Rafael Martínez-Peláez
YOU?
Author Swipe
View article: NeuralSyncTester: A tool for research and teaching in neural synchronization of multilayer tree parity machine networks
NeuralSyncTester: A tool for research and teaching in neural synchronization of multilayer tree parity machine networks Open
NeuralSyncTester is a tool for simulating and analyze the synchronization process of Multilayer Tree Parity Machine (MTPM) neural networks, applicable to research and education. It allows users to explore diverse scenarios, learning rules,…
View article: ConfSync: Confirmation of mutual synchronization of the TPMs in Python
ConfSync: Confirmation of mutual synchronization of the TPMs in Python Open
ConfSync is a specialized open-source tool for simulating synchronization of Tree Parity Machines (TPMs). This new tool introduces advanced verification models, including hash-based, matrix-based and polynomial function methods for synapti…
View article: Geo-Information Approaches for Water Quality Monitoring in Arid River Systems Using Machine Learning
Geo-Information Approaches for Water Quality Monitoring in Arid River Systems Using Machine Learning Open
Water is the most important resource for life; however, the intensifying exploitation of water resources has led to significant degradation in water quality, particularly in rivers. This study investigates the potential of predictive model…
View article: Enhancing financial risk prediction with symbolic classifiers: addressing class imbalance and the accuracy–interpretability trade–off
Enhancing financial risk prediction with symbolic classifiers: addressing class imbalance and the accuracy–interpretability trade–off Open
Machine learning for financial risk prediction has garnered substantial interest in recent decades. However, the class imbalance problem and the dilemma of accuracy gain by loss interpretability have yet to be widely studied. Symbolic clas…
View article: Assessing Employee Susceptibility to Cybersecurity Risks
Assessing Employee Susceptibility to Cybersecurity Risks Open
This research challenges assumptions about cybersecurity risk factors, revealing that age, gender, and educational background are not significant determinants of employee susceptibility. It highlights the importance of inclusive cybersecur…
View article: Computer Simulation of Catheter Cryoablation for Pulmonary Vein Isolation
Computer Simulation of Catheter Cryoablation for Pulmonary Vein Isolation Open
Cryoablation is a well-established medical procedure for surgically treating atrial fibrillation. Cryothermal catheter therapy induces cellular necrosis by freezing the insides of pulmonary veins, with the goal of disrupting abnormal elect…
View article: Examining cybersecurity culture in Leon city organizations: Insights from 2022
Examining cybersecurity culture in Leon city organizations: Insights from 2022 Open
Recent research indicates that public and private organizations worldwide face cybersecurity breaches due to a need for more cybersecurity awareness among their employees. This study assesses the cybersecurity culture in different organiza…
View article: Sustainable Digital Transformation for SMEs: A Comprehensive Framework for Informed Decision-Making
Sustainable Digital Transformation for SMEs: A Comprehensive Framework for Informed Decision-Making Open
This study presents a sustainable digital transformation framework to integrate sustainable practices into digital transformation initiatives within Small and Medium Enterprises (SMEs). The methodology includes a literature review, a frame…
View article: Random forest for generating recommendations for predicting copper recovery by flotation
Random forest for generating recommendations for predicting copper recovery by flotation Open
In the copper mining industry, Data Science (DS) techniques and Machine Learning (ML) methods are contributing to improve the prediction of results in industrial processes. In this paper, an experience of applying both DS techniques and a …
View article: Confsync: Confirmation of Mutual Synchronization of the Tpms in Python
Confsync: Confirmation of Mutual Synchronization of the Tpms in Python Open
View article: Fast Parabolic Fitting: An R-Peak Detection Algorithm for Wearable ECG Devices
Fast Parabolic Fitting: An R-Peak Detection Algorithm for Wearable ECG Devices Open
Heart diseases rank among the most fatal health concerns globally, with the majority being preventable through early diagnosis and effective treatment. Electrocardiogram (ECG) analysis is critical in detecting heart diseases, as it capture…
View article: Role of Digital Transformation for Achieving Sustainability: Mediated Role of Stakeholders, Key Capabilities, and Technology
Role of Digital Transformation for Achieving Sustainability: Mediated Role of Stakeholders, Key Capabilities, and Technology Open
Sustainability through digital transformation is essential for contemporary businesses. Embracing sustainability, micro-, small-, and medium-sized enterprises (MSMEs) can gain a competitive advantage, attracting customers and investors who…
View article: Factores de riesgo a muerte por COVID-19 en México y mapeo sistemático de recomendaciones para la práctica clínica odontológica
Factores de riesgo a muerte por COVID-19 en México y mapeo sistemático de recomendaciones para la práctica clínica odontológica Open
COVID-19 is a respiratory disease caused by the SARS-CoV2 virus. It can cause everything from common colds to deadly respiratory syndromes.
View article: A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation
A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation Open
In this paper, we addressed the problem of dataset scarcity for the task of network intrusion detection. Our main contribution was to develop a framework that provides a complete process for generating network traffic datasets based on the…
View article: Pre-existing comorbidity, the highest risk factor for poor prognosis of COVID-19 among the Mexican population
Pre-existing comorbidity, the highest risk factor for poor prognosis of COVID-19 among the Mexican population Open
The coronavirus disease 2019 (COVID-19) pandemic represents a challenge for public health and a high risk for patients with pre-existing comorbidity. As of July 20, 2020, the Case Fatality Rate (CFR) was 11.30% and the Mortality Rate (MR) …
View article: Revisiting the Dissimilarity Representation in the Context of Regression
Revisiting the Dissimilarity Representation in the Context of Regression Open
In machine learning, a natural way to represent an instance is by using a feature vector.
\nHowever, several studies have shown that this representation may not accurately characterize an object.
\nFor classification problems, the dissimil…
View article: Mobile Personal Health Care System for Noninvasive, Pervasive, and Continuous Blood Pressure Monitoring: Development and Usability Study
Mobile Personal Health Care System for Noninvasive, Pervasive, and Continuous Blood Pressure Monitoring: Development and Usability Study Open
Background Smartphone-based blood pressure (BP) monitoring using photoplethysmography (PPG) technology has emerged as a promising approach to empower users with self-monitoring for effective diagnosis and control of hypertension. Objective…
View article: A Radial-In-Plane Sensitivity Interferometer with Divergent Illumination for Displacement Measurement
A Radial-In-Plane Sensitivity Interferometer with Divergent Illumination for Displacement Measurement Open
An in-plane radial sensitivity interferometer that uses the divergent illumination for displacement measurement in the radial direction is presented. A description and mathematical model for calculating the sensitivity vector are also pres…
View article: Mobile Personal Health Care System for Noninvasive, Pervasive, and Continuous Blood Pressure Monitoring: Development and Usability Study (Preprint)
Mobile Personal Health Care System for Noninvasive, Pervasive, and Continuous Blood Pressure Monitoring: Development and Usability Study (Preprint) Open
BACKGROUND Smartphone-based blood pressure (BP) monitoring using photoplethysmography (PPG) technology has emerged as a promising approach to empower users with self-monitoring for effective diagnosis and control of hypertension. OBJECT…
View article: An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances Open
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new…
View article: Segmentation of the ECG Signal by Means of a Linear Regression Algorithm
Segmentation of the ECG Signal by Means of a Linear Regression Algorithm Open
The monitoring and processing of electrocardiogram (ECG) beats have been actively studied in recent years: new lines of research have even been developed to analyze ECG signals using mobile devices. Considering these trends, we proposed a …
View article: A regression model based on the nearest centroid neighborhood
A regression model based on the nearest centroid neighborhood Open
The renowned k-nearest neighbor decision rule is widely used for classification tasks, where the label of any new sample is estimated based on a similarity criterion defined by an appropriate distance function. It has also been used succes…
View article: Después de presionar el botón enviar, se pierde el control sobre la información personal y la privacidad: un caso de estudio en México
Después de presionar el botón enviar, se pierde el control sobre la información personal y la privacidad: un caso de estudio en México Open
Desde el inicio de los servicios electrónicos, los usuarios de Internet han enviado su información personal y financiera a diferentes servidores web, perdiendo el control sobre su información. Años más tarde, con la popularización de los s…
View article: Esquema seguro de autenticación de usuario basado en identificador dinámico utilizando cifrado simétrico y tarjetas inteligentes
Esquema seguro de autenticación de usuario basado en identificador dinámico utilizando cifrado simétrico y tarjetas inteligentes Open
En 2004, Das, Saxena & Gulati propusieron un nuevo esquema de autenticación basado en un identificador dinámico cuyo principal propósito fue evitar el ataque de robo de identidad. Desde ese momento, se han propuesto varios esquemas con la …
View article: Esquema de autenticación de usuario remoto basado en un identificador dinamico utilizando el sistema de cifrado ElGamal
Esquema de autenticación de usuario remoto basado en un identificador dinamico utilizando el sistema de cifrado ElGamal Open
We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce. The scheme achieves the following security requirements: 1) use…
View article: Conociendo la tendencia electoral de un candidato a través de Facebook: un caso de estudio en las elecciones municipales en Miahuatlán de Porfirio Díaz, Oaxaca
Conociendo la tendencia electoral de un candidato a través de Facebook: un caso de estudio en las elecciones municipales en Miahuatlán de Porfirio Díaz, Oaxaca Open
A raíz de la popularidad de los sitios de redes sociales en diversas campañas electorales, alrededor del mundo, se han realizado dos tipos de estudios: 1) identificar el efecto en la población y 2) conocer la tendencia electoral. En el pre…
View article: Dynamic ID-based remote user authentication scheme using El Gamal encryption system
Dynamic ID-based remote user authentication scheme using El Gamal encryption system Open
"El Algoritmo de Recocido Simulado, cristalización simulada o enfriamiento simulado, es un algoritmo de búsqueda metaheurística para problemas de optimización; el objetivo general de este tipo de algoritmos es encontrar una buena aproximac…
View article: Security Enhancement on Li-Lee’s Remote User Authentication Scheme Using Smart Card
Security Enhancement on Li-Lee’s Remote User Authentication Scheme Using Smart Card Open
Recently, Li and Lee proposed a new remote user authentication scheme using smart card. However, their scheme requires a verification table and the user’s identity is not protected. Moreover, users cannot change their password off-line. In…