Ingeniería, arquitectura, urbanismo
URI permanente para esta comunidad
Contenidos producidos por la comunidad de la Universidad Cooperativa de Colombia, incluye los temas de desarrollo de software, ingeniería ambiental, ingeniería civil, ingeniería de sistemas, ingeniería de telecomunicaciones, ingeniería electrónica, ingeniería industrial, ingeniería mecánica, redes de telecomunicaciones, tecnología de sistemas, tecnología en electrónica, tecnologías de la información y telemática. Está conformada por trabajos de grado, artículos, imágenes, documentos de trabajo, recursos educativos digitales, libros, capítulos de libros, ponencias, webinars, videos, lecturas críticas, reportes de investigación, consultorías, guías y experiencias significativas.
Examinar
Examinando Ingeniería, arquitectura, urbanismo por Sede "Bucaramanga"
Mostrando1 - 20 de 236
Resultados por página
Opciones de clasificación
- ÍtemActualización del sistema de información Sócrates a la nueva plataforma de desarrollo Delphi Xe3(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2015) Sánchez Cadena, Miguel Andrés; Arismendi Santos, José RicardoInformation systems every day are emphasized as an important area and have become essential part of business, allowing to obtain or access real-time information for decision making and monitoring them. Information systems are largely those that enable companies in the sector possession being developed, this is because the information found is efficient and reliable, allows agility and generates benefits to both internal and external users. Socrates The information system is designed to capture information related to the provision of hospital services, process it and mainly perform billing; This process is the most important feature with which the IPS, because ultimately allows the collection of resources used in the provision of services. For this reason we performed an upgrade to the system to meet the needs of customers, making it competitive in the market and be at the forefront of current technologies migrating from Delphi 6 to Delphi xe3 platform. The update is performed using as event reengineering software, was used to the methodology proposed in the paradigm of Roger Pressman cyclic model is an interactive model that coast 6 interactions or activities, can study and learn in an organized, quick and brief structure and operation of the system.
- ÍtemAdopción del proceso “estrategia del servicio” de la biblioteca de infraestructura de tecnologías de la información (itil®), en la línea de it de halliburton latín américa s.a., sucursal Colombia(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2014) Orjuela Abril, Carlos Andrés; Vela Sáenz, Yovanny
- ÍtemAnálisis de estrategias actuales en controles prenatales que permitan implementar herramientas tic para la mitigación de inasistencia antes de la semana doce de gestación(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Maestría en Gestión de Tecnologías de la Información, Bucaramanga, 2023-06-23) Jaimes Sandoval, Holger Humberto; Ortiz Rojas, Julieth Kristina; Pedro Alberto Arias Quintero, Director; Fredy Angarita Reina, CodirectorIn this exploration, the fundamental reasons for non-attendance are established, establishing the most relevant ones and thus being able to include them within the design of strategies supported by IT, which gives a high proportion of solutions to this problem, while its application allows to positively influence Development of indicators of the (Ministry of Health - Resolution 408, 2018) for the evaluation of Management Management Plan of the E.S.E. For its development, over several years and through field research experiences on this topic, it has been seen by the authors that there are several components that affect this early onset of this fundamental consultation, the implementation of similar readings in numerous areas around the world, Colombia and at regional level, which establish causes in general, as well as the behavior of the consultation or controls in the last three vigencies in the E. For this reason, we pose the following research question: What strategies in information technology should be implemented so that the mothers of the municipality of Onzaga start their prenatal checkups early with all the activities of promotion and prevention (P&P) in the E.S.E. Hospital Integrado San Vicente de Paúl. By observing the latest results and their impact on the health of pregnant women and their babies at birth who do not start prenatal checkups on time at the IPS (Institution providing services) of the municipality where they are zoned, noting that there are protocols and care guidelines adopted and applied by the Ministry of Health and Social Protection, In addition to this, their quality of user can be obtained by any person of the affiliation regimes (subsidized, contributory, poor or vulnerable population, special regime), finding that the health benefits of the mother-child binomial are a priority and therefore the attention through early prenatal checkups.
- ÍtemAnálisis de la gestión de proyectos de tecnologías de información en el sector público. Una revisión de literatura.(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Maestría en Gestión de Tecnologías de Información, Bucaramanga, 2020-12) Maestre-Gongora, Gina Paola; Osorio-Sanabria, Mariutsi Alexandra; Cuy Cruz, José EginioInfomation Technology (IT) management contributes to achieving an organization's objectives, goals and benefits. This process requires combining resources, knowledge, and best practices to support the planning, development, and implementation of technological solutions that support all organizational units' operation. One of the tools that facilitate this task is IT project management. However, IT projects are carried out in a decentralized and isolated manner in the public sector, without adequate management to optimize the resources available to public entities. This study aims to compare the best practices and cases of application of IT project management in public entities from the technical, normative and organizational perspective. The research is based on a literature review of secondary sources and academic databases from 2010 to 2020. In general, barriers and challenges to overcome were identified about the absence of an IT organizational unit that is transversal to the organization, low empowerment of IT as strategic support, clearly defined processes and roles, and few guidelines and methodologies that guide the adoption of best practices or standards; therefore, the need to propose instruments that guide and facilitate the adoption of a reference framework for IT project management in public sector entities in Colombia is evident.
- ÍtemAnálisis de seguridad contra ataques Cross site en sitios CSM aplicando la herramienta OWASAP ZAP: aso de estudio Wordpress versión 4.7.4(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2016) Orduz Rodríguez, Bryan Johao; Figueroa Lizcano, Guillermo; García Carreño, Marcos Andrés; Castellanos Guarín, Luis Fernando
- ÍtemAnálisis de técnicas antiforenses(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2014) Hernandez Valencia, Marilyn; Galvis Leon, Cesar; Torres Barreto, Martha Liliana
- ÍtemAnálisis de vulnerabilidades en aplicaciones WEB desarrolladas en PHP versión 5.6.24 con Base de Datos MySQL versión 5.0.11 a partir de ataques SQL Inyección(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2017) Amado Ballén, John William; Ayala Calderón, Carlos Andrés; Sierra Morales, Armando Andrés; Castellanos Guarín, Luis Fernando
- ÍtemAnálisis de vulnerabilidades en seguridad informática de los servidores del programa ingeniería de sistemas para la universidad cooperativa de Colombia sede Bucaramanga(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2015) García Jaimes, Felix Adolfo; Albarracín Navas, Elkin Alfredo
- ÍtemAnálisis del ataque cross-site request forgery (falsificación de petición en sitios cruzados) en aplicaciones web desarrolladas con PHP versión 5.6 o superior(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2017) de Ávila Arce, Daniel Eduardo; Peñaloza Urbina, Jonathan Alexander; Llanes Baquero, Sergio Daniel; Castellanos Guarín, Luis Fernando
- ÍtemAnálisis del proceso de arquitectura empresarial para el diseño de una PMO para el área de gestión tic de la secretaría de educación y cultura del Tolima, bajo los estándares de PMI(Universidad Cooperativa de Colombia, Bucaramanga, Maestría en Gestión de Tecnologías de la Información, 2019-10-09) Hernández Carrillo, Geidy Katherine; Jaramillo Díaz, Sofia; Arias Quintero, Pedro Alberto; Angarita Reina, Fredy
- ÍtemAnálisis e identificación de vulnerabilidades informáticas mediante la aplicación de técnicas de inyección SQL, con la herramienta open source SQLMAP version 1.1 a la pagina, www.endesatuvidamasfacil.com perteneciente a la empresa Endesa.(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2017) Ruiz Hernández, Natalia; Torres Forero, Yeison Giovanny; Castellanos Guarín, Luis Fernando
- ÍtemAnálisis forense a los nuevos discos duros o rígidos(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2014) Acero Quintero, Leidy Paola; Jurado Rueda, Javier Enrique; Tellez Jerez, Jaime Horacio; Torres Barreto, Martha LilianaStore information has been one of the characteristic features of computers since its inception, a function could be extended to other applications, thus developing hardware and devices with more capacity, efficiency, speed and reliability, able to meet the new demands of programs and the latest technology, but the ability to store more and better information has also allowed the construction of programs, applications and methods to commit illegal activities, why developers of computer equipment and high tech have created ways to encrypt records in their storage devices and how to regain form as proof of the activities in these, by their users. Thus, information technology developers have been implementing a different storage device in traditional dishes HDD (HDD), which is known as Solid State Disk (SSD), developed to meet the need to store and retrieve programs and files efficiently, avoiding unexpected or accidental loss of your information stored on the hard drive of the computer or device, evolution dates back to 1956, when IBM introduced a hard disk with a (larger ton a fridge ), and with only a capacity of 5 MB, even working with vacuum tubes and going to physical Albert Fert (French) and Peter Grünberg (German), both Nobel prize in physics for his contributions in the field of storage magnetic, when it could improve the ability to save information, which in the year 1992 and had disks storage capacity of 250 MB and were 3.5 inch, ten years later store reached 40,000 thousand MB or equivalent to 40 GB until today over 1 million TB or MB. This supports the creation of procedures to protect the information stored on the hard drives and know that the movements are or what has been able to maintain this growth leads to implement el forensics, but this in turn has to be dynamic with the new technology and progress, looking for tools that will facilitate the search for information and data procedure de Thus, the computer forensics hard disks, applied to new SSD has great revealance in business, legal and investigative authorities and people they store important information, which allows a higher level of security and the ability to restore the normal state of a system after being a victim of crime or accident, this is where computer forensics and analysis of hard or rigid disks plays a key role in information security, institutions and individuals. These procedures are based on deliberate actions to collect evidence, analyze and identify a trial or data loss. Its main requirements are guiding users on the importance of forensics to hard or hard drives. This discipline makes use of technology to maintain the integrity of the data and the procedure thereof. To perform an analysis considers four parts are: the victim, crime scene evidence and a suspect, so digital evidence is very important and useful for determining a trial. All this leads to an assessment of tools to perform forensic analysis led to hard drives, which have a life cycle for the evidence, which are: preparation, detention, and forensic analysis, choice of response strategy, tracking and recovery. Moreover, data recovery is functional in the loss of information due to blows to the computer, falls, accidental deletion or formatting or intentional, a computer virus infected files, rust from hard drive, contrasting temperatures, hard drive Obsolete or manufacturing defect, causing economic losses and if they are of criminal origin, could further raise these costs and cause legal problems.
- ÍtemAnálisis forense al malware keylogger en entorno de windows(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2014) Palencia Castañeda, Edlin Janire; Trillos Serrano, Andrea; Torres Barreto, Martha LilianaCurrently it is of great importance because Computer forensics through it , companies get a response to privacy issues , unfair competition , fraud, theft of confidential information and / or industrial espionage arose through misuse of information technologies . Through its procedures are identified, they say, extracted, analyzed and presented electronically generated and stored so that they can be accepted in a court case testing. For all the above is appropriate for every institution to invest in the security of the organization as it is to provide users with a high degree of confidentiality, integrity and availability of information but if you do not have a proper security framework, it they may have various sources of attacks, threats, consequences and means of proliferation that could have a negative impact on organizations. For the foregoing procedure was generated for analysis and monitoring of malware on Windows Operating System, through various tools for detection and prevention, to provide evidence in a judicial proceeding. This procedure is important to prevent intrusions to the operating system, and through this project is to conduct an audit keylogger malware, to know its form of intrusion, functions and objective to enter the operating system, allowing to determine the behavior of malware, and in turn, generate a useful evidence in a judicial proceeding. This project was feasible in the legal part, because research done and information collected for the project is clearly referenced, avoiding fraud and plagiarism of other projects. Also, the software used is free to use. Overhead and computer equipment were assumed by the authors of the project. The methodology used to conduct a study of incidents with which it was possible to review how the keylogger has been entered into the system, sending packages and functionality of the malware was examined. Finally the information was used as digital evidence to serve in a judicial process is preserved. As a final purpose , we propose that users aware of the importance of information security to ensure the confidentiality of personal data such as passwords , bank details , personal information, considering that this type of malware can be installed on the computer by using email, instant messaging or simply mismanagement computer equipment or USB.
- ÍtemAnálisis y diseño de un sistema domótico para climatización e iluminación inteligente. Caso de uso: abcell comunicaciones fase1(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2017) Jaimes Carreño, Edgar Yesid; Álvarez Montañez, Edinson Giovanny; Castellanos Guarín, Luis FernandoEl presente proyecto tiene como fin obtener un documento que permita conocer acerca de la automatización de procesos “domótica” a través de los diferentes protocolos, tecnologías, arquitecturas, medios de transmisión y componentes de la misma para el control de iluminación y climatización. De tal forma que se pueda establecer y diseñar la mejor tecnología aplicable para el caso de estudio: ABCell Comunicaciones.
- ÍtemAnalizando Big Data – caso de estudio: “UCC Logging Architecture”(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Maestría en Gestión de Tecnologías de Información, Bucaramanga, 2022-07) Gonzalez Fabra, Bertha Aidee; Sánchez Torres, José Danilo; Arias Quintero, Pedro Alberto; Delgado, Daniel RicardoThe proposal of this work consists of an analysis of new technologies for the reception and processing of log files, in a secure and independent way of the information system involved. These technologies are part of a series of hardware and software components used for this purpose, which will allow the representation of the information analyzed from these logs, in a clear and exclusive way for the interested parties and owners of these information systems through the generation of dashboards. This will be possible through the creation of a software component that will facilitate the activities related to the processing of these files and the generation of dashboards per user representing the company interested in participating in this data analysis.
- ÍtemAplicabilidad del machine Learning For Kids como estrategia didáctica para el aprendizaje de la competencia planteamiento y resolución de problemas matemáticos con estudiantes de noveno grado(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Maestría en Gestión de Tecnologías de Información, Bucaramanga, 2023-07-08) Gracia Flóres , Yeison; Mendoza Rivera , Stivill; Arias Quintero , Pedro AlbertoThis project explores the use of machine learning for the San Juan de Eudes educational institution in the city of Medellín. The importance of theory and practice in the introduction of advanced digital technology with a pedagogical and cultural approach that can be addressed in the current context after favoring visions defined by the competence, approach and resolution of mathematical problems, as an unavoidable necessity in the training of all students belonging to the ninth grade of this institution, by optimizing educational processes to teach traditional lessons within the classroom; but, with an attractive and innovative countenance. Agree to create solutions with the help of games, workshops and interactive computer activities for training purposes that facilitate the estimation of the performance of a technological resource based on tools developed by the "Machine Learning For Kids" technological platform as a relevant option for automatic training To carry out this procedure, it was defined to apply a methodological route of work with a qualitative-quantitative (mixed) approach, which crosses statistical data and descriptive definitions delimited by experience during the development of this training process, where initially a diagnostic test is made. of knowledge to later develop the resource that best suits the academic needs and that are aligned with the didactic strategy that must be implemented for this academic process.
- ÍtemAplicabilidad del Machine Learning for kids como estrategia didáctica para el aprendizaje de la competencia planteamiento y resolución de problemas matemáticos con estudiantes de noveno grado de la Fundación Educativa San Juan Eudes.(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Maestría en Gestión de Tecnologías de la Información, Bucaramanga, 2023-06) Gracia Flórez, Yeison Ferney; Mendoza Rivera, Stivill; Pincay Lozada, Jorge Luis; Arias Quintero, Pedro AlbertoThis project explores the use of machine learning for the San Juan de Eudes educational institution in the city of Medellín. The importance of theory and practice in the introduction of advanced digital technology is explored with a pedagogical and cultural approach that can be addressed in the current context after favoring visions defined by the competence, approach and resolution of mathematical problems, as an unavoidable necessity in the training of all students belonging to the ninth grade of this institution, through the optimization of educational processes to teach traditional lessons within the classroom; but, with an attractive and innovative countenance. Agree to create solutions with the help of games, workshops and interactive computer activities for training purposes that facilitate the estimation of the performance of a technological resource based on tools developed by the "Machine Learning For Kids" technological platform as a relevant option for automatic training To carry out this procedure, it was defined to apply a methodological route of work with a qualitative-quantitative (mixed) approach, which crosses statistical data and descriptive definitions delimited by experience during the development of this training process, where initially a diagnostic test is made. of knowledge to later develop the resource that best suits the academic needs and that are aligned with the didactic strategy that must be implemented for this academic process.
- ÍtemAplicación de hacking ético mediante ataques Dos y DDoS a página web www.projectionlife.com(Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bucaramanga, 2018) Suarez Hernández, Miguel Fernando; García Mantilla, Cindy Marlay; Castellanos Guarín, Luis Fernando
- ÍtemAplicación de minería de datos en el proceso de toma de decisiones de proyectos energéticos en zonas no interconectadas en Colombia(Universidad Cooperativa de Colombia, Posgrado, Maestría en Gestión de Tecnologías de la Información, Bucaramanga, 2021-01-05) Camacho perez, Elizabeth Tatiana; Colmenares Quintero, Ramón Fernando; Maestre Góngora, Gina Paola