Ingeniería de Sistemas de Información: Recent submissions
Now showing items 41-60 of 69
-
A decision tree–based classifier to provide nutritional plans recommendations(IEEE Computer Society, 2022-01-01)The use of machine learning algorithms in the field of nutritional health is a topic that has been developed in recent years for the early diagnosis of diseases or the recommendation of better nutritional habits. People with poor diets are more prone to chronic diseases and, in the long term, this can lead to dead. This study proposes a model for the recommendation of nutritional plans using the decision tree technique considering the patient data, in complement with the BMI (Body Mass Index) and BMR (Basal Metabolic Rate) to evaluate and recommend the best nutritional plan for the patient. The algorithm used in the model was trained with a dataset of meal plan data assigned by specialists which were obtained from the Peruvian food composition table, and the data from the diets that were assigned and collected from the nutrition area of the Hospital Marino Molina Sccipa in Lima, Peru. Preliminary results of the experiment with the proposed algorithm show an accuracy of 78.95% allowing to provide accurate recommendations from a considerable amount of historical data. In a matter of seconds, these results were obtained using Scikit learn library. Finally, the accuracy of the algorithm has been proven, generating the necessary knowledge so that it can be used to create appropriate nutritional plans for patients and to improve the process of creating plans for the nutritionist.Acceso restringido temporalmente
-
Implementation of Lean Manufacturing Principles to increase Productivity in SMEs in the manufacturing sector of clothing(Association for Computing Machinery, 2022-01-12)SMEs in the textile sector face many problems in their production flows, mainly due to the lack of production management systems caused by poor management of the production chain. Therefore, a diagnostic analysis is carried out in a textile SME to evaluate and define the deficiencies and factors that affect its competitiveness, which began with the analysis of the current situation of the company, where it was established the existence of poor-quality management, high waiting times and lack of procedures. Therefore, the use of lean manufacturing tools such as Jidoka, Single Minute Exchange of Die with respect to the production line and process management for the measurement and control of operations in the production area is proposed. The incorporation of these tools in block allows to decrease the rates of defective products, the excess of operative work and the set-up of the machines for the change of model. The main result of the research was that production increased to 0.091 und/PEN.Acceso restringido temporalmente
-
Efficient Grocery Shopping Using Geolocation and Data Mining(IEEE Computer Society, 2022-01-01)In the current pandemic, people are looking to leave their houses less frequently to prevent getting infected, but the absence of an app that shows the necessary information before going to the supermarket forces people to look in different supermarkets for the products they want to buy, thus increasing their chances of catching the virus, not to mention the waste of money and time. DoremyS is an app that allows you to create shopping lists that indicate to the user which supermarket to visit to find every product in them; it uses Geolocation to recommend supermarkets that are near the user and Data Mining to recommend shopping lists based on the user's interests.Acceso restringido temporalmente
-
IoT Watercare: Water Quality Control System in Unofficial Settlements of Peru Based in an IoT Architecture(IEEE Computer Society, 2022-01-01)Many homes in the country of Peru, especially those located in unofficial settlements, are not connected to public service networks, and in the case of residential water, require tanker truck delivery. However, this water has often been contaminated from the upstream storage, conveyance and delivery systems that provide it, and thus will not comply with government water quality standards, ultimately compromising the health of the people who rely on it. While the topic of quality monitoring in traditional water networks has been studied, research has not focused on water quality control in under-developed and under-served unofficial settlements. This study introduces an IoT architecture and web-based system for real-Time monitoring of the key water quality parameters to help municipalities and other government entities to act early when large volumes of low-quality water are detected. The system proposed was implemented across five layers: capture, communication, processing, storage and presentation. Two experiments were conducted in a residential home with real time measurement of temperature, turbidity, TDS y pH. When comparing the results of both experiments, the pH parameter had a better precision with a 2% error rate. In addition, the survey results showed that the experts agree with the proposal.Acceso restringido temporalmente
-
Mobile Application: A Serious Game Based in Gamification for Learning Mathematics in High School Students(IEEE Computer Society, 2022-01-01)In the present study, a serious game based on gamification techniques was developed to motivate the learning of mathematical topics seen in the last academic grade of Peruvian high schools. The proposed game was developed for mobile devices and uses a cloud-based web infrastructure. In addition, gamification techniques such as avatar, levels, progress indicators and rewards were used for its design. A total of 14 students participated in the experiment and qualitative data were collected through a questionnaire. The results showed that the selected gamification techniques were very effective in motivating learning, the serious game had a good user experience, and the students were satisfied with the learning experience of the game.Acceso restringido temporalmente
-
An Investigation in Analyzing the Food Quality Well-Being for Lung Cancer Using Blockchain through CNN(Hindawi Limited, 2022-01-01)Deep learning (DL) is a new approach that provides exceptional speed in healthcare activities with greater accuracy. In this regard, "convolutional neural network"or CNN and blockchain are two important parts that together fasten the disease detection procedures securely. CNN can detect and predict diseases like lung cancer and help determine food quality, and blockchain is responsible for data. This research is going to analyze the extension of blockchain with the help of CNN for lung cancer prediction and making food safer. CNN algorithm has been trained with a huge number of images by altering the filters, features, epoch values, padding value, kernel size, and resolution. Subsequently, the CNN accuracy has been measured to understand how these factors affect the accuracy. A linear regression analysis has been carried out in IBM SPSS where the independent variables selected are image dataset augmentation, epochs, features, pixel size (90 × 90 to 512 × 512), kernel size (0-7), filters (10-40), and padding. The dependent variable is the accuracy of CNN. Findings suggested that a larger number of epochs improve the CNN accuracy; however, when more than 12 epochs are considered, the accuracy may decrease. A greater pixel/resolution also improves the accuracy of cancer and food image detection. When images are provided with excellent features and filters, the CNN accuracy improves. The main objective of this research is to comprehend how the independent variables affect the accuracy (dependent), but the reading may not be fully exact, and thus, the researcher has conceded out a minor task, which delivered evidence supportive of the analysis and against the analysis. As a result, it can be determined that image augmentation and a large number of images develop the CNN accuracy in lung cancer prediction and food safety determination when features and filters are applied correctly. A total of 10-12 epochs are desirable for CNN to receive 99% accuracy with 1 padding.Acceso abierto
-
Hybrid big bang-big crunch with ant colony optimization for email spam detection(World Scientific, 2022-04-01)Electronic mails (emails) have been widely adapted by organizations and individuals as efficient communication means. Despite the pervasiveness of alternate means like social networks, mobile SMS, electronic messages, etc. email users are continuously growing. The higher user growth attracts more spammers who send unsolicited emails to anonymous users. These spam emails may contain malware, misleading information, phishing links, etc. that can imperil the privacy of benign users. The paper proposes a self-adaptive hybrid algorithm of big bang-big crunch (BB-BC) with ant colony optimization (ACO) for email spam detection. The BB-BC algorithm is based on the physics-inspired evolution theory of the universe, and the collective interaction behavior of ants is the inspiration for the ACO algorithm. Here, the ant miner plus (AMP) variant of the ACO algorithm is adapted, a data mining variant efficient for the classification. The proposed hybrid algorithm (HB3C-AMP) adapts the attributes of B3C (BB-BC) for local exploitation and AMP for global exploration. It evaluates the center of mass along with the consideration of pheromone value evaluated by the best ants to detect email spam efficiently. The experiments for the proposed HB3C-AMP algorithm are conducted with the Ling Spam and CSDMC2010 datasets. Different experiments are conducted to determine the significance of the pre-processing modules, iterations, and population size on the proposed algorithm. The results are also evaluated for the AM (ant miner), AM2 (ant miner2), AM3 (ant miner3), and AMP algorithms. The performance comparison demonstrates that the proposed HB3C-AMP algorithm is superior to the other techniques.Acceso restringido temporalmente
-
A novel hybrid approach of gravitational search algorithm and decision tree for twitter spammer detection(World Scientific, 2022-05-01)With the increasing popularity of online social networking platforms, the amount of social data has grown exponentially. Social data analysis is essential as spamming activities and spammers are escalating over online social networking platforms. This paper focuses on spammer detection on the Twitter social networking platform. Although existing researchers have developed numerous machine learning methods to detect spammers, these methods are inefficient for appropriately detecting spammers on Twitter due to the imbalance of spam and nonspam data distribution, the involvement of diverse features and the applicability of data mechanisms by spammers to avoid their detection. This research work proposes a novel hybrid approach of the gravitational search algorithm and the decision tree (HGSDT) for detecting Twitter spammers. The individual decision tree (DT) algorithm is not able to address the challenges as it is unstable and ineffective for the higher level of favorable data for a particular attribute. The gravitational search algorithm (GSA) constructs the DTs with improved performance as the gravitational forces act as the information-transferring agents through mass agents. Moreover, the GSA is efficient in handling the data of higher dimensional search space. In the HGSDT approach, the construction of the DT and splitting of nodes are performed with the heuristic function and Newton's laws. The performance of the proposed HGSDT approach is determined for the Social Honeypot dataset and 1KS-10KN dataset by conducting three different experiments to analyze the impact of training data size, features and spammer ratio. The result of the first experiment shows the need of a higher proportion of training data size, the second experiment signifies the more importance of textual content-based features compared to the other feature categories and the third experiment indicates the requirement of balanced data to attain the effective performance of the proposed approach. The overall performance comparison indicates that the proposed HGSDT approach is superior to the incorporated machine learning methods of DT, support vector machine and back propagation neural network for detecting Twitter spammers.Acceso restringido temporalmente
-
Enterprise architecture based on TOGAF for the aof educational institutions to e-learning using the DLPCA Methodology and Google Classroom(Springer Science and Business Media Deutschland GmbH, 2022-01-01)Given the current situation of online classes, it is necessary to implement a Business Architecture model in order to facilitate the adaptation of virtual teaching, since 97.4% of teachers give up the use of information systems for learning. In addition, up to 80% of students experience stress with this new modality of learning. Based on this context, we can identify the gap in the adaptation to the virtual class process as a latent problem. Therefore, a model composed of 3 stages (Analysis, design, and validation) is proposed. Stage 1 includes the analysis of components on which the model will be developed. Stage 2 describes the Open Group Architecture Framework (TOGAF) on which the model will be developed, and the Discover, Learn, Practice, Collaborate, and Assignment (DLPCA) e-learning Methodology as the basis of the business process to be proposed. Finally, in stage 3, the model was validated in a private school in Lima with 70 students, 2 teachers, and 1 director, where it was shown that our proposal increased user satisfaction by 18.97%, positively increased adaptation to virtual classes by 28.50%, and also obtained a 75.34% acceptance of our proposal by the subjects of study, which shows the effectiveness of our solution to the problem.Acceso restringido temporalmente
-
Comparing the impact of internet of things and cloud computing on organisational behavior: a survey(Elsevier Ltd, 2022-01-01)Cloud computing is about delivery of different computing services involving databases, analytics, software, networking with the use of internet to enhance innovation, incorporate flexibility in resources and broaden profitability. However, Internet of Things (IoT) is an essential system for interrelating computer devices, digital machines, people and others which are offered with unique identifiers where data can be transferred with human involvement and wireless network. 42% of organisations in UK use cloud computing. The problem with cloud computing revolves around security and privacy issues as data is stored by a third party from inside or outside of the organisation leading to broken authentication, compromising of credentials and others. The use of IoT is vulnerable as it provides connectivity to devices, machines and people therefore, it needs to contain more storage that is made from cloud facilities. Survey has been conducted where primary quantitative method has been considered to obtain data from 101 managers of the organisation that has adopted cloud computing and IoT. However, 8 close-ended questions have been asked to 101 managers. Positivism philosophy has been used to make quantifiable observations along with descriptive design and others. The results and discussion will analyse responses of the respondents after conducting statistical analysis. However, research has been revolving around making a comparison between using cloud computing and IoT along with analysing organisational behaviour.Acceso restringido temporalmente
-
Intelligent gravitational search random forest algorithm for fake news detection(World Scientific, 2022-01-01)Online social media has made the process of disseminating news so quick that people have shifted their way of accessing news from traditional journalism and press to online social media sources. The rapid rotation of news on social media makes it challenging to evaluate its reliability. Fake news not only erodes public trust but also subverts their opinions. An intelligent automated system is required to detect fake news as there is a tenuous difference between fake and real news. This paper proposes an intelligent gravitational search random forest (IGSRF) algorithm to be employed to detect fake news. The IGSRF algorithm amalgamates the Intelligent Gravitational Search Algorithm (IGSA) and the Random Forest (RF) algorithm. The IGSA is an improved intelligent variant of the classical gravitational search algorithm (GSA) that adds information about the best and worst gravitational mass agents in order to retain the exploitation ability of agents at later iterations and thus avoid the trapping of the classical GSA in local optimum. In the proposed IGSRF algorithm, all the intelligent mass agents determine the solution by generating decision trees (DT) with a random subset of attributes following the hypothesis of random forest. The mass agents generate the collection of solutions from solution space using random proportional rules. The comprehensive prediction to decide the class of news (fake or real) is determined by all the agents following the attributes of random forest. The performance of the proposed algorithm is determined for the FakeNewsNet dataset, which has sub-categories of BuzzFeed and PolitiFact news categories. To analyze the effectiveness of the proposed algorithm, the results are also evaluated with decision tree and random forest algorithms. The proposed IGSRF algorithm has attained superlative results compared to the DT, RF and state-of-the-art techniques.Acceso restringido temporalmente
-
Data Visualization Techniques for Monitoring Real-Time Information of Cold Chain(Springer Science and Business Media Deutschland GmbH, 2021-01-01)Real-time monitoring of temperature is a critical factor in ensuring the integrity of food during the cold chain. In this work, we compare techniques related to real-time data visualization to contribute to more efficient monitoring of the cold chain. Three real-time data display attributes were evaluated, and we constructed a dataset based on the Frisbee database (CDD). In this paper, we proposed graphics containing different line and area techniques to be evaluated for a specialist. The proposed graphs contained the line and area techniques that, when performing the experiment, obtained a higher success rate compared to the auto-charting technique. However, it was evidenced that elements such as color facilitate the detection of anomalies and trends in temperature change due to its high percentage of effectiveness in the results.Acceso restringido temporalmente
-
Telepresence Technological Model Applied to Primary Education(Institute of Electrical and Electronics Engineers Inc., 2020-09-01)This research paper proposes a low-cost telepresence technological model focused on primary education. Its aim is to give students a new resource/communication channel for classes, which would be used when they cannot attend school due to health problems that do not affect their learning process. This solution seeks students to not be passive listeners during a session, but that they interact with their classmates and teachers during class. To validate the model, a telepresence platform based on WebRTC was developed. It was tested in three schools in different geographical areas belonging to socioeconomic sector C, collecting data from the students who tested the tool, as well as from classmates, teachers, and parents.Acceso restringido temporalmente
-
Prediction of financial product acquisition for Peruvian savings and credit associations(Institute of Electrical and Electronics Engineers Inc., 2020-09-30)Savings and credit cooperatives in Peru are of great importance for their participation in the economy, reaching in 2019, deposits and deposits and assets of more than 2,890,191,000. However, they do not invest in predictive technologies to identify customers with a higher probability of purchasing a financial product, making marketing campaigns unproductive. In this work, a model based on machine learning is proposed to identify the clients who are most likely to acquire a financial product for Peruvian savings and credit cooperatives. The model was implemented using IBM SPSS Modeler for predictive analysis and tests were performed on 40,000 records on 10,000 clients, obtaining 91.25% accuracy on data not used in training.Acceso restringido temporalmente
-
Blockchain-based Website Solution for Controlling the Authorized Sale of Drugs in Peru(Institute of Electrical and Electronics Engineers Inc., 2020-10-21)Drug counterfeiting or adulteration is a worldwide concern due to the serious consequences they generate, especially in the health and economic sectors. This concern is greater in Peru, as it is among the top five countries with drug counterfeiting incidents in the Americas, according to a study carried out in 2018 by the Pan American Health Organization. In this paper, we present our project, which aims at implementing a technological solution that provides reliable information on the origin and authenticity of these products in Peru to the drug consumer user, preserving the security and integrity of the exposed information using Blockchain technology. Likewise, it allows showing detailed drug characteristics, such as: composition, pharmaceutical form, active ingredients, among other relevant information. The technological solution, proposed by our project, aims at publishing the commercial origin of drugs from their sale in laboratories and distributors to the sale to the public in pharmacies. In the development of this paper, a bibliographic review of research on the use of blockchain technology is presented, as well as its benefits in the health sector, the architecture used by the system and the conceptual commercialization chain that supports it, and the qualitative and quantitative validation for the drug query service is shown.Acceso restringido temporalmente
-
Extended Model for the Early Skin Cancer Detection Using Image Processing(IEEE Computer Society, 2020-06-01)In this research paper, we proposed an extended model for the early detection of skin cancer... The purpose is reduce the waiting time to obtaining a diagnosis, in addition, the function of the dermatoscope has been digitized by using a Smartphone and magnifying lenses as an accessory the mobile device. The proposed model has five phases: 1. The patient is attended by a general practitioner or nurse previously trained in any health center which has WiFi or mobile network connectivity to record their data and capture the skin lesion that will be analyzed. 2) The image will be in the cloud storage, which at the same time feeds an exclusive access website of dermatologists.3) Images are analyzed in real time using an image recognition service provided by IBM, which is integrated into a cloud-hosted web platform and an-Android application. 4)The result of the image processing is visualized by the dermatologist who makes a remote diagnosis.5) This diagnosis is received by the general practitioner or nurse, responsible for transmitting the diagnosis and treatment to the patient. This model was validated in a group of 60 patients, where 28 suffer from skin cancer in the early stage, 12 in the late stage and 20 are healthy patients, in a network of clinics in Lima, Peru. The obtained result was 97.5% of assertiveness on the analyzed skin lesions and 95% in healthy patients.Acceso restringido temporalmente
-
Technological solution for the identification and reduction of stress level using wearables(IEEE Computer Society, 2020-06-01)In this article, a technological solution is proposed to identify and reduce the level of mental stress of a person through a wearable device. The proposal identifies a physiological variable: Heart rate, through the integration between a wearable and a mobile application through text recognition using the back camera of a smartphone. As part of the process, the technological solution shows a list of guidelines depending on the level of stress obtained in a given time. Once completed, it can be measured again in order to confirm the evolution of your stress level. This proposal allows the patient to keep his stress level under control in an effective and accessible way in real time. The proposal consists of four phases: 1. Collection of parameters through the wearable; 2. Data reception by the mobile application; 3. Data storage in a cloud environment and 4. Data collection and processing; this last phase is divided into 4 sub-phases: 4.1. Stress level analysis, 4.2. Recommendations to decrease the level obtained, 4.3. Comparison between measurements and 4.4. Measurement history per day. The proposal was validated in a workplace with people from 20 to 35 years old located in Lima, Peru. Preliminary results showed that 80% of patients managed to reduce their stress level with the proposed solution.Acceso restringido temporalmente
-
Information security risk management model for mitigating the impact on SMEs in Peru(IEEE Computer Society, 2020-06-01)This paper proposes an information security risk management model that allows mitigating the threats to which SMEs in Peru are exposed. According to studies by Ernst Young, 90% of companies in Peru are not prepared to detect security breaches, and 51% have already been attacked. In addition, according to Deloitte, only 10% of companies maintain risk management indicators. The model consists of 3 phases: 1. Inventory the information assets of the company, to conduct the risk analysis of each one; 2. Evaluate treatment that should be given to each risk, 3. Once the controls are implemented, design indicators to help monitor the implemented safeguards. The article focuses on the creation of a model that integrates a standard of risk management across the company with a standard of IS indicators to validate compliance, adding as a contribution the results of implementation in a specific environment. The proposed model was validated in a pharmaceutical SME in Lima, Peru. The results showed a 71% decrease in risk, after applying 15 monitoring and training controls, lowering the status from a critical level to an acceptable level between 1.5 and 2.3, according to the given assessment.Acceso restringido temporalmente
-
Technological Architecture with Low Cost Sensors to Improve Physical Therapy Monitoring(IEEE Computer Society, 2020-06-01)In this article, we propose a wireless monitoring solution for gait parameters using low-cost sensors in the physical rehabilitation of patients with gait disorders. This solution consists of infrared speed sensors (IRSS), force-sensing Resistor (FSR) and microcontrollers placed in a walker. These sensors collect the pressure distribution on the walker's handle and the speed of the steps during therapy session. The proposal allows to improve the traditional physiotherapy session times through a mobile application to perform the monitoring controlled by a health specialist in real time. The proposed solution consists of 4 stages: 1. Obtaining gear parameters, 2. Data transmission, 3. Information Storage and 4. Data collection and processing. Solution was tested with 10 patients from a physical rehabilitation center in Lima, Peru. Preliminary results revealed a significant reduction in the rehabilitation session from 25 to 5.2 minutes.Acceso restringido temporalmente
-
Matrix of guidelines to improve the understandability of non-expert users in process mining projects(IEEE Computer Society, 2020-06-01)Process Mining is a discipline that recognizes three types of analysis: Discovery, monitoring, and process improvement. Organizations are focusing on redesigning and automating their major processes, according to a report published in 2018 [1]. In this way, a challenge n process mining is to show the results of the process analysis in a way that is understandable to non-expert users. Therefore, this research paper introduces a matrix of guidelines to guide process mining specialists/tool developers to improve the results of the analysis in process mining projects. This matrix is composed of 2 study fields that throughout the literature have been merging their virtues. First, process mining under 2 of its 3 types of projects: (1) based on objectives and (2) based on questions. The last type is based on data (exploratory analysis). Second, visualization of data with its techniques to represent data graphically. This research proposes a matrix of guidelines that integrates the discipline of process mining and the set of data visualization techniques based on the purpose of each graph (technique), the question / objective to be achieved and the importance that colors take in the analysis results in the process mining projects.Acceso restringido temporalmente