Volumen 7 No. especial (2016) - TIC.EC: Congreso Ecuatoriano de Tecnologías de la Información y Comunicaciones
Permanent URI for this collectionhttps://dspace-test.ucuenca.edu.ec/handle/123456789/26299
Browse
Browsing Volumen 7 No. especial (2016) - TIC.EC: Congreso Ecuatoriano de Tecnologías de la Información y Comunicaciones by Issue Date
Now showing 1 - 20 of 23
- Results Per Page
- Sort Options
Item Los PLE’s en el desarrollo de competencias cognitivas desde la metodología sistémica en estudiantes universitarios(Universidad de Cuenca, 2016-11-16) Silva Castillo, Jorge; Estrada García, JesúsThe research focused on the evaluation of the application of personal learning environments to first semester students of the Biology and Chemistry program at the Universidad Nacional de Chimborazo (UNACH), with respect to the development of cognitive competencies based on a systemic methodological approach. The research design was quasi experimental and applied. Initially, through surveys it was diagnosed that 78,3% of students possessed a medium level of digital competencies that directly influenced the low level of cognitive competencies. At the end of the research it was found that students positively improved the creation and application of their own personal learning environments (PLE’s), given the applied systematic methodology that combines the hybrid way of virtual classroom, the e-portfolio and the web 2.0 tools, conceptualized and related about the Bloom’s Taxonomy. Data analysis yielded the arithmetic mean with the best PLE-output score and resulted with respect to the PLE-input in a difference of 29,261 points, equivalent to an improvement of 69,6% in cognitive competencies at the end of academic period. The findings suggest that students in their academic and professional career should continuously apply PLE’s like methodologies.Item Análisis del direccionamiento IPv6 y estudio de los Protocolos de Enrutamiento orientados a IPv6(Universidad de Cuenca, 2016-11-16) Patiño Sánchez, Jose RobertoThis paper presents the results of a comparative analysis of routing protocols in IPv6 by experimental evidence, for which network topologies were designed based on the knowledge obtained in IPv4. In the tests, features were examined such as convergence, reliability, scalability and latency. In addition, the hardware used to choose the appropriate equipment for a production environment were compared. The laboratory procedures performed are described, identifying the advantages and disadvantages of an IGP over another, monitoring network performance and finally analyzing the results obtained in the different tests, both in distance vector protocols and state link. As part of the study, the IPv6 addressing was analyzed, its main features, package structures, address format, static IPv6 routing, hardware and software required for its implementation. A review of each of the IGP's was conducted, starting with the distance vector (RIPng and EIGRP) and continuing with link-state (IS-IS and OSPFv3), checking operation, configuration, analysis and update routing tables.Item Detección de patologías de la mama mediante filtros multirresolución(Universidad de Cuenca, 2016-11-16) Pérez, María G.; Benalcazar, Marco; Conci, Aura; Fiallos, CarlosMammography is considered as the gold standard examination for early detection of breast cancer. However, in the techniques of medical image analysis 3 aspects are yet an issue: noise removal, segmentation of images, and extracting the region of interest (ROI). This work presents a survey of breast mammography and the preliminary results corresponding to a method for the automatic detection of breast anomalies in mammography images using histogram transformation, contrast enhancement and Quadrature Mirror Filter (QMF) banks. The QMF filters are preceded by an advanced tree structured nonlinear filter for noise suppression. Several multiresolution methods are reported for feature extraction in breast cancer using digital mammography. The initial approach is directed to malignant diseases, such as microcalcification clusters, present in mammograms, using initially two or three channels for the multiresolution decomposition.Item Automatización del proceso de despliegue de servicios en la nube(Universidad de Cuenca, 2016-11-16) Zuñiga-Prieto, Miguel; Solano-Quinde, Lizandro; Insfran, Emilio; Cabrera, YesseniaThe lack of standardization of the access methods and the management of resources in cloud environments hinders both, the portability of services between different cloud environments, and the agile deployment of services. In this context, it is important to reduce the deployment time in order to reduce the economic cost to organizations. The manuscript presents an approach for automating the deployment process of cloud services, by proposing a language that specifies the resource needs in cloud environments, in support to the logic of cloud services. The information about requirements is used for generating resource provisioning scripts and service configurations, both, specific to the deployment platform. This approach is applied to a case study in the Windows Azure© platform, used as a deployment environment and the development of a deployment script based on the cloud resource specification.Item Guía referencial para el manejo de QoS en redes WLAN prioritizando tráfico(Universidad de Cuenca, 2016-11-16) Granizo R., Angela V.; Tacuri, Alex A.The implementation of QoS policies can address various points depending on the requirements of the WLAN; for example, the allocation of bandwidth in a differentiated way, avoiding or managing congestion on the network, managing priorities according to the type of traffic, etc. As a function of the analysis of the traffic, QoS policies can be established that enable the prioritization of the traffic type (http, ftp, ssh) according to the user needs in line with the objective of the WLAN. To do this a WLAN scenario is performed without prioritization of traffic and with traffic prioritization, using an application designed to manage service quality in wireless networks: FROTTLE, software for analysis of traffic on the WLAN as ntop, wireshark, program echoping, hping3. The results obtained allow us to demonstrate the improved quality of service to prioritize traffic so that the indicators show satisfactory levels. A reference guide was developed to manage the quality of WLAN service based on a prioritization of traffic.Item Aplicación Facebook para la gestión de objetos de aprendizaje en redes sociales(Universidad de Cuenca, 2016-11-16) León, Diego; Fernández, Félix; Urrutia, PilarWith the evolution of Facebook into a platform, the objective of this work was to evaluate how reliable is it to build a Facebook application for managing learning objects in social media. The paper provides a description of the design and implementation of the proposal, and the analysis of the main contributions. The results of the study are twofold: The flexibility of the Facebook was demonstrated and the convergence of both, data and programming languages, was corroborated. The developed application is easily integratable in the canvas of Facebook and implemented using JavaScript as data and programming language in the client and server layers of the software architecture. The developed application enhances the management of learning objects in the environment of Facebook, providing the benefits of the creation of interest groups and the social actions enhancing the usability of learning objects.Item Generación de librerías de código base para autenticación a través de certificados SSL generados automáticamente utilizando Java(Universidad de Cuenca, 2016-11-16) Vargas, Javier; Guevara, David; Mayorga, Franklin; Sánchez, Franklin; Díaz, DanieLThis paper describes the processes involved in the creation and evaluation of a Tool for Automatic Generation of Security Infrastructure in Communications using Java. Incorporation of security services in the source code of distributed applications is not that easy and requires, on the one hand the creation of a manual for the security of infrastructure based on digital certificates of public and private OpenSSL keys, and/or security stores. On the other hand, the application developer must incorporate manually in the source code the functions and/or procedures that proproperly manage certificates, keys and stores, to secure automatic implementation of the security services.Item Arquitectura para una red de sensores web basada en SWE (Sensor Web Enablement): caso de estudio para la implementación en sensores hidrometeorológicos(Universidad de Cuenca, 2016-11-16) Muñoz Guillén, Lissette; Medina Cartuche, José; Guillermo Aungüisaca, Juan; Veintimilla-Reyes, JaimeThe growth of information and communication technologies associated with the needs to access immediately information generated by different sensors made the implementation and the use of communication protocols to acquire and interchange data necessary. In this sense, Sensor Web Enablement (SWE) developed by OGC (Open Geospatial Consortium) and each of its components constitute the most appropriate tool to achieve this goal. This research project proposes an architecture based in SWE that allows to access in real-time sensors belonging to a hydro-meteorological network. The architecture has been verified and validated through the implementation of a case study, using the hydrometeorological station “Marianza” located in the Azuay province; station run by PROMAS (Programa para el Manejo del Agua y el Suelo).Item Automatic RDF-ization of big data semi-structured datasets(Universidad de Cuenca, 2016-11-16) Gualán, Ronald; Freire, Renán; Tello, Andrés; Espinoza, Mauricio; Saquicela Galarza, Víctor HugoLinked data adoption continues to grow in many fields at a considerable pace. However, some of the most important datasets usually remain underexploited because of two main reasons: the huge volume of the datasets and the lack of methods for automatic conversion to RDF. This paper presents an automatic approach to tackle these problems by leveraging recent Big Data tools and a program for automatic conversion from a relational model to RDF. Overall, the process can be summarized in three steps: 1) bulk transfer of data from different sources to Hive/HDFS; 2) transformation of data on Hive to RDF using D2RQ; and 3) storing the resulting RDF in CumulusRDF. By using these Big Data tools, the platform will cope with the handling of big amounts of data available in different sources, which can include structured or semi-structured data. Moreover, since the RDF data are stored in CumulusRDF in the final step, users or applications can consume the resulting data by means of web services or SPARQL queries. Finally, an evaluation in the hydro-meteorological domain demonstrates the soundness of our approach.Item An empirical performance evaluation of a semantic-based data retrieving process from RDBs & RDF data storages(Universidad de Cuenca, 2016-11-16) Tabares Martín, Leandro; Fernández Peña, Félix Oscar; Leiva Mederos, Amed Abel; Nummenmaa, JyrkiSQL and, more recently, SPARQL are standard languages of the software industry for retrieving data. Other studies showed that retrieving data by using a SPARQL query is much slower than the semantically equivalent SQL query. Nevertheless, some recent proposals optimized database servers for SPARQL queries. This paper presents the results of a comparative analysis between the capability of SQL and SPARQL with respect to the retrieval of data from a relational database and RDF-triples. A free and open source-based scenario was constructed by using PostgreSQL and Virtuoso for storing data, and RETRI, a data retrieving software built in JavaScript which displays data views in a specific XML format. Open data from the British National Library Bibliographic Data Set were used in the experiment; results were analyzed from a performance perspective.Item Heuristic evaluations: app movil para evaluaciones heurísticas de la usabilidad e ISO25010(Universidad de Cuenca, 2016-11-16) Sánchez León, Nayibe S.; Rivera Guzmán, Melissa; Moreno Vargas, Angie L.; Díaz Molina, MónicaThe evolution in technology led to a new trend in the development of software, from desktop applications to mobile web environment, enabling people with different physical and cognitive conditions to access those facilities. The quality level of these programs should be excellent, as there are a number of users with varied needs, abilities and complex skills. The purpose of this research was (a) to better understand the criteria that must be taken into consideration to achieve the design of usable software, and (b) the development of a tool that conducts automatic heuristic evaluations of the usability and of the User Centered Design (UCD) for web and mobile applications. As methodological paradigm for research we used a qualitative and quantitative approach, using methods and techniques of inquiry. The research was descriptive-propositional. For the development of the mobile application, the team took the decision to schedule under the methodological object-oriented paradigm and methodology that guided the development of the project, the Rational Unified Process (RUP). The research resulted into the development of three instruments for heuristic evaluations, and a mobile application that includes such tests and statistically determines the level of compliance of the ISO25010 and the usability of the principles of Nielsen. In conclusion, Heuristic Evaluation is a mobile application that can serve as a tool for the delivery of statistical results on the principles of usability and standards.Item Análisis y comparación de la seguridad utilizando dos protocolos de enrutamiento para IPv6(Universidad de Cuenca, 2016-11-16) Patiño Sánchez, Jose RobertoIn the next years, IPv6 will inevitably replace the IPv4 protocol. Although, taking consciousness about technical details and aspects of security of the “new” protocol, the protocol is poorly applied in administrator’s networks of different Ecuadorian companies. The security attacks to the IPv4 protocol, illustrating the vulnerabilities of networks, are likely also happening in IPv6, and that is why we evaluated the response of two IPv6 protocols against security attacks. Two virtual networks were designed and implemented, conformed by routers and hosts. The first one was configured with the OPSFv3 protocol and the second with RIPng. We used a server-client model, where clients share information with the server databases, interacting with the services. The implemented network model simulated a business environment, where each node connected to the network represented different branches and matrices that a company could have. Different types of attacks to the network were performed and the response from both were measured, taking into consideration the following parameters: availability, integrality and confidentiality. The statistical interpretation of the tests provided insight on how security operates in IPv6. This knowledge could serve as a source of information for network administrators on the security susceptibility of the IPv6 protocol.Item Accesibilidad a la información y la inclusión social de personas con discapacidad visual(Universidad de Cuenca, 2016-11-16) Martínez Bonilla, Carlos; Silva Silva, Ricardo; Naranjo Gamboa, ByronTechnological advances and the evolution of the media, especially the Internet, facilitates the transfer of messages to and between people, in particular between people with visual disabilities. The project presented herein determined the accessibility to information of people with visual disabilities and its effect on their social integration in the province of Tungurahua; with the overall objective to identify methodological strategies, including the integration of ICT tools, that will enhance communication, accessibility to information and social inclusion, leading ultimately in an improvement of the quality of life. Important features and guidelines to develop communication and accessibility, not only with people possessing visual disability, were obtained through a quantitative and bibliographic survey of the field resulting in important features to reach and improve communication. Along the survey better ideas were generated on how to live better with this disabled group of the society.Item Ontología DHARMA para la construcción de arquitectura de sistemas empresariales(Universidad de Cuenca, 2016-11-16) Pérez, Wilson; Abad, Karina; Carvallo, Juan Pablo; Espinoza, Mauricio; Saquicela Galarza, Víctor HugoThe construction of enterprise context models, a fundamental tool for the design of modern information systems, is usually a cumbersome task, largely as a consequence of the lack of communication between administrative staff and technical consultants in charge of its construction. In order to make this task easier, previous works proposed the reuse of context elements identified in various industrial cases, which have been packaged and stored in a catalog specifically designed for this purpose. The authors propose to go one step further, using semantic technologies to exploit the catalog, storing its content in a semantic repository designed to support the construction of context models. In order to construct the repository, NeOn ontology was adopted to develop a network ontology which integrates different domains and their vocabularies, based on different scenarios that allows the capturing of the requirements, reuse and enrichment of ontologies.Item Modelo de calidad para portales web universitarios del Ecuador. Estudio de casos(Universidad de Cuenca, 2016-11-16) Erazo G., Lenin; Illescas P., Lourdes; Mejía P., Magalimanagement transparent and in ensuring the quality of the services they offer. To reach these goals, web portals should consider a set of desirable features and attributes aimed to improve their quality. This research work proposes the use of an external quality model assessing the quality of the university’s web portal. The model is framed by the public policies of Ecuador such that it can be applied as either, a future development guide or to improve current quality services. A comprehensive bibliographic review of the most used quality models, both generic and specific to the domain, led us to the design of a hierarchical model formed by five main features: functionality, efficiency, usability, reliability and content. The latter has been structured to match Ecuadorian’s transparency rules on the presentation of public information and the quality policies of higher education. As test three web portals from accredited institutions (category “A”), currently offering both graduate and postgraduate programs, were selected and screened by the developed model. As a result, the obtained global quality preference (GP) indicator is: Marginal Acceptability, whose interpretation reveals that the evaluated web portals need to be improved.Item Sistema de monitoreo de monóxido de carbono a través de una red de sensores inalámbrica y una plataforma como servicio en la nube para una residencia(Universidad de Cuenca, 2016-11-16) Carrión, Edison M.; Maya O., Edgar A.; Domínguez L., Hernán M.; Peluffo O., Diego H.This paper presents a system of monitoring carbon monoxide as basis for the securization of environmental safety in a residence, based on a wireless sensor network and platform as a service in the cloud with the objective of caring for human lives and preventing gas poisoning.Item Aplicación de técnicas de fuerza bruta con diccionario de datos, para vulnerar servicios con métodos de autenticación simple “Contraseñas”, pruebas de concepto con software libre y su remediación(Universidad de Cuenca, 2016-11-16) Domínguez L., Hernán M.; Maya O., Edgar A.; Peluffo O., Diego H.; Crisanto Ñ., Christian M.This paper illustrates the increased security risks in recent years of attacks on authentication controls, specifically passwords. Methods and techniques for violating such controls using more and more brute force attack approaches, including data dictionaries. Furthermore, the manuscript presents a proof concept using the free distribution of Linux "Kali Linux" and the penetration tool "Metaexploits Framework" to mitigate attacks; to finally present a more detailed approach for the secure management of passwords, an important issue in times of crisis.Item Diseño de telefonía IP a través del cloud computing bajo una plataforma de software libre OpenNebula(Universidad de Cuenca, 2016-11-16) Ruiz G., Gisela C.; Maya O., Edgar A.; Vásquez A., Carlos A.; Domínguez L., Hernán M.; Peluffo O., Diego H.The present study implicates a new solution of telecommunication for IP telephony service, which is based on cloud computing, providing an option for communications at the “Universidad Técnica del Norte”. The analysis was performed, based on the IEEE 29148 standard for selecting a virtualization platform and IP telephony software. Subsequently, the IP telephony was designed through cloud computing. In the IP telephony design, the dimensioning of IP telephony was developed through the cloud, considering the instance capacity, bandwidth, traffic flow and the number of trunks. For the analysis of these parameters the updated information of the University’s IP telephony was used. Thereafter, the cloud platform was configured. Following, the service performance was tested as to observe the behavior after the incorporation of this infrastructure.Item Bibliomining para descubrir reglas de asociación en el Centro de Documentación Regional “Juan Bautista Vázquez”(Universidad de Cuenca, 2016-11-16) Haro, Valeria; Pérez, Wilson; Saquicela Galarza, Víctor HugoThe technological advances in hardware and software in the last years allows storing large volumes of information, which has complicated its management and exploitation. Data mining is a process to discover hidden knowledge in databases and to support decision-making, taking advantage of historic data of a business or institution. This article describes the implementation of data mining techniques in the Regional Documentation Centre “Juan Bautista Vazquez” of the University of Cuenca. The study follows the methodology proposed by Nicholson and uses the algorithms of Weka based on the loan transactions data of Data Warehouse, implemented previously in the documentation center. Finally, the association rules between the bibliographic resources are validated to determine the users’ preference.Item Diseño de una red de sensores para la detección y protección de incendios forestales(Universidad de Cuenca, 2016-11-16) Guamán-Quinche, José; Guamán-Quinche, René; Torres-Carrión, Hernán; Figueroa-Díaz, RoberthWith the growth of monitoring applications in intelligent environments in the engineering, transport, communications, business, agriculture sector, and the significant reduction in the manufacturing costs of sensors, enabled the introduction of monitoring applications in new contexts, where their application benefits any population. Furthermore, todays sensor networks permit the monitoring of places of difficult access and large territorial extension. This paper details the design and implementation of a network of sensors for the prevention of forest fires, where its main objective is to rely on technology as an alternative to early warning.
