Persona: Pastor Vargas, Rafael
Cargando...
Dirección de correo electrónico
ORCID
0000-0002-4089-9538
Fecha de nacimiento
Proyectos de investigación
Unidades organizativas
Puesto de trabajo
Apellidos
Pastor Vargas
Nombre de pila
Rafael
Nombre
24 resultados
Resultados de la búsqueda
Mostrando 1 - 10 de 24
Publicación A Cloud Game-based Educative Platform Architecture: the CyberScratch Project(MDPI, 2021) Utrilla, Alejandro; Tobarra Abad, María de los Llanos; Robles Gómez, Antonio; Pastor Vargas, Rafael; Hernández Berlinches, RobertoThe employment of modern technologies is widespread in our society, so the inclusion of practical activities for education has become essential and useful at the same time. These activities are more noticeable in Engineering, in areas such as cybersecurity, data science, artificial intelligence, etc. Additionally, these activities acquire even more relevance with a distance education methodology, as our case is. The inclusion of these practical activities has clear advantages , such as (1) promoting critical thinking and (2) improving students’ abilities and skills for their professional careers. There are several options, such as the use of remote and virtual laboratories, virtual reality and gamebased platforms, among others. This work addresses the development of a new cloud game-based educational platform, which defines a modular and flexible architecture (using light containers). This architecture provides interactive and monitoring services and data storage in a transparent way. The platform uses gamification to integrate the game as part of the instructional process. The CyberScratch project is a particular implementation of this architecture focused on cybersecurity game-based activities. The data privacy management is a critical issue for these kinds of platforms, so the architecture is designed with this feature integrated in the platform components. To achieve this goal, we first focus on all the privacy aspects for the data generated by our cloud game-based platform, by considering the European legal context for data privacy following GDPR and ISO/IEC TR 20748-1:2016 recommendations for Learning Analytics (LA). Our second objective is to provide implementation guidelines for efficient data privacy management for our cloud game-based educative platform. All these contributions are not found in current related works. The CyberScratch project, which was approved by UNED for the year 2020, considers using the xAPI standard for data handling and services for the game editor, game engine and game monitor modules of CyberScratch. Therefore, apart from considering GDPR privacy and LA recommendations, our cloud game-based architecture covers all phases from game creation to the final users’ interactions with the game.Publicación Cerebral ischemia detection using Deep Learning techniques(Springer, 2025-05-20) Pastor Vargas, Rafael; Antón‑Munárriz, Cristina; Haut, Juan M.; Robles Gómez, Antonio; Paoletti, Mercedes E.; Benítez Andrades, José Alberto; https://orcid.org/0000-0002-4089-9538Cerebrovascular accident (CVA), commonly known as stroke, stands as a significant contributor to contemporary mortality and morbidity rates, often leading to lasting disabilities. Early identification is crucial in mitigating its impact and reducing mortality. Non-contrast computed tomography (NCCT) remains the primary diagnostic tool in stroke emergencies due to its speed, accessibility, and cost-effectiveness. NCCT enables the exclusion of hemorrhage and directs attention to ischemic causes resulting from arterial flow obstruction. Quantification of NCCT findings employs the Alberta Stroke Program Early Computed Tomography Score (ASPECTS), which evaluates affected brain structures. This study seeks to identify early alterations in NCCT density in patients with stroke symptoms using a binary classifier distinguishing NCCT scans with and without stroke. To achieve this, various well-known deep learning architectures, namely VGG3D, ResNet3D, and DenseNet3D, validated in the ImageNet challenges, are implemented with 3D images covering the entire brain volume. The training results of these networks are presented, wherein diverse parameters are examined for optimal performance. The DenseNet3D network emerges as the most effective model, attaining a training set accuracy of 98% and a test set accuracy of 95%. The aim is to alert medical professionals to potential stroke cases in their early stages based on NCCT findings displaying altered density patterns.Publicación Forensic Analysis Laboratory for Sport Devices: A Practical Case of Use(MDPI, 2023) Donaire Calleja, Pablo; Robles Gómez, Antonio; Tobarra Abad, María de los Llanos; Pastor Vargas, RafaelAt present, the mobile device sector is experiencing significant growth. In particular, wear- 1 able devices have become a common element in society. This fact implies that users unconsciously 2 accept the constant dynamic collection of private data about their habits and behaviours. Therefore, 3 this work focuses on highlighting and analyzing some of the main issues that forensic analysts face 4 in this sector, such as the lack of standard procedures for analysis and the common use of private 5 protocols for data communication. Thus, it is almost impossible for a digital forensic specialist to 6 fully specialize in the context of wearables, such as smartwatches for sports activities. With the aim 7 of highlighting these problems, a complete forensic analysis laboratory for such sports devices is 8 described in this paper. We selected a smartwatch belonging to the Garmin Forerunner Series, due to 9 its great popularity. Through an analysis, its strengths and weaknesses in terms of data protection 10 are described. We also analyze how companies are increasingly taking personal data privacy into 11 consideration, in order to minimize unwanted information leaks. Finally, a set of initial security 12 recommendations for the use of these kinds of devices are provided to the reader.Publicación Analyzing the Users’ Acceptance of an IoT Cloud Platform using the UTAUT/TAM Model(Institute of Electrical and Electronics Engineers, 2021) Haut, Juan M.; Robles Gómez, Antonio; Tobarra Abad, María de los Llanos; Pastor Vargas, Rafael; Hernández Berlinches, RobertoAntonio Robles-Gómez, Llanos Tobarra, Rafael Pastor-Vargas, Roberto Hernández, Juan M. Haut; Título:; Publicación: . ISSN (https://doi.org/10.1109/ACCESS.2021.3125497);Publicación A Data-Driven Approach to Engineering Instruction: Exploring Learning Styles, Study Habits, and Machine Learning(IEEE Xplore, 2025-01-10) Isaza Domínguez, Lauren Genith; Robles Gómez, Antonio; Pastor Vargas, RafaelThis study examined the impact of learning style and study habit alignment on the academic success of engineering students. Over a 16-week semester, 72 students from Process Engineering and Electronic Engineering programs at the Universidad de Los Llanos participated in this study. They completed the Learning Styles Index questionnaire on the first day of class, and each week, teaching methods and class activities were aligned with one of the four learning dimensions of the Felder-Silverman Learning Styles Model. Lesson 1 focused on one side of a learning dimension, lesson 2 on the opposite side, and the tutorial session incorporated both. Quizzes and engagement surveys assessed short-term academic performance, whereas midterm and final exam results measured long-term performance. Paired t-tests, Cohen’s effect size, and two-way ANOVA showed that aligning teaching methods with learning styles improved students’short-term exam scores and engagement. However, multiple regression analysis indicated that study habits (specifically time spent studying, frequency, and scores on a custom-developed study quality survey) were much stronger predictors of midterm and final exam performance. Several machine learning models, including Random Forest and Voting Ensemble, were tested to predict academic performance using study behavior data. Voting Ensemble was found to be the strongest model, explaining 83% of the variance in final exam scores, with a mean absolute error of 3.18. Our findings suggest that, while learning style alignment improves short-term engagement and comprehension, effective study habits and time management play a more important role in long-term academic success.Publicación Easy Java Simulations: an Open-Source Tool to Develop Interactive Virtual Laboratories Using MATLAB/Simulink(TEMPUS Publications, The International Journal of Engineering Education: Especial issue on Matlab/Simulink in engineering education, 21, 5, 798-813, 2005, 2005-01-01) Esquembre Martínez, Francisco; Dormido Bencomo, Sebastián; Sánchez Moreno, José; Martín Villalba, Carla; Dormido Canto, Sebastián; Dormido Canto, Raquel; Pastor Vargas, Rafael; Urquía Moraleda, AlfonsoPublicación Alf : un entorno abierto para el desarrollo de comunidades virtuales de trabajo y cursos adaptados a la educación superior(2005-02-23) Raffenne, Emmanuelle; Aguado, M.; Arroyo, D.; Cordova, M. A.; Guzmán Sánchez, José Luis; Hermira, S.; Ortíz, J.; Pesquera, A.; Morales, R.; Romojaro Gómez, Héctor; Valiente, S.; Carmona, G.; Tejedor, D.; Alejo, J. A.; García Saiz, Tomás; González Boticario, Jesús; Pastor Vargas, RafaelAlf, entorno de trabajo, comunidades virtuales, enseñanza superiorPublicación A WoT Platform for Supporting Full-Cycle IoT Solutions from Edge to Cloud Infrastructures: A Practical Case(MDPI, 2020-07-05) Pastor Vargas, Rafael; Tobarra Abad, María de los Llanos; Robles Gómez, Antonio; Martín Gutiérrez, Sergio; Hernández Berlinches, Roberto; Cano, Jesús; MDPI; https://orcid.org/0000-0001-6926-1311Internet of Things (IoT) learning involves the acquisition of transversal skills ranging from the development based on IoT devices and sensors (edge computing) to the connection of the devices themselves to management environments that allow the storage and processing (cloud computing) of data generated by sensors. The usual development cycle for IoT applications consists of the following three stages: stage 1 corresponds to the description of the devices and basic interaction with sensors. In stage 2, data acquired by the devices/sensors are employed by communication models from the origin edge to the management middleware in the cloud. Finally, stage 3 focuses on processing and presentation models. These models present the most relevant indicators for IoT devices and sensors. Students must acquire all the necessary skills and abilities to understand and develop these types of applications, so lecturers need an infrastructure to enable the learning of development of full IoT applications. AWeb of Things (WoT) platform named Labs of Things at UNED (LoT@UNED) has been used for this goal. This paper shows the fundamentals and features of this infrastructure, and how the different phases of the full development cycle of solutions in IoT environments are implemented using LoT@UNED. The proposed system has been tested in several computer science subjects. Students can perform remote experimentation with a collaborativeWoT learning environment in the cloud, including the possibility to analyze the generated data by IoT sensors.Publicación Automated IoT vulnerability classification using Deep Learning(2025-07) Sernández Iglesias, Daniel; Enrique Fernández Morales,; Garcia Merino, Jose Carlos; Tobarra Abad, María de los Llanos; Pastor Vargas, Rafael; Robles Gómez, Antonio; Sarraipa, JoaoTechnological advancements in the development of low-power chips have enabled everyday objects to connect to the Internet, giving rise to the concept known as the Internet of Things (IoT). It is currently estimated that there are approximately 16 billion IoT connections worldwide, a figure expected to double by 2030. However, this rapid growth of the IoT ecosystem has introduced new vulnerabilities that could be exploited by malicious actors. Since many IoT devices handle personal and sensitive information, threats to these devices can have severe consequences. Moreover, a series of cybersecurity incidents could undermine public trust in IoT technology, potentially delaying its widespread adoption across various sectors.Common Vulnerabilities and Exposures records (also known by their acronym as CVEs) is a public cataloging system designed to identify and list known security vulnerabilities in software and hardware products. This system is developed and maintained by MITRE with the support of the cybersecurity community and sponsored by the U.S. Department of Homeland Security (DHS) through the Cybersecurity and Infrastructure Security Agency (CISA). CVE provides a reference database that enables security researchers, manufacturers, and organizational security managers to more effectively identify and address security issues.In our study, we have focused on CVEs exclusively oriented towards IoT systems, with the aim of analyzing the main vulnerabilities detected from 2010 to nowadays as a basis for detecting the main attack vectors in IoT systems. As part of this effort we have created the following dataset. CVEs records include various metrics such as: - Common Weakness Enumeration (CWE), mainly focused on technical classification of vulnerabilities. - Common Vulnerability Scoring System (CVSS), which reports about different metrics such as the attack vector, the severity of the vulnerability or the impact level of the exploitation of the vulnerability. This is one of the most informative metric. - Stakeholder-Specific Vulnerability Categorization (SSVC), oriented towards help cybersecurity team to handle properly the vulnerability. These metrics allow security teams on the one hand to prioritize, such vulnerabilities within their security program, evaluating efforts to mitigate them. But according to our analysis of our dataset, around the 14% of CVEs records do not contain any metric. Around the 83% of CVEs registries contain CWE metric (an ID or its textual description). This metric, as it is explained before, only reports about the type of vulnerability from a technic point of view. Only the 10% of CVEs registries contain SSVC metrics. And CVSS, in its different versions, appears only in the 40% of the studied CVEs registries. Additionally, most of studied records includes metrics a retrospectively, several weeks or months later the vulnerability is disclosed. Thus, cybersecurity teams must trust their previous knowledge in order to distinguish which vulnerabilities are relevant and which not.To tackled this situation, our proposal is focused in the application of Deep Learning techniques in order to classify the severity of CVE records from its textual description. Textual description is a mandatory field that is present in all CVEs records. To achieve this objective, we trained the BiLSTM algorithm using the CVE records with CVSS metrics and its description field; and performed a comparative study of different hyperparameter configurations to find the optimal configuration. The metrics for model evaluation that have been studied are accuracy, loss and F1-score.Publicación SiCoDeF² Net: Siamese Convolution Deconvolution Feature Fusion Network for One-Shot Classification(IEEE, 2021) Kumar Roy, Swalpa; Kar, Purbayan; Paoletti, Mercedes E.; Haut, Juan M.; Pastor Vargas, Rafael; Robles Gómez, AntonioNowadays, deep convolutional neural networks (CNNs) for face recognition exhibit a performance comparable to human ability in the presence of the appropriate amount of labelled training data. However, training CNNs remains as an arduous task due to the lack of training samples. To overcome this drawback, applications demand one-shot learning to improve the obtained performances over traditional machine learning approaches by learning representative information about data categories from few training samples. In this context, Siamese convolutional network ( SiConvNet ) provides an interesting deep architecture to tackle the data limitation. In this regard, applying the convolution operation on real world images by using the trainable correlative Gaussian kernel adds correlations to the output images, which hinder the recognition process due to the blurring effects introduced by the convolution kernel application. As a result the pixel-wise and channel-wise correlations or redundancies could appear in both single and multiple feature maps obtained by a hidden layer. In this sense, convolution-based models fail to generalize the feature representation because of both the strong correlations presence in neighboring pixels and the channel-wise high redundancies between different channels of the feature maps, which hamper the effective training. Deconvolution operation helps to overcome the shortcomings that limit the conventional SiConvNet performance, learning successfully correlation-free features representation. In this paper, a simple but efficient Siamese convolution deconvolution feature fusion network ( SiCoDeF 2 Net ) is proposed to learn the invariant and discriminative complementary features generated from both the (i) sub-convolution (SCoNet) and (ii) sub deconvolutional (SDeNet) networks using a concatenation operation which significantly improves the one-shot unconstrained facial recognition task. Extensive experiments performed on several widely used benchmarks, provide promising results, where the proposed SiCoDeF 2 Net model significantly outperforms the current state-of-art in terms of classification accuracy, F1, precision and recall. The code will be available on: https://github.com/purbayankar/SiCoDeF2Net .
- «
- 1 (current)
- 2
- 3
- »