Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
jesus diaz

    jesus diaz

    Abstract: A case of a three-month female infant who was born in an ectopic and institutional delivery is described. His parents are healthy and came to the consultation office due to an enlargement in the posterior part of the head.... more
    Abstract: A case of a three-month female infant who was born in an ectopic and institutional delivery is described. His parents are healthy and came to the consultation office due to an enlargement in the posterior part of the head. Precocious Hyperostosis due to synostoses ...
    ABSTRACT
    New cyanamidonitrate–copper(II) complexes [Cu(NO2NCN)2Ln] (L=imidazole (iz), n=2; L=iz, 1-, 2- or 4-methylimidazole (meiz), n=4) have been isolated and characterised by IR, electronic and ESR spectroscopy. The crystal structures of 1- and... more
    New cyanamidonitrate–copper(II) complexes [Cu(NO2NCN)2Ln] (L=imidazole (iz), n=2; L=iz, 1-, 2- or 4-methylimidazole (meiz), n=4) have been isolated and characterised by IR, electronic and ESR spectroscopy. The crystal structures of 1- and 4-meiz complexes have been determined by X-ray crystallography; the structure of [Cu(NO2NCN)2(iz)2] is known (J. Kožı́šek, J.G. Dı́az, M. Hvastijová, L. Jäger, Acta Crystallogr., Sect. C 53 (1997) 703). The crystal structure of the first two compounds consists of [Cu(NO2NCN)2L4] units, in which the central CuII atoms are pseudo-octahedrally coordinated by six nitrogen atoms. Four of them, in equatorial planes, originate from meiz molecules and two, in axial positions, are nitrile nitrogens from the NO2NCN− anions. Influence of hydrogen bonds on equatorial–axial bond length correlation was ascertained. In the ESR spectra of the [Cu(NO2NCN)2L4] compounds copper hyperfine splitting is resolved. For all complexes, weak lines corresponding to the ΔMs=2 transitions appear. The spectrum of [Cu(NO2NCN)2(iz)4] in frozen methanolic solution shows 16-fold nitrogen splitting of the perpendicular band.
    We propose a methodology for verifying security properties of network protocols at design level. It can be separated in two main parts: context and requirements analysis and informal verification; and formal representation and procedural... more
    We propose a methodology for verifying security properties of network protocols at design level. It can be separated in two main parts: context and requirements analysis and informal verification; and formal representation and procedural verification. It is an iterative process where the early steps are simpler than the last ones. Therefore, the effort required for detecting flaws is proportional to the complexity of the associated attack. Thus, we avoid wasting valuable resources for simple flaws that can be detected early in the verification process. In order to illustrate the advantages provided by our methodology, we also analyze three real protocols.
    We prove some existence (and sometimes also uniqueness) of weak solutions to some stationary equations associated to the complex Schr\"{o}dinger operator under the presence of a singular nonlinear term. Among other new facts, with respect... more
    We prove some existence (and sometimes also uniqueness) of weak solutions to some stationary equations associated to the complex Schr\"{o}dinger operator under the presence of a singular nonlinear term. Among other new facts, with respect some previous results in the literature for such type of nonlinear potential terms, we include the case in which the spatial domain is possibly unbounded (something which is connected with some previous localization results by the authors), the presence of possible non-local terms at the equation, the case of boundary conditions different to the Dirichlet ones and, finally, the proof of the existence of solutions when the right-hand side term of the equation is beyond the usual $L^2$-space.
    Prior research has documented caregiving difficulties in families of children with autism spectrum disorder (ASD). However, Latino families may encounter unique challenges. The purpose of this study was to understand the caregiving... more
    Prior research has documented caregiving difficulties in families of children with autism spectrum disorder (ASD). However, Latino families may encounter unique challenges. The purpose of this study was to understand the caregiving experiences of Latino families with children with ASD, including daily activities, coping strategies, and service utilization. Fifteen Latino parents of children with ASD were interviewed. The interviews were transcribed for analysis to identify themes of experiences unique to this population. Latino families of children with ASD encounter many similar issues as non-Latino families but also unique issues that affect service utilization. Four themes were identified: dealing with the diagnosis, dealing with stigma and isolation from family and community, understanding the role of mothers in changing family routines, and utilizing services. To meet the unique needs of Latino families, services need to be provided in culturally sensitive context that address ...
    Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these platforms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these... more
    Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these platforms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these networks as a probable threat. In order to solve this problem, we propose to add support for fairness mechanisms to the Tor network. Specifically, by introducing a slight modification to the key negotiation process with the entry and exit nodes, in the shape of group signatures. By means of these signatures, we set up an access control method to prevent misbehaving users to make use of the Tor network. Additionally, we establish a predefined method for denouncing illegitimate actions, which impedes the application of the proposed fairness mechanisms as a threat eroding users' privacy. As a direct consequence, traffic coming from Tor would be considered less suspicious by service providers.
    In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues.... more
    In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administrators and developers. Moreover, as far as we know, the use of formal methodologies for the verification of security properties of communication protocols isn't yet a common practice. We propose here a methodology to fill this gap, i.e., to analyse both the security of the proposed protocol and the pertinence of the underlying premises. In this concern, we propose the definition and formal evaluation of a protocol for the distribution of digital identities. Once distributed, these identities can be used to verify integrity and source of information. We base our security analysis on tools...
    Research Interests:
    Las matemáticas son una de las materias más relevantes en la formación intelectual de los estudiantes y su importancia se remonta a las civilizaciones antiguas. Sin embargo, su importancia es menospreciada y son dejadas de lado en la... more
    Las matemáticas son una de las materias más relevantes en la formación intelectual de los estudiantes y su importancia se remonta a las civilizaciones antiguas. Sin embargo, su importancia es menospreciada y son dejadas de lado en la actualidad. Este fenómeno se presenta en México, donde el 72% de la población total de estudiantes de primaria de entre tercer y sexto grado (8"108,694) en México poseen un nivel insuficiente a elemental de estudiantes mientras jugaban. Palabras clave: Objetos de aprendizaje, videojuegos, dispositivos móviles.
    ABSTRACT We get some necessary and sufficient conditions for the very weak solvability of the beam equation stated in terms of powers of the distance to the boundary, accordingly to the boundary condition under consideration. We get a L... more
    ABSTRACT We get some necessary and sufficient conditions for the very weak solvability of the beam equation stated in terms of powers of the distance to the boundary, accordingly to the boundary condition under consideration. We get a L 1-estimate by using an abstract result due to Crandall and Tartar. Applications to some nonlinear perturbed equations and to the eventual positivity of the solution of the parabolic problems are also given.
    Research Interests:
    ABSTRACT Privacy has become a major concern in the Internet, resulting in an increased popularity of anonymizing systems aimed to protect users’ identities. However, service providers sometimes interpret this anonymity as a risk, since... more
    ABSTRACT Privacy has become a major concern in the Internet, resulting in an increased popularity of anonymizing systems aimed to protect users’ identities. However, service providers sometimes interpret this anonymity as a risk, since dishonest users may take advantage of it. A possible solution is to create a practical implementation of fairness mechanisms to reach an equilibrium between anonymity and its different types of revocation. Furthermore, in order to reach a wide acceptance, any new mechanism must be easily deployable in current systems and must be adaptable (from the functionality perspective) to the needs that may arise in different situations. To that end, we propose a set of extensions to the CRL and OCSP procedures of the X.509 infrastructure, and a new protocol for easing the task of providing evidence of illegitimate actions. On one hand, the adaptability of our scheme relies on the already widely deployed X.509 infrastructure. On the other hand, the functionality provided by our proposal is mainly built upon group signatures, which gives it a vast variety of schemes to choose from, depending on the specific needs that may arise.
    To evaluate the evolution of the clinical presentation of this malignancy over time, and its possible prognostic repercussions. A retrospective study of 538 patients subjected to surgery due to renal cancer in our hospital during the... more
    To evaluate the evolution of the clinical presentation of this malignancy over time, and its possible prognostic repercussions. A retrospective study of 538 patients subjected to surgery due to renal cancer in our hospital during the period 1995-2011. An analysis was made of the evolution of the clinical manifestations at the time of diagnosis, stratifying the results by years during four time periods. At the time of diagnosis, 53,4% of the patients were asymptomatic for 1995-1999 and 72% in the period 2008-2011. Pain is the symptom that occurs most frequently (18.8%) followed by hematuria (15.4% ). The proportion of symptomatic patients increases in relation to stage and histopathological grade. The clinical presentation of renal cancer has evolved over the years, not in terms of symptoms, which when present are still similar, but in terms of their incidence.
    . Until now, an unconditional nonlinear energy stability analysis for thermal convection according to Navier-Stokes theory had not been developed for the case in which the viscosity depends on the temperature in a quadratic manner such... more
    . Until now, an unconditional nonlinear energy stability analysis for thermal convection according to Navier-Stokes theory had not been developed for the case in which the viscosity depends on the temperature in a quadratic manner such that the viscosity has a maximum. We analyse here a model of non-Newtonian fluid behaviour that allows us to develop an unconditional analysis directly when the quadratic viscosity relation is allowed. By unconditional, we mean that the nonlinear stability so obtained holds for arbitrarily large perturbations of the initial data. The nonlinear stability boundaries derived herein are sharp when compared with the linear instability thresholds.
    Female, 59 FINAL DIAGNOSIS: Paraneoplastic limbic encephalitis Symptoms: Seizure • memory changes • decreased concentration Chemotherapy Clinical Procedure: Cerebral images Specialty: Hematology • Oncology. Challenging differential... more
    Female, 59 FINAL DIAGNOSIS: Paraneoplastic limbic encephalitis Symptoms: Seizure • memory changes • decreased concentration Chemotherapy Clinical Procedure: Cerebral images Specialty: Hematology • Oncology. Challenging differential diagnosis. Paraneoplastic neurological disorders (PND) are defined as remote effects on the nervous system that are not caused directly by the tumor, its metastases, or metabolic disruptions. This syndrome occurs in less than 1 per 10,000 patients diagnosed with a malignancy. Many antibodies are found in the central nervous system in PND, the most well known are Anti-Hu, Tr, CV2 Ta, Yo, Ri and amphiphysin. Paraneoplastic limbic encephalitis occurs due to involvement of the limbic system secondary to an autoimmune response to neurons of the brain provoked by the antibodies. PATIENTs, thus, present with seizures, changes in mood, memory, and personality. Fifty-nine years-old female patient presented with seizures, decreased concentration and memory changes....

    And 165 more