Ingeniería de Sistemas: Recent submissions
Now showing items 21-40 of 65
-
The EU Trustworthy Artificial Intelligence: How the EU Wants to Regulate the Artificial Intelligence Practices
(Universidad de Lima, 2021)Acceso abiertoThe European Union (EU) recently proposed in April 2021 an Artificial Intelligence legal framework. The EU highlights the advantages of using Artificial Intelligence (AI) especia-lly in prediction, optimizing operations, ... -
Análisis comparativo de métodos de machine learning para clasificar opiniones sobre el servicio de restaurantes peruanos en Facebook
(Universidad de Lima, 2021)Acceso abiertoLas opiniones de los clientes sobre servicios en redes sociales son vitales para las empresas debido a que se pueden utilizar para mejorar y potenciar las oportunidades de negocio si los comentarios pueden analizarse a ... -
Gamit!: Plataforma para la gamificación basada en un sistema de recompensas para estudiantes universitarios
(Universidad de Lima, 2022)Acceso abiertoLa gamificación es una técnica que permite utilizar en distintos contextos las que se presentan en los juegos. En la actualidad, existen varias iniciativas para aplicarla en contextos educativos, las cuales buscan impactar ... -
Desafíos del aprendizaje profundo en la visión por computador
(Universidad de Lima, 2022)Acceso abiertoLa visión por computador es un área de estudio en la inteligencia artificial que se enfoca en el desarrollo de técnicas computacionales para percibir el mundo a través de entradas visuales, como videos o imágenes. El ... -
Venciendo los desafíos para la inclusión de mujeres en STEM
(Universidad de Lima, 2022)Acceso abiertoLos cambios disruptivos en organizaciones y sociedades originados en áreas como la tecnología, economía y medioambiente desafían la flexibilidad de empresas e instituciones. En este contexto, se ha incrementado la demanda ... -
SER0 Tawa Pukllay: sistema educativo remoto online/offline
(Universidad de Lima, 2022)Acceso abiertoLa recuperación del conocimiento matemático inca a través del método Tawa Pukllay es un recurso de la alternancia semiótica que facilita el aprendizaje de la aritmética básica. Paralelamente, la educación rural presenta ... -
Phishing video game to validate the principles of persuasion in university students
(Association for Information Systems, 2021)Acceso restringidoPhishing is a social engineering procedure in which a malicious actor impersonates a trusted third party with the intention of tricking the user into disclosing confidential information. Research on social engineering has ... -
Blockchain and smart contract for donation traceability
(IEEE, 2021)Acceso restringidoIt has been observed that an organization that administers donations has problems controlling the flow of incoming and outgoing donations, as it does not have an accurate record of how many donations come in, how many go ... -
Humpback Whale’s Flukes Segmentation Algorithms
(Springer, 2021)Acceso restringidoPhoto-identification consists of the analysis of photographs to identify cetacean individuals based on unique characteristics that each specimen of the same species exhibits. The use of this tool allows us to carry out ... -
Is It Intelligent? A Systematic Review of Intelligence in the Most Cited Papers in IoT
(Springer, 2021)Acceso restringidoArtificial intelligence is a buzz word and even more when its accomplishments have challenged our intelligence. However, what is intelligence? Is there a consensus in its meaning for researchers and professionals? Is it ... -
The influence of digital transformation of the peruvian public sector on citizen trust
(26th Americas Conference on Information Systems, AMCIS 2020., 2020)Acceso restringidoDeveloping countries have been launching e-government projects; a number of them have, however, failed partially or completely, generating distrust in citizens. E-government implies an internal approach, which has been ... -
Gender gap in IT in Latin America
(26th Americas Conference on Information Systems, AMCIS 2020., 2020)Acceso abiertoThe underrepresentation of women in IT related majors such as computer science, computer engineering, and information systems (IS) has been evident all over the world. As a result, many private and public institutions have ... -
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)Acceso restringidoAuthentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ... -
Comparison of Classifiers Models for Prediction of Intimate Partner Violence
(Springer, 2021)Acceso restringidoIntimate partner violence (IPV) is a problem that has been studied by different researchers to determine the factors that influence its occurrence, as well as to predict it. In Peru, 68.2% of women have been victims of ... -
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(Springer, 2021)Acceso restringidoSteganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ... -
Virtual Reality Application to Teach Dangerous Over Exposure to UV Radiation
(Springer, 2021)Acceso restringidoThe high levels of ultraviolet (UV) radiation in Peru constitute a risk for the population, that does not give it the importance that it should and does not take adequate measures to protect against it and to prevent skin ... -
Content-Based Learning Object Recommendation System Using a User Profile Ontology for High School Students
(Springer, 2021)Acceso restringidoThe lack of quality of education in Peruvian schools has caused young people to look for other ways to obtain information, of which the web stands out. However, this tool is made up of billions of web pages, which affects ... -
Matching System for Animal-Assisted Therapy Based on the Levenshtein and Gale-Shapley Algorithms
(Springer, 2021)Acceso restringidoThis current research is based on the implementation of an algorithm that assigns pets, cats, or dogs to persons with depressive disorders such as low self-esteem. We found that even though different institutions have made ... -
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)Acceso restringidoSteganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ... -
Dimensionality reduction via an orthogonal autoencoder approach for hyperspectral image classification
(The International Society for Photogrammetry and Remote Sensing, 2020)Acceso abiertoNowadays, the increasing amount of information provided by hyperspectral sensors requires optimal solutions to ease the subsequent analysis of the produced data. A common issue in this matter relates to the hyperspectral ...