Mostrando 1 - 20 Resultados de 36 Para Buscar 'Andrade-Arenas, Laberiano', tiempo de consulta: 0.18s Limitar resultados
1
artículo
Las enfermedades tropicales desatendidas (ETD) son aquellas que comúnmente se encuentran en varios países de bajos ingresos en África, Asia y América Latina, provocadas básicamente, por el escaso acceso la higiene, agua limpia o sistemas de alcantarillado. Las ETD comprenden una diversidad de enfermedades de alta prevalencia en los países tropicales causadas por una variedad de patógenos, incluyendo bacterias, virus, parásitos y hongos. La epidemiología de las ETD es bastante compleja y se relacionan con las condiciones ambientales del entorno. Muchas son transmitidas por vectores, tienen un origen zoonótico con reservorios animales bien caracterizados y están asociadas con ciclos de vida complejos. Todos estos factores hacen que su control en salud pública sea un desafío; desafío que se caracteriza por la falta de financiamiento en investigación y control. En ese sentido,...
2
artículo
This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Top-down methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used ...
3
artículo
Activities they perform. A problem that apparently is not very important arises or becomes more evident. Talking about the carelessness that we often, without being intentional, have with our pets, the circumstances force us mostly to have tragic endings with them. Therefore, with the advancement of technology, we have the opportunity to greatly reduce this end and thus give utility to the current resources being presented. The objective of the research work is to develop a prototype of a mobile application using the Balsamiq mockup tool and take as a reference the care model of experts in animal care. In this way, it is possible to have better control and monitoring of the health and other care of our pets. For this use, the Rational Unified Process (RUP) methodology since it is the most appropriate for producing high-quality software, giving us a complete vision in the development of e...
4
artículo
Currently, most companies have an induction process whenever they hire a new employee. This implies a constant expense, but for some companies, the induction process only consists of assigning one of the company's internal workers to be in charge of the new worker and teach him the functions that correspond to him; this usually causes the new worker to have a poor performance in the first month of work. This research aims to design a mobile application to improve the induction process and therefore improve the performance of new workers from the first month of work. The methodology used was Design Thinking, which allowed the evaluation of different ideas and then implementation in a solution, prioritizing the user experience and achieving the development of the mobile application. A test was conducted on a population of 43 users, using questionnaires to gather information on their experi...
5
artículo
Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the privacy of personal data. The present work was carried out under a systematic literature review, which aims to show the importance of cybersecurity in the health sector knowing which tools are the most used and efficient to prevent a cyberattack. A systematic review of 301 articles was carried out, 79 of which are aligned with the objective set, fulfilling the inclusion and exclusion criteria. The search for information was carried out in the Scopus and Dimensions databases. The analysis carried out has resulted in good information that was compiled for the development of this topic, being fav...
6
artículo
In the last years, it has been seen how the number of judicial processes in Peru is affected by inefficiency or lack of agility for their attention and due process. Due to the digital transformation that has arisen with the use of IT, it has been necessary to choose to restructure the processes in the judicial systems by prioritizing the activities within each one to adapt to the new context that exists. Thus, given this need, this research arises, which aims to implement a mobile application to optimize the management of notifications in the delivery of judicial deposit certificates in the Judicial Branch. In order to effectively carry out this mobile application, the Mobile-D agile methodology has been chosen, which has 5 phases that start from the exploration phase to the testing phase. In addition, Figma was used as a tool for prototype design. In this way, the objective of improving...
7
artículo
In recent years, information security has become a very important aspect, since it creates serious trouble for organizations that do not take it into consideration. In this regard, it was detected that many entities in the banking sector experience multiple problems that are mainly related to the way in which they protect their data, so it is necessary to pay close attention to this issue. For this reason, in this investigation it was decided to carry out a systematic review of the literature, obtaining 2,787 articles through searches in electronic databases. Likewise, the PRISMA method was used, which allowed the identification of 15 relevant articles to form the synthesis of the investigation. In the same way, a bibliometric analysis was carried out, which allowed knowing the gaps in knowledge. Finally, in the conclusions emphasis is placed on several aspects; for example, it is highli...
8
artículo
[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens throug...
9
tesis de grado
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and countryof publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the...
10
artículo
In recent years, both locally and globally, many citizens are cornered by different diseases which grates a lot of concern in the person, due to the collapse of different medical centers, it is necessary to use information systems. The objective of the research is to develop a mobile application that allows detecting what type of disease a patient suffers from and maintaining communication with the expert in the field using an expert system such as azure machine learning studio that allows detecting the deadliest diseases. For the development of this research, the rup methodology was applied, which allows the use of different techniques where the necessary activities can be carried out with efficient communication. For the validation of this project, a survey was used for the experts with a questionnaire of questions, giving a positive result in the implementation of this project. The re...
11
artículo
In the last decade, mobile applications have proven to be con-stantly evolving where it has played an important role since the development of technology. Children and adolescents are very interested in these new technolo-gies, and it is easier for them to use them, which also helps them to learn any subject of their interest. That is why in this research a mobile application proto-type is designed for the management of courses in secondary education. The Scrum methodology was used to develop its phases. As a result, a proposal arose to develop a prototype of a mobile application to improve student learning. The survey result shows that most of the questions have a high rating scale, with the highest average being 4.91 with a standard deviation of 0.302, and only a low rating scale of 1.45, on average, with a standard deviation of 0.52. The study is scalable, where it can be applied to un...
12
artículo
In this work, the results of the analysis on total electron content (TEC) data before, during and after the geomagnetic storm of 8 September 2017 are reported. One of the responses to geomagnetic storms due to the southern vertical interplanetary magnetic field (Bz) is the enhancement of the electron density in the ionosphere. Vertical TEC (VTEC) from the Center for Orbit determination in Europe (CODE) along with a statistical method were used to identify positive and/or negative ionospheric storms in response to the geomagnetic storm of 8 September 2017. When analyzing the response to the storm of 8 September 2017 it was indeed possible to observe an enhancement of the equatorial ionization anomaly (EIA); however, what was unexpected was the identification of a local TEC enhancement (LTE) to the south of the EIA (∼40°S, right over New Zealand and extending towards the southeastern co...
13
artículo
In this work, the results of the analysis on total electron content (TEC) data before, during and after the geomagnetic storm of 8 September 2017 are reported. One of the responses to geomagnetic storms due to the southern vertical interplanetary magnetic field (Bz) is the enhancement of the electron density in the ionosphere. Vertical TEC (VTEC) from the Center for Orbit determination in Europe (CODE) along with a statistical method were used to identify positive and/or negative ionospheric storms in response to the geomagnetic storm of 8 September 2017. When analyzing the response to the storm of 8 September 2017 it was indeed possible to observe an enhancement of the equatorial ionization anomaly (EIA); however, what was unexpected was the identification of a local TEC enhancement (LTE) to the south of the EIA (∼40°S, right over New Zealand and extending towards the southeastern co...
14
artículo
This research aims to develop a multiplatform mobile application for managing post-Covid-19 patients in a Lima Hospital. The research used the Dart programming language and the Flutter framework to construct the multiplatform mobile application; for the REST services, the PHP programming language and the Laravel framework were used. Finally, all the information is stored in the system. of relational database management, MySql. For the project's development, it was decided to use the Scrum methodology, which was divided into four Srtint. All the needs extracted from the user stories collected by post-Covid-19 patients and medical personnel were reflected. , obtaining as a final product the mobile application and the master manager; finally, three technology specialists and two health specialists used expert judgment to measure the results. As a result, high satisfaction of 88.4% in the cr...
15
artículo
The state company Sedapal contains a wide variety of obsolete technological standards that do not allow the growth of the technological infrastructure due to the limited financing by the state for the operation, maintenance, and renovation of a new structure. Due to this, the objective of this research is to design a server virtualization plan. Virtualization allows physical components to be abstracted and logically replicated. With this, a reduction in operation and maintenance costs can be achieved, in addition to allowing the new virtualized infrastructure to be scalable, expanding the resources that are acquired in the company. Likewise, the methodology used in this research is the waterfall methodology, which is divided into 5 stages, the first stage being the analysis of requirements, to move on to the design of the solution, its subsequent implementation, and the verification stag...
16
artículo
The advantages of machine learning are not only in trying to reduce losses due to better prediction but there are also benefits related to the evaluation of risk profiles, whether they are clients or entities. It also adds to the savings in operating costs and resources that must be reserved to cover potential delinquency. The objective of the work is to imply that artificial intelligence can help measure the credit risk index of a financial institution to avoid loss and thus determine whether to access a loan or not. In the methodology, the Python programming language will be used with the necessary libraries for the analysis of Artificial Intelligence (AI), which, through the steps done in work, will proceed to make an application that demonstrates how useful it is. It is machine learning to avoid losses. Finally, the final result obtained will be the application which shows us if a cl...
17
artículo
“Infectious diseases such as COVID-19, dengue, diphtheria, etc., are spreading throughout the world, just like in Peru. Some of the symptoms of these diseases are similar. Rapid diagnosis is not available in this case, especially in regions with limited medical facilities. In addition, some people are unaware of the symptoms caused by these diseases. The objective of the research is to design a rule-based web expert system prototype using the Buchanan and Rational Unified Process (RUP) methodology and evaluate to determine the feasibility of building the system for early detection and timely treatment of infectious diseases such as COVID-19, Zika, Dengue, Diphtheria, Influenza, Chikungunya, and Monkeypox. The result was a prototype of an expert system with friendly and easy-to-use interfaces. In addition, the quality level of the prototype was evaluated through expert judgment, who ana...
18
artículo
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and th...
19
artículo
Currently, most companies have an induction process whenever they hire a new employee. This implies a constant expense, but for some companies, the induction process only consists of assigning one of the company's internal workers to be in charge of the new worker and teach him the functions that correspond to him; this usually causes the new worker to have a poor performance in the first month of work. This research aims to design a mobile application to improve the induction process and therefore improve the performance of new workers from the first month of work. The methodology used was Design Thinking, which allowed the evaluation of different ideas and then implementation in a solution, prioritizing the user experience and achieving the development of the mobile application. A test was conducted on a population of 43 users, using questionnaires to gather information on their experi...
20
artículo
“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices. Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR) methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; bei...