School of Technology of Chimborazo, Riobamba

www.espoch.edu.ec
Riobamba, Ecuador

Time filter

Source Type

Vivanco R.C.,School of Technology of Chimborazo, Riobamba
Optics InfoBase Conference Papers | Year: 2016

This Panel was built using the ions transport, providing a electrical potential that can be collected or measured reaching 0.142 V obtained through irradiation of the carotenoids contain in carrot extract with his absorption specter. © OSA 2016.


Rationale: Osteoporosis is a cause for pathological fractures and loss of autonomy and validism in the postmenopausal woman. Identification of risk factors might serve for preventing the appearance of this co-morbidity.Objectives: To determine the association between loss of bone mineral density (BMD) and selected demographic, clinical and anthropometric features in the postmenopausal woman that can be assumed as risk factors of osteoporosis.Study design: Non-experimental, cross-sectional, analytical.Study serie: 53 women with ages ≥ 60 años assisted at the “San Juan” Specialities Hospital in Riobamba (Province of Chimborazo, Republic of Ecuador). Materials and methods: BMD was determined in 2 regions of interest (lumbar spine | femur) by means of DEXA (DPX-L, Lunar Technologies, USA). Loss of BMD was established with “t”-scores < -1.0 standard deviations. Amount and quality of dietetic Calcium intakes were estimated by means of pCa score that takes into account frequency of consumption of foods regarded as sources of calcium and mineral bioavailability. Nature and strength of association between loss of BMD, on one hand, and presuntive risk factors of osteoporosis and state of dietetic calcium intake, on the other, were assessed.Results: Loss of BMD was dependent upon region of interest: Femur: Osteoporosis: 13.2% + Osteopenia: 50.9%; Lumbar spine: Osteoporosis: 49.1% + Osteopenia: 37.7%. Highest intakes of dietetic calcium concentrated among Milk and dairy products (pCa = 26.56), Meat, poultry, fish, seafood and eggs (pCa = 6.51), Beans and others legumes (soy included) (pCa = 2.85); and Vegetables (pCa = 2.54); respectively. DMO “t” score associated with woman’s age, family history of bone fractures, Body Mass Index (BMI), and body fat (estimated by means of DEXA). Dietetic calcium intakes were independent of presumptive risk factors of osteoporosis and DMO “t” score in the region of interest. Odds-ratios for variables univariately associated with BMD were as follows: Age: OR = 2.09 (p < 0.05); BMI: OR = 0.278 (p = 0.059); and Body fat: OR = 0.553 (p > 0.05); respectively.Conclusions: Loss of BMD is significantly associated with female aging, and an increased presence of body fat. Family history of bone fractures might serve for identifying post-menopausal women at increased risk of loss of BMD. Further research is required in order to establish the role of physical exercise and better intakes of dietetic calcium as protective factors against loss of BMD. © 2014 Grupo Aula Medica S.A. All rights reserved.


Mogos G.,School of Technology of Chimborazo, Riobamba
2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015 | Year: 2015

The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case of the cybernetic attack simulation, type Intercept-Resend - the well known attack on quantum world, over the each protocol. Presence of the eavesdropper is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Error Rate for detecting the eavesdropper can be applied to the majority key distribution systems, each system having its own acceptable error rate. Starting from the same size of input data, the paper presents an analysis of the data obtained on cybernetic attack simulations and analyzes the percentage of errors by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol. © 2015 IEEE.


Mogos G.,School of Technology of Chimborazo, Riobamba
2015 14th RoEduNet International Conference - Networking in Education and Research, RoEduNet NER 2015 - Proceedings | Year: 2015

The practical implementation of quantum information technologies requires, for the most part, highly advanced and currently experimental procedures. One exception is quantum cryptography, or quantum key distribution, which has been successfully demonstrated in many laboratories and has reached an advanced level of development. The purpose of this paper is to present comparative studies regarding the percentages of quantum errors which appear when obtaining the cryptographic keys in the case of two quantum key distribution protocols: Chen et al. (four-state quantum key distribution scheme) and Bruβ (six-state quantum key distribution scheme). Were followed the variation of the percentage of errors in the case of these symmetrical protocols in two situations: the absence and the presence of cyber-attacks (Intercept-Resend attack), and, analyze the degree of security of the protocols. © 2015 IEEE.


Mogos G.,School of Technology of Chimborazo, Riobamba
IEEE International Conference on Communications | Year: 2016

A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. This paper presents the entropy and p-value tests performed on classical and quantum random number generators, in order to check the randomness of the generated output data. Both generators have been integrated in software applications reproducing asymmetrical cryptosystems, their results contributing to the generation of key material within Diffie-Hellman protocol. Can regard these tests as a first step in determining if a generator is suitable for a particular cryptographic application. At the same time, the statistical tests cannot serve as a substitute for cryptanalysis. © 2016 IEEE.


Mogos G.,School of Technology of Chimborazo, Riobamba
2015 International Symposium on Networks, Computers and Communications, ISNCC 2015 | Year: 2015

The main goals of cryptography are for a sender and a receiver to be able to communicate in a way that is unintelligible to third parties, and for the authentication of messages to prove that they were not altered in transit. Both of these goals can be accomplished with provable security if sender and receiver are in possession of shared, the secret key. This paper presents a software-prototype of the Bechmann-Pasquinucci and Peres protocol for qutrits, on two cases: with and without cyber-attack (the Intercept-Resend attack). Presence of the enemy is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Trit Error Rate (QTER) for detecting enemy can be applied to the majority key distribution systems, each system having its own acceptable error rate. © 2015 IEEE.


Mogos G.,School of Technology of Chimborazo, Riobamba
Procedia Computer Science | Year: 2015

In this paper, we propose a software implementation of Quantum Key Distribution scheme using twelve orthogonal states in a four-state system. With the twelve states, the Sender can encode two bits classical information in one particle, and distribute her secret key to the Receiver. This study explores quantum alternatives to traditional key distribution protocols, and involves implementations of quantum key distribution protocol on two cases: with and without cyber-attacks (the Intercept-Resend attack). © 2015 The Authors.


Holban A.M.,University of Bucharest | Holban A.M.,Polytechnic University of Bucharest | Gestal M.C.,School of Technology of Chimborazo, Riobamba | Grumezescu A.M.,Polytechnic University of Bucharest
Current Medicinal Chemistry | Year: 2014

Due to the great prevalence of persistent and recurrent implanted device associated-infections novel and alternative therapeutic approaches are intensely investigated. For reducing complications and antibiotic resistance development, one major strategy is using natural or synthetic modulators for targeting microbial molecular pathways which are not related with cell multiplication and death, as Quorum Sensing, virulence and biofilm formation. The purpose of this review paper is to discuss the most recent in vitro approaches, investigating the efficiency of some novel antimicrobial products and the nano-technologic progress performed in order to increase their effect and stability. Copyright © 2014 Bentham Science Publishers.


Mogos G.,School of Technology of Chimborazo, Riobamba
2016 20th IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR 2016 - Proceedings | Year: 2016

The development of information society, which led to an impressive increase of the volume of information, mostly economic, which was circulated in computer networks, accelerated the development and especially the use of modern cryptography tools. The role of modern cryptography is to assure by specific mathematical means, both theoretically and practically, the four basic characteristics of information: confidentiality, integrity, authenticity, and nonrepudiation. This paper presents a series of results obtained within an ample project, whose purpose is to integrate devices based on quantum properties, in order to gradually replace the current classical equipment which becomes vulnerable, and also to develop software applications. The results were obtained as a result of performance and testing of an experimental model which implements an architecture of client-server type, and which integrates a quantum random number generator in the mechanism of obtaining the cryptographic key. © 2016 IEEE.


Peramo A.,School of Technology of Chimborazo, Riobamba
Molecular Simulation | Year: 2016

While there has been an increase in the number of biomolecular computational studies employing graphics processing units (GPU), results describing their use with the molecular dynamics package AMBER with the CUDA implementation are scarce. No information is available comparing MD methodologies pmemd.cuda, pmemd.mpi or sander.mpi, available in AMBER, for generalised Born (GB) simulations or with solvated systems. As part of our current studies with antifreeze proteins (AFP), and for the previous reasons, we present details of our experience comparing performance of MD simulations at varied temperatures between multi-CPU runs using sander.mpi, pmemd.mpi and pmemd.cuda with the AFP from the fish ocean pout (1KDF). We found extremely small differences in total energies between multi-CPU and GPU CUDA implementations of AMBER12 in 1ns production simulations of the solvated system using the TIP3P water model. Additionally, GPU computations achieved typical one order of magnitude speedups when using mixed precision but were similar to CPU speeds when computing with double precision. However, we found that GB calculations were highly sensitive to the choice of initial GB parametrisation regardless of the type of methodology, with substantial differences in total energies. © 2016 Informa UK Limited, trading as Taylor & Francis Group

Loading School of Technology of Chimborazo, Riobamba collaborators
Loading School of Technology of Chimborazo, Riobamba collaborators