146 research outputs found

    Some Modern Translation Techniques Reflected in an Arabic Text From the Ninth Century: A Passage From the Kitâb al-hayawân of al-Yâhiz al-Basrî

    Get PDF
    Tras una breve semblanza del autor y de su obra, se incluye la traducción de un pasaje del Libro de los animales en el que al-Ŷâhiz alude a la versión de una lengua a otra y se comentan algunas cuestiones planteadas por la moderna teoría de la traducción en relación al mismoAfter a biographical sketch of the author and his works, the translation of a passage from the Bookof Animals in which al-Ŷâhiz alludes to the fact of translating from one language to another is includedand some questions raised by the modern theories of translation are discussed in relation to this tex

    Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety

    Get PDF
    Robots and autonomous systems in general are set to suffer similar cybersecurity problems that computers have been facing for decades. This is not only worrying for critical tasks such as those performed by surgical, or military robots but also for household robots such as vacuum cleaners or for teleconference robots compromise privacy and safety of their owners. What will happen if these robots are hacked? This study presents a survey on the cybersecurity attacks associated with service robots, and as a result, a taxonomy that classifies the risks faced by users when using service robots, distinguishing between security and safety threads, is presented. We also present the robot software development phase as one the most relevant ones for the security of robots

    Exploraty factor structural model of the intangible assets in knowledge creating organization

    Get PDF
    The psychological studies of organizations, about human capital, have shown that this factor increases to the extent that the environmental demands are intensified, but it is the intellectual trait that acquires the greatest value when considered as the main intangible asset. of an organization.In this way, the objective of this paper was to expose the theoretical, conceptual and empirical frameworks related to human capital in order to establish discussion scenarios related to the value chain of an organization based on its intangible assets.A documentary study was carried out with a non-probabilistic selection of sources indexed to repositories such asDialnet,Latindex,Publindex, Redalyc and Scielo, considering the year of publication and relationship between the concepts of organization and human capital.There are lines of research around empathy, trust, commitment, satisfaction and happiness as inherent factors ofhumancapitalas an intellectual asset of an organization

    Comparación de 3 pautas de sedación para pacientes sometidos a anestesia subaracnoidea. Ensayo clínico aleatorizado, simple ciego

    Get PDF
    ResumenIntroducciónLa sedación es un conjunto de acciones dirigidas a lograr que un paciente se encuentre tranquilo, cómodo, libre de dolor o de malos recuerdos mientras se realiza un procedimiento diagnóstico o terapéutico. Dado que las técnicas anestésicas regionales empleadas en la práctica clínica habitual son procedimientos relativamente traumáticos y dolorosos, se han asociado a sedación, para hacer este tipo de intervenciones más confortables para el paciente y hacer más fácil la colaboración del mismo.ObjetivoDeterminar la eficacia de 3 pautas de sedación en pacientes que van a ser sometidos a anestesia subaracnoidea.MetodologíaEstudio experimental, ensayo clínico, aleatorizado, prospectivo, simple ciego, en el cual se compararon 3 pautas para sedación en pacientes sometidos a anestesia subaracnoidea.ResultadosTodos los pacientes del estudio tuvieron ansiolisis, colaboraron a la punción y refirieron que volverían a recibir una anestesia subaracnoidea sin temor; además, no se reportaron complicaciones tales como depresión respiratoria, náuseas, vómitos u otra, con las pautas de sedación utilizadas, siendo alta la satisfacción por parte de los pacientes. El reflejo de retirada (p=0,0003) y el dolor a la punción (p=0,0069) se presentaron en mayor proporción en el grupo que usó como pauta solo midazolam intravenoso. En este mismo grupo hubo menor satisfacción con la sedación; sin embargo, las 3 pautas mostraron una buena eficacia.ConclusionesLas 3 pautas de sedación propuestas fueron eficaces para su uso en anestesia subaracnoidea, con mejores resultados cuando se usó midazolam más fentanilo o midazolam más ketamina.p-2011-1682 Colciencias. Registro # NCT0213664 (clinicaltrials.gov,prospectivo).AbstractIntroductionSedation is defined as the set of actions aimed at having a quiet, comfortable, pain-free patient during a diagnostic or therapeutic procedure without any bad memories. Since the standard regional anesthesia techniques used in clinical practice are relatively traumatic and painful procedures, sedation has been introduced to make these interventions more comfortable for the patient and to facilitate the patient's cooperation.ObjectiveTo establish the efficacy of three sedation guidelines in patients undergoing subarachnoid anesthesia.MethodologyExperimental, randomized, prospective, single blind clinical trial comparing three guidelines for the sedation of patients undergoing subarachnoid anesthesia.ResultsAll of the patients in the trial received anxiolysis, collaborated with the puncture and said that they would not be afraid to receive subarachnoid anesthesia in the future. There were no complications including respiratory depression, nausea, vomiting or any other complications reported with the use of the sedation guidelines. Patient satisfaction was high. Withdrawal reflex (P=0.0003) and puncture related pain (P=0.0069) were more common in the group using the intravenous midazolam-only guideline and patient satisfaction with sedation was also lower in this group; however, the three guidelines showed good efficacy.ConclusionsThe three sedation guidelines presented were effectively used in subarachnoid anesthesia; the results were more favorable with the use of midazolam + fentanyl or midazolam + ketamine.p-2011-1682 Colciencias. Registro # NCT0213664 (clinicaltrials.gov,prospectivo)

    CD36 gene polymorphism -31118 G > A (rs1761667) is associated with overweight and obesity but not with fat preferences in Mexican children

    Get PDF
    CD36 glycoprotein is a candidate receptor involved in the gustatory detection of lipids and emerging evidence has suggested that genetic variations in CD36 may modulate the oral perception threshold to fatty acids. Here, we analyzed the association of -31118 G > A polymorphism in CD36 gene with nutritional status and preferences for fatty foods in Mexican children. Genotyping of SNP rs1761667 was performed in school-age children (n = 63) in addition to sensory tests evaluating the preference and satisfaction score assigned to oil-based sauces of different fatty acid composition. The G allele was associated with high BMI z-score in children (OR = 2.43, 95% (CI 1.02–5.99); p = 0.02) but CD36 genotypes (AA, GA, and GG) did not show significant association with the preference and satisfaction scores assigned to oil-based sauces. The BMI z-score showed no association with the preference to oil-based sauces; however, children with normal weight gave higher satisfaction scores to sauces with a high content of unsaturated fatty acids than to sauces rich in saturated fatty acids (0.56 ± 1.26 vs. 0.06 ± 1.22; p = 0.02). Therefore, the G allele of -31118 G > A SNP in CD36 gene is associated with overweight and obesity in Mexican children but do not appear to modulate the preferences and satisfaction scores to fat.info:eu-repo/semantics/acceptedVersio

    Analyzing the influence of the sampling rate in the detection of malicious traffic on flow data

    Get PDF
    [EN] Cyberattacks are a growing concern for companies and public administrations. The literature shows that analyzing network-layer traffic can detect intrusion attempts. However, such detection usually implies studying every datagram in a computer network. Therefore, routers routing a significant volume of network traffic do not perform an in-depth analysis of every packet. Instead, they analyze traffic patterns based on network flows. However, even gathering and analyzing flow data has a high-computational cost, and therefore routers usually apply a sampling rate to generate flow data. Adjusting the sampling rate is a tricky problem. If the sampling rate is low, much information is lost and some cyberattacks may be neglected, but if the sampling rate is high, routers cannot deal with it. This paper tries to characterize the influence of this parameter in different detection methods based on machine learning. To do so, we trained and tested malicious-traffic detection models using synthetic flow data gathered with several sampling rates. Then, we double-check the above models with flow data from the public BoT-IoT dataset and with actual flow data collected on RedCAYLE, the Castilla y León regional academic network.S

    Poliolefinas reforzadas con óxido de grafeno reducido. Mediciones viscoelásticas

    Get PDF
    Se analiza el efecto de óxido de grafeno reducido y del óxido de polietileno sobre las propiedades viscoelásticas de HDPE y PP. Los gráficos de la viscosidad dinámica presentan curvas muy similares en todos los casos. Utilizando porcentajes de rGO de 0.1% con 2% de PEO, se obtienen valores del módulo elástico cuatro veces más grandes que los de HDPE puro y tres veces más que el del PP puro. Con 0.5% de rGO en ambos composites, manteniendo el mismo porcentaje de PEO, se obtiene un módulo elástico tres veces más grande que el de las poliolefinas puras

    SQL injection attack detection in network flow data

    Get PDF
    [EN] SQL injections rank in the OWASP Top 3. The literature shows that analyzing network datagrams allows for detecting or preventing such attacks. Unfortunately, such detection usually implies studying all packets flowing in a computer network. Therefore, routers in charge of routing significant traffic loads usually cannot apply the solutions proposed in the literature. This work demonstrates that detecting SQL injection attacks on flow data from lightweight protocols is possible. For this purpose, we gathered two datasets collecting flow data from several SQL injection attacks on the most popular database engines. After evaluating several machine learning-based algorithms, we get a detection rate of over 97% with a false alarm rate of less than 0.07% with a Logistic Regression-based model.SIInstituto Nacional de Ciberseguridad de España (INCIBE)Universidad de Leó

    Desenvolupament d'interfícies d'usuari i visualització d'imatge mèdica en dispositius mòbils Android

    Get PDF
    Aquest document conté originàriament altre material i/o programari només consultable a la Biblioteca de Ciència i Tecnologia.Aquest treball tracta sobre la realització d'una aplicació per a dispositius Android que permeti visualitzar imatges mèdiques. Amb la col·laboració del parc Taulí de Sabadell s'han realitzat tasques de recerca de requeriments com l'elaboració d'una entrevista o la realització d'una maqueta de paper que s'ha sotmès a una avaluació heurística en un procés iteratiu. Finalment, s'ha implementat una aplicació on es poden visualitzar imatges mèdiques, fer accions sobre elles com canviar el color o fer zoom i accedir a informació del pacient.Este trabajo trata sobre la realización de una aplicación para dispositivos Android que permita visualizar imágenes médicas. Con la colaboración del parc Taulí de Sabadell se han realizado tareas de búsqueda de necesidades como la elaboración de una entrevista o la realización de una maqueta de papel que se ha sometido a una evaluación heurística en un proceso iterativo. Finalmente, se ha implementado una aplicación donde se pueden visualizar imágenes médicas, hacer acciones sobre ellas como cambiar el color o hacer zoom y acceder a información del paciente.This project is about making an Android application for mobile devices that allows viewing medical images. Needfinding tasks were made with the collaboration of parc Taulí de Sabadell, such preparing and doing an interview or making a paper prototype that has been subjected to a heuristic evaluation in an iterative process. Finally, we have implemented an application where you can view medical images, perform actions on them as changing the color or zoom in and access patient information
    corecore