2:00pm - 2:12pmPredictive Maintenance in Underground using artificial intelligence
Nelson Chambi1, Celso Sanga2, Alejandra Sanga3, Piero Sanga4
1National University of Engineering, Perú; 2San Agustin National University, Perú; 3San Agustin National University, Perú; 4San Agustin National University, Perú
The article addresses predictive maintenance (PdM) applied to underground mining equipment using artificial intelligence, a crucial approach for improving efficiency and reducing operating costs. The objective is to optimize the equipment's lifespan through early fault detection, avoiding costly repairs and unplanned downtime. The challenge lies in the extreme conditions and intensive use of the equipment, which makes it difficult to predict failures using traditional methods. The methodology includes continuous monitoring of key parameters (temperature, pressure, oil analysis, thickness measurement) through sensors and real-time data analysis. This data is processed using artificial intelligence and machine learning techniques to identify patterns that precede failures. The results show that PdM can reduce maintenance costs by 8% and increase equipment availability by 10%, leading to greater productivity and safety in underground mining operations
2:12pm - 2:24pmUse of Business Intelligence in Startups
Carlos Alberto Ramonda
Universidad Siglo 21, Argentina
The management of information in organizations is key to gaining competitive advantages, driving the development of tools and methodologies focused on data analysis, such as Business Intelligence (BI). This study analyzes the use of BI tools in startups in Córdoba and their impact on decision-making. It establishes three objectives: (1) identifying the BI tools used, (2) recognizing the main challenges in their implementation, and (3) analyzing their influence on decision-making processes. Through a quantitative approach, a survey was conducted among Córdoba-based startups to assess BI adoption and its challenges. The results indicate that 45% of startups have adopted these tools, reflecting a growing awareness of their importance. Microsoft Power BI is the most widely used platform, with 85% of respondents favoring it. The main barrier to BI adoption is the lack of training, highlighting the need for educational strategies to improve its use. Other challenges include a lack of awareness, budget constraints, and technical limitations, emphasizing the importance of adaptive approaches based on each company’s reality. Finally, 10 key factors are identified to guide BI adoption in startups, proposing strategies to overcome the detected challenges. These findings underscore the importance of strengthening training and improving access to BI tools to enhance decision-making in Córdoba’s startups.
2:24pm - 2:36pmWeb prototype for parking control on a university campus
Federico Felipe-Duran, Juan-Pablo-Francisco Posadas-Duran, Miguel Sanchez-Meraz
Instituto Politécnico Nacional de Mexico - (MX), México
This paper presents the design of a prototype parking control system with Web Programming for the Smart Campus Zacatenco of the National Polytechnic Institute of Mexico. The Campus has approximately four thousand parking spaces for cars, bicycles and motorcycles, but there is only one access control, without registering who enters driving, nor vehicle data, nor the parking lot, nor the space in which it is parked. The system aims to carry out this control and also provide extra services such as alarms and generate occupancy statistics during different periods of the Institute's school calendar.
2:36pm - 2:48pmVulnerabilidades en la Seguridad Cibernética de Empresas: Un Estudio de Casos
Tamara Howell1, Javier Rojas-Segura1, Jose Martinez-Villavicencio1, Cesar Rodriguez Bravo2
1Tecnológico de Costa Rica, Costa Rica; 2Kyndryl, Inc, Costa Rica
El riesgo cibernético se refiere a los peligros asociados con el uso de tecnologías de información y comunicación, derivado de actividades delictivas. Estos riesgos pueden ser perpetrados tanto por individuos como por organizaciones. Muchas de estas empresas carecen del conocimiento técnico necesario para protegerse eficazmente contra estos ataques, lo que las sitúa en una posición vulnerable. Sin embargo, adoptar una postura proactiva y resiliente les permite gestionar estos riesgos de manera más efectiva. El objetivo de este estudio es comprender el nivel de ciberseguridad en las empresas y analizar el riesgo cibernético al que están expuestas, utilizando un instrumento denominado ECM2 para medir las prácticas de ciberseguridad y obtener datos precisos que permitan una evaluación exhaustiva. Mediante la metodología de estudio de casos se analizaron y compararon empresas de diferentes sectores y tamaños, comprendiendo que tanto empresas transnacionales del sector tecnológico, como pequeñas empresas de servicios de mercado, son vulnerables y presentan un nivel de riesgo cibernético alto, dadas sus falencias en las políticas de uso de dispositivos móviles.
2:48pm - 3:00pmPrivacy in the Skies and Screens: A Survey of IoT Aerospace Systems and Mobile Application Privacy Policies
Rosa Sosa Szurgot, Preethi Santhanam, Catalina Aranzazu-Suescun
Embry-Riddle Aeronautical University, United States of America
Abstract—The rapid integration of Internet of Things (IoT) de- vices and mobile applications across several industries, including health and aerospace, has revolutionized operational efficiency, passenger experience, and safety, in these fields. However, as these devices and applications become more used, the concerns regarding privacy and cybersecurity also increase. Though IoT devices are low-powered and small, they face critical issues supporting traditional security protocols, making them more susceptible to cyber threats. Beyond IoT, mobile applications - whether everyday consumer apps or specialized aerospace software—are essential for both op- erations and customer interactions. These devices usually collect and retain many users’ personal data, and are transmitted via insecure networks, raising data breach concerns. In sectors like aviation and aerospace, where flight data, sensitive information, and real-time systems are consistently being shared, privacy- enhancing technologies such as encryption, anonymization, and secure authentication are essential to minimize possible attacks. This work explores the state-of-the-art on privacy policies for IoT systems and mobile applications, specifically in aeronautics, and provides recommendations for integrating robust privacy and security measures into these technologies.
3:00pm - 3:12pmInteractive application through music, dance and digital animation: complexity and creativity for well-being.
Edgar Lopez-Caudana, David Lascurain, Karla Cruz, Kheri Chavira, Miguel Ogando, David Navarro-Duran
INSTITUTO TECNOLOGICO Y DE ESTUDIOS SUPERIORES DE MONTERREY, México
The arts and electronics have made it possible to innovate with audiovisual elements in art and entertainment. Still, there is rarely an artistic interaction with these technologies since they are only used to display or show artistic works. This article presents an example of how interactivity with technology plays a vital role in personal and/or collective well-being, as it allows us to take the expression of the human being to the next level. Music, an expression of society's origin, has always been seen as something unchangeable or invariable after being produced as a work, but what would happen if music changed to the will of a human being? This project develops a system that allows a user to control multiple parameters of animations and sounds through their movement through wirelessly interconnected sensors, to create an artistic experience that helps increasing the expression and communication of the user beyond their bodily manifestation, obtaining as a result a creative and innovative proposal to improve the level of expression and well-being of users by achieving Objectives of interaction between
Body Movement, Artistic Expression and Technology.
|