Results (94)
Search Parameters:
Keyword: PTOA Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes
In this paper, a novel quantum transmission protocol which are based on the quantum no-key protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code…
Read MoreAnalysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador
The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…
Read MoreROS Based Multimode Control of Wheeled Robot
This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…
Read MoreNew Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata
Medical images are transmitted via the Internet or the hospital intranet which include many important information about the patient’s personal information. Medical image encryption is a technology that can effectively protect the information contained in these medical images. In this paper, we give a secure and trusty Combined Cellular Automata (CoCA) based medical image encryption…
Read MoreAttacks classification and security mechanisms in Wireless Sensor Networks
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…
Read MoreEvaluation of Classroom Furniture Design for Ecuadorian University Students: An Anthropometry-Based Approach
It is widely known that students’ exposure to poor postures due to inappropriate classroom furniture design may contribute to the increase of the prevalence of musculoskeletal disorders symptoms that if not identified on time could lead to severe health issues. In this context, due to the unavailability of scientific studies related to this topic in…
Read MoreAnalysis of Information Security for a Voting Process for Sectional Governments in Ecuador
Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…
Read MoreTransformation of Solar Energy to Electricity with Photovoltaic Systems, Reduction of Electrical Consumption and Installation of LED Lamps in the ITSAO
In this work of technological development and research is presented the work done in the ITSAO to contribute to the use of clean energy such as photovoltaics and the implementation of activities to reduce electricity consumption by the technological community, the monitoring of electricity consumption is made on a monthly basis and an annual report…
Read MoreAndroid Application to Detect Cat Disease Using an Expert System
The purpose of this research is to develop an android application named “TANYA MEOW” which can be used by cat owners to detect the diseases that their cats suffer based on visible symptoms. The cat owners need to answer questionnaire to detect what disease is suffering by their cat. The result of the disease is…
Read MorePrototype of a Security Architecture for a System of Electronic Voting for the Ecuador
To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…
Read MoreAn Adaptive Fuzzy-Sliding Mode Controller for The Bridge Crane
This article presents a bridge crane nonlinear dynamic model in 2-dimensional space, and then given a novel adaptive fuzzy-sliding mode controller based on combining sliding mode control with fuzzy logic and Lyapunov function. Firstly, the article proposes an intermediate variable to link signal between two slide surfaces, related to trolley movement and payload swing. Then…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreHigh-Temperature Optical Characterization of Wide Band Gap Light Emitting Diodes and Photodiodes for Future Power Module Application
A systematic study of wide bandgap (WBG) based light emitting diodes (LEDs) and photodiodes (PDs) were conducted for the assessment of modular integration of optoelectronic devices into power modules. The temperature dependence of the photoluminescence (PL) efficiency of Indium gallium nitride/Gallium nitride (InGaN/GaN) multiple quantum wells (MQWs) material was studied from 10 to 800 K.…
Read MoreEnhancing and Monitoring Patient Outcomes Through Customized Learning
Chronic diseases such as heart disease, cancer, diabetes, and asthma continue to increase in the general public within the modern era. With careful observation of the symptoms potential diseases may be detected early and managed properly. For that to happen, the awareness of the symptoms and proper knowledge about the diseases may be needed for…
Read MoreOptimal Designs of Constrained Accelerated Life Testing Experiments for Proportional Hazards Models
This paper investigates the methods of optimal design construction for step-stress accelerated life testing (ALT) when a Cox’s hazards model is adopted with either a linear or a quadratic baseline hazard function. We discuss multiple step-stress plans for time-censored ALT experiments. The maximum likelihood method is utilized for estimating the model parameters. The information matrices…
Read MoreA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreEffects of Cinnamon on Diabetes
Diabetes is a condition of the body in which blood sugar level is higher than the normal average value. It is considered as a major cause of morbidity worldwide. According to the data reported in 2015,420 million people had diabetes worldwide, type 2 diabetes account for 85% of these cases. This shows 9.2% of the…
Read MoreExperimental Results and Numerical Simulation of the Target RCS using Gaussian Beam Summation Method
This paper presents a numerical and experimental study of Radar Cross Section (RCS) of radar targets using Gaussian Beam Summation (GBS) method. The purpose GBS method has several advantages over ray method, mainly on the caustic problem. To evaluate the performance of the chosen method, we started the analysis of the RCS using Gaussian Beam…
Read MoreCo-designed accelerator for homomorphic encryption applications
Fully Homomorphic Encryption (FHE) is considered as a key cryptographic tool in building a secure cloud computing environment since it allows computing arbitrary functions directly on encrypted data. However, existing FHE implementations remain impractical due to very high time and resource costs. These costs are essentially due to the computationally intensive modular polynomial multiplication. In…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreNonresonance between the first two Eigencurves of Laplacian for a Nonautonomous Neumann Problem
We consider the following Neumann elliptic problem \( \left\{ \begin{array}{rl} -\Delta u =\alpha\,m_{1}(x)\,u+m_{2}(x)\,g(u)+h(x)\quad & in \: \Omega,\\ \quad\\ \frac{\partial u}{\partial\nu} = 0\qquad\qquad\qquad\qquad\qquad\qquad\quad& on\: \partial\Omega. \end{array} \right. \) By means of Leray-Schauder degree and under some assumptions on the asymptotic behavior of the potential of the nonlinearity g, we prove an existence result for our equation…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read More
