Cultura Científica y Tecnológica http://erevistas.uacj.mx/ojs/index.php/culcyt <p>Revista de investigación en ingeniería e innovación tecnológica, con revisión por pares doble ciega. Publica artículos de investigación, artículos de revisión, notas técnicas y trabajos galardonados, en la modalidad de publicación continua. Acceso abierto.</p> <p>Latindex • Dialnet • Repositorio UACJ</p> es-ES <p>Todos los contenidos de CULCYT se distribuyen bajo una licencia de uso y distribución “Creative Commons Reconocimiento-No Comercial 4.0 Internacional” (CC-BY-NC). <a href="https://creativecommons.org/licenses/by-nc/4.0/deed.es">Puede consultar desde aquí la versión informativa de la licencia.</a></p> <p>Los autores/as que soliciten publicar en esta revista, aceptan los términos siguientes: a) los/las autores/as conservarán sus derechos de autor y garantizarán a la revista el derecho de primera publicación de su obra; y b) se permite y recomienda a los/las autores/as agregar enlaces de sus artículos en CULCYT en la página web de su institución o en la personal, debido a que ello puede generar intercambios interesantes y aumentar las citas de su obra publicada.</p> culcyt@uacj.mx (Dr. Manuel Antonio Ramos Murillo) culcyt@uacj.mx (Mtro. Raúl Alfredo Meza González) Fri, 28 Nov 2025 00:00:00 -0700 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 Optimality Criteria Optimization of Truss Structures Under Multiple Frequency Constraints by the Linear Approximation Resizing Rule http://erevistas.uacj.mx/ojs/index.php/culcyt/article/view/7177 <p>The optimization of structures requires an efficient method to minimize weight, while satisfying multiple types of constraints. This approach generalizes the optimality criteria for the specific type of constraints in the frequency. Equations of motion for truss structures are considered to obtain the derivatives of the constraints required by the optimality criterion. Exponential and linear resizing optimization rules for the design variables are described. In the first, the optimized areas are compared with the analytical solution for a continuous rod. As a second example the optimized frequencies, weights and areas obtained by the linear resizing rule are compared to reference values. Both examples demonstrate the validity and effectiveness of the optimality criteria approach for the frequency constraints in truss structures.</p> José Alfredo Ramírez Monares, Elva Lilia Jardón Reynoso, Quirino Estrada Barbosa Derechos de autor 2025 José Alfredo Ramírez Monares, Elva Lilia Jardón Reynoso, Quirino Estrada Barbosa http://creativecommons.org/licenses/by-nc/4.0 http://erevistas.uacj.mx/ojs/index.php/culcyt/article/view/7177 Fri, 28 Nov 2025 00:00:00 -0700 ChaCha20 Encryption Algorithm Security Enhancement through Artificial Intelligence-Based Random Noisy Injection: A Case Study http://erevistas.uacj.mx/ojs/index.php/culcyt/article/view/6916 <p>The problem of digital data theft is receiving growing attention in organizations because it may produce significant financial losses. This issue can be handled using dynamic encryption methodologies. There exists safety encryption alternatives such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). However, it is known that these algorithms have been threatened by quantum computing advent. Thereby, the aim of this research is to suggest novel dynamic encryption alternatives using artificial intelligence (AI), based on a noisy injection scheme on ciphertext, as it has the potential to mislead cybercriminals. Several aspects related to this subject were studied. Despite that quantum computing was not used, other measures have been proposed. The designed methodology was focused over the updating of ChaCha20 strategy combined with random Caesar II methodology. This fusion of techniques, referred to as random noisy ChaCha20, is suggested for increasing ciphertext security. Our novel proposal was compared with other random noisy alternatives such as random noisy DES, random noisy 3DES, random noisy AES-256, and random noisy Blowfish. The obtained results were dynamic ciphertext outputs. These schemes are limited to the ASCII table values. In conclusion, the suggested alternatives presented here may be difficult for cybercriminals to decrypt.</p> Edgar Rangel Lugo , Kevin Uriel Rangel Ríos , Leonel González Vidales, Carlos Alberto Bernal Beltrán , Cinthya Maybeth Rangel Ríos, Rosa Isabel Reynoso Andrés, César del Ángel Rodríguez Torres, Lucero de Jesús Ascencio Antúnez Derechos de autor 2026 Edgar Rangel Lugo , Kevin Uriel Rangel Ríos , Leonel González Vidales, Carlos Alberto Bernal Beltrán , Rosa Isabel Reynoso Andrés, César Del Ángel Rodríguez Torres, Lucero De Jesús Ascencio Antúnez Ascencio Antúnez http://creativecommons.org/licenses/by-nc/4.0 http://erevistas.uacj.mx/ojs/index.php/culcyt/article/view/6916 Wed, 31 Dec 2025 00:00:00 -0700