Ingeniería de Sistemas de Información
Recent Submissions
-
Predictive model based on machine learning for raw material purchasing management in the retail sector.(Association for Computing Machinery, 2024-06-28)Making raw material purchase forecasts for companies is very difficult and, if inadequately controlled, can affect the company's decision making and profitability. Currently, there are optimized systems or mathematical models to try to predict the demands and solve this problem. In this study, a raw material purchase prediction model is proposed that uses the Elastic Net algorithm to analyze historical sales and inventory data. The model is used to improve prediction accuracy, allowing SMEs to optimize inventories, reduce costs and improve efficiency. Experimental results indicate that the proposed model obtains better results in the MAE, RMSE and R2 indicators.Acceso restringido temporalmente
-
Predicting Smartphone Addiction in Teenagers: An Integrative Model Incorporating Machine Learning and Big Five Personality Traits(Science Publications, 2024-01-01)Smartphone addiction has emerged as a growing concern in society, particularly among teenagers, due to its potential negative impact on physical, emotional social well-being. The excessive use of smartphones has consistently shown associations with negative outcomes, highlighting a strong dependence on these devices, which often leads to detrimental effects on mental health, including heightened levels of anxiety, distress, stress depression. This psychological burden can further result in the neglect of daily activities as individuals become increasingly engrossed in seeking pleasure through their smartphones. The aim of this study is to develop a predictive model utilizing machine learning techniques to identify smartphone addiction based on the "Big Five Personality Traits (BFPT)". The model was developed by following five out of the six phases of the "Cross Industry Standard Process for Data Mining (CRISP-DM)" methodology, namely "business understanding," "data understanding," "data preparation," "modeling," and "evaluation." To construct the database, data was collected from a school using the Big Five Inventory (BFI) and the Smartphone Addiction Scale (SAS) questionnaires. Subsequently, four algorithms (DT, RF, XGB LG) were employed the correlation between the personality traits and addiction was examined. The analysis revealed a relationship between the traits of neuroticism and conscientiousness with smartphone addiction. The results demonstrated that the RF algorithm achieved an accuracy of 89.7%, a precision of 87.3% the highest AUC value on the ROC curve. These findings highlight the effectiveness of the proposed model in accurately predicting smartphone addiction among adolescents.Acceso abierto
-
Framework for the Adaptive Learning of Higher Education Students in Virtual Classes in Peru Using CRISP-DM and Machine Learning(Science Publications, 2024-01-01)During the COVID-19 pandemic, virtual education played a significant role around the world. In post-pandemic Peru, higher education institutions did not entirely dismiss the online education modality. However, this virtual education system maintains a traditional teaching-learning model, where all students receive the same content material and are expected to learn in the same way; as a result, it has not been effective in meeting the individual needs of students, causing poor performance in many cases. For this reason, a framework is proposed for the adaptive learning of higher education students in virtual classes using the Cross-Industry Standard Process for Data Mining (CRISP-DM) and Machine Learning (ML) methodology in order to recommend individualized learning materials. This framework is made up of four stages: (i) Analysis of student aspects, (ii) Analysis of Learning Methodology (LM), (iii) ML development and (iv) Integration of LM and ML models. (i) evaluates the student-related factors to be considered in adapting their learning content material. (ii) Evaluate which LM is more effective in a virtual environment. In (iii), Four ML algorithms based on the CRISP-DM methodology are implemented. In (iv), The best ML model is integrated with the LM in a virtual class. Two experiments were carried out to compare the traditional teaching methodology (experiment I) and the proposed framework (experiment 2) with a sample of 68 students. The results showed that the framework was more effective in promoting progress and academic performance, obtaining an Improvement Percentage (IP) of 39.72%. This percentage was calculated by subtracting the grade average of the tests taken at the beginning and end of each experiment.Acceso restringido temporalmente
-
AyudaMujer: A Mobile Application for the Treatment of Violence Against Women in Peru(Routledge, 2024-01-01)Violence against women in Peru is a problem that has a high incidence and is increasing, despite the policies undertaken by past governments and the creation of the Ministry of Women and Vulnerable Populations in 1996, causing that one in two women have been abused at some point in their lives. However, the treatment of abused women is still insufficient even though there are more Women’s Emergency Centers (WEC) each year, where victims can ask for professional support and treatment quickly and effectively. The chatbot provides an alternative to eliminate the distance between the abused woman and the WEC; therefore, a mobile application called AyudaMujer is proposed that includes a chatbot, news, a map of nearby WECs, and the connection with specialists for the treatment of violence against women. The chatbot identifies, automatically and through a natural dialogue, the type of violence and its level of risk. Additionally, it assigns a specialist to provide personalized professional treatment. The testing of AyudaMujer with 20 abused women from Lima, Peru, shows that the risk of violence is reduced by an average of 19.43% after three weeks of use. The results show that this tool can contribute to the treatment of abused women.Acceso abierto
-
Generator of User Interfaces for Mobile Applications from the Recognition of Patterns in Wireframes(International Institute of Informatics and Cybernetics, 2023-01-01)The importance of mobile development has significantly grown as technology becomes more accessible, leading to increased interconnectivity in society. To keep pace with evolving trends, businesses and companies allocate development departments to create mobile applications that meet current and ever-changing needs. However, developers often encounter numerous challenges during the software development cycle. One common issue is the conversion of wireframes, which are designed to meet functional requirements and engage customers, into functional GUI code. This manual conversion process can be cumbersome, slow, and error-prone, consuming valuable time that could be spent on developing other functionalities. This paper aims to address this problem by introducing a website that offers an automated alternative to the wireframe-to-graphic user interface transformation process. Leveraging pattern recognition and machine learning techniques, the website streamlines and accelerates the conversion, eliminating the need for manual coding. Furthermore, the paper presents the results of a questionnaire administered to a group of software developers specializing in mobile development. The developers were shown a demo of the website, and their feedback and responses are analyzed and discussed.Acceso restringido temporalmente
-
Competency Model for Product Owners and Product Managers(International Institute of Informatics and Systemics, IIIS, 2023-01-01)The objective of this article is to develop a competency model for Product Owners and Product Managers that enables them to perform successfully in their roles. The article goes through several stages, with the first being the study and analysis phase. In this stage, the problems, related work for the mentioned roles, and the literature used for the model design process will be analyzed. Subsequently, the competency model for Product Owners and Product Managers will be designed to establish the competencies that these roles should possess. This will also help companies in hiring qualified individuals for product development. Finally, the model will be validated through the evaluation of experts in the field, using virtual interviews and a Likert scale-based survey. These techniques will allow for the collection of quantitative data to support the validity of the model. © 2023 CISCI 2023 - Vigesima Segunda Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Vigesimo Simposium Iberoamericano en Educacion, Cibernetica e Informatica, SIECI 2023Acceso restringido temporalmente
-
Software for Generating Reports of Automated Tests Using RPA in Web Applications(International Institute of Informatics and Systemics, IIIS, 2023-01-01)Many companies have adopted the Agile methodology for software project implementation, which involves an iterative and incremental approach. This introduces changes to the software testing lifecycle, as the developed functionalities need to be validated in each iteration. Thus, to avoid manual testing and human error, test automation emerges as a technique for executing functional tests. However, automating tests and analyzing their results in Agile environments can be a complex process due to constantly changing requirements. Therefore, this study focuses on the development of software for generating reports of automated tests, presenting key performance indicators that measure the efficiency and effectiveness of the testing process. Additionally, RPA technology was used for the automation and execution of functional tests in web applications. Finally, the satisfaction level of the developed software was validated with a group of users, resulting in a 46.72% improvement in user perception regarding the ease of performing tasks with the proposed solution compared to the current context in their workplaces. © 2023 CISCI 2023 - Vigesima Segunda Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Vigesimo Simposium Iberoamericano en Educacion, Cibernetica e Informatica, SIECI 2023Acceso restringido temporalmente
-
Development of an Online Multiplayer RTS Video Game for Windows PC(International Institute of Informatics and Systemics, IIIS, 2023-01-01)In recent years, the video game industry has experienced significant growth, as a large portion of the global population has turned to gaming as a pastime during the COVID-19 pandemic. However, not all genres of video games have been part of this surge in popularity. This is the case for real-time strategy (RTS) games, whose popularity has been declining over time, despite the cognitive benefits they offer, such as improved information processing and visual cognitive enhancement. Therefore, the development of a multiplayer real-time strategy game for Windows PC called “Cosmic Crusade” is proposed. This game is designed to provide a quick understanding of its mechanics and gameplay. This article outlines the development procedures for the Cosmic Crusade video game and includes validation efforts aimed at confirming and ensuring user satisfaction with the game. © 2023 CISCI 2023 - Vigesima Segunda Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Vigesimo Simposium Iberoamericano en Educacion, Cibernetica e Informatica, SIECI 2023 - Memorias.Acceso restringido temporalmente
-
A Model for Tracking Indicators and Achieving Goals Under an Agile Approach Using Scrum and OKRs(International Institute of Informatics and Systemics, IIIS, 2023-01-01)Organizations across different industries are gradually transforming their operational approaches toward an agile mindset. This shift is driven by the need and demand in a constantly changing and competitive environment. One of the most well-known and adopted agility frameworks is Scrum, which advocates for activities with incremental value delivery. While Scrum offers a way to streamline team work, it doesn't necessarily guarantee success or ensure that teams are working on what truly matters. This work presents a model that combines Scrum with OKRs (Objectives and Key Results), allowing organizations to define relevant, challenging, and meaningful objectives while also specifying how progress toward these objectives will be measured through Key Results. OKRs contribute to focus and alignment so that teams implementing and working under the Scrum framework can make improvements to products, services, or operations and generate more value. Through validation using expert judgment and a Top Two Box analysis, it was determined that professionals perceive a high level of interest and potential in this proposal. © 2023 CISCI 2023 - Vigesima Segunda Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Vigesimo Simposium Iberoamericano en Educacion, Cibernetica e Informatica, SIECI 2023Acceso restringido temporalmente
-
Product Management Model for Entrepreneurship(International Institute of Informatics and Systemics, IIIS, 2023-01-01)After the COVID pandemic in 2019, the number of startups and entrepreneurship ventures grew exponentially. This article aims to develop a Product Management Model for Entrepreneurship, which allows users to have a better view of the company's financial status. The goal is to facilitate decision-making and optimal resource management. This research consists of several stages. In the first stage, an analysis of the environment and the current situation of the problem was conducted, along with a review of related research papers. Additionally, an analysis of the most important Product Management models currently in use was performed to understand the most relevant aspects and implement an innovative model. Following the study process, the foundational elements of the model were designed, including the metrics involved, as well as the relationships and connections between them, the projection time, and the financial values for simulating the model in a real-world scenario. Finally, the model will be validated by experts in the field through virtual interviews and a Likert scale-based survey. The quantitative data collected will support the validity of the model. © 2023 CISCI 2023 - Vigesima Segunda Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Vigesimo Simposium Iberoamericano en Educacion, Cibernetica e Informatica, SIECI 2023 - Memorias.Acceso restringido temporalmente
-
Implementation of a system for documentary procedures in public institutions applying Robotic Process Automation (RPA)(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)The research has shown that, in Peru, public institutions have a deficient service in document management, as a result, it generates loss of time, accumulation and low security of documents, which affects citizens. Therefore, this paper proposes to implement RPA technology through a web system, which has been developed, as objective of automating the workflow and avoiding performing repetitive tasks. This technological solution will generate great improvements for public institutions such as the reduction of the attention time for a procedure in order to prevent the dissatisfaction of citizens. The proposed solution is verified through evaluations based on the indicators presented. Finally, a considerable improvement was shown in the procedures, improving the experience of citizens and workers by reducing the attention time from 516 minutes to 490 minutes on average, which implies a saving of approximately 26 minutes, but it should be noted that the attention time for a procedure may vary depending on the type of procedure.Acceso restringido temporalmente
-
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.Acceso restringido temporalmente
-
Approach for Personalized Recommendations to Enhance Customer Service Process in Peruvian Restaurants using OpenAI Contextual Chatbot(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)In the current digital era, efficiently accessing relevant information is crucial for various applications such as restaurant recommendation systems, website searches, book recommendations, among others. This study presents an approach for personalized recommendations in improving the customer service process in restaurants using OpenAI's Contextual Chatbot. The approach consists of six phases: (1) Data preprocessing, (2) Embedding and storage, (3) Scheduled updating, (4) Document retrieval, (5) Context adaptation and request creation, and (6) Response generation. OpenAI's text embeddings are used to convert application data into vectors and store them in a vector database. These vectors are used to retrieve similar records and generate contextualized responses using the GPT-3.5 model. The chatbot's performance is evaluated in terms of accuracy and user satisfaction. Two scenarios were used in the experimentation: (a) with the proposed solution and (b) without the solution. The results demonstrated an operational efficiency of 86.67% with the proposed solution and the versatility of the proposed methodology, showcasing its potential for application in a wide range of domains, including websites, books, PDFs, and other forms of documentation.Acceso restringido temporalmente
-
Automation of the psychological care process in university students using machine learning(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)With the increase of the university population, the individual psychological care service by psychologists in universities has been affected. Which has caused discomfort among students to access the psychological consulting service. Therefore, this project aims to implement a data analysis system to control the psychological variables that affect university students, improving attention to them through the use of artificial intelligence (AI). We present a system that allows the visualization of data related to the mental health of the students who developed a psychological test, with which the psychologist will be able to diagnose the student's mental state and determine if he or she requires personalized attention. Finally, with this research, we achieved an improvement in the speed of attention and quality of service for the student.Acceso restringido temporalmente
-
Audit model using controls from ISO/IEC 27002 for the information security of electronic voting based on IoT and Blockchain(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)In recent years, significant progress has been made in the integration of technologies in voting systems with the aim of improving the transparency of the process. This study proposes an audit model based on the ISO/IEC 27002 standard to evaluate electronic voting systems that make use of Blockchain technology and the Internet of Things (IoT), with the aim of improving security in voting processes. To validate this model, an evaluation of the security control was carried out by applying this international standard to a voting system that integrates Blockchain and IoT. In our analysis of 6 security controls applied to the reality of electronic voting, the system passed all established tests; Therefore, it can be concluded that the risk of compromising system information has been significantly mitigated. This research contributes to the advancement of the security of electronic voting systems and provides a solid foundation for future developments in this field. The combination of emerging technologies and international standards promotes trust, security and therefore mitigates any risk of compromising an electronic voting system by following the best practices of the international standard ISO/IEC 27002.Acceso restringido temporalmente
-
Specialist-Woman Interaction System for Female Empowerment in Cases of Discrimination and Gender Violence(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)Gender violence and discrimination against women in Peru persist as a pressing social issue, demanding prioritized attention. Despite ongoing efforts, the prevalence of gender violence remains stubbornly high. A significant challenge in addressing this problem lies in the delayed reporting by victims to authorities or support organizations. On average, victims in Peru take 8 years and 8 months to report their ordeal, influenced by factors like fear of the aggressor, lack of information about available resources, and distrust in the justice system. In response, an integrated system has been developed to facilitate communication and support for victims. Comprising a cloud web platform and a virtual assistant, this system provides a secure and anonymous space for victims to share their concerns. The virtual assistant, or chatbot, serves as an intermediary, aiding victims in expressing their concerns and delivering pertinent information. Validation tests revealed that over 90% of participating women approved the chatbot as an effective means of interaction for obtaining information and scheduling appointments with specialists. This positive reception indicates that the system effectively fulfills its purpose of offering an accessible and confidential communication channel. Moreover, collaborating specialists have acknowledged the benefits of the system, noting its facilitation of regular tasks and improvement in patient interaction. Communication through the chatbot enhances specialists' understanding of victims' needs, contributing to more effective support.Acceso restringido temporalmente
-
Design of a Crowdlending System for Formalized SMEs Based on Smart Contracts in Metropolitan Lima(Institute of Electrical and Electronics Engineers Inc., 2023-01-01)In Metropolitan Lima, small and medium-sized enterprises (SMEs) face significant challenges in obtaining financing, primarily due to high interest rates and stringent requirements from traditional financial institutions. This research introduces a crowdlending system based on smart contracts backed by blockchain technology as a solution to these obstacles. A validation with end users was conducted, and the results obtained demonstrated an impressive compliance rate of 99%. This innovative approach provides a secure, transparent, and efficient environment, offering a robust solution to the financing needs of SMEs in the region.Acceso restringido temporalmente
-
Cybersecurity maturity model for the protection and privacy of personal health data(Institute of Electrical and Electronics Engineers Inc., 2022-01-01)This paper proposes a cybersecurity maturity model to assess the capabilities of medical organizations to identify their level of maturity, prioritizing privacy and personal data protection. There are problems such as data breaches, the lack of security measures in health information, and the poor capacity of organizations to handle cybersecurity threats that generate concern in the health sector as they seek to mitigate risks in cyberspace. The proposal, based upon C2M2 (Cybersecurity Capability Maturity Model), incorporates practices and controls which allow organizations to identify security gaps generated through cyberattacks on sensitive health patient data. This model seeks to integrate the best practices related to privacy and protection of personal data in the Peruvian legal framework through the Administrative Directive No. 294-MINSA and the personal data protection Act No. 29733. The model consists of 3 evaluation phases. 1. Assessment planning; 2. Execution of the evaluation; 3. Implementation of improvements. The model was validated and tested in a public sector medical organization in Lima, Peru. The preliminary results showed that the organization is at Level 1 with 14% of compliance with established controls, 34% in risk, threat and vulnerability management practices and 19% in supply chain management. These the 3 highest percentages of the 10 evaluated domains.Acceso restringido temporalmente
-
Traffic accident monitoring system using radio frequency identification tools(Institute of Electrical and Electronics Engineers Inc., 2022-01-01)This article proposes a system that allows monitoring car accidents with the use of NFC technology. The solution is comprised of low-cost Radio Frequency Identification (RFID) tools integrated into a mobile and web application that interact with the Google Maps API for efficient monitoring. The car accident reporting process collects and sends data manually through different service channels, which generates delays and, in some cases, the receipt of erroneous data. The proposed solution automates the accident reporting process by storing data from the users involved in the RFID tags and displaying them in the mobile and web applications, when generating a new report. Also, our application interacts with the Google Maps API to show the exact location from where accidents are reported, in order to speed up the process of attention by the PNP. The validation was carried out in the city of Lima, Peru. Preliminary results yielded data showing a 94% reduction in the accident reporting process and a 94% reduction in the average data capture time by the National Police of Peru (PNP).Acceso restringido temporalmente
-
Technological Model Based on Blockchain Technology for Genetic Information Protection in the Health Sector(Springer Science and Business Media Deutschland GmbH, 2023-01-01)In the health industry, the transparency of product data registration in the supply chain is a critical aspect in determining the source of genetic data. Various upcoming technologies, such as blockchain, can help with this challenge. Blockchain is a shared and immutable database that makes recording transactions and tracking assets in a commercial network easier. Currently, genetic information is regarded as a vital asset in the health sector, as more precise diagnostic samples in medical genomics enable improved treatments for patients suffering from a variety of disorders. Since actions connected to the storage or management of data might have several areas of vulnerability, this paper describes the development of a technological model employing Blockchain as technology to assure the protection of genetic information in the private health sector. Furthermore, unauthorized activities such as registration and access control in the exchange of genetic information have been carried out, primarily through entities that manage the eligibility of users with genomics information and grant access to specific data sets, demonstrating a lack of harmonization in access policies between the owners of genetic information and the health entities that manage it. A proof-of-concept was carried out to evaluate the model’s capabilities and ensure that a larger-scale deployment could be carried out. Experts agreed with our proposal, and consumers would be prepared to employ proof of concept to assure traceability and security of their data, according to the evaluation.Acceso restringido temporalmente