{"id":64630,"date":"2024-08-30T19:34:11","date_gmt":"2024-08-30T19:34:11","guid":{"rendered":"https:\/\/produccionweb.yachaytech.edu.ec\/?post_type=grupo-investigacion&#038;p=64630"},"modified":"2025-09-30T13:54:03","modified_gmt":"2025-09-30T13:54:03","slug":"data-science-and-analytics-datascienceyt","status":"publish","type":"grupo-investigacion","link":"http:\/\/yachaytech.edu.ec\/en\/grupo-investigacion\/data-science-and-analytics-datascienceyt\/","title":{"rendered":"Data Science and Analytics \u2013 DataScienceYT"},"content":{"rendered":"<h3><strong>Misi\u00f3n<\/strong><\/h3>\n<p>Aportar con soluciones basadas en la investigaci\u00f3n te\u00f3rica y pr\u00e1ctica a la industria, academia a nivel local e internacional<\/p>\n<h3><strong>Objetivos<\/strong><\/h3>\n<ul>\n<li>Desarrollar nuevas metodolog\u00edas, modelos, aplicaciones que hagan frente a las problem\u00e1ticas encontradas en los campos de las Ciencias de Datos.<\/li>\n<li>Contribuir al desarrollo tecnol\u00f3gico local e internacional.<\/li>\n<li>Analizar fen\u00f3menos sociales a trav\u00e9s del uso de datos.<\/li>\n<li>Divulgar los resultados de las investigaciones a la academia, industria y sociedad civil.<\/li>\n<\/ul>\n<h3><strong>L\u00edneas de Investigaci\u00f3n<\/strong><\/h3>\n<ul>\n<li>Ciencia de Datos<\/li>\n<li>Inteligencia Computacional<\/li>\n<li>Computaci\u00f3n Cient\u00edfica<\/li>\n<li>Tecnolog\u00edas de la Informaci\u00f3n<\/li>\n<\/ul>\n<h3><strong>Proyectos<\/strong><\/h3>\n<ul>\n<li>An\u00e1lisis y Visualizaci\u00f3n de Datos Espacio Temporales<\/li>\n<\/ul>\n<h3>Publicaciones<\/h3>\n<table>\n<tbody>\n<tr>\n<th><strong>A\u00f1o<\/strong><\/th>\n<th><strong>T\u00edtulo<\/strong><\/th>\n<th><strong>Link<\/strong><\/th>\n<\/tr>\n<tr>\n<td>2023<\/td>\n<td>A Review of Techniques for Detecting Illicit Messages on Twitter<\/td>\n<td><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10309025\">https:\/\/ieeexplore.ieee.org\/document\/10309025<\/a><\/td>\n<\/tr>\n<tr>\n<td>2023<\/td>\n<td>Human Trafficking in Social Networks: A Review of Machine Learning Techniques<\/td>\n<td><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-45438-7_2#:~:text=Machine%20learning%20has%20become%20a,possible%20instances%20of%20trafficking%20activity.\">Link<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>","protected":false},"featured_media":78550,"template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","inline_featured_image":false},"categories":[131],"estado-de-vigencia":[137],"class_list":["post-64630","grupo-investigacion","type-grupo-investigacion","status-publish","has-post-thumbnail","hentry","category-ecmc","estado-de-vigencia-vigente"],"acf":[],"_links":{"self":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/grupo-investigacion\/64630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/grupo-investigacion"}],"about":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/types\/grupo-investigacion"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/media\/78550"}],"wp:attachment":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/media?parent=64630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/categories?post=64630"},{"taxonomy":"estado-de-vigencia","embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/estado-de-vigencia?post=64630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}