317 research outputs found

    El Protocolo de Kyoto y la lucha contra el cambio climático: situación actual y perspectivas futuras

    Get PDF
    El trabajo trata sobre un tema que está cada vez más de actualidad, el problema del cambio climático. El empeoramiento del clima, sobre todo desde la época industrial, hizo que se creara en 1992 un marco internacional para la lucha contra el Cambio Climático, la CMNUCC. Y en 1997 se adicionó un anexo a la misma, el Protocolo de Kyoto. El objetivo del trabajo es analizar cómo fue el grado de cumplimiento de los compromisos asumidos por los países que firmaron el Protocolo de Kyoto al final de su periodo de vigencia en 2012, estudiar qué países se adhirieron a la prórroga que se aprobó en la Cumbre del Clima de Doha 2012 y finalmente mostrar que perspectivas de futuro se esperan, sobre todo cuando se celebre la Cumbre del Clima de París en 2015, donde se debe aprobar un nuevo texto vinculante que sustituya al Protocolo de Kyoto y cuya entrada en vigor sería a partir de 2021. Finalmente, el trabajo concluirá con unas conclusiones sobre todo el proceso a lo largo de los años.Universidad de Sevilla. Grado en Economí

    Aplicación de una metodología multicriterio para el diseño de rutas eficientes en una distribuidora de alimentos en Suba

    Get PDF
    Alternativa InvestigaciónLas necesidad de optimizar los recursos de las organizaciones en la actualidad ha llevado la competitividad a niveles de exigencia y efectividad sin margen de error, en este trabajo se aplicará una metodología multicriterio en la que se evaluara distancias, tiempos de recorrido, eficiencia en el recurso del transporte de la empresa, recolectando información de la situación, con estudios y variables que nos permitan aumentar el la utilidad y desempeño actual de la empresa, proponiendo mejoras con estudios y pruebas piloto en la empresa, obteniendo información que será el apoyo para una retroalimentación de los resultados antes y después del estudio realizado.PregradoIngeniero Industria

    Identifying critical nodes in multi-layered networks under multi-vector malware attack

    Get PDF
    This proceeding at: Net-Works 2013 International Conference. Complex and Multiplex Networks: Structure, Applications and Related Topic, took place 2013, February, 11-13, in El Escorial (Spain).Computer viruses are evolving by developing multiple spreading mechanisms that are simultaneously used during the infection process. The identification of the nodes that allow a better spreading efficiency of these kind of viruses is becoming a determinant part of the defensive strategy against malware. These multi-vector viruses can be modeled in multi-layered networks in which each node belongs simultaneously to different layers, adapting the spreading vector to the properties of the layer. This way, the same virus has different propagation rates in each layer and also in the multi-layered network considered as a whole. The set of nodes selected as initial group of infected subjects can determine the final propagation of the infection. In this work, we analyze the spreading of a virus in a multi-layered network formed by M layers, given different sets of initial infected nodes, and, in particular, the effect of the initial selection on the efficiency of the infection. The initial group of infected nodes is selected according to properties of the nodes considered as part of a layer and also of the whole system. As an example, we apply this study to a multi-layered network formed by two layers: the social network of collaboration of the Spanish scientific community of Statistical Physics, and the telecommunication network of each institution.We want to thank the financial support of MINECO through grants MTM2012-39101 for J.G. and FIS2011-22449 (PRODIEVO) for S.C., and of CM through grant S2009/ESP-1691 (MODELICO) for J.G. and S.C.Publicad

    Vulnerability of state-interdependent networks under malware spreading

    Get PDF
    Computer viruses are evolving by developing spreading mechanisms based on the use of multiple vectors of propagation. The use of the social network as an extra vector of attack to penetrate the security measures in IP networks is improving the effectiveness of malware, and have therefore been used by the most aggressive viruses, like Conficker and Stuxnet. In this work we use interdependent networks to model the propagation of these kind of viruses. In particular, we study the propagation of a SIS model on interdependent networks where the state of each node is layer-independent and the dynamics in each network follows either a contact process or a reactive process, with different propagation rates. We apply this study to the case of existing interdependent networks, namely a Spanish scientific community of Statistical Physics, formed by a social network of scientific collaborations and a physical network of connected computers in each institution. We show that the interplay between layers increases dramatically the infectivity of viruses in the long term and their robustness against immunization.The financial support of MINECO through grants MTM2012-39101 for J.G. and FIS2011-22449 (PRODIEVO) for S.C., and of CM through grant S2009/ESP-1691 (MODELICO) for J.G. and S.C.Publicad

    A stochastic generative model of the World Trade Network.

    Get PDF
    The World Trade Network (WTN) is a network of exchange flows among countries whose topological and statistical properties are a valuable source of information. Degree and strength (weighted degree) are key magnitudes to understand its structure and generative mechanisms. In this work, we describe a stochastic model that yields synthetic networks that closely mimic the properties of annual empirical data. The model combines two popular mechanisms of network generation: preferential attachment and multiplicative process. Agreement between empirical and synthetic networks is checked using the available series from 1962 to 2017.post-print2516 K
    corecore