Volumen 7 No. especial (2016) - TIC.EC: Congreso Ecuatoriano de Tecnologías de la Información y Comunicaciones
Permanent URI for this collectionhttps://dspace-test.ucuenca.edu.ec/handle/123456789/26299
Browse
Recent Submissions
Item Sistema de anotación semiautomático de señales electrocardiográficas de esfuerzo(Universidad de Cuenca, 2016-11-16) Fajardo-Reinoso, Juan; Astudillo-Salinas, Darwin; Solano-Quinde, Lizandro; Wong, SaraDespite the availability of electrocardiographic (ECG) databases does the medical sector not yet possesses an annotated stress database. This paper introduces an annotation system using RR-time series obtained from an eight lead stress database (DICARDIA). First, the system proposes to the user a lead (reference channel) according to its statistical measures. The user then undergoes a visual inspection validating or denying the channel proposed by the system. Afterwards, the system proposes two options based on the quality of the RR-time series. If the series contains few artifacts the annotations are realized using the interval of annotations; in the case of noisy series the system allows annotations beat by beat. The preliminary results realized over 172025 beats (approximately 15% of DICARDIA database) give a sensibility and positive predictive value of 97.66% and 96.71% respectively. The system will permit the delineation of stress databases, which will be an important starting point for evaluating the performance of QRS detectors.Item Diseño de una red de sensores para la detección y protección de incendios forestales(Universidad de Cuenca, 2016-11-16) Guamán-Quinche, José; Guamán-Quinche, René; Torres-Carrión, Hernán; Figueroa-Díaz, RoberthWith the growth of monitoring applications in intelligent environments in the engineering, transport, communications, business, agriculture sector, and the significant reduction in the manufacturing costs of sensors, enabled the introduction of monitoring applications in new contexts, where their application benefits any population. Furthermore, todays sensor networks permit the monitoring of places of difficult access and large territorial extension. This paper details the design and implementation of a network of sensors for the prevention of forest fires, where its main objective is to rely on technology as an alternative to early warning.Item Análisis del direccionamiento IPv6 y estudio de los Protocolos de Enrutamiento orientados a IPv6(Universidad de Cuenca, 2016-11-16) Patiño Sánchez, Jose RobertoThis paper presents the results of a comparative analysis of routing protocols in IPv6 by experimental evidence, for which network topologies were designed based on the knowledge obtained in IPv4. In the tests, features were examined such as convergence, reliability, scalability and latency. In addition, the hardware used to choose the appropriate equipment for a production environment were compared. The laboratory procedures performed are described, identifying the advantages and disadvantages of an IGP over another, monitoring network performance and finally analyzing the results obtained in the different tests, both in distance vector protocols and state link. As part of the study, the IPv6 addressing was analyzed, its main features, package structures, address format, static IPv6 routing, hardware and software required for its implementation. A review of each of the IGP's was conducted, starting with the distance vector (RIPng and EIGRP) and continuing with link-state (IS-IS and OSPFv3), checking operation, configuration, analysis and update routing tables.Item Análisis y comparación de la seguridad utilizando dos protocolos de enrutamiento para IPv6(Universidad de Cuenca, 2016-11-16) Patiño Sánchez, Jose RobertoIn the next years, IPv6 will inevitably replace the IPv4 protocol. Although, taking consciousness about technical details and aspects of security of the “new” protocol, the protocol is poorly applied in administrator’s networks of different Ecuadorian companies. The security attacks to the IPv4 protocol, illustrating the vulnerabilities of networks, are likely also happening in IPv6, and that is why we evaluated the response of two IPv6 protocols against security attacks. Two virtual networks were designed and implemented, conformed by routers and hosts. The first one was configured with the OPSFv3 protocol and the second with RIPng. We used a server-client model, where clients share information with the server databases, interacting with the services. The implemented network model simulated a business environment, where each node connected to the network represented different branches and matrices that a company could have. Different types of attacks to the network were performed and the response from both were measured, taking into consideration the following parameters: availability, integrality and confidentiality. The statistical interpretation of the tests provided insight on how security operates in IPv6. This knowledge could serve as a source of information for network administrators on the security susceptibility of the IPv6 protocol.Item Sistema de monitoreo de monóxido de carbono a través de una red de sensores inalámbrica y una plataforma como servicio en la nube para una residencia(Universidad de Cuenca, 2016-11-16) Carrión, Edison M.; Maya O., Edgar A.; Domínguez L., Hernán M.; Peluffo O., Diego H.This paper presents a system of monitoring carbon monoxide as basis for the securization of environmental safety in a residence, based on a wireless sensor network and platform as a service in the cloud with the objective of caring for human lives and preventing gas poisoning.Item Bibliomining para descubrir reglas de asociación en el Centro de Documentación Regional “Juan Bautista Vázquez”(Universidad de Cuenca, 2016-11-16) Haro, Valeria; Pérez, Wilson; Saquicela Galarza, Víctor HugoThe technological advances in hardware and software in the last years allows storing large volumes of information, which has complicated its management and exploitation. Data mining is a process to discover hidden knowledge in databases and to support decision-making, taking advantage of historic data of a business or institution. This article describes the implementation of data mining techniques in the Regional Documentation Centre “Juan Bautista Vazquez” of the University of Cuenca. The study follows the methodology proposed by Nicholson and uses the algorithms of Weka based on the loan transactions data of Data Warehouse, implemented previously in the documentation center. Finally, the association rules between the bibliographic resources are validated to determine the users’ preference.Item Accesibilidad a la información y la inclusión social de personas con discapacidad visual(Universidad de Cuenca, 2016-11-16) Martínez Bonilla, Carlos; Silva Silva, Ricardo; Naranjo Gamboa, ByronTechnological advances and the evolution of the media, especially the Internet, facilitates the transfer of messages to and between people, in particular between people with visual disabilities. The project presented herein determined the accessibility to information of people with visual disabilities and its effect on their social integration in the province of Tungurahua; with the overall objective to identify methodological strategies, including the integration of ICT tools, that will enhance communication, accessibility to information and social inclusion, leading ultimately in an improvement of the quality of life. Important features and guidelines to develop communication and accessibility, not only with people possessing visual disability, were obtained through a quantitative and bibliographic survey of the field resulting in important features to reach and improve communication. Along the survey better ideas were generated on how to live better with this disabled group of the society.Item Automatización del proceso de despliegue de servicios en la nube(Universidad de Cuenca, 2016-11-16) Zuñiga-Prieto, Miguel; Solano-Quinde, Lizandro; Insfran, Emilio; Cabrera, YesseniaThe lack of standardization of the access methods and the management of resources in cloud environments hinders both, the portability of services between different cloud environments, and the agile deployment of services. In this context, it is important to reduce the deployment time in order to reduce the economic cost to organizations. The manuscript presents an approach for automating the deployment process of cloud services, by proposing a language that specifies the resource needs in cloud environments, in support to the logic of cloud services. The information about requirements is used for generating resource provisioning scripts and service configurations, both, specific to the deployment platform. This approach is applied to a case study in the Windows Azure© platform, used as a deployment environment and the development of a deployment script based on the cloud resource specification.Item Detección de patologías de la mama mediante filtros multirresolución(Universidad de Cuenca, 2016-11-16) Pérez, María G.; Benalcazar, Marco; Conci, Aura; Fiallos, CarlosMammography is considered as the gold standard examination for early detection of breast cancer. However, in the techniques of medical image analysis 3 aspects are yet an issue: noise removal, segmentation of images, and extracting the region of interest (ROI). This work presents a survey of breast mammography and the preliminary results corresponding to a method for the automatic detection of breast anomalies in mammography images using histogram transformation, contrast enhancement and Quadrature Mirror Filter (QMF) banks. The QMF filters are preceded by an advanced tree structured nonlinear filter for noise suppression. Several multiresolution methods are reported for feature extraction in breast cancer using digital mammography. The initial approach is directed to malignant diseases, such as microcalcification clusters, present in mammograms, using initially two or three channels for the multiresolution decomposition.Item Aplicación de técnicas de fuerza bruta con diccionario de datos, para vulnerar servicios con métodos de autenticación simple “Contraseñas”, pruebas de concepto con software libre y su remediación(Universidad de Cuenca, 2016-11-16) Domínguez L., Hernán M.; Maya O., Edgar A.; Peluffo O., Diego H.; Crisanto Ñ., Christian M.This paper illustrates the increased security risks in recent years of attacks on authentication controls, specifically passwords. Methods and techniques for violating such controls using more and more brute force attack approaches, including data dictionaries. Furthermore, the manuscript presents a proof concept using the free distribution of Linux "Kali Linux" and the penetration tool "Metaexploits Framework" to mitigate attacks; to finally present a more detailed approach for the secure management of passwords, an important issue in times of crisis.Item Ontología DHARMA para la construcción de arquitectura de sistemas empresariales(Universidad de Cuenca, 2016-11-16) Pérez, Wilson; Abad, Karina; Carvallo, Juan Pablo; Espinoza, Mauricio; Saquicela Galarza, Víctor HugoThe construction of enterprise context models, a fundamental tool for the design of modern information systems, is usually a cumbersome task, largely as a consequence of the lack of communication between administrative staff and technical consultants in charge of its construction. In order to make this task easier, previous works proposed the reuse of context elements identified in various industrial cases, which have been packaged and stored in a catalog specifically designed for this purpose. The authors propose to go one step further, using semantic technologies to exploit the catalog, storing its content in a semantic repository designed to support the construction of context models. In order to construct the repository, NeOn ontology was adopted to develop a network ontology which integrates different domains and their vocabularies, based on different scenarios that allows the capturing of the requirements, reuse and enrichment of ontologies.Item Modelo de calidad para portales web universitarios del Ecuador. Estudio de casos(Universidad de Cuenca, 2016-11-16) Erazo G., Lenin; Illescas P., Lourdes; Mejía P., Magalimanagement transparent and in ensuring the quality of the services they offer. To reach these goals, web portals should consider a set of desirable features and attributes aimed to improve their quality. This research work proposes the use of an external quality model assessing the quality of the university’s web portal. The model is framed by the public policies of Ecuador such that it can be applied as either, a future development guide or to improve current quality services. A comprehensive bibliographic review of the most used quality models, both generic and specific to the domain, led us to the design of a hierarchical model formed by five main features: functionality, efficiency, usability, reliability and content. The latter has been structured to match Ecuadorian’s transparency rules on the presentation of public information and the quality policies of higher education. As test three web portals from accredited institutions (category “A”), currently offering both graduate and postgraduate programs, were selected and screened by the developed model. As a result, the obtained global quality preference (GP) indicator is: Marginal Acceptability, whose interpretation reveals that the evaluated web portals need to be improved.Item Guía referencial para el manejo de QoS en redes WLAN prioritizando tráfico(Universidad de Cuenca, 2016-11-16) Granizo R., Angela V.; Tacuri, Alex A.The implementation of QoS policies can address various points depending on the requirements of the WLAN; for example, the allocation of bandwidth in a differentiated way, avoiding or managing congestion on the network, managing priorities according to the type of traffic, etc. As a function of the analysis of the traffic, QoS policies can be established that enable the prioritization of the traffic type (http, ftp, ssh) according to the user needs in line with the objective of the WLAN. To do this a WLAN scenario is performed without prioritization of traffic and with traffic prioritization, using an application designed to manage service quality in wireless networks: FROTTLE, software for analysis of traffic on the WLAN as ntop, wireshark, program echoping, hping3. The results obtained allow us to demonstrate the improved quality of service to prioritize traffic so that the indicators show satisfactory levels. A reference guide was developed to manage the quality of WLAN service based on a prioritization of traffic.Item Clasificación vía aprendizaje automático de conformaciones moleculares en estructuras teloméricas(Universidad de Cuenca, 2016-11-16) Barragán R., Daniela A.; Cazar, Robert A.; Mendez, Miguel A.A great number of studies have been published on the area of small molecules bound to telomeric sequences that fold on a non-cannonical DNA structure known as G-quadruplex structure. The study of these structures has been driven for its potential as targets for drug development. Furthermore, G-quadruplex structures have been identified in other sequences of importance through all the genome. Within the different studies two main models have been used: the human telomeric sequence and the oxytricha, tetrahymena telomeric sequence. Both cases are used as models for computational studies and in vitro essays. Here we study the trajectory generated from an atomistic molecular dynamic simulation to obtain the amount of flexibility and mobility of these model structures. We used data mining and classification tools (i.e. k nearest neighbor method) to identify automatically subpopulations of structures within the simulation. We found the most populated conformations and we discuss the structural findings.Item Diseño de una red de fibra hasta el hogar para la ciudad de Cuenca(Universidad de Cuenca, 2016-11-16) Heredia Sandoval, Víctor; Astudillo-Salinas, DarwinThis article presents a Fiber To The Home (FTTH), for the city of Cuenca in the province of Azuay, Ecuador. The design goal is to bring to homes an unlimited volume of information, which will be accompanied by the need that telecommunication services every time require larger bandwidth. Foregoing means that a technology is needed that reaches most households with the lowest cost of implementation, and respecting the technical/esthetical standards for laying cables in the city.Item Diseño de telefonía IP a través del cloud computing bajo una plataforma de software libre OpenNebula(Universidad de Cuenca, 2016-11-16) Ruiz G., Gisela C.; Maya O., Edgar A.; Vásquez A., Carlos A.; Domínguez L., Hernán M.; Peluffo O., Diego H.The present study implicates a new solution of telecommunication for IP telephony service, which is based on cloud computing, providing an option for communications at the “Universidad Técnica del Norte”. The analysis was performed, based on the IEEE 29148 standard for selecting a virtualization platform and IP telephony software. Subsequently, the IP telephony was designed through cloud computing. In the IP telephony design, the dimensioning of IP telephony was developed through the cloud, considering the instance capacity, bandwidth, traffic flow and the number of trunks. For the analysis of these parameters the updated information of the University’s IP telephony was used. Thereafter, the cloud platform was configured. Following, the service performance was tested as to observe the behavior after the incorporation of this infrastructure.Item Generación de librerías de código base para autenticación a través de certificados SSL generados automáticamente utilizando Java(Universidad de Cuenca, 2016-11-16) Vargas, Javier; Guevara, David; Mayorga, Franklin; Sánchez, Franklin; Díaz, DanieLThis paper describes the processes involved in the creation and evaluation of a Tool for Automatic Generation of Security Infrastructure in Communications using Java. Incorporation of security services in the source code of distributed applications is not that easy and requires, on the one hand the creation of a manual for the security of infrastructure based on digital certificates of public and private OpenSSL keys, and/or security stores. On the other hand, the application developer must incorporate manually in the source code the functions and/or procedures that proproperly manage certificates, keys and stores, to secure automatic implementation of the security services.Item Arquitectura para una red de sensores web basada en SWE (Sensor Web Enablement): caso de estudio para la implementación en sensores hidrometeorológicos(Universidad de Cuenca, 2016-11-16) Muñoz Guillén, Lissette; Medina Cartuche, José; Guillermo Aungüisaca, Juan; Veintimilla-Reyes, JaimeThe growth of information and communication technologies associated with the needs to access immediately information generated by different sensors made the implementation and the use of communication protocols to acquire and interchange data necessary. In this sense, Sensor Web Enablement (SWE) developed by OGC (Open Geospatial Consortium) and each of its components constitute the most appropriate tool to achieve this goal. This research project proposes an architecture based in SWE that allows to access in real-time sensors belonging to a hydro-meteorological network. The architecture has been verified and validated through the implementation of a case study, using the hydrometeorological station “Marianza” located in the Azuay province; station run by PROMAS (Programa para el Manejo del Agua y el Suelo).Item Los PLE’s en el desarrollo de competencias cognitivas desde la metodología sistémica en estudiantes universitarios(Universidad de Cuenca, 2016-11-16) Silva Castillo, Jorge; Estrada García, JesúsThe research focused on the evaluation of the application of personal learning environments to first semester students of the Biology and Chemistry program at the Universidad Nacional de Chimborazo (UNACH), with respect to the development of cognitive competencies based on a systemic methodological approach. The research design was quasi experimental and applied. Initially, through surveys it was diagnosed that 78,3% of students possessed a medium level of digital competencies that directly influenced the low level of cognitive competencies. At the end of the research it was found that students positively improved the creation and application of their own personal learning environments (PLE’s), given the applied systematic methodology that combines the hybrid way of virtual classroom, the e-portfolio and the web 2.0 tools, conceptualized and related about the Bloom’s Taxonomy. Data analysis yielded the arithmetic mean with the best PLE-output score and resulted with respect to the PLE-input in a difference of 29,261 points, equivalent to an improvement of 69,6% in cognitive competencies at the end of academic period. The findings suggest that students in their academic and professional career should continuously apply PLE’s like methodologies.Item Automatic RDF-ization of big data semi-structured datasets(Universidad de Cuenca, 2016-11-16) Gualán, Ronald; Freire, Renán; Tello, Andrés; Espinoza, Mauricio; Saquicela Galarza, Víctor HugoLinked data adoption continues to grow in many fields at a considerable pace. However, some of the most important datasets usually remain underexploited because of two main reasons: the huge volume of the datasets and the lack of methods for automatic conversion to RDF. This paper presents an automatic approach to tackle these problems by leveraging recent Big Data tools and a program for automatic conversion from a relational model to RDF. Overall, the process can be summarized in three steps: 1) bulk transfer of data from different sources to Hive/HDFS; 2) transformation of data on Hive to RDF using D2RQ; and 3) storing the resulting RDF in CumulusRDF. By using these Big Data tools, the platform will cope with the handling of big amounts of data available in different sources, which can include structured or semi-structured data. Moreover, since the RDF data are stored in CumulusRDF in the final step, users or applications can consume the resulting data by means of web services or SPARQL queries. Finally, an evaluation in the hydro-meteorological domain demonstrates the soundness of our approach.
