26 research outputs found

    Legal Issues Concerning P2P Exchange of Educational Materials and Their Impact on E-Learning Multi-Agent Systems

    Get PDF
    The last years have known an impressive change in the use of technologies for the sharing and dissemination of knowledge, thus affecting deeply all the traditional means used by education in all its shapes and levels. This transformation has not been fully understood by the society at large for its immense impacts and its short life. This paper describes in the question emerging from the clash of the rights to education in a wide sense and the rights derived from authorship and how that issue is affecting the design of e-learning multi-agent tools

    A Prototype for linear features generalization

    Get PDF
    A computer application designed to generalize linear elements in a vector formatted cartographic set by means of two of the most contrasted line generalization algorithms, Douglas-Peucker simplification and Bézier curves based smoothing, is presented in this paper. Regarding codification, the simultaneous treatment of different lineal geometry entity classes and the conservation of their original topological relationships among them are considered. It is recommended in processes that produce small scale reductions (in a 1:2 relationship or similar). The application allows changing the characteristic parameters of the referred algorithms and proposes a report of the results obtained after every transformation. That way it supplies an additional facility as a trial tool to choose the parameters that give the best results in every process

    Relative Radiometric Normalization of Multitemporal images

    Get PDF
    A correct radiometric normalization between both images is fundamental for change detection. MAD method and its IR-MAD extension in an implementation on multisprectral aerial images is described in this paper

    TÉCNICAS INTELIGENTES, AGENTES ADAPTATIVOS Y REPRESENTACIONES ONTOLÓGICAS EN SISTEMAS DE DETECCIÓN DE INTRUSOS

    Get PDF
    RESUMEN La seguridad Informática requiere una optimización permanente de los mecanismos de protección y estrategias que permitan prevenir ataques en las redes y sistemas de información. El proceso de monitoreo de eventos que ocurren en un sistema o en una red a partir de patrones y firmas de posibles ataques se conoce como Sistema de Detección de Intrusos (IDS). Los IDS han escalado significativamente al punto de focalizarse en modelos basados en prevención más que en corrección, estos sistemas monitorean tráfico utilizando un conjunto de firmas para detectar actividades malignas, reportar incidentes o tomar acciones correctivas; pero cualquier cambio insertado en el patrón de un ataque, puede comprometer el sistema y evitar que la tecnología subyacente de detección o prevención sea insuficiente. En los últimos años se han planteado diferentes modelos basados en técnicas de Inteligencia Artificial que pueden ayudar a la generación automática de nuevas firmas y detectar nuevos patrones de ataque sin la intervención humana. Algunas investigaciones presentan técnicas como Redes Neuronales, Algoritmos Genéticos, Razonamiento Basado en Casos, árboles de decisión, Lógica Difusa entre otras, aplicadas a la Detección de Intrusos, además de arquitecturas basadas en Agentes Inteligentes sobre IDS Distribuidos incorporando así capacidades de autonomía, reactividad, pro actividad, movilidad y racionalidad. Este artículo es el resultado de un estudio del estado del arte de las diferentes estrategias inteligentes en IDS. Además la introducción de modelos de cooperación a partir de Agentes adaptativos y de representaciones ontológicas en los Sistemas de Detección de Intrusos Distribuidos, adicionalmente se plantean los elementos de una investigación en curso donde se incorporan estos métodos.PALABRAS CLAVE: Sistemas de Detección de Intrusos, Detección de Intrusos Inteligente, Agentes Inteligentes, Seguridad en Redes, Representaciones Ontológicas y Semánticas Conglomerados.   ABSTRACT Security Computing requires a permanent optimization in protection mechanisms and strategies that allow preventing attacks in the networks and information systems. The event monitoring process that happens in a system or a network using patterns or signs is known like Intrusion Detection System (IDS).    The IDS have been focused more in prevention models than correction models; these systems tests traffic using a set of signs to detect malicious activities, report incidents o take correction actions; but, any change inserted in the attack pattern can compromise the system and avoid the underlying technology and make insufficient the Intrusion Detection. Over the years different models based in Artificial Intelligence techniques have been considered to help the automatic signs and patterns generation without human intervention.     Some     researching     projects     present Neuronal Networks, Genetic Algorithms, Case Based Reasoning, decision trees, Fuzzy logic applied to the Intrusion Detection; additionally using Intelligent and Mobile Agents architectures over Distributed IDS incorporating autonomy, reactivity, pro activity, mobility and    rationality    capabilities.     This    paper    is    result    of studying state of art of multiples intelligent strategies in IDS and cooperation models using Agents and ontology representation in Intrusion Detection. This paper complements elements in a course research considering integrating these methods.KEYWORDS: Intrusion Detection Systems, Intelligent Intrusion Detection, Intelligent Agents, Network Security, Ontology and Semantic representations

    Mortality prediction in chronic obstructive pulmonary disease comparing the GOLD 2015 and GOLD 2019 staging: a pooled analysis of individual patient data

    Get PDF
    In 2019, The Global Initiative for Chronic Obstructive Lung Disease (GOLD) modified the grading system for patients with COPD, creating 16 subgroups (1A–4D). As part of the COPD Cohorts Collaborative International Assessment (3CIA) initiative, we aim to compare the mortality prediction of the 2015 and 2019 COPD GOLD staging systems. We studied 17 139 COPD patients from the 3CIA study, selecting those with complete data. Patients were classified by the 2015 and 2019 GOLD ABCD systems, and we compared the predictive ability for 5-year mortality of both classifications. In total, 17 139 patients with COPD were enrolled in 22 cohorts from 11 countries between 2003 and 2017; 8823 of them had complete data and were analysed. Mean±sd age was 63.9±9.8 years and 62.9% were male. GOLD 2019 classified the patients in milder degrees of COPD. For both classifications, group D had higher mortality. 5-year mortality did not differ between groups B and C in GOLD 2015; in GOLD 2019, mortality was greater for group B than C. Patients classified as group A and B had better sensitivity and positive predictive value with the GOLD 2019 classification than GOLD 2015. GOLD 2015 had better sensitivity for group C and D than GOLD 2019. The area under the curve values for 5-year mortality were only 0.67 (95% CI 0.66–0.68) for GOLD 2015 and 0.65 (95% CI 0.63–0.66) for GOLD 2019

    CIBERER : Spanish national network for research on rare diseases: A highly productive collaborative initiative

    Get PDF
    Altres ajuts: Instituto de Salud Carlos III (ISCIII); Ministerio de Ciencia e Innovación.CIBER (Center for Biomedical Network Research; Centro de Investigación Biomédica En Red) is a public national consortium created in 2006 under the umbrella of the Spanish National Institute of Health Carlos III (ISCIII). This innovative research structure comprises 11 different specific areas dedicated to the main public health priorities in the National Health System. CIBERER, the thematic area of CIBER focused on rare diseases (RDs) currently consists of 75 research groups belonging to universities, research centers, and hospitals of the entire country. CIBERER's mission is to be a center prioritizing and favoring collaboration and cooperation between biomedical and clinical research groups, with special emphasis on the aspects of genetic, molecular, biochemical, and cellular research of RDs. This research is the basis for providing new tools for the diagnosis and therapy of low-prevalence diseases, in line with the International Rare Diseases Research Consortium (IRDiRC) objectives, thus favoring translational research between the scientific environment of the laboratory and the clinical setting of health centers. In this article, we intend to review CIBERER's 15-year journey and summarize the main results obtained in terms of internationalization, scientific production, contributions toward the discovery of new therapies and novel genes associated to diseases, cooperation with patients' associations and many other topics related to RD research

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    Legal Effects of Link Sharing in Social Networks

    No full text
    Knowledge sharing among individuals has changed deeply with the advent of social networks in the environment of Web 2.0. Every user has the possibility of publishing what he or she deems of interest for their audience, regardless of the origin or authorship of the piece of knowledge. It is generally accepted that as the user is sharing a link to a document or video, for example, without getting paid for it, there is no point in worrying about the rights of the original author. It seems that the concepts of authorship and originality is about to disappear as promised the structuralists fifty years ago. Nevertheless the legal system has not changed, nor have the economic interests concerned. This paper explores the last developments of the legal system concerning these issue

    A prototype for linear features generalization

    No full text
    A computer application designed to generalize linear elements in a vector formatted cartographic set by means of two of the most contrasted line generalization algorithms, Douglas-Peucker simplification and Bézier curves based smoothing, is presented in this paper. Regarding codification, the simultaneous treatment of different lineal geometry entity classes and the conservation of their original topological relationships among them are considered. It is recommended in processes that produce small scale reductions (in a 1:2 relationship or similar). The application allows changing the characteristic parameters of the referred algorithms and proposes a report of the results obtained after every transformation. That way it supplies an additional facility as a trial tool to choose the parameters that give the best results in every process
    corecore