Conference Agenda

Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).

Please note that all times are shown in the time zone of the conference. The current conference time is: 1st June 2025, 04:21:13am CST

 
Only Sessions at Location/Venue 
 
 
Session Overview
Session
52B
Time:
Wednesday, 16/July/2025:
2:00pm - 3:45pm

Location: Room 03: Alameda 3

Main level
Session Topics:
In Person

Show help for 'Increase or decrease the abstract text size'
Presentations
2:00pm - 2:12pm

Predictive Maintenance in Underground using artificial intelligence

Nelson Chambi1, Celso Sanga2, Alejandra Sanga3, Piero Sanga4

1National University of Engineering, Perú; 2San Agustin National University, Perú; 3San Agustin National University, Perú; 4San Agustin National University, Perú

The article addresses predictive maintenance (PdM) applied to underground mining equipment using artificial intelligence, a crucial approach for improving efficiency and reducing operating costs. The objective is to optimize the equipment's lifespan through early fault detection, avoiding costly repairs and unplanned downtime. The challenge lies in the extreme conditions and intensive use of the equipment, which makes it difficult to predict failures using traditional methods. The methodology includes continuous monitoring of key parameters (temperature, pressure, oil analysis, thickness measurement) through sensors and real-time data analysis. This data is processed using artificial intelligence and machine learning techniques to identify patterns that precede failures. The results show that PdM can reduce maintenance costs by 8% and increase equipment availability by 10%, leading to greater productivity and safety in underground mining operations



2:12pm - 2:24pm

Use of Business Intelligence in Startups

Carlos Alberto Ramonda

Universidad Siglo 21, Argentina

The management of information in organizations is key to gaining competitive advantages, driving the development of tools and methodologies focused on data analysis, such as Business Intelligence (BI). This study analyzes the use of BI tools in startups in Córdoba and their impact on decision-making. It establishes three objectives: (1) identifying the BI tools used, (2) recognizing the main challenges in their implementation, and (3) analyzing their influence on decision-making processes. Through a quantitative approach, a survey was conducted among Córdoba-based startups to assess BI adoption and its challenges. The results indicate that 45% of startups have adopted these tools, reflecting a growing awareness of their importance. Microsoft Power BI is the most widely used platform, with 85% of respondents favoring it. The main barrier to BI adoption is the lack of training, highlighting the need for educational strategies to improve its use. Other challenges include a lack of awareness, budget constraints, and technical limitations, emphasizing the importance of adaptive approaches based on each company’s reality. Finally, 10 key factors are identified to guide BI adoption in startups, proposing strategies to overcome the detected challenges. These findings underscore the importance of strengthening training and improving access to BI tools to enhance decision-making in Córdoba’s startups.



2:24pm - 2:36pm

Web prototype for parking control on a university campus

Federico Felipe-Duran, Juan-Pablo-Francisco Posadas-Duran, Miguel Sanchez-Meraz

Instituto Politécnico Nacional de Mexico - (MX), México

This paper presents the design of a prototype parking control system with Web Programming for the Smart Campus Zacatenco of the National Polytechnic Institute of Mexico. The Campus has approximately four thousand parking spaces for cars, bicycles and motorcycles, but there is only one access control, without registering who enters driving, nor vehicle data, nor the parking lot, nor the space in which it is parked. The system aims to carry out this control and also provide extra services such as alarms and generate occupancy statistics during different periods of the Institute's school calendar.



2:36pm - 2:48pm

Vulnerabilidades en la Seguridad Cibernética de Empresas: Un Estudio de Casos

Tamara Howell1, Javier Rojas-Segura1, Jose Martinez-Villavicencio1, Cesar Rodriguez Bravo2

1Tecnológico de Costa Rica, Costa Rica; 2Kyndryl, Inc, Costa Rica

El riesgo cibernético se refiere a los peligros asociados con el uso de tecnologías de información y comunicación, derivado de actividades delictivas. Estos riesgos pueden ser perpetrados tanto por individuos como por organizaciones. Muchas de estas empresas carecen del conocimiento técnico necesario para protegerse eficazmente contra estos ataques, lo que las sitúa en una posición vulnerable. Sin embargo, adoptar una postura proactiva y resiliente les permite gestionar estos riesgos de manera más efectiva. El objetivo de este estudio es comprender el nivel de ciberseguridad en las empresas y analizar el riesgo cibernético al que están expuestas, utilizando un instrumento denominado ECM2 para medir las prácticas de ciberseguridad y obtener datos precisos que permitan una evaluación exhaustiva. Mediante la metodología de estudio de casos se analizaron y compararon empresas de diferentes sectores y tamaños, comprendiendo que tanto empresas transnacionales del sector tecnológico, como pequeñas empresas de servicios de mercado, son vulnerables y presentan un nivel de riesgo cibernético alto, dadas sus falencias en las políticas de uso de dispositivos móviles.



2:48pm - 3:00pm

Privacy in the Skies and Screens: A Survey of IoT Aerospace Systems and Mobile Application Privacy Policies

Rosa Sosa Szurgot, Preethi Santhanam, Catalina Aranzazu-Suescun

Embry-Riddle Aeronautical University, United States of America

Abstract—The rapid integration of Internet of Things (IoT) de-
vices and mobile applications across several industries, including
health and aerospace, has revolutionized operational efficiency,
passenger experience, and safety, in these fields. However, as
these devices and applications become more used, the concerns
regarding privacy and cybersecurity also increase. Though IoT
devices are low-powered and small, they face critical issues
supporting traditional security protocols, making them more
susceptible to cyber threats.
Beyond IoT, mobile applications - whether everyday consumer
apps or specialized aerospace software—are essential for both op-
erations and customer interactions. These devices usually collect
and retain many users’ personal data, and are transmitted via
insecure networks, raising data breach concerns. In sectors like
aviation and aerospace, where flight data, sensitive information,
and real-time systems are consistently being shared, privacy-
enhancing technologies such as encryption, anonymization, and
secure authentication are essential to minimize possible attacks.
This work explores the state-of-the-art on privacy policies for
IoT systems and mobile applications, specifically in aeronautics,
and provides recommendations for integrating robust privacy
and security measures into these technologies.



3:00pm - 3:12pm

Interactive application through music, dance and digital animation: complexity and creativity for well-being.

Edgar Lopez-Caudana, David Lascurain, Karla Cruz, Kheri Chavira, Miguel Ogando, David Navarro-Duran

INSTITUTO TECNOLOGICO Y DE ESTUDIOS SUPERIORES DE MONTERREY, México

The arts and electronics have made it possible to innovate with audiovisual elements in art and entertainment. Still, there is rarely an artistic interaction with these technologies since they are only used to display or show artistic works. This article presents an example of how interactivity with technology plays a vital role in personal and/or collective well-being, as it allows us to take the expression of the human being to the next level. Music, an expression of society's origin, has always been seen as something unchangeable or invariable after being produced as a work, but what would happen if music changed to the will of a human being? This project develops a system that allows a user to control multiple parameters of animations and sounds through their movement through wirelessly interconnected sensors, to create an artistic experience that helps increasing the expression and communication of the user beyond their bodily manifestation, obtaining as a result a creative and innovative proposal to improve the level of expression and well-being of users by achieving Objectives of interaction between

Body Movement, Artistic Expression and Technology.



 
Contact and Legal Notice · Contact Address:
Privacy Statement · Conference: LACCEI 2025
Conference Software: ConfTool Pro 2.8.106+TC
© 2001–2025 by Dr. H. Weinreich, Hamburg, Germany