teruel. From initial specifications, students, working in team, identify their lack of training, make a workingplan and try to achieve the objectives of their project, always being supervised by professor. Student abilities more developed are self-learning and team working. The main problems are lack of work habit with this method and the students' necessities of help by professorsEl proceso de convergencia al Espacio Europeo de Educación Superior establece el uso de metodologías activas de aprendizaje, que desarrollen en el estudiante la capacidad de aprendizaje continuo y le permitan adquirir las capacidades, habilidades, valores y competencias demandadas en el mundo profesional. Uno de estos métodos activos del aprendizaje es el denominado Aprendizaje Basado en Problemas (ABP). El presente trabajo muestra la experiencia multidisciplinar realizada en la Escuela Universitaria Politécnica de Teruel mediante esta metodología. Partiendo de unos requisitos iniciales, los alumnos, agrupados en equipos de trabajo, identifican sus necesidades de formación, elaboran un plan de trabajo y buscan la consecución de los objetivos de su proyecto, siempre bajo la tutela del profesorado. Las capacidades más desarrolladas por los alumnos fueron el autoaprendizaje y el trabajo en equipo. Como aspectos de mejora, destacar la falta de hábito de trabajo mediante este método y la mayor necesidad de ayuda de los estudiantes por parte del profeso