305 research outputs found

    RECOMENDACIONES DE SEGURIDAD EN EXÁMENES: ANTES, DURANTE Y DESPUÉS

    Get PDF
    Este artículo presenta un análisis de los posibles fraudes la realización de exámenes, con especial énfasis en aquellos tipos de fraude que empleen algún mecanismo basado en la tecnología y propone un conjunto de recomendaciones para la mejorar de la seguridad de los mismos. El trabajo se centra en los fraudes relacionados con los exámenes tradicionales. No se abordan las amenazas específicas contra exámenes realizados mediante ordenador o en plataformas online, aunque algunas de las medidas propuestas también suponen mejoras para dichos entornos. This article presents an analysis of the potential frauds related to test realization, focusing on technology-based frauds and establishes a set of recommendations and good practices to improve test security. This work deals with ‘pen and paper’ tests. The specific threats against compute-based or online tests are out of the scope of this work; they could benefit from the application of some of the recommendations outlined here, though

    Performance analysis of a security architecture for active networks in Java

    Get PDF
    Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic implementations in Java.Publicad

    Dataset of academic performance evolution for engineering students

    Get PDF
    This data article presents data on the results in national as- sessments for secondary and university education in engineering students. The data contains academic, social, economic information for 12,411 students. The data were obtained by orderly crossing the databases of the Colombian Institute for the Evaluation of Education (ICFES). The structure of the data allows us to observe the influence of social variables and the evolution of students’ learning skills. In addition to serving as input to develop analysis of academic efficiency, student recommendation systems and educational data mining

    A machine learning approach for banks classification and forecast

    Get PDF
    n this research, a classification model is developed for the banking sector using the machine earning technique GLMNET. In the first place, a clustering process was developed, where 3 clearly differentiated groups were found. Subsequently, a Fuzzy analysis was performed finding the probabilities of transition of the banks to each group found, finally, the GLMNET algorithm was implemented, the automatic classification of the banks according to their financial items, obtaining a result of 95% accuracy. © 2019 International Business Information Management Association (IBIMA)

    Hierarchical Clustering and Linguistic Mediation Rules for Multiagent Negotiation

    Get PDF
    Eleventh International Conference on Autonomous Agents and Multiagent Systems AAMAS 2012, , 04/06/2012-08/06/2012, Valencia, EspañaWe propose a framework based on Hierarchical Clustering (HC) to perform multiagent negotiations where we can specify the type of agreements needed in terms of utility sharing among the agents.The proposed multi-round mediation process is based on the analysis of the agents" offers at each negotiation round and the generation of a social contract at each round as a feedback to the agents, which explore the negotiation space to generate new offers. This mechanism efficiently manages negotiations following predefined consensus policies avoiding zones of no agreemen

    Mecanismos de Seguridad para una red ad hoc en un entorno urbano

    Get PDF
    Las redes ad-hoc representan un paradigma de comunicación\ud emergente cuya aplicación se ha propuesto en diversos entornos por su\ud capacidad de autoconfiguración y rápido despliegue. Sin embargo, siguen\ud planteados importantes desafíos relativos a problemas de seguridad. Uno\ud de estos problemas es la gestión y distribución de claves. Se propone la\ud aplicación del protocolo TESLA de distribución de claves a una red adhoc\ud de servicios en un entorno urbano como la alternativa más adecuada\ud frente a otras propuestas en el estado del arte. Finalmente, se realizan\ud pruebas de validación de un estadio preliminar del algoritmo propuesto
    corecore