Latin American Journal of Computing <div> <p>Latin American Journal of Computing (LAJC) is an open access peer-reviewed journal, sponsored by the <a title="FIS" href="" target="_blank" rel="noopener">Faculty of Systems Engineering</a> of the <a title="EPN" href="" target="_blank" rel="noopener">National Polytechnic School of Ecuador</a>. This journal publishes new results in different areas such as Information Security, Information Systems, Intelligent Systems, Software Engineering and Science, Technology and Society (STS).</p> <p>The goal of this journal is to bring together researchers and practitioners from academia and industry to present original research papers, technical reviews and state-of-the-art reviews for publication.</p> <p>LAJC has a semi-annual periodicity. Authors are cordially invited to contribute to the journal by submitting their manuscripts in either, the January to May number, or July to November number.</p> </div> <p style="text-align: center;">Web Site: <a href="/"></a></p> <p>Indexed:<br><br></p> <table border="0" cellspacing="4" cellpadding="4"> <tbody> <tr> <td style="text-align: center;"><img class="image-left image-border" src="/public/site/images/Administrador/latindexCatalogo2.jpg" alt="latindex" width="112" height="39" border="0"></td> <td><img class="image-left image-border" src="/public/site/images/Administrador/smallLogoCiteFactor.png" alt="Cite Factor" width="129" height="41" border="0"></td> <td><img class="image-left image-border" src="/public/site/images/Administrador/doaj_320.jpg" alt="DOAJ" width="128" height="40" border="0"></td> </tr> </tbody> </table> ESCUELA POLITÉCNICA NACIONAL en-US Latin American Journal of Computing 1390-9266 <p>By participating as Author (s) in LAJC, non-exclusive copyright is transferred to the National Polytechnic School, represented by the Department of Informatics and Computer Sciences, to publish the material submitted by the Author (s) on institutional websites, or print materials from the institution.</p> <p><span id="result_box" lang="en"><span class="hps">The National Polytechnic School and the Department of Informatics and Computer Sciences, ensure that the material will not be released, nor will be used internally for profit through paid subscriptions. The material sent will be used only for academic and scientific purposes.</span></span></p> Switching Systems Synthesis Method Using Permuted Gray Code Tables (PGC Method) <p>Finding the shortest function on switching systems is a necessity for the development of efficient automatic systems. Currently, several methodologies aim to solve this need with different techniques. This article proposes a new methodology to find a propositional formula that describes a switching system problem using several truth tables which are based on an original one; these tables are generated using Gray Code principles and permutations. As it will be shown, the used code has a direct relation to the Hamiltonian paths, where each permutation is a different connection in a hypervolume, and each node is represented as a bit combination. An algorithm was developed using MATLAB and compared with the solutions from the software Boole-Deusto to verify and validate the applicability and implementation of the method. Finally, examples of execution, computational cost comparison and future work proposals are presented.</p> Cesar Troya-Sherdek Valentin Salgado-Fuentes Jaime Molina Gustavo Moreno ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 118 129 Autonomous Cycles of Data Analysis based on Process Mining for the Study of the Curricular Behavior of Students <p>In this work, the curricular behavior of the students of a master's degree program is evaluated through Process Mining. Specifically, what is related to the determination of the internal and external factors that affect the pursuit of their studies is analyzed. To understand student behavior, the MIDANO methodology is used, which has been used for the development of data analytics applications. In particular, it is specified the Autonomous Cycles of data analysis tasks that allow studying the dropout of the master's degree program during schooling or during the development of graduate thesis, in order to determine the causes or problems that arise during the pursuit of the studies. Very encouraging results were obtained on the causes of the dropout of the master's degree program, which discover the autonomous cycles.</p> Sonia Duarte Jose Aguilar ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 54 69 RESTful and SOAP Services Orchestration: Case Study, American Visa Assignment <p>This article presents the analysis of a case of U.S. visa assignment by extracting information from different entities. The following data sources are used for this issue: (i) personal information of the applicant, (ii) information on the person's real estate, and (iii) credit history from banks. For the extraction of the information, interfaces were created that simulated the operation of these entities and their respective databases and web services. For data submission, the use of a service-oriented architecture (SOA) by developing a service orchestration system was implemented in the application. In this context, BPEL language concepts were applied, which aim to demonstrate the importance of service orchestration across enterprises or organizations and the great utility of having integrated services. The concepts applied in the development of the final system corroborate its use, since the modules developed can be integrated with others without the need to redesign them from scratch, which is a substantial aid in the search for optimal solutions for IT infrastructures.</p> Jhon Calle Pablo Lója Marcos Orellana Priscila Cedillo ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 92 103 The Zero-day attack: Deployment and evolution <p>In cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact.&nbsp; Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-day attack, how to understand its real impact, and a few different accessible solutions nowadays. This study introduces a useful reference that provides researchers with knowledge to understand the current problem concerning zero- days attacks; hence they could develop solutions for facing them.</p> Xavier Riofrío Fabian Astudillo-Salinas Luis Tello-Oquendo Jorge Merchan-Lima ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 38 53 Big Data Analytics Architecture for Cybersecurity Applications <p>The technological and social changes in the&nbsp; cur- rent information age pose new challenges for security analysts. Novel strategies and security solutions are sought to improve security operations concerning the detection and analysis of security threats and attacks. Security analysts address security challenges by analyzing large amounts of data from server logs, communication equipment, security solutions, and blogs related to information security in different structured and unstructured formats. In this paper, we examine the application of big data to support some security activities and conceptual models to generate knowledge that can be used for the decision making or automation of security response action. Concretely, we present a massive data processing methodology and introduce&nbsp; a&nbsp; big data architecture devised for cybersecurity applications. This architecture identifies anomalous behavior patterns and trends to anticipate cybersecurity attacks characterized as relatively random, spontaneous, and out of the ordinary.</p> Roberto Omar Andrade Luis Tello-Oquendo Susana Cadena-Vela Patricia Jimbo-Santana Juan Zaldumbide Diana Yacchirema ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 22 37 Graph Model for Detection of text unstructured data such as Sarcasm <p class="p1">Sarcasm is frequently characterized as verbal incongruity to communicate scorn. It is a nuanced type of language with which people express something contrary to what is suggested. Perhaps the greatest test in building frameworks to consequently recognize unstructured information, for example, mockery, is the absence of huge, commented on informational indexes. We propose a diagram-based procedure in building conservative language models for sarcasm recognition. This strategy is likewise intended to utilize little information, it could help in different regions like disdain discourse, counterfeit news, and so forth. This charting strategy permits specialists to explore different parts of NLP without obtaining a huge dataset. These days, it still remains a challenge to unmistakably distinguish human slants and feelings by utilizing AI. Associations can use a superior philosophy to settle on proactive choices in basic circumstances. A definite investigation of our examination would hoist the current content mining applications and may help understand better the effect of mockery from the customers and partners communicated in a web-based media climate. We exhibit that straightforward classifiers worked from the model can recognize mockery very well, which they sum up 5 % better than those of the cutting edge.</p> Axel Rodríguez-García Armando Jipsion ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 70 91 Data migration process in the implantation of Enterprise IT Applications <p>Data migration is defined as the transfer of data between database management systems. There are few methodologies, strategies and techniques on data migration, however, these are not applied, are unknown or mostly designed for large companies. The purpose of this research is to develop a description of the data migration process in the implantation of Enterprise IT Applications (EITA). The methodology we use is a field study, which is based on the case study methodology proposed by Yin. This field study consisted of interviews with expert consultants and staff of the SMEs that participated in a data migration process. The qualitative analysis of the data collected was carried out with the MAXQDA tool, following Kuckartz's recommendations. The resulting process details the phases, activities and actors involved in the data migration.</p> Elvis Moreta Irving Reascos ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 104 117 Electric Vehicle with Speed Control Algorithm and Regenerative Braking and the Design of a Mobile Web App based on IoT <p>Currently, most electric vehicles for personal mobility do not keep a constant speed and they do not brake automatically when the system requires. Moreover, this braking energy is not used to power the system itself. To overcome these problems, this work presents the implementation of control algorithms and a web app for an electric vehicle for personal mobility. A cascade control algorithm is implemented where the internal loop is torque and the external loop is speed. Additionally, a mobile web app based on IoT was designed to display in real time some important information about the system status. Eventually, simulations and real test were performed indicating fast torque and speed response when the system is subjected to different mobility scenarios.</p> Axel Pulamarin ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 130 141 Editorial <p style="text-align: justify;"><strong>We reached 100 scientific papers published!</strong></p> <p style="text-align: justify;">A scientific journal aims to disseminate knowledge, ensuring the proper development of the evaluation process as an essential component to guarantee the validity of its content.&nbsp; The heart of our journal is to motivate the scientific production of original articles and their dissemination. This is what we have reflected in the 16 issues published over these six years, on a semi-annual basis, in which we have reached a total record of 101 contributions.&nbsp; The Journal LAJC, sponsored by the Faculty of Systems Engineering of the “Escuela Politécnica Nacional del Ecuador”, since its launch in late 2014, publishes an average of six to seven articles per issue. Beyond the implications caused due to the global health emergency caused by COVID-19, we present Volume VIII, Number 1.&nbsp; In September 2019, I was entrusted with the responsibility of being the&nbsp; Editor of the journal, transferring the responsibility to a work team that&nbsp; contributed to the creation of a renewed and avant-garde image in&nbsp; accordance with the latest technological developments that are emerging&nbsp; in our time.&nbsp; We have successfully achieved indexing in the Latindex catalog database with methodology 2.0, and inclusion, once again, in the Directory of Open Access Journals -DOAJ. In line with the international requirements for indexing databases, we have regulated the periodicity. In short, we are bringing a new beginning to the journal and, in this issue, the 100th article is published.&nbsp; These results, in addition to rejoicing and encouraging us to go for more, remind us of gratitude to those who laid the foundations of the journal, as well as to those who contribute every day to LAJC.&nbsp; I cordially invite you to take advantage of the reading of this issue that&nbsp; includes eight research articles related to relevant topics on: process&nbsp; mining, data analysis, service orchestration, AAL assistive technologies,&nbsp; natural processing language, data migration and cybersecurity.&nbsp; Finally, on behalf of the LAJC team, our best wishes that during this 2021 we can continue to share scientific production with a renewed spirit.&nbsp;&nbsp;&nbsp;</p> Marco Santórum ##submission.copyrightStatement## 2021-01-01 2021-01-01 8 1 14 17