Papers by Ponciano Jorge Escamilla-Ambrosio
Applied sciences, Jan 28, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
2001 European Control Conference (ECC), 2001
In this paper, after reviewing the traditional Kalman filter formulation, a development of a fuzz... more In this paper, after reviewing the traditional Kalman filter formulation, a development of a fuzzy logic-based adaptive Kalman filter is outlined. The adaptation is in the sense of adaptively tuning, on-line, the measurement noise covariance matrix R or the process noise covariance matrix Q. This improves the Kalman filter performance and prevents filter divergence when R or Q are uncertain. Based on the whiteness of the filter innovation sequence and employing the covariance-matching technique the tuning process is carried out by a fuzzy inference system. If a statistical analysis of the innovation sequence shows discrepancies with its expected statistics then a fuzzy inference system adjusts a factor through which the matrices R or Q are tuned on line. This fuzzy logic-based adaptive Kalman filter is tested on a numerical example. The results are compared with these obtained using a conventional Kalman filter and a traditionally adapted Kalman filter. The fuzzy logic-based adaptive Kalman filter showed better results than its traditional counterparts.
Communications in Computer and Information Science, 2020
Applied Sciences
This review identifies current machine-learning algorithms implemented in building structural hea... more This review identifies current machine-learning algorithms implemented in building structural health monitoring systems and their success in determining the level of damage in a hierarchical classification. The integration of physical models, feature extraction techniques, uncertainty management, parameter estimation, and finite element model analysis are used to implement data-driven model detection systems for SHM system design. A total of 68 articles using ANN, CNN and SVM, in combination with preprocessing techniques, were analyzed corresponding to the period 2011–2022. The application of these techniques in structural condition monitoring improves the reliability and performance of these systems.
Smart Cities, 2020
As part of the energy sustainability program intended to reduce the carbon footprint of the Natio... more As part of the energy sustainability program intended to reduce the carbon footprint of the National Polytechnic Institute, solar photovoltaic electricity generation systems along with electricity consumption reduction actions have been implemented in three entities. These actions were implemented in accordance with recommendations defined by environmental committees and considering the diagnoses of baseline energy consumption. This work reports the quantification of the savings generated by the implementation of operational measures of technological substitution and solar photovoltaic electric power generation. The foregoing includes a process of identification of the baseline of electricity consumption, the replacement of infrastructure and equipment of high energy consumption with equipment of low consumption and environmental impact, as well as the installation of technology for the generation of electrical energy by renewable sources. Three solar photovoltaic systems were installed, replacement of luminaires, replacement of hand dryers and replacement of obsolete air conditioning equipment. It was found that on average the reduction in monthly electricity consumption is 31% with the consequent economic savings. Regarding the reduction of the carbon footprint, an impact on non-generation of tonnes of CO2 equivalent amount 37% quantified with reference to the generation before the implementation of the operational and power generation measures. This is equivalent to not having generated 18.31 tCO2e per month. This work describes the activities carried out and the methodology used to calculate the savings found, both in energy consumption, economic, and in reducing the carbon footprint.
High gamma smartphones based on Android operating system support the development of third-party a... more High gamma smartphones based on Android operating system support the development of third-party applications. This kind of devices include subsystems such as sensors and actuators which can be used for diverse purposes. One example is the implementation of short range visible light communication (VLC) channels where the built-in light-emitting diode (LED) is the transmitter, and the complementary metal-oxide semiconductor (CMOS) camera works as the receiver. A major challenge for this communication channel is the modulation bandwidth of the light source which is limited to a few MHz, and the availability of a line-of-sight. The camera shutter is limited to a few frames per second (30 or 60 fps) for a few bits per second transmission, but the Rolling Shutter effect could allow the enhancement of the bit rate. In this work, we propose a VLC protocol design for the use of the built-in camera and the flash LED in order to implement a short range VLC channel, for high gamma mobile-to-mob...
2016 11th International Conference on Malicious and Unwanted Software (MALWARE), 2016
The use of Smartphones (SPs)with Android Operating System (AOS) has reached unprecedented popular... more The use of Smartphones (SPs)with Android Operating System (AOS) has reached unprecedented popularity. This is due to the many features that these devices offer as Internet connection, storage of information as well as the ability to perform diverse online transactions. As a result, these devices have become the main target of malware attacks that try to exploit the security vulnerabilities of AOS.Therefore, in order to mitigate these attacks, methods for malware analysis and detection are needed.In this work a method for analysis and detection of malware, which can run natively in the device, is proposed. The approach can analyze applications already installed on the device, monitor new apps installations or updates. Static analysis is used to determine the permissions, hardware and software features requested by applications. An application being analyzed is classified as malware or benign using a model based on ensemble machine learning classifiers and feature selection algorithms. To validate the proposed method, 1377 malware samples and 1377 benign samples, collected from different sources, were used.Results show that the proposed approach detects malware with 96.26%of accuracy. Additional tests were conducted in three different SPs devices to validate malware detection performance in a real environment andto obtain an average execution time. Results of these tests show that the proposed method detects malware with 94.48% of accuracy, getting the analysis results of an application in 35milliseconds.
During the day of October 7-8, the congress has invited experts from the sector of Smart Cities t... more During the day of October 7-8, the congress has invited experts from the sector of Smart Cities to organize a sectoral debate. This debate will be composed of prestigious companies in the sector, Public Administration, as well as specialized consultants. The aim is to give a business point of view around Smart Cities. CYTED is the Ibero-American Program of Science and Technology for Development, created by the governments of Ibero-American countries to promote cooperation on issues of science, technology and innovation for the harmonious development of Ibero-America. CYTED achieves its objectives through different financing instruments that mobilize Ibero-American entrepreneurs, researchers and experts and allow them to be trained and generate joint research, development and innovation projects. Thus, the countries that make up the CYTED Program are able to keep up to date with the most recent advances and scientific-technological developments.
During the day of October 7-8, the congress has invited experts from the sector of Smart Cities t... more During the day of October 7-8, the congress has invited experts from the sector of Smart Cities to organize a sectoral debate. This debate will be composed of prestigious companies in the sector, Public Administration, as well as specialized consultants. The aim is to give a business point of view around Smart Cities. CYTED is the Ibero-American Program of Science and Technology for Development, created by the governments of Ibero-American countries to promote cooperation on issues of science, technology and innovation for the harmonious development of Ibero-America. CYTED achieves its objectives through different financing instruments that mobilize Ibero-American entrepreneurs, researchers and experts and allow them to be trained and generate joint research, development and innovation projects. Thus, the countries that make up the CYTED Program are able to keep up to date with the most recent advances and scientific-technological developments.
2016 IEEE Colombian Conference on Communications and Computing (COLCOM), 2016
In this paper, novel hybrid methodologies for modal parameters extraction using Empirical Mode De... more In this paper, novel hybrid methodologies for modal parameters extraction using Empirical Mode Decomposition (EMD) based techniques combined with classic signal processing spectral analysis are presented. The modal frequencies are extracted by a methodology that combines EMD and Fast Fourier Transform (FFT). The damping factor is obtained by another methodology that uses FFT as a time-frequency estimator. The proposed methodologies were applied to real signals. Results have shown very good accuracy, precision, and low dispersion in comparison with other conventional methods.
2016 International Conference on Electronics, Communications and Computers (CONIELECOMP), 2016
Current pervasive usage of mobile devices around the world has rose big security and data protect... more Current pervasive usage of mobile devices around the world has rose big security and data protection concerns both into the application development process as into the data security field. Although the long way of development in PC security malware treatment in the computer science and industrial areas, mobile devices security research and development have proved that in this area malware treatment goes far beyond PC malware analysis and prevention techniques replication. In this context, this paper provides a description of a current open-ended project aimed to produce a 2-hybrid malware detection test framework. Based on the current trends of hybrid malware analysis, in this work the term 2-hybrid implies both a local(host)-remote(server/cloud) implementation and a static-dynamic analysis approach.
Microwave and Optical Technology Letters, 2011
This article presents the experimental characterization of a mechanically induced long-period fib... more This article presents the experimental characterization of a mechanically induced long-period fiber grating (MLPFG) array sensor for measuring the amplitude and width of an applied weight as well as detecting its position. The MLPFG array sensor consists of an ...
2016 4th International Conference in Software Engineering Research and Innovation (CONISOFT), 2016
The explosive growth of mobile technology has brought uncountable benefits to consumers, but it a... more The explosive growth of mobile technology has brought uncountable benefits to consumers, but it also presents new concerns and provides a platform for cybercrime. In the case of devices running the Android Operating System (OS), concerns have raised as Android has become a major OS in the market. Moreover, even though there have been efforts from Google and the Open Handset Alliance (OHA), among others, towards reducing the impact of security threats in Android, malicious attacks continue to increase in frequency and complexity. Interestingly, bad software development practices still are being considered a major surface attack provider, mainly due to the lack of knowledge or misuse of Android security features. Therefore, this work presents a Web tool, named GARMDROID, aimed to provide security information that will helps Android developers to identify insecure development aspects, saving them from the nuisances associated to the learning of specialized security analysis tools and techniques.
This research work concerns the development of novel adaptive multi-sensor data fusion (MSDF) arc... more This research work concerns the development of novel adaptive multi-sensor data fusion (MSDF) architectures which combine fuzzy logic, neuro-fuzzy and Kalman filtering techniques. A novel adaptive scheme of the Kalman filter employing the principles of fuzzy logic is presented (referred to as fuzzy logic-based adaptive Kalman filter- FL-AKF). The adaptation is in the sense of dynamically adjusting the measurement noise covariance matrix R and/or the process noise covariance matrix Q from data as they are obtained. An original hybrid MSDF architecture integrating the FL-AKF and a fuzzy logic performance assessment scheme is proposed (referred to as FL-AKF-FLA). This architecture merges the measurement vectors coming from multiple sensors and obtains a fused state-vector estimate which better reflects the actual value of the parameters being measured. The MSDF architectures based on the standard Kalman filter (SKF) are extended and developed by including the FL-AKF. As a result, three...
2020 IEEE Colombian Conference on Communications and Computing (COLCOM)
In this paper we present progress towards visual iconography (elements) and a grammar for Interne... more In this paper we present progress towards visual iconography (elements) and a grammar for Internet of Things (IoT) system representations and their cybersecurity requirements. Our visual representation of IoT systems aims to facilitate the identification of the IoT attack surface and the vulnerabilities that an attacker may exploit. The paper first outlines the basic visual elements and the associated grammar, which are then applied to a series of smart home IoT use cases to demonstrate how these can be used to represent these networks and their cybersecurity requirements in a visual and intuitive way. The motivation behind this work is to improve our ability to reason about IoT attack surfaces towards improving our defense capabilities for those systems.
Uploads
Papers by Ponciano Jorge Escamilla-Ambrosio