Person: Astudillo Salinas, Darwin Fabián
Loading...
Email Address
Birth Date
1983-09-22
ORCID
0000-0001-7644-0270
Scopus Author ID
55575222200
Web of Science ResearcherID
Afiliación
Universidad de Cuenca, Cuenca, Ecuador
Universidad de Cuenca, Departamento de Ingeniería Eléctrica, Electrónica y Telecomunicaciones(DEET), Cuenca, Ecuador
Universidad de Cuenca, Facultad de Ingeniería, Cuenca, Ecuador
Universidad de Cuenca, Departamento de Ingeniería Eléctrica, Electrónica y Telecomunicaciones(DEET), Cuenca, Ecuador
Universidad de Cuenca, Facultad de Ingeniería, Cuenca, Ecuador
País
Ecuador
Research Projects
Organizational Units
Facultad de Ingeniería
La Facultad de Ingeniería, a inicios de los años 60, mediante resolución del Honorable Consejo Universitario, se formalizó la Facultad de Ingeniería de la Universidad de Cuenca, conformada por las escuelas de Ingeniería Civil y Topografía. Esta nueva estructura permitió una mayor especialización y fortalecimiento en áreas clave para el desarrollo regional. Cuenta con programas académicos reconocidos internacionalmente, que promueven y lideran actividades de investigación. Aplica un modelo educativo centrado en el estudiante y con procesos de mejora continua. Establece como prioridad una educación integra, la formación humanística es parte del programa de estudios que complementa a la sólida preparación científico-técnica. Las actividades culturales pertenecen a un programa permanente y activo al interior de nuestras dependencias, a la par de proyectos que desde el alumnado y bajo la supervisión de docentes cumplen con servicios de apoyo a nivel local y regional; promoviendo así una vinculación estrecha con la comunidad.
Job Title
Profesor (T)
Last Name
Astudillo Salinas
First Name
Darwin Fabián
Name
40 results
Search Results
Now showing 1 - 10 of 40
Publication PRAVDA: Pseudo random network coding in vanet for data download(IEEE COMPUTER SOCIETY, 2014-11-12) Astudillo Salinas, Darwin FabiánThis paper introduces PRAVDA, a new approach for infrastructure based content distribution in a vehicular network. PRAVDA is built on broadcasting and pseudo random network coding. Its first strength is that, being broadcast based, it does not need any feedback channel and thus consumes very little throughput. Data is transmitted through network coding: multiple linear combinations of data are sent. A vehicle needs to receive a defined number of independent linear combinations to decode the data. The server will send a larger number of different linear combinations. The unreliability of broadcast is thus fought through a useful redundancy rather than through re-transmission. Finally, computation of the linear combination coefficients is done so that the overhead is the same as it would be without network coding.Publication Characterizing artifacts in RR stress test time series(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2016-08-16) Astudillo Salinas, Darwin Fabián; Medina Molina, Ruben; Palacio Baus, Kenneth Samuel; Solano Quinde, Lizandro Damián; Wong De Balzan, SaraElectrocardiographic stress test records have a lot of artifacts. In this paper we explore a simple method to characterize the amount of artifacts present in unprocessed RR stress test time series. Four time series classes were defined: Very good lead, Good lead, Low quality lead and Useless lead. 65 ECG, 8 lead, records of stress test series were analyzed. Firstly, RR-time series were annotated by two experts. The automatic methodology is based on dividing the RR-time series in non-overlapping windows. Each window is marked as noisy whenever it exceeds an established standard deviation threshold (SDT). Series are classified according to the percentage of windows that exceeds a given value, based upon the first manual annotation. Different SDT were explored. Results show that SDT close to 20% (as a percentage of the mean) provides the best results. The coincidence between annotators classification is 70.77% whereas, the coincidence between the second annotator and the automatic method providing the best matches is larger than 63%. Leads classified as Very good leads and Good leads could be combined to improve automatic heartbeat labeling.Publication Improving the AC transmission expansion planning by using initial solutions algorithms(IEEE Computer Society, 2020) Matute, Nelson; Flores, Wilfredo; López Quizhpi, Julio César; Astudillo Salinas, Darwin Fabián; Morquecho, Edgar; Torres Contreras, Santiago PatricioInitial Solutions (IS) are decisive in meta-heuristics based optimization problems since they impact the performance of the optimization process. This research work proposes and compares some random and deterministic algorithms to create initial solutions based on existing expansion planning criteria to solve the AC Transmission Expansion Planning (TEP) problem. The TEP is formulated as a full non-convex optimization problem using the AC network representation. A local version of the Particle Swarm Optimization (LPSO) technique is employed to solve the TEP problem. The Garver 6-bus and IEEE 24-bus test systems are used to evaluate the IS algorithms performance. It is shown that these algorithms have great potential to improve the robustness and computational effort of meta-heuristics.Publication Pseudo Random Network Coding in Infrastructure to Vehicle Environment for Data Download(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2015-07-14) Astudillo Salinas, Darwin FabiánThis paper introduces a new approach for infrastructure based content distribution in a vehicular network. It is built on broadcasting and pseudo random network coding. Its main strength is that, being broadcast based, it does not need any feedback channel and thus uses less data rate. Data is transmitted exploiting network coding, multiple linear combinations of data are sent. A vehicle needs to receive a defined number of independent linear combinations to decode the data. The server will send a larger number of different linear combinations. The unreliability of broadcast is thus neutralized through a useful redundancy rather than through re-transmission. Finally, computation of the linear combination coefficients is done so that the overhead is the same as it would be without network coding. Depending on the infrastructure deployed, this technique can be a content distribution solution per se or the first step in a more general solution, the second step being based on collaborative download. The high diversity in transmissions will then be a key feature for the performance of such an application.Publication A simple mapping methodology of gait biomechanics for walking control of a biped robot(Institute of Electrical and Electronics Engineers Inc., 2018) Minchala Ávila, Luis Ismael; Astudillo Salinas, Darwin Fabián; Vázquez Rodas, Andrés Marcelo; Astudillo Salinas, Darwin FabiánThis research presents a simple mapping methodology for gait biomechanics of a human being into joint angles of a 10 degrees of freedom (DOF) biped robot. The joint angles are mapped by considering the zero moment point (ZMP) criterion. The walking control of the robot is performed by an optimal state feedback controller. The walking trajectories are planned in the sagittal plane, and they are generated in compliance with the ZMP of the robot - keeping the robot within the support polygon - by dividing the control process in two stages: unique support and double support. A linear inverted pendulum model (LIPM) is used as an approximate single mass model of the robot during gait. Results of this research include simulation-based analysis and real-time implementation results, which show accurate robot movements with limited robustness under slippery platforms. © 2018 IEEE.Publication Information security management frameworks in higher education institutions: an overview(Institute of Electrical and Electronics Engineers Inc., 2019) Merchán Lima, Jorge; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis; Sanchez, Franklin; Lopez, Gabriel; Quiroz, DorysAn overview of academic articles focused on information security management (ISM) in higher education institutions (HEIs) is presented. For this purpose, an empirical study was carried out. The articles found were then analyzed following a methodological procedure consisted of a systematic mapping study with their research questions, inclusion and exclusion criteria, selection of digital libraries, and analysis of the respective search strings. As a result, a set of information security management frameworks (ISMF) for HEIs were identified. They are based on standards such as ISO 27000, COBIT, ITIL, NIST and EDUCAUSE.Publication Trajectory tracking of a quadrotor using sliding mode control(IEEE COMPUTER SOCIETY, 2016-05-01) Reinoso, M; Astudillo Salinas, Darwin Fabián; Minchala Ávila, Luis IsmaelThis paper presents the design of a sliding mode control (SMC) for trajectory tracking of an unmanned aerial vehicle (UAV), quadrotor. A simplified model of the quadrotor is used for the controller design. The robustness of the controller is verified through simulations, and also through data analysis from the experiments in the 3DR Arducopter platform. The SMC algorithms are implemented in a microcontroller that communicates with a human machine interface (HMI), which monitors the behavior and stability of the state variables. The results show effectiveness of the control technique for maintaining stability in the quadrotor under different operating scenarios.Publication Water level monitoring system based on LoPy4 microcontroller with LoRa technology(Institute of Electrical and Electronics Engineers Inc., 2018) Guamán Rivera, Jhonny Lenin; Astudillo Salinas, Darwin Fabián; Vázquez Rodas, Andrés Marcelo; Minchala Ávila, Luis Ismael; Placencia León, José Sebastián; Astudillo Salinas, Darwin FabiánModern weather stations allow real-time monitoring of several atmospheric variables. Wireless Sensor Networks (WSN) provide communication between nodes and the Network Coordinator (Gateway). This network uses transceivers to send the data generated by the stations. The use of WSN in remote locations involves the construction of repeaters because there is no cellular signal or an access network. This article presents the development of a datalogger for stations that measure river water levels of the andean region. The LoPy4 microcontroller is used. This solution combines easy sensor configuration via WiFi and long-range transceiver with LoRa (Long Range) technology. The proposed datalogger has a solar power supply and allows real-time data transmission using the SX1272 transceivers, while a GPRS module is integrated in the coordinator for transmission to the monitoring station server. A GPRS module is integrated into the gateway to forward the data from the stations to the data center.Publication Information security management frameworks and strategies in higher education institutions: a systematic review(2021) Merchán Lima, Jorge Luis; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis; Sánchez, Franklin; López Fonseca, Gabriel; Quiroz, DorysEffective information security management (ISM) practices to protect the information assets of organizations from security intrusions and attacks is imperative. In that sense, a systematic literature review of academic articles focused on ISM in higher education institutions (HEIs) is conducted. For this purpose, an empirical study was performed. Studies carried out from 2012 onward reporting results from HEIs data that perform the ISM through various means, such as a set of framework functions, implementation phases, infrastructure services, and securities to their assets, have been explored. The articles found were then analyzed following a methodological procedure consisting of a systematic mapping study with their research questions, inclusion and exclusion criteria, selection of digital libraries, and analysis of the respective search strings. A set of competencies, resources, directives, and strategies that contribute to designing and to developing an ISM framework (ISMF) for HEIs is identified based on standards such as ISO 27000, COBIT, ITIL, NIST, and EDUCAUSE. This study introduces a strategic reference that guides HEIs on the development of an ISMF and provides recommendations that should be considered for its implementation in an era of ever-evolving security threats.Publication The Zero-day attack: deployment and evolution(2021) Merchán Lima, Jorge Luis; Tello Oquendo, Luis Patricio; Astudillo Salinas, Darwin Fabián; Riofrío Machado, Xavier FernandoIn cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact. Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-day attack, how to understand its real impact, and a few different accessible solutions nowadays. This study introduces a useful reference that provides researchers with knowledge to understand the current problem concerning zero- days attacks; hence they could develop solutions for facing them.
