Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Octavio Nieto-Taladriz is active.

Publication


Featured researches published by Octavio Nieto-Taladriz.


IEEE Transactions on Education | 2006

A project-based learning approach to design electronic systems curricula

Javier Macias-Guarasa; Juan Manuel Montero; Rubén San-Segundo; Alvaro Araujo; Octavio Nieto-Taladriz

This paper presents an approach to design Electronic Systems Curricula for making electronics more appealing to students. Since electronics is an important grounding for other disciplines (computer science, signal processing, and communications), this approach proposes the development of multidisciplinary projects using the project-based learning (PBL) strategy for increasing the attractiveness of the curriculum. The proposed curriculum structure consists of eight courses: four theoretical courses and four PBL courses (including a compulsory Masters thesis). In PBL courses, the students, working together in groups, develop multidisciplinary systems, which become progressively more complex. To address this complexity, the Department of Electronic Engineering has invested in the last five years in many resources for developing software tools and a common hardware. This curriculum has been evaluated successfully for the last four academic years: the students have increased their interest in electronics and have given the courses an average grade of more than 71% for all PBL course evaluations (data extracted from students surveys). The students have also acquired new skills and obtained very good academic results: the average grade was more than 74% for all PBL courses. An important result is that all students have developed more complex and sophisticated electronic systems, while considering that the results are worth the effort invested


Computers & Electrical Engineering | 2007

Improving network security using genetic algorithm approach

Zorana Bankovic; Dušan Stepanović; Slobodan Bojanić; Octavio Nieto-Taladriz

With the expansion of Internet and its importance, the types and number of the attacks have also grown making intrusion detection an increasingly important technique. In this work we have realized a misuse detection system based on genetic algorithm (GA) approach. For evolving and testing new rules for intrusion detection the KDD99Cup training and testing dataset were used. To be able to process network data in real time, we have deployed principal component analysis (PCA) to extract the most important features of the data. In that way we were able to keep the high level of detection rates of attacks while speeding up the processing of the data.


IEEE Transactions on Instrumentation and Measurement | 2012

Wireless Measurement System for Structural Health Monitoring With High Time-Synchronization Accuracy

Alvaro Araujo; Jaime H. García-Palacios; Javier Blesa; Francisco Tirado; Elena Romero; Avelino Samartín; Octavio Nieto-Taladriz

Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability. A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges. Our contribution ranges from the hardware to the graphical front end. System goal is to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization. We reduce spatial jitter to 125 ns, far below the 120 μs required for high-precision acquisition systems and much better than the 10-μs current solutions, without adding complexity. The system is scalable to a large number of nodes to allow for dense sensor coverage of real-world structures, only limited by a compromise between measurement length and mandatory time to obtain the final result. The system addresses a myriad of problems encountered in a real deployment under difficult conditions, rather than a simulation or laboratory test bed.


IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2007

Improved Interval-Based Characterization of Fixed-Point LTI Systems With Feedback Loops

Juan A. López; Carlos Carreras; Octavio Nieto-Taladriz

Traditional approaches for fixed-point characterization are based on long simulations or additive noise models that do not show the nonlinear behavior of the quantization operations in reasonable time. In this paper, a novel interval-based approach that provides both tighter and faster results than the existing approaches is presented. It is based on a nonlinear adaptation of the quantization operations of affine arithmetic (AA). The results obtained with this method are compared to other published interval-based approaches, and the problem of interval oversizing is discussed in detail. Simulations show that: 1) the propagation techniques are not well suited to characterize the quantized linear systems with feedback loops; 2) the AA provides oversized bounds in this type of systems; and 3) the proposed adaptation does not provide guaranteed bounds as in the traditional interval-based computations, but it provides tighter estimates of the evolution in time of the ranges of the fixed-point signals and better runtime than the existing interval-based characterization techniques.


Information Sciences | 2007

Finding an internal state of RC4 stream cipher

Violeta Tomašević; Slobodan Bojanić; Octavio Nieto-Taladriz

The RC4 is a stream cipher widely deployed in software applications due to its simplicity and efficiency. The paper presents a cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for managing the information about its internal state. In order to find the initial state, the tree of general conditions is searched applying the hill-climbing strategy. The complexity of this attack is lower than that of an exhaustive search. The attack is derived from a general cryptanalytic approach for a class of table-shuffling ciphers, whose next-state function permutes the table entries. Incorporating the general conditions in the existing backtracking algorithm, the estimated complexity of the cryptanalytic attack is decreased below the best published result but the RC4 still remains a quite secure cipher in practice.


Iet Circuits Devices & Systems | 2008

Fast and accurate computation of the roundoff noise of linear time-invariant systems

Juan A. López; Gabriel Caffarena; Carlos Carreras; Octavio Nieto-Taladriz

From its introduction in the last decade, affine arithmetic (AA) has shown beneficial properties to speed up the time of computation procedures in a wide variety of areas. In the determination of the optimum set of finite word-lengths of the digital signal processing systems, the use of AA has been recently suggested by several authors, but the existing procedures provide pessimistic results. The aim is to present a novel approach to compute the round-off noise (RON) using AA which is both faster and more accurate than the existing techniques and to justify that this type of computation is restricted to linear time-invariant systems. By a novel definition of AA-based models, this is the first methodology that performs interval-based computation of the RON. The provided comparative results show that the proposed technique is faster than the existing numerical ones with an observed speed-up ranging from 1.6 to 20.48, and that the application of discrete noise models leads to results up to five times more accurate than the traditional estimations.


international symposium on systems synthesis | 1999

Bit-width selection for data-path implementations

Carlos Carreras; Juan A. López; Octavio Nieto-Taladriz

Specifications of data computations may not necessarily describe the ranges of the intermediate results that can be generated. However, such information is critical to determine the bandwidths of the resources required for a data-path implementation. We present a novel approach based on interval computations that provides, not only guaranteed range estimates that take into account dependencies between variables, but estimates of their probability density functions that can be used when some truncation must be performed due to constraints in the specification. Results show that interval based estimates are obtained in reasonable times and are more accurate than those provided by independent range computation, thus leading to substantial reductions in area and latency of the corresponding data-path implementation.


IEEE Transactions on Circuits and Systems Ii-express Briefs | 2006

Optimal combined word-length allocation and architectural synthesis of digital signal processing circuits

Gabriel Caffarena; George A. Constantinides; Peter Y. K. Cheung; Carlos Carreras; Octavio Nieto-Taladriz

In this brief, we address the combined application of word-length allocation and architectural synthesis of linear time-invariant digital signal processing systems. These two design tasks are traditionally performed sequentially, thus lessening the overall design complexity, but ignoring forward and backward dependencies that may lead to cost reductions. Mixed integer linear programming is used to formulate the combined problem and results are compared to the two-step traditional approach.


Journal of Network and Computer Applications | 2011

Improving security in WMNs with reputation systems and self-organizing maps

Zorana Bankovic; David Fraga; José Manuel Moya; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Elena Romero; Javier Blesa; Daniel Villanueva; Octavio Nieto-Taladriz

One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.


Journal of Circuits, Systems, and Computers | 2007

FPGA ACCELERATION FOR DNA SEQUENCE ALIGNMENT

Gabriel Caffarena; Carlos E. Pedreira; Carlos Carreras; Slobodan Bojanić; Octavio Nieto-Taladriz

In this paper, we present two new hardware architectures that implement the Smith–Waterman algorithm for DNA sequence alignment. Previous low-cost approaches based on Field Programmable Gate Array (FPGA) technology are reviewed in detail and then improved with the goal of increased performance at the same cost (i.e., area). This goal is achieved through low level optimizations aimed to adapt the systolic structure implementing the algorithm to the regular structure of FPGAs, essentially finding the optimum granularity of the systolic cells. The proposed architectures achieve processing rates close to 1 Gbps, clearly outperforming previous approaches. Comparing to the reported FPGA results of the computation of the edit-distance between two DNA sequences, throughput is doubled for the same clock frequency with a minimum area penalty. The design has been implemented on an FPGA-based prototyping board integrated into a bioinformatics system. This has allowed validating the approach in a real system (i.e., including I/O and database access), and comparing the proposed hardware solution to purely software approaches. As shown in the paper, the results are outstanding even for slow-rate buses.

Collaboration


Dive into the Octavio Nieto-Taladriz's collaboration.

Top Co-Authors

Avatar

Alvaro Araujo

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Carlos Carreras

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Gabriel Caffarena

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Elena Romero

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Juan A. López

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Slobodan Bojanić

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Javier Blesa

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Pedro Malagón

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

José Manuel Moya

Technical University of Madrid

View shared research outputs
Researchain Logo
Decentralizing Knowledge