Computer Engineering
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12475/57
Browse
Item An Assessment and Study of Wi-Fi Security Through the Use of Wardriving in Caguas, Puerto Rico(Polytechnic University of Puerto Rico, 2024) Iglesias Santiago, Miguel A.; Cruz, AlfredoIn this project, the current state of wireless security in Caguas, Puerto Rico, is analyzed using wardriving as the primary data acquisition method. Wardriving is a technique for scanning and collecting information from wireless access points while in motion and is widely used by security professionals/enthusiasts to evaluate WLAN systems. This project aims to assess the security configurations of publicly accessible IEEE 802.11 wireless networks and identify potential weaknesses. Data was collected through multiple wardriving audits, focusing on encryption protocols and access point configurations. The findings contribute to the broader understanding of wireless network security in Puerto Rico and suggest measures to strengthen protections in light of increasing internet usage. Key Terms ⎯ Wireless, Wi-Fi, Security, Wardriving, Auditing.Item Analysis of Sentiment in YouTube Comments for 2024 Political Campaigns for Governor of Puerto Rico(Polytechnic University of Puerto Rico, 2024) Oriol Rivera, Carlos A.; Duffany, JeffreyThe analysis of public sentiment is an invaluable tool in political campaigns, enabling candidates and their teams to assess voter attitudes and adjust campaign strategies accordingly. This project focuses on collecting and analyzing video comments on YouTube from the months leading up to an election to determine the public’s sentiment toward different candidates for governor in Puerto Rico. To make this sentiment analysis, the Text Blob Python library was used due to its ease of use and robust functionality. The project incorporates both client-side and server-side components, integrating modern web development frameworks and libraries to provide good user experience. This investigation outlines the data collection methodology, system architecture, analysis process, discussion of results, and coding logic used to achieve the analysis. Key Terms ⎯ Political Campaigns, Sentiment Analysis, TextBlob Python Library.Item Aplicación android para publicidad y auditar los ingresos de las campañas eleccionarias en Puerto Rico(Polytechnic University of Puerto Rico, 2019) Soto Delgado, Luis Ángel; Torres Batista, Nelliud D.Se detalla el diseño e implementación de un sistema con varios componentes: una aplicación web de administración y otra para el sistema operativo Android, utilizado en varios teléfonos móviles. La finalidad de esta aplicación es proveerle una alternativa al candidato a puesto electivo de acercarse más a la ciudadanía. Con esta aplicación, el ciudadano tendrá la alternativa de donar a la campaña del candidato de su predilección. A su vez, mediante la aplicación web, la Oficina del Contralor Electoral podrá realizar auditorías de los donativos que el ciudadano le otorga al candidato. Toda información del donativo será transferida a un base de datos en SQL, que podrá ser accedida por auditores de la Oficina del Contralor Electoral y a su vez, facilitará al tesorero del candidato el obtener la información requerida para poder cumplir más eficientemente con la radicación de los informes de ingresos y gastos que son enviados a dicha oficina. Términos clave - Auditoría, Candidato, Donativos, Elecciones.Item Applications of Fast.ai Pretrained Models in Image Classification Problem(Polytechnic University of Puerto Rico, 2024) Tapia Maldonado, Antonio Ahmed; Duffany, JeffreySince the inception of Transformers and GPTs, artificial intelligence has proliferated. Fast.ai is among the cutting-edge libraries that are leading new advancements in the field. To harness the power of fast.ai and other advancements in the field, we set out to try and evaluate the practicality of the fast.ai library. To achieve this, we choose a given use case for artificial intelligence and then set out to fulfill said use case by leveraging fast.ai. We created three image classification models through fast.ai and then made an application that used those models. The use case we chose was a local wildlife fauna and flora classifier. The results from training the models were models with meager error rates, and these models had little to no data engineering. Key Terms ¾ computer vision, deep learning, fast.ai, image classification.Item Audio Fingerprinting with Robustness to Pitch Scaling and Time Stretching(Polytechnic University of Puerto Rico, 2013) Díaz Millet, Yesenia; Duffany, JeffreyCurrent audio fingerprinting systems are becoming increasingly robust against noise and filter distortions, however songs that have been pitch scaled and time stretched are still likely to pass undetected. This research focuses on expanding an existing landmark-based fingerprinting method to identify songs that have been pitch scaled and time stretched to escape current systems while still sounding natural to the human ear. Two feature extraction methods have been explored with the purpose of resolving each task individually. The constant Q spectrogram was used for feature extraction, instead of a conventional spectrogram, to identify songs that have been pitch scaled. Mel-frequency Cepstral Coefficients were used as features for the other task. The goal is to verify whether or not low-level spectral based features alone are capable of handling such transformations in a song instead of needing to use mid-level or high-level musical features as is the case with other Song ID methods. Key Terms - Audio Fingerprinting, Feature Extraction, Music Information Retrieval, Music Similarity.Item Automatic Document Digitalization: DocDigitice(Polytechnic University of Puerto Rico, 2020) Rivera Acevedo, Ramón J.; Cruz, AlfredoIn today’s technological era, the use of cloud computing and cloud storage has become the norm for many big companies. This is no different for Health Insurance Organizations that are regulated by various corporations such as the Commissioner of Insurance of Puerto Rico. They require extensive documentation of every document that is sent and received. The goal is to design a multi-system application program for the Health Insurance Organization. The primary purpose will be created, facilitate, and improve the process of digitizing different documents of the company. It will offer a secure way to save the documents and at the same time ensuring the quality of these in the system. Employees can upload, monitor, and view the documents required by the company in a simple and safe environment. It will also help the company in audits and increase the overall income of the company in terms of storage, employee time and printing of document copy. Key Terms ¾ ERD, hard copy, Model-View-Control (MVC), soft copyItem Automatic Documentation Generation Tool for Software Integration Phase in NGPF Program Engines(Polytechnic University of Puerto Rico, 2016) Torres Martínez, Marycarmen; Rodríguez Jiménez, OthonielThe actual process of HardwareSoftware Integration [1] takes too much time for completion due to the required documentation, and that is costly for the customer. Creating this tool help us to reduce significantly the amount the time is taken for the Integration Phase and the delivery to the customer after the start of the Verification Phase, thus lowering the cost of integration. The automatic documentation tool creates documents analyzing the deliverables from the Integration phase after compiling the source code. This tool provides documentation at design level by generating documentation from deliverables and is a way of integration with hand-written documentation. Hand-written documentation is not effective as it raises errors and takes more time. This approach works by reading keywords from a series of templates replacing them with the corresponding data in each document. This approach has been shown to be effective for the customer and reduces the time to deliver new engine software documentation to the informal verification phase. Key Terms - Documentation, Integration, NGPF, Templates.Item Automatización del Proceso de Creación de Cotizaciones y Facturas Utilizando Aplicaciones Web Desarrolladas Utilizando PHP, JavaScript, CSS, HTML5 y MySQL(Polytechnic University of Puerto Rico, 2013) Pagán Rivera, Christian; Ramírez, JuanFacturación, aspecto crítico de cada negocio ya que es la última impresión que una compañía le da al cliente luego que una venta es completada. Para una toma de decisiones efectiva es crucial tener de forma accesible toda la información financiera de una manera exacta y actualizada. La utilización de aplicaciones basadas en la web, es un método poco costoso, novedoso y efectivo el cual provee un excelente manejo de la información financiera de una entidad. Bajo este método es posible mantener un sistema de facturación totalmente actualizado y de ser necesario llevar a cabo el ciclo completo de la contabilidad de una compañía de manera virtual y segura. Una de las ventajas de la facturación a través de la web es que asegura toda la información en línea, permitiendo que la misma sea accesible remotamente para todo usuario autorizado, dando a los dueños de negocios la capacidad de acceder a reportes financieros desde cualquier dispositivo electrónico con acceso a internet. Términos claves - HyperText Markup Language 5, PHP Hypertext Preprocessor, RBAC, Web-Based App.Item Big Data vs. Business Analytics: Could this work together?(Polytechnic University of Puerto Rico, 2020) Montes de Oca, Antulio Lorenzo; Torres Batista, Nelliud D.In a world where technology constantly evolves and the amount of data being created is exponentially increasing, data processing and analysis becomes crucial on decision and risk evaluation. Companies around the world can agree that fast processing, predictive analysis, and realtime data can give strategic advantage. Business Intelligence (BI) is an approach of information gathering and analysis to give executives a better understanding based on data. BI can be applied using concepts from statistics, artificial intelligence, and data mining, among other, focusing on achieving to help companies in decision- and risktaking. Big Data is used to describe large sets of information that traditional systems, such as databases, cannot process and maintain reliably. These techniques make the processing of high volumes of data easier, which in turn may result in quick analysis. One of the benefits of integrating Big Data and Business Intelligence is the management of both structure and unstructured data from diverse and large collections. Key Terms ⎯ analytics, big data, business intelligence, systemsItem Black Box Testing – Puerto Rico Tax Form 482 using “Planilla Plus+” Software(Polytechnic University of Puerto Rico, 2016) Claudio Valentín, Emmanuel; Cruz, AlfredoSoftware testing is a very important development process. Every software design must have a development testing phase. Although, not all developers apply testing to their software. The phase of testing a software is required to point out the defects and errors that were made during the development phases. In this project, we use Black Box testing methodology to test “Planilla Plus+” software, using Puerto Rico Tax Form 482. In Puerto Rico exist many tax forms software to help people to fill their tax forms. Not everybody knows how to fill a tax form from scratch. The idea of this software is to help people that don’t have any knowledge how to fill out their tax forms without any professional help since now the electronic tax form submission is required by law in Puerto Rico starting 2016. This project answer these questions applying Black Box Testing Methodology. Key Terms - Black Box Testing, Software Testing, Test Cases, Testing Techniques.Item Business Intelligence Implementation on the Marketing of Real Estate(Polytechnic University of Puerto Rico, 2018) Acevedo Martínez, Douglas S.; Torres Batista, Nelliud D.This research identify the Business Intelligence’s components and techniques that could be implemented on different industries. Also, I review literature available in relation of the implementation of Business Intelligence systems within the Real Estate Industry. This study conducted a data mining analysis using an available public data from 2007 until 2017. Using this data mining, I seek to follow the Business Intelligence principle of translating data into knowledge. The analysis identify trends that confirm the valuable information gain by these techniques and these were translated into strategies that could be implemented for improving the quality of services provided by real estate professionals. To conclude the paper, I used data warehouse containing the loan application data to developed different models to predict the loan amount applications and the prediction model seek to serve as an example that could be used to translate the results on potential strategies for the real estate professional. Key Terms - The following terms are relevant terms used on this article: Business Intelligence, Data Mining, Real Estate, Predictive ModelItem Centralized Device Independent Software Architecture for the Internet of Things(Polytechnic University of Puerto Rico, 2015) Ruiz Linares, Luis; Masalmah, Yahya M.The Internet of Things (IoT) is growing stronger every year, as developers we need to get ready for the challenges ahead of us. It is getting hard for software developers to have a starting point for implementing new embedded systems and test them on existing IoT platforms. A software platform which is easy to understand, with scalability and security in mind is needed. This paper provides a centralized device independent software platform as a possible solution for developers that need a starting point that has a simple to understand architecture. Since security is also a key factor in IoT, this platform is secured by implementing public key encryption using Secure Socket Layer (SSL). This proposed software platform has very familiar components to start developing and testing communication with custom or vendor specific embedded devices for the IoT. Key Terms - Centralized Architecture, Device Independent, IoT, SSL.Item Comparación del Desarrollo de una Aplicación usando Metodologías Alternas: .Net Bootstrap Framework en Visual Studio versus Modelo BPMN en Bizagi(Polytechnic University of Puerto Rico, 2017) Palomino Flores, Meluni D.; Rodríguez Jiménez, OthonielEl presente proyecto compara dos metodologías de desarrollo la primera utilizando programación convencional y la segunda usando la notación estándar BPMN. Para dicho propósito estaremos utilizando los frameworks .Net y Bootstrap usando C# como el entorno de desarrollo para la programación tradicional y Bizagi 2.0 para usar la notación estándar BPMN. Para hacer la comparación de estas metodologías estaremos tomando como caso de estudio el desarrollo del “Sistema de solicitudes para Empleados de la Universidad Nacional de San Antonio Abad del Cusco”. Explicaremos el proceso durante el desarrollo con cada una de las metodologías mencionadas y, finalmente, analizaremos los puntos fuertes y débiles de las mismas. Términos claves - Bizagi, Bootstrap, BPMN, C#, .Net, Sistema de Solicitudes.Item A Comparison Approach of Digital Forensics Tools(Polytechnic University of Puerto Rico, 2016) Torres Andino, Enrique A.; Cruz, AlfredoDigital forensics is an important branch in the forensics and computer science. This branch encompasses the recovery and the investigation found on digital devices, such as computers and cellphones, which typically is related to a crime. Due to the outstanding increase in technology that we are experiencing, a lot of innovative technology has been developing which are used for effective and beneficial aspects but also for malicious activities. This and the necessity to solve crimes related with computer technology has made the window to create and develop digital forensics tools that can be very helpful in a crime investigation that involves any computer technology. The proposed project is to compare a little group of forensics tools based on what they do, the basis of the Digital Forensic Investigation Process that they fulfill, and the basis of the Integrated Digital Forensics Process Model Framework that they are able to cover. Key Terms Digital Forensics Branches, Digital Forensics Investigation Process, Digital Forensics Tools, Integrated Digital Forensics Process Model.Item Comprensión del Lenguaje Natural e Integración de Asistente Virtual para el manejo de cuentas y comercios(Polytechnic University of Puerto Rico, 2020) Sierra Rivera, Wilfredo; Torres Batista, Nelliud D.En Puerto Rico, las compañías no han explorado la posibilidad de incorporar el uso de un Asistente Virtual para manejar transacciones comerciales. En búsqueda de facilitar la interacción de un usuario con una aplicación sin la necesidad del uso directo de un móvil o computadora, se creó una solución integrando un Asistente Virtual. Para esto se llevó a cabo una compresión del lenguaje natural y se utilizaron varias herramientas como Amazon Web Services, Alexa y NodeJS, entre otros. Dicha solución nos permite solicitarle al Asistente Virtual realizar pagos de servicios como agua, luz y telefonía, entre otros. Para ello, se integró una base de datos en MySQL para almacenar los datos de la aplicación web. También se añadió el framework Express para establecer la comunicación entre la web y la aplicación. Además, se utilizaron funciones Lambda para poder almacenar los datos de las transacciones en la base de datos del cloud y un API Gateway para la comunicación entre la aplicación web y el cloud. Este proyecto es una muestra pequeña de todo lo que se puede lograr integrando esta solución a otras aplicaciones. Términos clave — asistente virtual, comandos de voz, comprensión de lenguaje natural, servicios inteligentes de vozItem Computer Forensic Laboratory for the Polytechnic University of Puerto Rico(Polytechnic University of Puerto Rico, 2011) González Acevedo, Carlos J.; Duffany, JeffreyAbstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law, was define computer forensic. The legal and technical aspects of computer forensics will help you capture vital information if your network is compromised, will help you ensure the overall integrity and survivability of your network infrastructure and you prosecute the case if the intruder is caught. Security professionals need to consider their policy decisions and technical actions in the context of existing laws. This paper presents the design and implementation of an experimental Computer Security and Forensic Analysis (CSFA) laboratory and the tools associated with it for the University. The laboratory is envisioned to be a training facility for future computer security professionals. Key Terms ⎯ Computer, Forensic, Software, Tools.Item Considerations on SQL Optimization Tools in MS Azure SQL Server Database using SQL language(Polytechnic University of Puerto Rico, 2021) Rodríguez-Ortiz, Arlene; Duffany, JeffreyDatabases are essential since are designed to stored and organized data that can be easily managed and accessed. They are crucial to many organizations, companies, and are used in many aspects of our lives. The relational database, based on the relational model, and represented in a tabular way, is one of the most used. Relational database management systems are used to maintain them. One of the most known languages for querying and maintaining relational databases is the Structured Query Language. On this paper article, the researcher explored different optimization tools in MS Azure SQL Server Database that could bring information that could help students and developers to optimize their queries and improve performance. Key Terms ⎯ Query Plans, Query Profiler, SQL Optimization Tools, and Structured query language (SQL).Item Cybersecurity Tools(Polytechnic University of Puerto Rico, 2024) López Ubinas, Harry E.; Duffany, JeffreyThe goal of this project is to analyze the effectiveness of different Cybersecurity tools. It will test different techniques such as vulnerability scanning on the network, Wi-Fi hacking, and password cracking. Key Terms ¾ cybersecurity, password cracking, vulnerability scanning, wi-fi-hacking.Item Dairy Cows Data Transformation Software: From Report Analysis to Performance Visualization(Polytechnic University of Puerto Rico, 2022) Pérez, Juan David; Cruz, AlfredoThere is a big opportunity to apply technology and data analytics to the agriculture sector, specifically, to dairy farms. Dairy farmers are looking for solutions that helps them to increase their profitability, efficiency, and reduce labor variance. The Dairy Cows Data Transformation Software helps dairy farmers in the analysis of the data being provided by DHIA report. The application shows all the KPI to the farmer in a web-based dashboard fashion. This eliminates the need of hour of data analysis and manual calculations. The pilot implementation was performed with the support of the dairy farm “El Remanso” in Camuy, Puerto Rico. Key terms– Data Analytics, Industry 4.0, Python, and Reporting.Item Deployment of Emergency Response Networks, a Web Application for Management(Polytechnic University of Puerto Rico, 2018) Candelario Soto, Neftalí; Torres Batista, Nelliud D.With every passing day, more resources become internet dependent. It’s evident that as time passes the share of our daily communications that rely on the internet will only continue to grow. Banking transactions take place online, enterprises rely on Voice over IP to communicate between workplaces, and online social media platforms are the method of choice for most individuals. While these are all welcomed commodities, it does however pose a huge drawback in the event a natural disaster renders the internet unavailable. Response efforts must be well planned and swiftly executed to ensure as little downtime as possible. Emergency Networks must be monitored and managed to ensure proper functionality until normal conditions are reestablished. This paper addresses the hurdles that may be encountered during an event that cripples an existing internet infrastructure and proposes alternatives to deploy and monitor a temporary solution that provides the necessary services while intelligently safeguarding the available bandwidth. Key Terms Disaster, Emergency Communications, Emergency Network, Network Deployment, Network Site Database.