8 research outputs found

    Installation process and main functionalities of the Spin model checker

    Get PDF
    This document explains how to download and install all the software needed to properly run the Spin model checker and its user-friendly graphical user interface, called iSpin. It also offers a short tutorial which presents the main functionalities of Spin and explains briefly some basic concepts which are important to be able to use Spin through iSpin.Grupo de investigación MYDASS (Modelling & Development of Advanced Software Systems), TIC-230. Departamento de Lenguajes y Sistemas Informáticos (Universidad de Granada)

    Decision-making model for designing telecom products/services based on customer preferences and non-preferences

    Get PDF
    The design of the packages of products/services to be offered by a telecom company to its clients is a complex decision-making process that must consider different criteria to achieve both customer satisfaction and optimization of the company’s resources. In this process, Intuitionistic Fuzzy Sets (IFSs) can be used to manage uncertainty and better represent both preferences and non-preferences expressed by people who value each proposed alternative. We present a novel approach to design/develop new products/services that combines the Lean Six Sigma methodology with IFSs. Its main contribution comes from considering both preferences and nonpreferences expressed by real clients, whereas existing proposals only consider their preferences. By also considering their non-preferences, it provides an additional capacity to manage the high uncertainty in the selection of the commercial plan that best suits each client’s needs. Thus, client satisfaction is increased while improving the company’s corporate image, which will lead to customer loyalty and increased revenue. To validate the presented proposal, it has been applied to a real case study of the telecom sector, in which 2135 users have participated. The results obtained have been analysed and compared with those obtained with a model that does not consider the non-preferences expressed by users.Spanish Ministry of Science and Innovation (State Research Agency)Junta de Andalucia PID2019-103880RB-I00 PID2019-109644RB-I00 PY20_0067

    Aprendiendo los fundamentos de criptografía con ejemplos prácticos

    Get PDF
    Shab E Noor – Universidad de Granada - 0000-0003-0345-4692Ali Ahmad – Universidad de Granada - 0000-0001-5530-7374Vanessa Martos Núñez – Universidad de Granada - 0000-0001-6442-7968Miguel J. Hornos Barranco – Universidad de Granada - 0000-0001-5722-9816Recepción: 03.05.2022 | Aceptado: 09.05.2022Correspondencia a través de ORCID: Ali Ahmad - 0000-0001-5530-7374Área o categoría del conocimiento: Estudios de IngenieríaAbstract: Cryptography is a secure technique of data communication and exchange that relies on encryption and decryption protocols. This technique is in use since many centuries. Nonetheless, in today’s world, it supports data protection and privacy while ensuring the authenticity and confidentiality of the data. E-commerce, banking, military, and corporations are the prominent operators of this technology, although it is, directly or indirectly, linked to almost every single person nowadays. Symmetric and asymmetric key cryptography are the two fundamental forms of cryptography. Asymmetric key cryptography is more secure than symmetric but at the cost of greater computational complexity. The use of hash functions and digital signatures also contribute to the security of systems and the privacy of information. This article presents the basic differences between the fundamental types of cryptography as well as practical examples of encrypting information using various cipher systems, which will help to understand them. This is an introductory article that is primarily aimed at undergraduate students in the area of computer science, in order to enrich their understanding of the field.Resumen: La criptografía es una técnica segura de comunicación y de intercambio de datos que se basa en protocolos de cifrado y descifrado. Esta técnica se utiliza desde hace muchos siglos. No obstante, sirve para proteger los datos y la privacidad en el mundo actual, garantizando la autenticidad y la confidencialidad de los datos. El comercio electrónico, la banca, el ejército y las empresas son los principales operadores de esta tecnología, aunque hoy en día está vinculada, directa o indirectamente, a casi todas las personas. La criptografía de clave simétrica y asimétrica son las dos formas fundamentales de criptografía. La criptografía de clave asimétrica es más segura que la simétrica, pero a costa de una mayor complejidad computacional. El uso de funciones hash y firmas digitales también contribuye a la seguridad de los sistemas y a la privacidad de la información. Este artículo presenta las diferencias básicas entre los tipos fundamentales de criptografía, además de ejemplos prácticos de cifrado de información usando varios sistemas, que ayudará a comprenderlos. Se trata de un artículo introductorio que está principalmente dirigido a estudiantes de grado en el área de las ciencias de la computación, con el fin de enriquecer su comprensión del campo

    A Linguistic Multi-Criteria Decision Making Model Applied to the Integration of Education Questionnaires

    Get PDF
    We present a model made up of linguistic multi-criteria decision making processes to integrate the answers to heterogeneous questionnaires, based on a five-point Likert scale, into a unique form rooted in the widespread course experience questionnaire. The main advantage of having the resulting integrated questionnaire is that it can be incorporated into other course experience questionnaire surveys to make benchmarking among organizations. This model has been applied to integrate heterogeneous educational questionnaires at the University of Granada.European Union (EU) TIN2010-17876Andalusian Excellence Projects TIC-05299 TIC-599

    Validation of a development methodology and tool for IoT-based systems through a case study for visually impaired people

    Get PDF
    In this article, we validate the Test-Driven Development Methodology for Internet of Things (IoT)-based Systems (TDDM4IoTS) and its companion tool, called Test-Driven Development Tool for IoT-based Systems (TDDT4IoTS). TDDM4IoTS consists of 11 stages, including activities ranging from system requirements gathering to system maintenance. To evaluate the effectiveness of TDDM4IoTS and TDDT4IoTS, in the last four academic years from 2019, System Engineering students have developed several IoT-based systems as part of their training, from the sixth semester (third academic year). Ñawi (phonetically, Gnawi), which is the case study presented herein, is one of them, and intends to assist visually impaired people to move through open environments. Ñawi consists of a device, a mobile application and a web application. The device interacts with the environment and issues alerts to the user whenever it recognizes obstacles in their path. The mobile application targets two user roles: assisted person and caregiver. Assisted people can use the device and log in into a server when they leave home, so that the mobile application identifies and notifies obstacles in their path. All the collected data is gathered into the server, so that caregivers receive notifications and can monitor the location of their assisted people at any place and time. The web application allows caregivers to query and view more extensive information (details of events, trajectories, etc.). TDDM4IoTS has been evaluated regarding both the roles of the project members and the development cycle stages. A survey was used to evaluate the methodology. Out of a total of 47 respondents, 30 had used TDDM4IoTS and 96.66% of them were very satisfied or satisfied, with nobody unsatisfied

    A hybrid model for decision-making in the information and communications technology sector

    No full text
    The majority of businesses in the Information and Communications Technology (ICT) sector face decision-making problems on a daily basis. Most of these problems are based on contexts of uncertainty, where decisions are founded on qualitative information which may be imprecise or perception-based. In these cases, the information which is expressed by experts and users of evaluated services can be treated using processes of computing with words (CW). In this paper, we present a hybrid decision-making model especially designed for the ICT sector whereby the experts have the support of an intelligent system which provides information about the opinions of users related to those problems which are to be analysed. These opinions are obtained by using different mechanisms and techniques when users conduct business with the service provider. In addition, we employ a procedure for obtaining consensus between experts which enriches and strengthens the decision-making process.European Union (EU) TIN2012-38600 TIN2013-40658-PAndalusian Government TIC-599

    Development and Assessment of an Indoor Air Quality Control IoT-Based System

    Get PDF
    Good health and well-being are primary goals within the list of Sustainable Development Goals (SDGs) proposed by the United Nations (UN) in 2015. New technologies, such as Internet of Things (IoT) and Cloud Computing, can aid to achieve that goal by enabling people to improve their lifestyles and have a more healthy and comfortable life. Pollution monitoring is especially important in order to avoid exposure to fine particles and to control the impact of human activity on the natural environment. Some of the sources of hazardous gas emissions can be found indoors. For instance, carbon monoxide (CO), which is considered a silent killer because it can cause death, is emitted by water heaters and heaters that rely on fossil fuels. Existing solutions for indoor pollution monitoring suffer from some drawbacks that make their implementation impossible for households with limited financial resources. This paper presents the development of IdeAir, a low-cost IoT-based air quality monitoring system that aims to reduce the disadvantages of existing systems. IdeAir was designed as a proof of concept to capture and determine the concentrations of harmful gases in indoor environments and, depending on their concentration levels, issue alarms and notifications, turn on the fan, and/or open the door. It has been developed following the Test-Driven Development Methodology for IoT-based Systems (TDDM4IoTS), which, together with the tool (based on this methodology) used for the automation of the development of IoT-based systems, has facilitated the work of the developers. Preliminary results on the functioning of IdeAir show a high level of acceptance by potential users.Spanish Ministry of Science and Innovation (State Research Agency) PID2019-109644RB-I00Junta de Andalucia B-TIC-320-UGR2013th International Symposium on Ambient Intelligence (ISAMI 2022
    corecore