6 research outputs found

    A privacy-aware crowd management system for smart cities and smart buildings

    Get PDF
    Cities are growing at a dizzying pace and they require improved methods to manage crowded areas. Crowd management stands for the decisions and actions taken to supervise and control densely populated spaces and it involves multiple challenges, from recognition and assessment to application of actions tailored to the current situation. To that end, Wi-Fi-based monitoring systems have emerged as a cost-effective solution for the former one. The key challenge that they impose is the requirement to handle large datasets and provide results in near real-time basis. However, traditional big data and event processing approaches have important shortcomings while dealing with crowd management information. In this paper, we describe a novel system architecture for real-time crowd recognition for smart cities and smart buildings that can be easily replicated. The described system proposes a privacy-aware platform that enables the application of artificial intelligence mechanisms to assess crowds' behavior in buildings employing sensed Wi-Fi traces. Furthermore, the present paper shows the implementation of the system in two buildings, an airport and a market, as well as the results of applying a set of classification algorithms to provide crowd management information.This work was supported in part by the Spanish Government (MINECO) by means of the Project Future Internet Enabled Resilient CitiEs (FIERCE) under Grant RTI2018-093475-A-I00, and in part by the European Union’s Horizon 2020 Programme through the European project Federated CPS Digital Innovation Hubs for the Smart Anything Everywhere Initiative (FED4SAE) under Grant 761708

    A922 Sequential measurement of 1 hour creatinine clearance (1-CRCL) in critically ill patients at risk of acute kidney injury (AKI)

    Get PDF
    Meeting abstrac

    IoT infrastructure for passengers localization in airports terminals

    Get PDF
    RESUMEN: De la mano de la colaboración entre AENA y el Grupo de Ingeniería Telemática de la Universidad de Cantabria, en una fase en la evolución de la tecnología, donde el teléfono inteligente, la inteligencia artificial y la Internet de las Cosas se encuentran en continua evolución, surge este proyecto que persigue ubicar, en tiempo real, las concentraciones de viajeros y usuarios en el interior de una terminal aeroportuaria. A lo largo del trabajo se realiza el análisis, diseño y posterior validación del uso de dispositivos IoT en el interior de ciertas zonas aeroportuarias, con el objetivo último de poder realizar una actuación inteligente y eficaz en caso de darse una situación de emergencia o anomalía. Ello ha conllevado abordar diferentes aspectos del ciclo de vida de un proyecto de ingeniería. En particular, la elección de los componentes hardware y la implementación del algoritmo de detección, así como el desarrollo de la componente software encargada de dotar al sistema de la inteligencia que le permita estimar el número de personas presentes. Todo ello con las restricciones impuestas por la necesidad de operar en tiempo real.ABSTRACT: From the collaboration between AENA and the Network Planning and Mobile Communications Group of University of Cantabria, in a stage of technology evolution, in which the smartphone, artificial intelligence and Internet of Things (IoT) are constantly evolving, it rises this project that copes with the real time localization of passenger crowds inside an airport terminal. This project addresses the design, deployment and validation of the use of Internet of Things as the enabling technology supporting passenger’s localization inside airport terminals. The final aim is to provide real time monitoring tools which enable to fulfil the needs linked to emergency situations. This work has dealt with the different issues belonging to the life cycle of an engineering project. In particular, it has addressed the analysis of the best hardware technology fulfilling the requirements imposed by the use case. Furthermore, an in depth analysis of the detection and decision algorithms has been carried out. Last but not least, the integration of such developments as well as its validation have also been included as part of this project.Máster en Ingeniería de Telecomunicació

    Virtual lab applied to the cloud’s vulnerabilities study

    Get PDF
    RESUMEN: En el mundo actual se almacena gran cantidad de información en la nube. Mucha de ella es comprometida y protegerla es un punto importante. Este proyecto nace de la necesidad de encontrar un entorno seguro sobre el que probar los ataques que pueden explotar las vulnerabilidades que presenta. Durante su realización se han probado varios sistemas operativos que presentaban diferentes vulnerabilidades explotables, con la intención de encontrar uno que pueda actuar como servidor del sistema de almacenamiento de archivos, lo que actualmente se denomina servicios en nube. Posteriormente, con cada opción se ha realizado una réplica de un proceso de análisis de vulnerabilidades, o lo que se conoce como pentesting, con el fin de evaluar los sistemas y obtener una visión clara de las características de las diferentes herramientas disponibles. Para finalizar, se propone un entorno de laboratorio virtual que, cumpliendo la condición de seguridad comentadas, permite realizar ataques aprovechando diferentes tipos de vulnerabilidades asociadas a los diferentes sistemas víctimas.ABSTRACT: Nowadays, amount of information is collected in the cloud. Much of it is reserved and protect it is a meaningful point. This project born of the necessity to find a secure environment on which to test attacks that they be able to exploit vulnerabilities that this present. During the realization time, several operating systems that had different exploitable vulnerabilities had been used, with the target to find one that it will be able to be like server of file storage system, known as cloud services. Subsequently, with each option has been made a replica of a pentesting (penetration test), with the purpose of evaluate the systems and get a clear vision of the features of the different available tools. Finally, is proposed a virtual lab environment that according to the security conditions mentioned that let to do attacks taking advantage of different vulnerabilities associated to the prey systems.Grado en Ingeniería de Tecnologías de Telecomunicació

    Characteristics and predictors of death among 4035 consecutively hospitalized patients with COVID-19 in Spain

    No full text
    corecore