Latin American Journal of Computing <div> <p>Latin American Journal of Computing (LAJC) is an open access peer-reviewed journal, sponsored by the <a title="FIS" href="" target="_blank" rel="noopener">Faculty of Systems Engineering</a> of the <a title="EPN" href="" target="_blank" rel="noopener">National Polytechnic School of Ecuador</a>. This journal publishes new results in different areas such as Information Security, Information Systems, Intelligent Systems, Software Engineering and Science, Technology and Society (STS).</p> <p>The goal of this journal is to bring together researchers and practitioners from academia and industry to present original research papers, technical reviews and state-of-the-art reviews for publication.</p> <p>LAJC has a semi-annual periodicity. Authors are cordially invited to contribute to the journal by submitting their manuscripts in either, the January to May number, or July to November number.</p> </div> <p style="text-align: center;">Web Site: <a href="/"></a></p> <p>Indexed:<br><br></p> <table border="0" cellspacing="4" cellpadding="4"> <tbody> <tr> <td style="text-align: center;"><img class="image-left image-border" src="/public/site/images/Administrador/latindexCatalogo2.jpg" alt="latindex" width="112" height="39" border="0"></td> <td><img class="image-left image-border" src="/public/site/images/Administrador/smallLogoCiteFactor.png" alt="Cite Factor" width="129" height="41" border="0"></td> <td><img class="image-left image-border" src="/public/site/images/Administrador/doaj_320.jpg" alt="DOAJ" width="128" height="40" border="0"></td> </tr> </tbody> </table> ESCUELA POLITÉCNICA NACIONAL en-US Latin American Journal of Computing 1390-9266 <p>By participating as Author (s) in LAJC, non-exclusive copyright is transferred to the National Polytechnic School, represented by the Department of Informatics and Computer Sciences, to publish the material submitted by the Author (s) on institutional websites, or print materials from the institution.</p> <p><span id="result_box" lang="en"><span class="hps">The National Polytechnic School and the Department of Informatics and Computer Sciences, ensure that the material will not be released, nor will be used internally for profit through paid subscriptions. The material sent will be used only for academic and scientific purposes.</span></span></p> Statistical Qualification for Approval of Commercial Credits through Generalized Additive Models <p>This article presents the application of a methodological procedure for the construction of a statistical qualification model for the approval of commercial credits in a public financial institution. In this line, the main aim is to reveal the benefits of using generalized additive models (GAM), whose functional structures contemplate the possible non-linearity of the explanatory variables of credit risk in relation to compliance with the payment obligations of borrowers, compared to linear models like the logit. This topic becomes relevant in view of the need for financial institutions to have the right tools and information management systems that allow them to de-establish strategies to improve the placement of their loan portfolio with clients who can fulfill their agreed obligations within the established deadlines, without incurring partial or total delays; in short, minimizing your credit risk. Additionally, in order to meet the stated need, the methodological procedure is applied through programming in the R software, with which the modeling is easily replicable.</p> Verónica Garrido Miguel Flores Luis Felipe Guevara ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 152 171 Development and evaluation of usability of a gamified web application for basic computer education <p>In recent years, the use of educational applications in learning processes in any domain has increased, due to the great potential they have to motivate students. This article illustrates the process of developing a gamified web application for basic computer education to support the digital inclusion process. The tool is designed and gamified using the iPlus methodology oriented to the design of serious games and the XP (Extreme Programming) methodology in its implementation. Both methodologies involve the user in the entire application development process. We also present the usability assessment using the IBM Computer System Usability Questionnaire (CSUQ) questionnaire.</p> Pedro Javier Cuasqui ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 138 151 Design of a portfolio management software to personalize learning in university environments <p>This article presents the process of developing eportfolios management software and the results obtained through its use in a subject. The software focuses mainly on personalizing learning in university context. For this, the system takes into account both the different levels of assimilation of knowledge that a student can achieve and indicators that give the teacher a guideline of progress in the learning process. With the work, authors wants to provide support to teachers in the learning process, through the proposal of a learning path to achieve the highest possible levels of learning for a particular student through the use of learning materials adapted to each situation.</p> Nicolás Eckell Viviana Santucci Lucila Romero ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 114 137 Quality Analysis of Learning Objects in Academic Contexts <p>The quality levels of educational institutions are influenced by the quality of learning objects used in their teaching processes. Considering that there are two disciplines involved in the definition, design and development of these objects, Computer Sciences on the one hand, and Educational Sciences in the other, both realities must be taken into account when analysing the quality of a learning object. Although there are recommendations and standards that propose models to evaluate the quality of software, they were thought and developed with the aim of being adapted to different artifacts at their different stages (design, development process, use, etc.). Therefore, it is necessary to review the proposals and to adapt them specifically objects managed by learning management systems in academic contexts, is presented. This is the first step to the development of a quality analysis model of learning objects.</p> Valeria Iliana Bertossi Maria de los Milagros Gutiérrez Karina Viviana Martinez Lucila Romero ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 100 113 The Internet of Things in Healthcare. An Overview <p>The provision of healthcare is experimenting enormous changes worldwide. Population ageing, rising incidence of chronic diseases, and shortages of resources are placing a heavy burden in current healthcare systems and have the potential to risk the delivery of healthcare in the next few decades. On the other hand, the growing popularity of smart devices for healthcare and wellness, along with advances in wireless communications and sensors are opening the door to novel models of health care delivery supported by the Internet of things (IoT). This paper presents a review of the trends that are driving the development of IoT-based applications for healthcare and briefly describe them at a system level.</p> Alex Cazañas-Gordón Esther Parra-Mora ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 86 99 Design of a simple monitoring system for large-scale networks <p>Currently, there are network management tools that try to monitor devices from different manufacturers. However, none of them allow you to automate the monitoring tasks carried out on the network. To tackle this problem, we propose a tailored system that automatically checks the networking devices’ configuration files. In this way, the technicians can spend their time resolving the faults found, resulting in a more efficient use of their workdays. The proposed monitoring system was developed for the WAN of Corporación Nacional de Telecomunicaciones (CNT EP) of Ecuador, in which two forms are used for the automatic analysis of configuration records: 1) by interactive use of commands that can be used in any of the devices, independently of his brand. 2) by using the MIB objects of Cisco, which are most of the network devices. The system was developed using free software and the whole, automatic network monitoring is carried out by our system in 14 hours, which represents a reduction in time of approximately 94%.</p> Vanessa Napa Luis Urquiza-Aguiar Xavier Calderón-Hinojosa ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 66 85 Evaluation of the functionalities of the intrusion detection systems based on the network of open source platforms using the anomaly detection technique <p>The purpose of this research work is to evaluate the functionality of the intrusion detection systems (IDS) based on Open Source platforms using the anomalies detection technique, defining several concepts about intrusion detection systems. For the evaluation of the IDS a methodology based on the application and quasi-experimental research was used, considering the existing knowledge and the implementation of the cases of: learning, simulation of attacks and application by means of virtual scenarios, on which they were installed the Snort, Suricata and Bro IDS and the different Benchmark tools. The correlation of the alerts issued by both Snort and Suricata using the anomaly detection technique based on statistical data, allowed to determine the true positives (TP) for the effective alerts and the false negatives (FN) for the anomalies.</p> José Eduardo Arteaga Pucha ##submission.copyrightStatement## 2020-07-03 2020-07-03 7 1 48 65