Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281161
Tomás Vera, S. Ochoa, Daniel Perovich
The software engineering research recognizes that small software companies are different to medium-sized and large organizations. Therefore, they require particular implementations of already known software practices to support their developments; this includes the estimation of the software development effort. The literature reports that estimation techniques based on expert judgement are preferred by the software industry in general, however, it is not clear what practices are used by small software companies and why they use them. Trying to clarify these aspects, particularly for small software companies in Chile, this article presents an empirical study based on semi-structured interviews that explores the effort estimation practices used by ten business stable organizations. The study results show the practices preferred by them, the reasons behind their preferences, and the expected accuracy of their estimates. The study also shows that using an appropriate estimation technique is not enough to keep the estimates under control.
{"title":"Development Effort Estimation Practices in Small Software Companies: An Exploratory Study","authors":"Tomás Vera, S. Ochoa, Daniel Perovich","doi":"10.1109/SCCC51225.2020.9281161","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281161","url":null,"abstract":"The software engineering research recognizes that small software companies are different to medium-sized and large organizations. Therefore, they require particular implementations of already known software practices to support their developments; this includes the estimation of the software development effort. The literature reports that estimation techniques based on expert judgement are preferred by the software industry in general, however, it is not clear what practices are used by small software companies and why they use them. Trying to clarify these aspects, particularly for small software companies in Chile, this article presents an empirical study based on semi-structured interviews that explores the effort estimation practices used by ten business stable organizations. The study results show the practices preferred by them, the reasons behind their preferences, and the expected accuracy of their estimates. The study also shows that using an appropriate estimation technique is not enough to keep the estimates under control.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281171
María de los Milagros Verrengia, Rafael Vargas, A. Vecchietti
The computational optimization of a process for obtaining 2G ethanol requires a model of the enzymatic hydrolysis stage that can be integrated into the rest of the process. Currently, there are many projects that represent its actions under certain experimental conditions. However, their predictions can be used as a guide and under operating conditions similar to those studied.The general models development can be extrapolated to different raw materials and different operating conditions is still a challenge, since the different processes involved in enzymatic hydrolysis are superficially known. However, for this reason, the experimental information available on the enzymatic hydrolysis of lignocellulosic materials can be used, in combination with non-conventional modeling methodologies in the field, as is the case of Artificial Neural Network modeling.In the present work, the performance of two approaches based on the Artificial Neural Networks model is analyzed to explain the behavior of the enzymatic hydrolysis process of different raw materials subjected to different pretreatments to obtain a general predictive model.
{"title":"General modeling of the enzymatic hydrolysis process of lignocellulosic materials using approaches based on Artificial Neural Networks","authors":"María de los Milagros Verrengia, Rafael Vargas, A. Vecchietti","doi":"10.1109/SCCC51225.2020.9281171","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281171","url":null,"abstract":"The computational optimization of a process for obtaining 2G ethanol requires a model of the enzymatic hydrolysis stage that can be integrated into the rest of the process. Currently, there are many projects that represent its actions under certain experimental conditions. However, their predictions can be used as a guide and under operating conditions similar to those studied.The general models development can be extrapolated to different raw materials and different operating conditions is still a challenge, since the different processes involved in enzymatic hydrolysis are superficially known. However, for this reason, the experimental information available on the enzymatic hydrolysis of lignocellulosic materials can be used, in combination with non-conventional modeling methodologies in the field, as is the case of Artificial Neural Network modeling.In the present work, the performance of two approaches based on the Artificial Neural Networks model is analyzed to explain the behavior of the enzymatic hydrolysis process of different raw materials subjected to different pretreatments to obtain a general predictive model.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/sccc51225.2020.9281224
{"title":"SCCC 2020 Copyright Page","authors":"","doi":"10.1109/sccc51225.2020.9281224","DOIUrl":"https://doi.org/10.1109/sccc51225.2020.9281224","url":null,"abstract":"","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281265
Juan Manuel Sobral, Martín Solari, S. Matalonga
Blockchain technology has fostered many projects, which have seen in it an alternative to carry out data management without relying on a trusted third party. However, business are failing to adopt this technology, and many applications are left over to proof of concepts. Furthermore, new Blockchain networks are emerging every year, hindering the decision to use this technology. The objective of this work is to have preliminary results on identifying available Blockchain networks. Recognizing their main characteristics: the type of consensus algorithm, centralization, and origin of the network, among others. We carried out a Multi-Vocal Review to identify the available Blockchain networks and analyze their most relevant characteristics. Resulting in a characterization of 112 Blockchain networks, offering a guide for the software developer, so that strategic decisions can be made when incorporating this technology.
{"title":"Preliminary Results of a Multi-Vocal Literature Review of Blockchain Networks","authors":"Juan Manuel Sobral, Martín Solari, S. Matalonga","doi":"10.1109/SCCC51225.2020.9281265","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281265","url":null,"abstract":"Blockchain technology has fostered many projects, which have seen in it an alternative to carry out data management without relying on a trusted third party. However, business are failing to adopt this technology, and many applications are left over to proof of concepts. Furthermore, new Blockchain networks are emerging every year, hindering the decision to use this technology. The objective of this work is to have preliminary results on identifying available Blockchain networks. Recognizing their main characteristics: the type of consensus algorithm, centralization, and origin of the network, among others. We carried out a Multi-Vocal Review to identify the available Blockchain networks and analyze their most relevant characteristics. Resulting in a characterization of 112 Blockchain networks, offering a guide for the software developer, so that strategic decisions can be made when incorporating this technology.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131732280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281267
Rafael Mellado-Silva, Antonio Faúndez-Ugalde, María Blanco Lobos
Chatbots have represented a revolution in how companies relate internally to their collaborators and externally to their customers. The impact they have had is directly related to saving time in business processes, an improvement in experience, and economic savings for those who implement them. At the educational level, various experiences of virtual assistants have been appreciated with promising results about how the tools are exploited against the learning results of the students. This paper presents the experience carried out by accounting students to teach rules related to tax control processes through the use of a rules-based chatbot that uses decision trees. The study focused on remote learning for COVID-19 reasons. The results of this experience are promising in this area, due to the complexity of the content and the little innovation in existing teaching subjects in the area. In general, the students presented an improvement in learning compared to other remote learning techniques.
{"title":"Learning tax regulations through rules-based chatbots using decision trees: a case study at the time of COVID-19","authors":"Rafael Mellado-Silva, Antonio Faúndez-Ugalde, María Blanco Lobos","doi":"10.1109/SCCC51225.2020.9281267","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281267","url":null,"abstract":"Chatbots have represented a revolution in how companies relate internally to their collaborators and externally to their customers. The impact they have had is directly related to saving time in business processes, an improvement in experience, and economic savings for those who implement them. At the educational level, various experiences of virtual assistants have been appreciated with promising results about how the tools are exploited against the learning results of the students. This paper presents the experience carried out by accounting students to teach rules related to tax control processes through the use of a rules-based chatbot that uses decision trees. The study focused on remote learning for COVID-19 reasons. The results of this experience are promising in this area, due to the complexity of the content and the little innovation in existing teaching subjects in the area. In general, the students presented an improvement in learning compared to other remote learning techniques.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281167
R. Ramírez-Méndez, Xaviera A. López-Cortés
Adverse drug reactions (ADRs) are defined as an unintended and harmful response that occurs with the ingestion of a certain drug. ADRs result in an appreciably harmful or unpleasant reaction that determines the success or failure of a drug. In this way, the generation of effective models for the prediction of ADR during the drug development process is of high relevance for human health. In this work, we present a complete proposal based on supervised machine learning to study dry mouth oral ADRs for the first time. Our approach integrates different drug properties, such as, chemical (fingerprint), biological (target protein, transporters and enzymes) and phenotypic (therapeutic indications and other known adverse reactions), all of them obtained from public databases that are combined on two and three levels. We employ different tree- based classification algorithms (AdaBoost and Random Forest), with the aim of obtaining the best predictors of the oral RAM studied. 14 models were generated, which gave an average AUC of 0.82 and an accuracy of 78%, where the best model with AdaBoost gave and accuracy and AUC of 87% and 0.89, respectively for the prediction of dry mouth oral ADR
{"title":"Supervised machine learning-based prediction for dry mouth oral adverse drug reactions","authors":"R. Ramírez-Méndez, Xaviera A. López-Cortés","doi":"10.1109/SCCC51225.2020.9281167","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281167","url":null,"abstract":"Adverse drug reactions (ADRs) are defined as an unintended and harmful response that occurs with the ingestion of a certain drug. ADRs result in an appreciably harmful or unpleasant reaction that determines the success or failure of a drug. In this way, the generation of effective models for the prediction of ADR during the drug development process is of high relevance for human health. In this work, we present a complete proposal based on supervised machine learning to study dry mouth oral ADRs for the first time. Our approach integrates different drug properties, such as, chemical (fingerprint), biological (target protein, transporters and enzymes) and phenotypic (therapeutic indications and other known adverse reactions), all of them obtained from public databases that are combined on two and three levels. We employ different tree- based classification algorithms (AdaBoost and Random Forest), with the aim of obtaining the best predictors of the oral RAM studied. 14 models were generated, which gave an average AUC of 0.82 and an accuracy of 78%, where the best model with AdaBoost gave and accuracy and AUC of 87% and 0.89, respectively for the prediction of dry mouth oral ADR","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281257
J. Pereira, F. H. Vera-Rivera, H. Astudillo, Pedro Contreras, J. Almeida
In this article, a multi-criteria approach is proposed to prioritize user-stories in an Agile Software Development environment. User-stories are characterized by their interdependencies and the effort of development. The PROMETHEE II multi-criteria method is proposed as a technique to find a ranking of user-stories, but it needs information about preference thresholds and criteria weights. These parameters are considered stochastic variables and a simulation process is performed to explore robustness of the user-stories prioritization. We show that the information provided by the approach reveals zones of ambiguity in which some user-stories cannot be ranked. An example illustrates this approach and its utility is analyzed. Limitations of the approach are discussed and future research is proposed.
{"title":"A multi-criteria stochastic approach to prioritize user-stories in Agile Software Development","authors":"J. Pereira, F. H. Vera-Rivera, H. Astudillo, Pedro Contreras, J. Almeida","doi":"10.1109/SCCC51225.2020.9281257","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281257","url":null,"abstract":"In this article, a multi-criteria approach is proposed to prioritize user-stories in an Agile Software Development environment. User-stories are characterized by their interdependencies and the effort of development. The PROMETHEE II multi-criteria method is proposed as a technique to find a ranking of user-stories, but it needs information about preference thresholds and criteria weights. These parameters are considered stochastic variables and a simulation process is performed to explore robustness of the user-stories prioritization. We show that the information provided by the approach reveals zones of ambiguity in which some user-stories cannot be ranked. An example illustrates this approach and its utility is analyzed. Limitations of the approach are discussed and future research is proposed.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281253
Juan Pérez, Romina Torres, Sven von Brand
In most countries, a large percentage of children between the ages of eight and thirteen have access to a mobile device at home, where monitoring and supervision by a trusted adult is not enough, so statistics on children victimized by bullying and damage to the integrity of their personal data have been increasing considerably.In this work, we design and develop a serious game, a playful application that integrates and delivers educational content on cybersecurity to users aged 8 to 12 years, allowing them to have basic ideas about the responsibilities that the use of current technologies entails. The contents raise awareness about the use of strong passwords and vulnerabilities identification through gamification techniques to ensure both learning and entertainment.
{"title":"CyberKids: video game for raising cyber security awareness in children","authors":"Juan Pérez, Romina Torres, Sven von Brand","doi":"10.1109/SCCC51225.2020.9281253","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281253","url":null,"abstract":"In most countries, a large percentage of children between the ages of eight and thirteen have access to a mobile device at home, where monitoring and supervision by a trusted adult is not enough, so statistics on children victimized by bullying and damage to the integrity of their personal data have been increasing considerably.In this work, we design and develop a serious game, a playful application that integrates and delivers educational content on cybersecurity to users aged 8 to 12 years, allowing them to have basic ideas about the responsibilities that the use of current technologies entails. The contents raise awareness about the use of strong passwords and vulnerabilities identification through gamification techniques to ensure both learning and entertainment.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133402691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281251
Pablo Cruz, María Clara Gómez-Álvarez, H. Astudillo
ESSENCE, the Software Engineering Method and Theory (SEMAT) extensible Kernel, allows description of software development initiatives. One of the extensions is SETMAT, the Software Engineering Teaching Method and Theory, which provides a set of new sub-alphas and activity spaces aiming at the description of software engineering teaching initiatives such as software-related university courses. Different alternatives for describing the elements of SETMAT would eventually provide more freedom for adopters by widening the representations options. In this paper we propose mapping SETMAT elements to SPEM (the Software Process Engineering Meta-model) to provide another representation alternative for SETMAT practices. We also provide an example by making use of EPF Composer and SPEM to map a previously created SETMAT practice for a Software Analysis and Design course. We also argue that by making use of a platform like EPF Composer both software engineering professors and practitioners will be able to instrument and enact the practices as concrete processes.
{"title":"Mapping SETMAT practices to SPEM","authors":"Pablo Cruz, María Clara Gómez-Álvarez, H. Astudillo","doi":"10.1109/SCCC51225.2020.9281251","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281251","url":null,"abstract":"ESSENCE, the Software Engineering Method and Theory (SEMAT) extensible Kernel, allows description of software development initiatives. One of the extensions is SETMAT, the Software Engineering Teaching Method and Theory, which provides a set of new sub-alphas and activity spaces aiming at the description of software engineering teaching initiatives such as software-related university courses. Different alternatives for describing the elements of SETMAT would eventually provide more freedom for adopters by widening the representations options. In this paper we propose mapping SETMAT elements to SPEM (the Software Process Engineering Meta-model) to provide another representation alternative for SETMAT practices. We also provide an example by making use of EPF Composer and SPEM to map a previously created SETMAT practice for a Software Analysis and Design course. We also argue that by making use of a platform like EPF Composer both software engineering professors and practitioners will be able to instrument and enact the practices as concrete processes.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-16DOI: 10.1109/SCCC51225.2020.9281264
J. Gallardo, Romina Torres, Oliver Tessini
Cyberattacks are malicious and sophisticated events that attempt to exploit the principles of confidentiality, integrity and availability of organizations, causing financial losses and reputational damage, among others. In general, the number of threats and their complexity increases every day as well as the digital transformation of organizations. While it is necessary for each company to increase its digital index, it is also necessary to increase its maturity in cybersecurity. Micro and small enterprises represent a large percentage of companies in Chile, which do not always have the capital to hire qualified cybersecurity personnel. Therefore, this bridge project between the Academy and the Industry, seeks to provide tools so that micro and small companies can evaluate themselves, and potentially have the accompaniment for continuous improvement and ultimately to mature digitally using a successful proposal of the study of different cybersecurity maturity modelels reviewed in the literature.
{"title":"Surveillance Platform of cybersecurity maturity of micro and small enterprises","authors":"J. Gallardo, Romina Torres, Oliver Tessini","doi":"10.1109/SCCC51225.2020.9281264","DOIUrl":"https://doi.org/10.1109/SCCC51225.2020.9281264","url":null,"abstract":"Cyberattacks are malicious and sophisticated events that attempt to exploit the principles of confidentiality, integrity and availability of organizations, causing financial losses and reputational damage, among others. In general, the number of threats and their complexity increases every day as well as the digital transformation of organizations. While it is necessary for each company to increase its digital index, it is also necessary to increase its maturity in cybersecurity. Micro and small enterprises represent a large percentage of companies in Chile, which do not always have the capital to hire qualified cybersecurity personnel. Therefore, this bridge project between the Academy and the Industry, seeks to provide tools so that micro and small companies can evaluate themselves, and potentially have the accompaniment for continuous improvement and ultimately to mature digitally using a successful proposal of the study of different cybersecurity maturity modelels reviewed in the literature.","PeriodicalId":117157,"journal":{"name":"2020 39th International Conference of the Chilean Computer Science Society (SCCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132224649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}