Papers by Gerardo Alberto Castang Montiel
Visión electrónica, 2018
The idea behind the QC paradigm lies in the information storage capacity in amplitude values that... more The idea behind the QC paradigm lies in the information storage capacity in amplitude values that use systems based on Qubits or quantum bits -not in bits-, and in the processing of it when transformations are required to change these amplitudes in a precise and controlled way. Therefore, the description of the states in a computer evolves obeying different algorithms than the known ones: correcting errors and digitizing arbitrarily precise calculations through limited resources. The present documentary research, carried out by the Orion research group in 2018, establishes a state of the art of knowledge in QC oriented to education as a baseline for future research whose development platforms are open source kind. A methodology based on indexes is established to categorize and subcategorize the QC, as are: fundamentals and background, QC history, concept and operation, companies that implement the QC field, applications, platforms that are managed in QC, architecture, and finally th...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Revista Clepsidra, 2009
En el presente artículo se realiza una introducción a la nanotecnología, siendo ésta un campo de ... more En el presente artículo se realiza una introducción a la nanotecnología, siendo ésta un campo de las ciencias aplicadas, dedicada a la manipulación de la materia a una escala nanométrica. Se presentan las distintas aplicaciones de la misma, presentando un particular interés en las soluciones ambientales. De igual forma se verifica el aporte realizado por los países involucrados e interesados en impulsar esta tecnología al interior de sus empresas, centros de investigación e instituciones educativas. A nivel nacional, se resalta el esfuerzo realizado por las entidades de investigación como Nanoescalar, Consejos de investigación y Semilleros de investigación interesados en impulsar esta temática.
Bookmarks Related papers MentionsView impact
Digital devices are presented several vulnerabilities because when making a connection your infor... more Digital devices are presented several vulnerabilities because when making a connection your information can be compromised. Bluetooth is a means of wireless communication that allows you to transfer files with distances of up to 100 meters, but its security has been seen as malicious users, attacking special cell phones. The Bluetooth manufacturers have improved their security but it has not been enough to control the vulnerabilities. The security of the Bluetooth connection has been directed by the manufacturers, but the user has not been able to carry out a control of this security.Los dispositivos digitales presentan vulnerabilidades ya que al realizar una conexión su información puede verse comprometida. Bluetooth es un medio de comunicación inalámbrico muy reconocido ya que permite transferencia de archivos con distancias de hasta 100 metros, pero su seguridad se ha visto afectada por usuarios maliciosos, atentando en especial dispositivos celulares. Los fabricantes de bluetoot...
Bookmarks Related papers MentionsView impact
Revista vínculos, Dec 1, 2008
Presently article is made a brief introduction to what is the programming guided to objects; leav... more Presently article is made a brief introduction to what is the programming guided to objects; leaving of an analysis of the environment and of the daily experience, to end up approaching a problem and to outline a solu- tion from the perspective of the programming guided to objects using as programming language the C++.
Bookmarks Related papers MentionsView impact
Visión electrónica, 2020
The mobile device manufacturers and Internet Of Things are searching for more compatible and easy... more The mobile device manufacturers and Internet Of Things are searching for more compatible and easy to connect protocols that increase coverage, which generates the user an effective experience when using different devices. Nevertheless, the constant updating process opens a security gap that exposes the users' personal information. Bluetooth is a communication protocol openly used by manufacturers because of their excellent information transfer capacities, allowing hackers to exploit it. The manufacturers work daily, generating security patches for communication protocols but this hasn't been enough to mitigate vulnerabilities. The security has always been on the manufacturer's side but the final user is limited to use a few security customization options to protect his network perimeter. Based on the wireless devices' background we wonder, Is there any way in which the user has the chance to reduce the possible dangers that wireless devices face? We can answer this q...
Bookmarks Related papers MentionsView impact
Tékhne, 2013
En este trabajo de investigacion se desarrollo el sistema web Siemmque busca automatizar y gestio... more En este trabajo de investigacion se desarrollo el sistema web Siemmque busca automatizar y gestionar la informacion administrativa de las escuelas municipales de musica, correspondientes al registro de matriculas de estudiantes de acuerdo con el area de formacion, programas y asignaturas parametrizables por la escuela de musica; asi mismo, el seguimiento de los cursos ofertados y el control de asistencia de los alumnos, como tambien hacer seguimiento del alumno desde su inscripcion, pasando por matriculas en cursos, hasta el momento en que el alumno se retire de la escuela de formacion musical. A diferencia de otros sistemas administrativos escolares de educacion continua, este sistema se caracteriza por llevar un registro de desercion de estudiantes en cualquier momento del ano; al ser educacion no formal el alumno puede retirarse en cualquier momento. Otra diferencia radical es el seguimiento de la caracterizacion poblacional con estadisticas que permiten reflejar la atencion de p...
Bookmarks Related papers MentionsView impact
South Florida Journal of Development, 2021
En el presente artículo se realiza el análisis espectral de señales en particular de algunos de l... more En el presente artículo se realiza el análisis espectral de señales en particular de algunos de los códigos de línea más utilizados o comunes en la representación eléctrica de una secuencia binaria de datos , con el propósito de validar su comportamiento espectral, así como su dependencia de los parámetros tasa de bit (R) que corresponde a la velocidad a la cual se transmiten los datos, en bits por segundo; frecuencia (f) definida como aquellas bandas o rangos en las que se distribuyen los componentes de potencia, dada en hertz y tiempo de bit (Tb) que corresponde al tiempo que dura la presencia o transmisión de un bit, dada en segundos y su incidencia en las gráficas de la densidad espectral de potencia. Se utiliza el software libre Python aplicado en casos de análisis de señales y en la enseñanza de temas de ingeniería, particularmente en la telemática y las comunicaciones.
Bookmarks Related papers MentionsView impact
Tecnología para el Progreso y la Reconciliación (2018), Sep 14, 2018
Bookmarks Related papers MentionsView impact
Ingeniería Solidaria
Introduction: This paper is the product of the research "Biological network nanosensors for ... more Introduction: This paper is the product of the research "Biological network nanosensors for diabetes control with the issuance of alerts to users", developed in the technological faculty of the Francisco José de Caldas District University carried out during 2018 and 2019. Problem: Diabetes is a disease that affects most of the adult population and not having proper control can lead to health complications that lead to early deaths. Objective: To propose a theoretical prototype for communication between a nano network and the applications that work to monitor networks, which issues an alarm to users who have diabetes and thus have better control of their disease. Methodology: Research articles, books and forums published from 2010 onwards (some exceptions are found in the references) were used, along with official documentation of tools such as Netcool, Nagios and Pandora. Results: 66 sources were found including papers, monographs, forums and others that complied with the ...
Bookmarks Related papers MentionsView impact
Vinculos, Jul 9, 2013
Bookmarks Related papers MentionsView impact
Vinculos, Jul 15, 2013
Bookmarks Related papers MentionsView impact
Vinculos, Jul 14, 2013
Bookmarks Related papers MentionsView impact
Vinculos, Jul 12, 2013
Bookmarks Related papers MentionsView impact
Vinculos, Jul 12, 2013
Bookmarks Related papers MentionsView impact
Vinculos, Jul 15, 2013
Bookmarks Related papers MentionsView impact
Uploads
Papers by Gerardo Alberto Castang Montiel