DIEGO AVILA PESANTEZ - Academia.edu (original) (raw)

Papers by DIEGO AVILA PESANTEZ

Research paper thumbnail of Políticas de Ciberseguridad para los dispositivos de conmutación de red en el centro de datos hospitalario: Un estudio de caso

Research paper thumbnail of Towards an Improvement of Interpersonal Relationships in Children with Autism Using a Serious Game

Advances in Intelligent Systems and Computing, 2019

Autism Spectrum Disorder (ASD) or Autism is considered as a psychological neurodevelopment disord... more Autism Spectrum Disorder (ASD) or Autism is considered as a psychological neurodevelopment disorder which affects people. It is characterized by a wide range of conditions that difficult their social skills, as well as their verbal and non-verbal communication. According to the Centers for Disease Control, Autism affects an estimated 1 in 59 children in the USA. Technological advances seek to benefit the most vulnerable groups of society, creating tools that enhance the development of their abilities and skills. In this sense, Serious Games are structure-oriented videogames designed to learning or therapies in a fun environment. With this principle, “JOINME” game was developed using a natural user interface to benefit the progress of interpersonal relationships in children aged between 5 and 10, diagnosed with high-functioning ASD. For experimentation, a case study was applied. It was built from the adaptation of the KidsLife scale through a pre-test and post-test. As a result, a significant improvement of 8.17% in the development of interpersonal relationships was obtained in the kids. It reinforced their mathematical reasoning, recognition of emotions, and comprehensive reading.

Research paper thumbnail of Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review

2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), 2021

Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and grea... more Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.

Research paper thumbnail of Modelo integrador para el diseño de Serious Games con Realidad Aumentada

Research paper thumbnail of Evaluation of 6PE and 6VPE techniques in MPLS-VPN networks for video streaming

2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), 2021

Research paper thumbnail of Improving the Serious Game design using Game Learning Analytics and Eye-tracking: A pilot study

Research paper thumbnail of Desarrollo de sistema Web basado en los frameworks de Laravel y VueJs, para la gestión por procesos: Un estudio de caso

Revista peruana de computación y sistemas, 2020

En la actualidad, el desarrollo de software implica un alto volumen de transferencia de datos ent... more En la actualidad, el desarrollo de software implica un alto volumen de transferencia de datos entre las aplicaciones y el usuario final , esto exige implementarlas utilizando nuevas tecnologías web. El presente trabajo contribuye al desarrollo de una aplicación web para mejorar la gestión de procesos de la compañía de seguridad UNICEPRI, integrando elementos adecuados como son los frameworks Laravel para el backend y VueJs para el frontend, y el gestor de base de datos MariaDB. El enfoque Modelo Vista-Controlador redujo el uso de recursos de memoria, el tiempo de navegación y la recuperación de datos mediante la reutilización de componentes y la carga parcial del sitio web, obteniendo flexibilidad y comunicación con otras aplicaciones y hardware. Para dar seguimiento a la implementación se utilizó la metodología ágil SCRUM, permitiendo una adecuada comunicación entre cliente y desarrollador, y el cumplimiento de las diferentes actividades en los tiempos establecidos. Para la evaluac...

Research paper thumbnail of PDUs Header-Based Online User Behavior Detection Algorithm

Communications in Computer and Information Science, 2021

The goal of this research is to present a detection algorithm for data interception between a Leg... more The goal of this research is to present a detection algorithm for data interception between a Legitimate Access Point (LAP) and wireless devices employing passive eavesdropping techniques, analyzing the Protocol Data Units (PDUs) header of specific Open Systems Interconnection (OSI) protocol layers in real-time: segment (transport-layer), packet (network-layer), and frame (data link-layer). The designed algorithm takes advantage of a passive Man-in-the-Middle (MITM) system, avoiding to gather sensitive information of the users connected to the network. The system focuses on requests from web browsers and apps of wireless devices to analyze the online behavior of the users on the Internet utilizing cybersecurity techniques. The research approaches on a small-scale wireless network to implement educational environments based on parental control in educational institutions (primary, secondary and higher education), fomenting Information and Communication Technologies (ICT) security in virtual classrooms. The data acquisition process of the wireless devices uses the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) services. It also analyzes the Transmission Control Protocol (TCP) control flags of the TCP three-way handshake protocol to identify requests from web browsers and apps. Finally, preliminary test results are presented, demonstrating that each wireless device can be characterized using information based on PDUs header, and these individual reports can be presented through an interactive dashboard to the teachers.

Research paper thumbnail of Modelo de Seguridad contra ataques de denegación de servicio para tráfico SIP

Actualmente las amenazas de seguridad en redes de Voz sobre IP (VoIP) son una preocupacion import... more Actualmente las amenazas de seguridad en redes de Voz sobre IP (VoIP) son una preocupacion importante y latente para las personas encargadas de la seguridad en redes corporativas, ya que cada dia, se desarrollan nuevos ataques de Denegacion de Servicio (DoS). Estos afectan la continuidad del negocio de una organizacion, en terminos de confidencialidad, disponibilidad e integridad de servicios, provocando innumerables perdidas tanto de informacion, como economicas. Esta investigacion tiene la finalidad de establecer las medidas de seguridad necesarias para mitigar las amenazas de DoS, que afectan a la disponibilidad de los sistemas de VoIP basados en el protocolo de senalizacion Session Inicial Protocol (SIP). Se plantea un Modelo de Seguridad denominado MS-DoS-SIP, que se basa en dos enfoques. El primero, analiza las recomendaciones de estandares y normas de seguridad internacionales como ISO/IEC 2702, UIT-T X.805 y NIST, mejores practicas de Asterisk y de la empresa CISCO SYTEMS, a...

Research paper thumbnail of Evaluación de una red de sensores inalámbrica para detección de incendios forestales

Para un sistema de deteccion de incendios forestales se ha evaluado una Red de Sensores Ina... more Para un sistema de deteccion de incendios forestales se ha evaluado una Red de Sensores Inalambrica (WSN) mediante el analisis de propagacion y simulaciones computacionales de tres tipos de versiones que utilizan el estandar IEEE 802.15.4, Xbee Series 2, Xbee Pro 2,4 GHz y Xbee Pro de 900 MHz. El estudio se realizo en base a la medicion de variables como: tasa de entrega de paquetes, rendimiento, consumo energetico y cobertura bajo parametros que describen un entorno forestal. Para el analisis de propagacion se utilizo el Modelo de Weissberger que permite hallar las perdidas por follaje y valores de cobertura, con estos valores obtenidos se efectuo las simulaciones computacionales utilizando el software NS-2. Con los resultados obtenidos del estudio y el analisis estadistico se determino que la version Xbee Pro 2.4GHz es la mas adecuada para la implementacion de este tipo de sistema. Finalmente, se diseno la WSN en una ambiente forestal real, en el cual se pudo ubi...

Research paper thumbnail of Aplicación Web progresiva para la adopción de mascotas empleando la tecnología Angular-Ionic CodeIgniter

Revista Científica Ciencia y Tecnología, 2021

En la actualidad, una aplicación web progresiva permite la ejecución de su código en cualquier na... more En la actualidad, una aplicación web progresiva permite la ejecución de su código en cualquier navegador compatible con los estándares de universalidad. En este sentido, este trabajo desarrolla una aplicación multiplataforma dedicada a la adopción y rescate de mascotas para la corporación “LADRA”. En el desarrollo del aplicativo web y móvil se aplicó la metodología ágil SCRUM con ayuda de los frameworks Angular-Ionic y CodeIgniter basados en TypeScript y PHP respectivamente. Además, de un plan de pruebas definido en TestLink, que garantizó la creación de un software eficiente. Para evaluar la calidad del producto software se utilizó la métrica de Usabilidad, definida en la norma ISO/IEC 25010, aplicando una encuesta basada en el cuestionario USE de Arnold Lund; logrando medir las subcaracterísticas de inteligibilidad, operabilidad y estética. Al realizar un análisis descriptivo e inferencial se obtuvo valores positivos en la medición, dando como resultado que el aplicativo web tiene...

Research paper thumbnail of Augmented reality implementation as reinforcement tool for public textbooks education in Ecuador

2018 IEEE Global Engineering Education Conference (EDUCON), 2018

The present work releases on the methodology followed for the implementation and experimentation ... more The present work releases on the methodology followed for the implementation and experimentation of an Augmented Reality (AR) application as a reinforcement tool for teaching-learning activities. The study case was carried out on a sample of 44 participants, who are students of the History subject of the second level of a public high school in Ecuador. The sample was divided into two groups. The AR tool was tested on the Experimental Group (EG), and its performance was compared with that of the Control Group (CG). Results obtained demonstrated that introduction of AR contents can efficiently support both activities and experiences academic, allowing for the enhancement of students grades significantly. In fact, the average grade of the EG was 17.0% higher than that of the CG.

Research paper thumbnail of Blockchain and IoT - Challenges and Its Role in Security: A Brief Overview

Research paper thumbnail of Desarrollo de una aplicación móvil utilizando el framework MEAN Stack e IONIC: Un estudio de caso en una compañía de transporte

Ecuadorian Science Journal

La utilización de aplicaciones móviles se ha convertido en un componente relevante transaccional ... more La utilización de aplicaciones móviles se ha convertido en un componente relevante transaccional dentro de una organización. Por tal motivo, se desarrolló un sistema móvil informativo para la gestión de rutas dentro de la compañía de transporte pesado Torres Revelo S.A, basado en la metodología ágil de desarrollo SCRUM y el framework MEAN Stack e Ionic basados en JavaScript. En este proyecto, se sometió a una prueba de usabilidad en función a la norma ISO/IEC 25010, tomando como referencias la inteligibilidad, aprendizaje, operabilidad, protección frente a errores de usuario, estética y accesibilidad. Se utilizó un cuestionario de 26 preguntas con el uso del método de Nielsen, aplicando a un total de 73 usuarios en todo el proceso del desarrollo de la aplicación, basado en prototipos. Al tabular los resultados obtenidos, se aplicó la prueba de chi cuadrado para determinar que la aplicación móvil y web es fácil de usar, aprender y permite al usuario realizar la trazabilidad de la rut...

Research paper thumbnail of Evaluation of Nodes Location Mechanisms in Underwater Wireless Sensor Network using Aqua-sim NG

2020 IEEE Engineering International Research Conference (EIRCON), 2020

Underwater wireless sensors network (UWSN) has become a promising communication technology buildi... more Underwater wireless sensors network (UWSN) has become a promising communication technology building block for a cost-effective massive oceanographic surveillance and monitoring systems. Routing protocols in traditional wireless sensor networks (WSN) are not suitable in the underwater environment due to its 3D deployment, high propagation delay, severe multi-path fading, high attenuation, low achievable data rate, reduced energy availability, and limited bandwidth. This research reports the results for performance evaluation of several routing protocols using the Aqua-Sim Next Generation simulator. The analyzed protocols are compared based on end-to-end delay, energy consumption, and throughput. 3D network architecture was conceived for a region with 1000times1000times500mathrmm1000\times 1000\times 500\ \mathrm{m}1000times1000times500mathrmm dimensions, where a total of 100 nodes are deployed (one SINK node and 99 sensor nodes). Two previously reported values for the marine current were analyzed (0.1 m/s for the dry season and 1.2 m/s ...

Research paper thumbnail of Comparative analysis of Cybersecurity mechanisms in SD-WAN architectures: A preliminary results

2021 IEEE Engineering International Research Conference (EIRCON)

Research paper thumbnail of Towards a Security Model against Denial of Service Attacks for SIP Traffic

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern fo... more Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-ofService (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organiz...

Research paper thumbnail of Exploring Learning in Near-Field Communication-Based Serious Games in Children Diagnosed with ADHD

Research paper thumbnail of Application of Web 2.0 Tools in the Pedagogical Process of Mathematics: A Case Study with Students of Basic Education

This work was focused on the study of Web 2.0 Open Source tools by using the methodology design: ... more This work was focused on the study of Web 2.0 Open Source tools by using the methodology design: Selection, Design, and Implementation (SDI) for the pedagogical development of Mathematics teaching to eighth-grade students of basic education. The most suitable tools applied in the educational and pedagogical development were determined. The research was conducted in two scenarios: the first one, by only using traditional learning with teacher guidance in the classroom; and the second one, by using Web 2.0 tools as a didactic and pedagogical resource for the reinforcement of guided knowledge. As a result of this analysis, it was determined that the Moodle platform was the most suitable tool for this school environment, combining with several web 2.0 tools such as Edmodo, Edpuzzle, and exercise simulators. Through them, improvement was achieved in the assimilation of knowledge, application of experiences, and intellectual development of students.

Research paper thumbnail of Trends and Challenges of HCI in the New Paradigm of Cognitive Cities

2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)

With all the given technological advances, the Human-Computer Interaction (HCI) has a complex rol... more With all the given technological advances, the Human-Computer Interaction (HCI) has a complex role in the ways of communication. Information is power and there are several challenges to conduct a successful and appropriate interaction between machines and humans to obtain and interpret the corresponding data. This study presents a summary of the new trends and types of equipment that are used in Artificial Intelligence Systems to support the urban planning process in the new cognitive cities paradigm were the human factor is the key. Based on the aforementioned, a Systematic Literature Review (SLR) methodology has been applied, originated by the searching for knowledge of social and technical situations about HCI. The results, which have been derived from data analysis, illustrate the impact of HCI in the digital age. Furthermore, they demonstrate some tendencies and approaches of the HCI research as well as artifacts and applications of HCI, and its relevance in the planning of cognitive cities.

Research paper thumbnail of Políticas de Ciberseguridad para los dispositivos de conmutación de red en el centro de datos hospitalario: Un estudio de caso

Research paper thumbnail of Towards an Improvement of Interpersonal Relationships in Children with Autism Using a Serious Game

Advances in Intelligent Systems and Computing, 2019

Autism Spectrum Disorder (ASD) or Autism is considered as a psychological neurodevelopment disord... more Autism Spectrum Disorder (ASD) or Autism is considered as a psychological neurodevelopment disorder which affects people. It is characterized by a wide range of conditions that difficult their social skills, as well as their verbal and non-verbal communication. According to the Centers for Disease Control, Autism affects an estimated 1 in 59 children in the USA. Technological advances seek to benefit the most vulnerable groups of society, creating tools that enhance the development of their abilities and skills. In this sense, Serious Games are structure-oriented videogames designed to learning or therapies in a fun environment. With this principle, “JOINME” game was developed using a natural user interface to benefit the progress of interpersonal relationships in children aged between 5 and 10, diagnosed with high-functioning ASD. For experimentation, a case study was applied. It was built from the adaptation of the KidsLife scale through a pre-test and post-test. As a result, a significant improvement of 8.17% in the development of interpersonal relationships was obtained in the kids. It reinforced their mathematical reasoning, recognition of emotions, and comprehensive reading.

Research paper thumbnail of Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review

2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), 2021

Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and grea... more Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.

Research paper thumbnail of Modelo integrador para el diseño de Serious Games con Realidad Aumentada

Research paper thumbnail of Evaluation of 6PE and 6VPE techniques in MPLS-VPN networks for video streaming

2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), 2021

Research paper thumbnail of Improving the Serious Game design using Game Learning Analytics and Eye-tracking: A pilot study

Research paper thumbnail of Desarrollo de sistema Web basado en los frameworks de Laravel y VueJs, para la gestión por procesos: Un estudio de caso

Revista peruana de computación y sistemas, 2020

En la actualidad, el desarrollo de software implica un alto volumen de transferencia de datos ent... more En la actualidad, el desarrollo de software implica un alto volumen de transferencia de datos entre las aplicaciones y el usuario final , esto exige implementarlas utilizando nuevas tecnologías web. El presente trabajo contribuye al desarrollo de una aplicación web para mejorar la gestión de procesos de la compañía de seguridad UNICEPRI, integrando elementos adecuados como son los frameworks Laravel para el backend y VueJs para el frontend, y el gestor de base de datos MariaDB. El enfoque Modelo Vista-Controlador redujo el uso de recursos de memoria, el tiempo de navegación y la recuperación de datos mediante la reutilización de componentes y la carga parcial del sitio web, obteniendo flexibilidad y comunicación con otras aplicaciones y hardware. Para dar seguimiento a la implementación se utilizó la metodología ágil SCRUM, permitiendo una adecuada comunicación entre cliente y desarrollador, y el cumplimiento de las diferentes actividades en los tiempos establecidos. Para la evaluac...

Research paper thumbnail of PDUs Header-Based Online User Behavior Detection Algorithm

Communications in Computer and Information Science, 2021

The goal of this research is to present a detection algorithm for data interception between a Leg... more The goal of this research is to present a detection algorithm for data interception between a Legitimate Access Point (LAP) and wireless devices employing passive eavesdropping techniques, analyzing the Protocol Data Units (PDUs) header of specific Open Systems Interconnection (OSI) protocol layers in real-time: segment (transport-layer), packet (network-layer), and frame (data link-layer). The designed algorithm takes advantage of a passive Man-in-the-Middle (MITM) system, avoiding to gather sensitive information of the users connected to the network. The system focuses on requests from web browsers and apps of wireless devices to analyze the online behavior of the users on the Internet utilizing cybersecurity techniques. The research approaches on a small-scale wireless network to implement educational environments based on parental control in educational institutions (primary, secondary and higher education), fomenting Information and Communication Technologies (ICT) security in virtual classrooms. The data acquisition process of the wireless devices uses the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) services. It also analyzes the Transmission Control Protocol (TCP) control flags of the TCP three-way handshake protocol to identify requests from web browsers and apps. Finally, preliminary test results are presented, demonstrating that each wireless device can be characterized using information based on PDUs header, and these individual reports can be presented through an interactive dashboard to the teachers.

Research paper thumbnail of Modelo de Seguridad contra ataques de denegación de servicio para tráfico SIP

Actualmente las amenazas de seguridad en redes de Voz sobre IP (VoIP) son una preocupacion import... more Actualmente las amenazas de seguridad en redes de Voz sobre IP (VoIP) son una preocupacion importante y latente para las personas encargadas de la seguridad en redes corporativas, ya que cada dia, se desarrollan nuevos ataques de Denegacion de Servicio (DoS). Estos afectan la continuidad del negocio de una organizacion, en terminos de confidencialidad, disponibilidad e integridad de servicios, provocando innumerables perdidas tanto de informacion, como economicas. Esta investigacion tiene la finalidad de establecer las medidas de seguridad necesarias para mitigar las amenazas de DoS, que afectan a la disponibilidad de los sistemas de VoIP basados en el protocolo de senalizacion Session Inicial Protocol (SIP). Se plantea un Modelo de Seguridad denominado MS-DoS-SIP, que se basa en dos enfoques. El primero, analiza las recomendaciones de estandares y normas de seguridad internacionales como ISO/IEC 2702, UIT-T X.805 y NIST, mejores practicas de Asterisk y de la empresa CISCO SYTEMS, a...

Research paper thumbnail of Evaluación de una red de sensores inalámbrica para detección de incendios forestales

Para un sistema de deteccion de incendios forestales se ha evaluado una Red de Sensores Ina... more Para un sistema de deteccion de incendios forestales se ha evaluado una Red de Sensores Inalambrica (WSN) mediante el analisis de propagacion y simulaciones computacionales de tres tipos de versiones que utilizan el estandar IEEE 802.15.4, Xbee Series 2, Xbee Pro 2,4 GHz y Xbee Pro de 900 MHz. El estudio se realizo en base a la medicion de variables como: tasa de entrega de paquetes, rendimiento, consumo energetico y cobertura bajo parametros que describen un entorno forestal. Para el analisis de propagacion se utilizo el Modelo de Weissberger que permite hallar las perdidas por follaje y valores de cobertura, con estos valores obtenidos se efectuo las simulaciones computacionales utilizando el software NS-2. Con los resultados obtenidos del estudio y el analisis estadistico se determino que la version Xbee Pro 2.4GHz es la mas adecuada para la implementacion de este tipo de sistema. Finalmente, se diseno la WSN en una ambiente forestal real, en el cual se pudo ubi...

Research paper thumbnail of Aplicación Web progresiva para la adopción de mascotas empleando la tecnología Angular-Ionic CodeIgniter

Revista Científica Ciencia y Tecnología, 2021

En la actualidad, una aplicación web progresiva permite la ejecución de su código en cualquier na... more En la actualidad, una aplicación web progresiva permite la ejecución de su código en cualquier navegador compatible con los estándares de universalidad. En este sentido, este trabajo desarrolla una aplicación multiplataforma dedicada a la adopción y rescate de mascotas para la corporación “LADRA”. En el desarrollo del aplicativo web y móvil se aplicó la metodología ágil SCRUM con ayuda de los frameworks Angular-Ionic y CodeIgniter basados en TypeScript y PHP respectivamente. Además, de un plan de pruebas definido en TestLink, que garantizó la creación de un software eficiente. Para evaluar la calidad del producto software se utilizó la métrica de Usabilidad, definida en la norma ISO/IEC 25010, aplicando una encuesta basada en el cuestionario USE de Arnold Lund; logrando medir las subcaracterísticas de inteligibilidad, operabilidad y estética. Al realizar un análisis descriptivo e inferencial se obtuvo valores positivos en la medición, dando como resultado que el aplicativo web tiene...

Research paper thumbnail of Augmented reality implementation as reinforcement tool for public textbooks education in Ecuador

2018 IEEE Global Engineering Education Conference (EDUCON), 2018

The present work releases on the methodology followed for the implementation and experimentation ... more The present work releases on the methodology followed for the implementation and experimentation of an Augmented Reality (AR) application as a reinforcement tool for teaching-learning activities. The study case was carried out on a sample of 44 participants, who are students of the History subject of the second level of a public high school in Ecuador. The sample was divided into two groups. The AR tool was tested on the Experimental Group (EG), and its performance was compared with that of the Control Group (CG). Results obtained demonstrated that introduction of AR contents can efficiently support both activities and experiences academic, allowing for the enhancement of students grades significantly. In fact, the average grade of the EG was 17.0% higher than that of the CG.

Research paper thumbnail of Blockchain and IoT - Challenges and Its Role in Security: A Brief Overview

Research paper thumbnail of Desarrollo de una aplicación móvil utilizando el framework MEAN Stack e IONIC: Un estudio de caso en una compañía de transporte

Ecuadorian Science Journal

La utilización de aplicaciones móviles se ha convertido en un componente relevante transaccional ... more La utilización de aplicaciones móviles se ha convertido en un componente relevante transaccional dentro de una organización. Por tal motivo, se desarrolló un sistema móvil informativo para la gestión de rutas dentro de la compañía de transporte pesado Torres Revelo S.A, basado en la metodología ágil de desarrollo SCRUM y el framework MEAN Stack e Ionic basados en JavaScript. En este proyecto, se sometió a una prueba de usabilidad en función a la norma ISO/IEC 25010, tomando como referencias la inteligibilidad, aprendizaje, operabilidad, protección frente a errores de usuario, estética y accesibilidad. Se utilizó un cuestionario de 26 preguntas con el uso del método de Nielsen, aplicando a un total de 73 usuarios en todo el proceso del desarrollo de la aplicación, basado en prototipos. Al tabular los resultados obtenidos, se aplicó la prueba de chi cuadrado para determinar que la aplicación móvil y web es fácil de usar, aprender y permite al usuario realizar la trazabilidad de la rut...

Research paper thumbnail of Evaluation of Nodes Location Mechanisms in Underwater Wireless Sensor Network using Aqua-sim NG

2020 IEEE Engineering International Research Conference (EIRCON), 2020

Underwater wireless sensors network (UWSN) has become a promising communication technology buildi... more Underwater wireless sensors network (UWSN) has become a promising communication technology building block for a cost-effective massive oceanographic surveillance and monitoring systems. Routing protocols in traditional wireless sensor networks (WSN) are not suitable in the underwater environment due to its 3D deployment, high propagation delay, severe multi-path fading, high attenuation, low achievable data rate, reduced energy availability, and limited bandwidth. This research reports the results for performance evaluation of several routing protocols using the Aqua-Sim Next Generation simulator. The analyzed protocols are compared based on end-to-end delay, energy consumption, and throughput. 3D network architecture was conceived for a region with 1000times1000times500mathrmm1000\times 1000\times 500\ \mathrm{m}1000times1000times500mathrmm dimensions, where a total of 100 nodes are deployed (one SINK node and 99 sensor nodes). Two previously reported values for the marine current were analyzed (0.1 m/s for the dry season and 1.2 m/s ...

Research paper thumbnail of Comparative analysis of Cybersecurity mechanisms in SD-WAN architectures: A preliminary results

2021 IEEE Engineering International Research Conference (EIRCON)

Research paper thumbnail of Towards a Security Model against Denial of Service Attacks for SIP Traffic

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern fo... more Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-ofService (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organiz...

Research paper thumbnail of Exploring Learning in Near-Field Communication-Based Serious Games in Children Diagnosed with ADHD

Research paper thumbnail of Application of Web 2.0 Tools in the Pedagogical Process of Mathematics: A Case Study with Students of Basic Education

This work was focused on the study of Web 2.0 Open Source tools by using the methodology design: ... more This work was focused on the study of Web 2.0 Open Source tools by using the methodology design: Selection, Design, and Implementation (SDI) for the pedagogical development of Mathematics teaching to eighth-grade students of basic education. The most suitable tools applied in the educational and pedagogical development were determined. The research was conducted in two scenarios: the first one, by only using traditional learning with teacher guidance in the classroom; and the second one, by using Web 2.0 tools as a didactic and pedagogical resource for the reinforcement of guided knowledge. As a result of this analysis, it was determined that the Moodle platform was the most suitable tool for this school environment, combining with several web 2.0 tools such as Edmodo, Edpuzzle, and exercise simulators. Through them, improvement was achieved in the assimilation of knowledge, application of experiences, and intellectual development of students.

Research paper thumbnail of Trends and Challenges of HCI in the New Paradigm of Cognitive Cities

2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)

With all the given technological advances, the Human-Computer Interaction (HCI) has a complex rol... more With all the given technological advances, the Human-Computer Interaction (HCI) has a complex role in the ways of communication. Information is power and there are several challenges to conduct a successful and appropriate interaction between machines and humans to obtain and interpret the corresponding data. This study presents a summary of the new trends and types of equipment that are used in Artificial Intelligence Systems to support the urban planning process in the new cognitive cities paradigm were the human factor is the key. Based on the aforementioned, a Systematic Literature Review (SLR) methodology has been applied, originated by the searching for knowledge of social and technical situations about HCI. The results, which have been derived from data analysis, illustrate the impact of HCI in the digital age. Furthermore, they demonstrate some tendencies and approaches of the HCI research as well as artifacts and applications of HCI, and its relevance in the planning of cognitive cities.