Ingeniería de Sistemas
Recent Submissions
-
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEEUS, 2020)Acceso restringidoAuthentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ... -
Comparación de técnicas de machine learning para detección de sitios web de phishing
(Universidad de LimaPE, 2020)Acceso abiertoEl phishing es el robo de datos personales a través de páginas web falsas. La víctima de este robo es dirigida a esta página falsa, donde se le solicita ingresar sus datos para validar su identidad. Es en ese momento que ... -
Software in the Loop para la implementación de un sistema de piloto automático para aeronaves de ala fija
(Universidad de LimaPE, 2020)Acceso abiertoCuando se desea desarrollar y probar softwares para sistemas complejos, como aviones, transbordadores espaciales, satélites, automóviles o plantas nucleares, uno de los mayores inconvenientes es la gran complejidad, riesgos ... -
Revisión de literatura sobre las barreras a la transformación digital y su relación con el rendimiento financiero
(Universidad de LimaPE, 2020)Acceso abiertoLa transformación digital es una actividad que han venido adoptando las empresas para aprovechar los desarrollos tecnológicos digitales y mantenerse a la vanguardia empresarial rentablemente. El propósito del presente ... -
Letter to the Editor: COVID-19 Infections Do Not Change with Increasing Altitudes from 1,000 to 4,700 m
(Mary Ann LieberUS, 2020)Acceso abiertoCoronavirus disease (COVID-19) infection, after the first case reported in Wuhan, China, on December 31, 2019 and declared a pandemic by the World Health Organization in March 2020, has climbed by September 2nd to 26,076,572 ... -
Comparison of Classifiers Models for Prediction of Intimate Partner Violence
(SpringerCH, 2021)Acceso restringidoIntimate partner violence (IPV) is a problem that has been studied by different researchers to determine the factors that influence its occurrence, as well as to predict it. In Peru, 68.2% of women have been victims of ... -
Steganography Application Using Combination of Movements in a 2D Video Game Platform
(SpringerCH, 2021)Acceso restringidoSteganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ... -
Virtual Reality Application to Teach Dangerous Over Exposure to UV Radiation
(SpringerCH, 2021)Acceso restringidoThe high levels of ultraviolet (UV) radiation in Peru constitute a risk for the population, that does not give it the importance that it should and does not take adequate measures to protect against it and to prevent skin ... -
Content-Based Learning Object Recommendation System Using a User Profile Ontology for High School Students
(SpringerCH, 2021)Acceso restringidoThe lack of quality of education in Peruvian schools has caused young people to look for other ways to obtain information, of which the web stands out. However, this tool is made up of billions of web pages, which affects ... -
Matching System for Animal-Assisted Therapy Based on the Levenshtein and Gale-Shapley Algorithms
(SpringerCH, 2021)Acceso restringidoThis current research is based on the implementation of an algorithm that assigns pets, cats, or dogs to persons with depressive disorders such as low self-esteem. We found that even though different institutions have made ... -
Are information systems and computer science overlapping more and more?
(ACM Association for Computing MachineryUS, 2020)Acceso abiertoIn this research, we posit the importance of including Computer Science topics in undergraduate Information Systems courses. A review of the existing literature has mentioned the importance of learning some Computer Science ... -
Proofs of the undecidability of stegananalysis techniques
(SpringerCH, 2020)Acceso restringidoSteganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ... -
Dimensionality reduction via an orthogonal autoencoder approach for hyperspectral image classification
(The International Society for Photogrammetry and Remote SensingDE, 2020)Acceso abiertoNowadays, the increasing amount of information provided by hyperspectral sensors requires optimal solutions to ease the subsequent analysis of the produced data. A common issue in this matter relates to the hyperspectral ... -
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI)Suiza, 2020)Acceso abiertoBotnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ... -
Variaciones de los tiempos de reacción frente a cambios de perspectiva y tamaño de los estímulos 2D y 3D en atención selectiva
(Sociedad Mexicana de Ingenieria BiomedicaMéxico, 2020)Acceso abiertoFrente a un estímulo objetivo, las personas procesan mediante la atención selectiva antes de realizar toma de decisiones. Si ese estímulo sufre algún cambio en su configuración 2D o 3D, ¿en qué casos una persona reacciona ... -
High altitude reduces infection rate of COVID-19 but not case-fatality rate
(ElsevierPaíses Bajos, 2020)Acceso abiertoCoronavirus disease 19 (COVID-19) is a pandemic caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2). It is suggested that life at high altitude may reduce COVID infections and case-fatality rates ... -
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing MachineryEstados Unidos, 2020)Acceso abiertoTeaching design patterns has proved to be a complicated topic in software engineering courses. Practitioners require mastering this technique in order to develop higher-quality programs. As part of the experiment, we ... -
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic ProfessionalsEstados Unidos, 2020)Acceso abiertoIn the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ... -
SCUT sampling and classification algorithms to identify levels of child malnutrition
(SpringerSuiza, 2020)Acceso restringidoChild malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ... -
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline)Suiza, 2020)Acceso abiertoIn recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...