159 research outputs found

    La diplomacia pública estadounidense y la modernización de la edudación en españa

    Get PDF
    En los 1960s, el servicio exterior estadounidense estableció una estrecha relación entre la educación y el fomento del crecimiento económico en los países en vías de desarrollo. Vinculación que llevó a la diplomacia norteamericana a preocuparse por el atraso educativo de España como un factor que entropecía la modernización del país y, en consecuencia, podía proyectar efectos adversos sobre los intereses políticos y estratégicos de la superpotencia. Para contrarrestar dicha amenaza, el gobierno norteamericano desplegó diversos programas culturales, comunicativos y formativos con la pretensión de elevar el nivel de la educación española y ponerla al servicio del desarrollo nacional. Este trabajo analiza la diplomacia pública estadounidense dirigida a abrir la educación española a métodos e influencias americanas con el fin de estimular su modernización y reforma. De este modo, el trabajo ofrece nueva luz sobre la diplomacia educativa estadounidense en España mediante un estudio que profundiza en la intersección entre la historia de la educación y del desarrollo internacional.Palabras clave: diplomacia pública, educación, Estados Unidos, España, 1960s

    Design of a secure architecture for the exchange of biomedical information in m-Health scenarios

    Get PDF
    El paradigma de m-Salud (salud móvil) aboga por la integración masiva de las más avanzadas tecnologías de comunicación, red móvil y sensores en aplicaciones y sistemas de salud, para fomentar el despliegue de un nuevo modelo de atención clínica centrada en el usuario/paciente. Este modelo tiene por objetivos el empoderamiento de los usuarios en la gestión de su propia salud (p.ej. aumentando sus conocimientos, promocionando estilos de vida saludable y previniendo enfermedades), la prestación de una mejor tele-asistencia sanitaria en el hogar para ancianos y pacientes crónicos y una notable disminución del gasto de los Sistemas de Salud gracias a la reducción del número y la duración de las hospitalizaciones. No obstante, estas ventajas, atribuidas a las aplicaciones de m-Salud, suelen venir acompañadas del requisito de un alto grado de disponibilidad de la información biomédica de sus usuarios para garantizar una alta calidad de servicio, p.ej. fusionar varias señales de un usuario para obtener un diagnóstico más preciso. La consecuencia negativa de cumplir esta demanda es el aumento directo de las superficies potencialmente vulnerables a ataques, lo que sitúa a la seguridad (y a la privacidad) del modelo de m-Salud como factor crítico para su éxito. Como requisito no funcional de las aplicaciones de m-Salud, la seguridad ha recibido menos atención que otros requisitos técnicos que eran más urgentes en etapas de desarrollo previas, tales como la robustez, la eficiencia, la interoperabilidad o la usabilidad. Otro factor importante que ha contribuido a retrasar la implementación de políticas de seguridad sólidas es que garantizar un determinado nivel de seguridad implica unos costes que pueden ser muy relevantes en varias dimensiones, en especial en la económica (p.ej. sobrecostes por la inclusión de hardware extra para la autenticación de usuarios), en el rendimiento (p.ej. reducción de la eficiencia y de la interoperabilidad debido a la integración de elementos de seguridad) y en la usabilidad (p.ej. configuración más complicada de dispositivos y aplicaciones de salud debido a las nuevas opciones de seguridad). Por tanto, las soluciones de seguridad que persigan satisfacer a todos los actores del contexto de m-Salud (usuarios, pacientes, personal médico, personal técnico, legisladores, fabricantes de dispositivos y equipos, etc.) deben ser robustas y al mismo tiempo minimizar sus costes asociados. Esta Tesis detalla una propuesta de seguridad, compuesta por cuatro grandes bloques interconectados, para dotar de seguridad a las arquitecturas de m-Salud con unos costes reducidos. El primer bloque define un esquema global que proporciona unos niveles de seguridad e interoperabilidad acordes con las características de las distintas aplicaciones de m-Salud. Este esquema está compuesto por tres capas diferenciadas, diseñadas a la medidas de los dominios de m-Salud y de sus restricciones, incluyendo medidas de seguridad adecuadas para la defensa contra las amenazas asociadas a sus aplicaciones de m-Salud. El segundo bloque establece la extensión de seguridad de aquellos protocolos estándar que permiten la adquisición, el intercambio y/o la administración de información biomédica -- por tanto, usados por muchas aplicaciones de m-Salud -- pero no reúnen los niveles de seguridad detallados en el esquema previo. Estas extensiones se concretan para los estándares biomédicos ISO/IEEE 11073 PHD y SCP-ECG. El tercer bloque propone nuevas formas de fortalecer la seguridad de los tests biomédicos, que constituyen el elemento esencial de muchas aplicaciones de m-Salud de carácter clínico, mediante codificaciones novedosas. Finalmente el cuarto bloque, que se sitúa en paralelo a los anteriores, selecciona herramientas genéricas de seguridad (elementos de autenticación y criptográficos) cuya integración en los otros bloques resulta idónea, y desarrolla nuevas herramientas de seguridad, basadas en señal -- embedding y keytagging --, para reforzar la protección de los test biomédicos.The paradigm of m-Health (mobile health) advocates for the massive integration of advanced mobile communications, network and sensor technologies in healthcare applications and systems to foster the deployment of a new, user/patient-centered healthcare model enabling the empowerment of users in the management of their health (e.g. by increasing their health literacy, promoting healthy lifestyles and the prevention of diseases), a better home-based healthcare delivery for elderly and chronic patients and important savings for healthcare systems due to the reduction of hospitalizations in number and duration. It is a fact that many m-Health applications demand high availability of biomedical information from their users (for further accurate analysis, e.g. by fusion of various signals) to guarantee high quality of service, which on the other hand entails increasing the potential surfaces for attacks. Therefore, it is not surprising that security (and privacy) is commonly included among the most important barriers for the success of m-Health. As a non-functional requirement for m-Health applications, security has received less attention than other technical issues that were more pressing at earlier development stages, such as reliability, eficiency, interoperability or usability. Another fact that has contributed to delaying the enforcement of robust security policies is that guaranteeing a certain security level implies costs that can be very relevant and that span along diferent dimensions. These include budgeting (e.g. the demand of extra hardware for user authentication), performance (e.g. lower eficiency and interoperability due to the addition of security elements) and usability (e.g. cumbersome configuration of devices and applications due to security options). Therefore, security solutions that aim to satisfy all the stakeholders in the m-Health context (users/patients, medical staff, technical staff, systems and devices manufacturers, regulators, etc.) shall be robust and, at the same time, minimize their associated costs. This Thesis details a proposal, composed of four interrelated blocks, to integrate appropriate levels of security in m-Health architectures in a cost-efcient manner. The first block designes a global scheme that provides different security and interoperability levels accordingto how critical are the m-Health applications to be implemented. This consists ofthree layers tailored to the m-Health domains and their constraints, whose security countermeasures defend against the threats of their associated m-Health applications. Next, the second block addresses the security extension of those standard protocols that enable the acquisition, exchange and/or management of biomedical information | thus, used by many m-Health applications | but do not meet the security levels described in the former scheme. These extensions are materialized for the biomedical standards ISO/IEEE 11073 PHD and SCP-ECG. Then, the third block proposes new ways of enhancing the security of biomedical standards, which are the centerpiece of many clinical m-Health applications, by means of novel codings. Finally the fourth block, with is parallel to the others, selects generic security methods (for user authentication and cryptographic protection) whose integration in the other blocks results optimal, and also develops novel signal-based methods (embedding and keytagging) for strengthening the security of biomedical tests. The layer-based extensions of the standards ISO/IEEE 11073 PHD and SCP-ECG can be considered as robust, cost-eficient and respectful with their original features and contents. The former adds no attributes to its data information model, four new frames to the service model |and extends four with new sub-frames|, and only one new sub-state to the communication model. Furthermore, a lightweight architecture consisting of a personal health device mounting a 9 MHz processor and an aggregator mounting a 1 GHz processor is enough to transmit a 3-lead electrocardiogram in real-time implementing the top security layer. The extra requirements associated to this extension are an initial configuration of the health device and the aggregator, tokens for identification/authentication of users if these devices are to be shared and the implementation of certain IHE profiles in the aggregator to enable the integration of measurements in healthcare systems. As regards to the extension of SCP-ECG, it only adds a new section with selected security elements and syntax in order to protect the rest of file contents and provide proper role-based access control. The overhead introduced in the protected SCP-ECG is typically 2{13 % of the regular file size, and the extra delays to protect a newly generated SCP-ECG file and to access it for interpretation are respectively a 2{10 % and a 5 % of the regular delays. As regards to the signal-based security techniques developed, the embedding method is the basis for the proposal of a generic coding for tests composed of biomedical signals, periodic measurements and contextual information. This has been adjusted and evaluated with electrocardiogram and electroencephalogram-based tests, proving the objective clinical quality of the coded tests, the capacity of the coding-access system to operate in real-time (overall delays of 2 s for electrocardiograms and 3.3 s for electroencephalograms) and its high usability. Despite of the embedding of security and metadata to enable m-Health services, the compression ratios obtained by this coding range from ' 3 in real-time transmission to ' 5 in offline operation. Complementarily, keytagging permits associating information to images (and other signals) by means of keys in a secure and non-distorting fashion, which has been availed to implement security measures such as image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. The tests conducted indicate a remarkable robustness-capacity tradeoff that permits implementing all this measures simultaneously, and the compatibility of keytagging with JPEG2000 compression, maintaining this tradeoff while setting the overall keytagging delay in only ' 120 ms for any image size | evidencing the scalability of this technique. As a general conclusion, it has been demonstrated and illustrated with examples that there are various, complementary and structured manners to contribute in the implementation of suitable security levels for m-Health architectures with a moderate cost in budget, performance, interoperability and usability. The m-Health landscape is evolving permanently along all their dimensions, and this Thesis aims to do so with its security. Furthermore, the lessons learned herein may offer further guidance for the elaboration of more comprehensive and updated security schemes, for the extension of other biomedical standards featuring low emphasis on security or privacy, and for the improvement of the state of the art regarding signal-based protection methods and applications

    Identifying past social-ecological thresholds to understand long-term temporal dynamics in Spain

    Full text link
    A thorough understanding of long-term temporal social-ecological dynamics at the national scale helps to explain the current condition of a country’s ecosystems and to support environmental policies to tackle future sustainability challenges. We aimed to develop a methodological approach to understand past long-term (1960-2010) social-ecological dynamics in Spain. First, we developed a methodical framework that allowed us to explore complex social-ecological dynamics among biodiversity, ecosystem services, human well-being, drivers of change, and institutional responses. Second, we compiled 21 long-term, national-scale indicators and analyzed their temporal relationships through a redundancy analysis. Third, we used a Bayesian change point analysis to detect evidence of past social-ecological thresholds and historical time periods. Our results revealed that Spain has passed through four socialecological thresholds that define five different time periods of nature and society relationships. Finally, we discussed how the proposed methodological approach helps to reinterpret national-level ecosystem indicators through a new conceptual lens to develop a more systems-based way of understanding long-term social-ecological patterns and dynamicsThis work was supported by the Biodiversity Foundation (http://www.fundacion-biodiversidad.es/) of the Spanish Ministry of Agriculture, Food and Environment. Partial financial support was also provided by the Ministry of Economy and Competitiveness of Spain (project CGL2014-53782-P: ECOGRADIENTES). The Spanish National Institute for Agriculture and Food Research and Technology (INIA) funded Marina García-Llorente as part of the European Social Fund. Blanca González García-Mon participated in this article as a “la Caixa” Banking Foundation scholar. The funders had no role in the study design, data collection and analysis, preparation of the report, or the decision to submit the study for publicatio

    A fast but ill-conditioned formal inverse to Radon transforms in 2D and 3D

    Get PDF
    We present a formal inversion of the multiscale discrete Radon trasform, valid both for 2D and 3D. With the transformed data from just one of the four quadrants of the direct 2D Radon transform, or one of the twelve dodecants, in case of 3D Radon transform, we can invert exactly and directly, with no iterations, the whole domain. The computational complexity of the proposed algorithms will be O(N log N). With N the total size of the problem, either square or cubic. But this inverse transforms are extremely ill conditioned, so the presence of noise in the transformed domain turns them useless. Still we present both algorithms, and characterize its weakness against noise

    Norms According to Age and Gender for the Spanish Version of the Inventory of Depression and Anxiety Symptoms (IDAS-II)

    Get PDF
    Inventory of Depression and Anxiety Symptoms-II (IDAS-II) constitutes a useful measurement tool with demonstrated psychometric properties that is contributing to the advancement of knowledge of emotional disorders within transdiagnostic models. To implement its use in clinical settings it is important that the scores can be interpreted in order to guide clinical decisions. This study aims to develops normative data for the Spanish version of the IDAS-II. An anonymous online survey was applied to 1,072 subjects, recruited through a stratified random sampling procedure taking into account population gender, age, and geographical region of Spain. Results show that women tend to score higher than men, particularly on the Dysphoria, General Depression, Appetite Gain, and Lassitude scales. Largest effect sizes for differences in the scores according to age were found for Lassitude, Dysphoria, and General Depression. Therefore, normative data according to gender and age group for each IDAS-II scale is provided. The norms provided in this work complement those already available, facilitating the decision-making of clinical professionals. Evidence of unidimensionality is provided for the 19 IDAS-II scales that allows researchers and clinicians to use specific IDAS-II scales independently

    Escenarios de guerra: paseando por Madrid a través de su memoria

    Get PDF
    Este libro difunde los resultados de las investigaciones llevadas a cabo en distintos proyectos de investigación en los últimos años, presentados en la Semana de la Ciencia y la Tecnología de Madrid. En él se proponen tres itinerarios por los lugares más significativos del impacto de la Guerra Civil en Madrid que recogen aspectos de la historia, el arte, el patrimonio, la memoria y la vida cotidiana, apoyándose en las fuentes directas de quienes vivieron el conflicto

    The PARP inhibitor olaparib enhances the sensitivity of Ewing sarcoma to trabectedin

    Get PDF
    This is an open-access article distributed under the terms of the Creative Commons Attribution License.-- et al.Recent preclinical evidence has suggested that Ewing Sarcoma (ES) bearing EWSR1-ETS fusions could be particularly sensitive to PARP inhibitors (PARPinh) in combination with DNA damage repair (DDR) agents. Trabectedin is an antitumoral agent that modulates EWSR1-FLI1 transcriptional functions, causing DNA damage. Interestingly, PARP1 is also a transcriptional regulator of EWSR1-FLI1, and PARPinh disrupts the DDR machinery. Thus, given the impact and apparent specificity of both agents with regard to the DNA damage/DDR system and EWSR1-FLI1 activity in ES, we decided to explore the activity of combining PARPinh and Trabectedin in in vitro and in vivo experiments. The combination of Olaparib and Trabectedin was found to be highly synergistic, inhibiting cell proliferation, inducing apoptosis, and the accumulation of G2/M. The drug combination also enhanced γH2AX intranuclear accumulation as a result of DNA damage induction, DNA fragmentation and global DDR deregulation, while EWSR1-FLI1 target expression remained unaffected. The effect of the drug combination was corroborated in a mouse xenograft model of ES and, more importantly, in two ES patient-derived xenograft (PDX) models in which the tumors showed complete regression. In conclusion, the combination of the two agents leads to a biologically significant deregulation of the DDR machinery that elicits relevant antitumor activity in preclinical models and might represent a promising therapeutic tool that should be further explored for translation to the clinical setting.Enrique de Álava’s lab is supported by the AECC (Asociación Española Contra el Cáncer), the Ministry of Economy and Competitiveness of Spain-FEDER (PI081828, RD06/0020/0059 RD12/0036/0017, PT13/0010/0056, PI110018, ISCIII Sara Borrell postdoc grant CD06/00001), the European Project EuroSARC (FP7-HEALTH-2011- two-stage, Project ID 278742 EUROSARC), Fundación Memoria de D. Manuel Solorzano Barruso, Fundación Cris contra el cancer, and Fundación María García Estrada. JLO was sponsored by the CSIC and the European Social Fund (post-doctoral grant JAE DOC) and is at present funded by the AECC. ATA is sponsored by the Fundaçao para a Ciência e Tecnologia, Portugal (fellowship SFRH/BD/69318/2010). OMT is funded by Fondo de Investigaciones Sanitarias-ISCIII (CES12/021) and the AECC. DHM is funded by the AECC. Work supported by the Xarxa de Bancs de Tumors de Catalunya (XBTC) sponsored by Pla Director d’Oncologia de Catalunya. AMC acknowledges funding from the European Union Seventh Framework Programme (FP7/2007-2013) under a Marie Curie International Reintegration Grant (PIRG-08- GA-2010-276998) and ISCIII-FEDER (CP13/00189).Peer Reviewe

    Caracterización de pacientes farmacodependiente en estancia hospitalaria que son atendidos en el Hospital Universitario CARI Mental de la ciudad de Barranquilla, durante el período Abril 2019 – Mayo 2019

    Get PDF
    La farmacodependencia es un problema mundial. En Latinoamérica sobre todo en Colombia no se han realizado muchos estudio acerca de la caracterización de este tipo de enfermedad, por lo tanto no existe información suficiente que permita a los centros de rehabilitación corroborar la eficacia de sus intervenciones, así como tampoco innovar para una mejor promoción y prevención de la enfermedad. La presente investigación es un estudio descriptivo transversal en el que se entrevistaron los pacientes del Hospital Cari Mental en Barranquilla, Colombia durante el período Abril 2019 – Mayo 2019. La muestra estuvo constituida por 21 pacientes que cumplieron los criterios de inclusión del estudio. Como resultados preponderantes se resalta que en gran proporción los pacientes fueron de sexo masculino, entre los 18-30 años, con una edad de inicio de consumo a los 10-15 años en promedio, desempleados y en gran proporción con hospitalizaciones previas por farmacodependencia. La mayoría de los pacientes en estudio pertenecían familias nucleares y ampliadas. La droga de inicio más frecuente fue el Cannabis, evidenciándose una tendencia al policonsumo. La mayoría de los pacientes expresaron tener facilidad para obtener las drogas además de una probabilidad de recaída entre 37%-62% en los próximos dos meses acordes a la escala AWARE 22.PregradoMedic

    Recurrent NOMO1 gene deletion is a potential clinical marker in early-onset colorectal cancer and is involved in the regulation of cell migration

    Get PDF
    The incidence of early-onset colorectal cancer (EOCRC; age younger than 50 years) has been progressively increasing over the last decades globally, with causes unexplained. A distinct molecular feature of EOCRC is that compared with cases of late-onset colorectal cancer, in EOCRC cases, there is a higher incidence of Nodal Modulator 1 (NOMO1) somatic deletions. However, the mechanisms of NOMO1 in early-onset colorectal carcinogenesis are currently unknown. In this study, we show that in 30% of EOCRCs with heterozygous deletion of NOMO1, there were pathogenic mutations in this gene, suggesting that NOMO1 can be inactivated by deletion or mutation in EOCRC. To study the role of NOMO1 in EOCRC, CRISPR/cas9 technology was employed to generate NOMO1 knockout HCT-116 (EOCRC) and HS-5 (bone marrow) cell lines. NOMO1 loss in these cell lines did not perturb Nodal pathway signaling nor cell proliferation. Expression microarrays, RNA sequencing, and protein expression analysis by LC–IMS/MS showed that NOMO1 inactivation deregulates other signaling pathways independent of the Nodal pathway, such as epithelial–mesenchymal transition and cell migration. Significantly, NOMO1 loss increased the migration capacity of CRC cells. Additionally, a gut-specific conditional NOMO1 KO mouse model revealed no subsequent tumor development in mice. Overall, these findings suggest that NOMO1 could play a secondary role in early-onset colorectal carcinogenesis because its loss increases the migration capacity of CRC cells. Therefore, further study is warranted to explore other signalling pathways deregulated by NOMO1 loss that may play a significant role in the pathogenesis of the disease.This study was supported by the health research program of the Instituto de Salud Carlos III (Spanish Ministry of Economy and Competitiveness, PI20/01569 and PI20/0974), co-funded by FEDER funds, and Mutua Madrileña Foundation (FMM20/001). A.M.-M was supported by a predoctoral research grant from the Dr. Moraza Fundation (FMoraza18/001). P.G.V and N.G.-U were supported by a predoctoral research grant from the Consejería de Educación—Junta de Castilla y León. A.N.H. was supported by the National Institutes of Health K12 HD043483 from the Eunice Kennedy Shriver National Institute of Child Health and Human Development
    corecore