{"id":566,"date":"2025-10-27T15:27:07","date_gmt":"2025-10-27T18:27:07","guid":{"rendered":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/?p=566"},"modified":"2025-10-27T15:34:20","modified_gmt":"2025-10-27T18:34:20","slug":"desarrollo-de-interfaces-de-usuario-graficas-confiables-en-dispositivos-medicos-utilizando-maquinas-de-estados-y-contratos","status":"publish","type":"post","link":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/2025\/10\/27\/desarrollo-de-interfaces-de-usuario-graficas-confiables-en-dispositivos-medicos-utilizando-maquinas-de-estados-y-contratos\/","title":{"rendered":"Desarrollo de interfaces de usuario gr\u00e1ficas confiables en dispositivos m\u00e9dicos utilizando m\u00e1quinas de estados y contratos"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"566\" class=\"elementor elementor-566\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20c9e44a e-flex e-con-boxed e-con e-parent\" data-id=\"20c9e44a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61391881 elementor-widget elementor-widget-text-editor\" data-id=\"61391881\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:heading {\"level\":4} -->\n<h4 class=\"wp-block-heading\">Resumen<\/h4>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>La construcci\u00f3n de software confiable para dispositivos m\u00e9dicos exige estrategias que refuercen la correctitud y la robustez del sistema, mediante metodolog\u00edas que ofrezcan garant\u00edas expl\u00edcitas de funcionamiento. Este trabajo presenta avances de una estrategia de integraci\u00f3n de m\u00e1quinas de estados finitos con el dise\u00f1o por contratos para el desarrollo de interfaces gr\u00e1ficas en dispositivos m\u00e9dicos. El estudio se centra en un prototipo funcional de monitor multiparam\u00e9trico simulado por software, dise\u00f1ado para el monitoreo de se\u00f1ales de relevancia cl\u00ednica. Partiendo de la hip\u00f3tesis de dise\u00f1o de que las interfaces pueden concebirse como una m\u00e1quina de estados finitos, se aplica y analiza la integraci\u00f3n propuesta. Como resultado, se observa que esta integraci\u00f3n permite modelar el comportamiento de la interfaz de usuario de forma precisa y verificable, facilitando la detecci\u00f3n temprana de errores, garantizando la coherencia frente a eventos externos y mejora la trazabilidad respecto de los requerimientos, sin requerir conocimientos avanzados en m\u00e9todos formales. Adem\u00e1s, esta estrategia contribuye a una definici\u00f3n m\u00e1s clara de responsabilidades entre m\u00f3dulos, permite generar pruebas automatizadas desde etapas tempranas y garantiza propiedades estructurales clave en la m\u00e1quina de estados finitos, como la existencia de un estado inicial \u00fanico y la accesibilidad entre estados. Si bien se identifican desaf\u00edos, como la sobrecarga computacional de las validaciones contractuales y la creciente complejidad del modelo, se abren l\u00edneas futuras prometedoras, como la simulaci\u00f3n de fallos y la implementaci\u00f3n en sistemas embebidos con adquisici\u00f3n de se\u00f1ales en tiempo real.<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/396559714_Desarrollo_de_interfaces_de_usuario_graficas_confiables_en_dispositivos_medicos_utilizando_maquinas_de_estados_y_contratos\" target=\"_blank\" rel=\"noopener\">Ver publicaci\u00f3n<\/a><\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Resumen La construcci\u00f3n de software confiable para dispositivos m\u00e9dicos exige estrategias que refuercen la correctitud y la robustez del sistema, mediante metodolog\u00edas que ofrezcan garant\u00edas expl\u00edcitas de funcionamiento. Este trabajo presenta avances de una estrategia de integraci\u00f3n de m\u00e1quinas de estados finitos con el dise\u00f1o por contratos para el desarrollo de interfaces gr\u00e1ficas en dispositivos [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[],"class_list":["post-566","post","type-post","status-publish","format-standard","hentry","category-publicaciones"],"_links":{"self":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":7,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":581,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/566\/revisions\/581"}],"wp:attachment":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}