95 research outputs found

    Modification of sensitivity of BaSnO3 sensor due to parameters of synthesis and formation of the device

    Get PDF
    Powders of BaSnO3 were synthesized to obtain gas sensor thick films (using the screen printing technique) for the detection of O2 and CO. Impedance spectroscopy was used at different atmospheres and temperatures. In the presence of O2, the films showed a maximum value of sensitivity at 300 °C, with the powders formed by Pechini presenting greater reproducibility and sensitivity (with an order of magnitude greater than that for the powders formed by precipitation). Results showed that the films formed with powders obtained using the Pechini method presented a better response to CO, with a maximum sensitivity at 450 °C. In addition, in the presence of CO and for T > 250 °C, these films showed an anomalous behavior regarding their sensitivity as a function of time when platinum electrodes were used: a great increase in the electrical resistance value for exposure times greater than 10 min.Fil: Ochoa, Yasser H.. Universidad del Cauca; ColombiaFil: Schipani, Federico. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mar del Plata. Instituto de Investigaciones en Ciencia y Tecnología de Materiales. Universidad Nacional de Mar del Plata. Facultad de Ingeniería. Instituto de Investigaciones en Ciencia y Tecnología de Materiales; ArgentinaFil: Aldao, Celso Manuel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mar del Plata. Instituto de Investigaciones en Ciencia y Tecnología de Materiales. Universidad Nacional de Mar del Plata. Facultad de Ingeniería. Instituto de Investigaciones en Ciencia y Tecnología de Materiales; ArgentinaFil: Rodriguez Paez, Jorge Enrique. Universidad del Cauca; ColombiaFil: Ponce, Miguel Adolfo. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mar del Plata. Instituto de Investigaciones en Ciencia y Tecnología de Materiales. Universidad Nacional de Mar del Plata. Facultad de Ingeniería. Instituto de Investigaciones en Ciencia y Tecnología de Materiales; Argentin

    Enterocutaneous fistulas due to stent migration. How reliable is its use on duodenal benign pathology? a case report

    Get PDF
    Duodenal stenting has been widely used on malignant pathology on selected patients with poor prognosis and advanced disease. In these last years, there has been a clear ampliation of the clinical applications of endoscopy procedures and stents. Its use on benign pathology is spreading but there is a lack of literature about the complications in this context. The incidence of stent migration is about 10-25% in self-expandable metal stent (SEMS), and 2-5% on covered self-expanding metal stents (CSEMS). We reported a clinical case of a 48 years old patient who developed a duodenal ulcer. The patient was submitted to exploratory laparotomy, with duodenal primary closure of the ulcer. Later, the patient developed a enterocutaneous fistula because of the duodenal leak. It was referred to our third level hospital to the hepatopancreatobiliary surgery service. A new exploratory laparotomy with duodenal exclusion was planned, but it was impossible to access due to frozen abdomen. CSEMS was placed in the duodenal bulb resulting in the resolution of leaking, but the stent could not be removed because of migration. The stent trajectory was followed by abdominal x ray and tomography. The patient developed multiple intestinal an fecal enterocutaneous fistulas. It was submitted to multiples endoscopies, colonoscopies and enteroscopy without any success to reaching it. It was decided to perform a right lumbotomy to extract the prothesis. The stent was surgically removed, a planned stoma was left on the right flank on the extraction site

    A Novel Method of Spatiotemporal Dynamic Geo-Visualization of Criminal Data, Applied to Command and Control Centers for Public Safety

    Full text link
    [EN] This article shows a novel geo-visualization method of dynamic spatiotemporal data that allows mobility and concentration of criminal activity to be study. The method was developed using, only and significantly, real data of Santiago de Cali (Colombia), collected by the Colombian National Police (PONAL). This method constitutes a tool that allows criminal influx to be analyzed by concentration, zone, time slot and date. In addition to the field experience of police commanders, it allows patterns of criminal activity to be detected, thereby enabling a better distribution and management of police resources allocated to crime deterrence, prevention and control. Additionally, it may be applied to the concepts of safe city and smart city of the PONAL within the architecture of Command and Control System (C2S) of Command and Control Centers for Public Safety. Furthermore, it contributes to a better situational awareness and improves the future projection, agility, efficiency and decision-making processes of police officers, which are all essential for fulfillment of police missions against crime. Finally, this was developed using an open source software, it can be adapted to any other city, be used with real-time data and be implemented, if necessary, with the geographic software of any other C2S.This work was co-funded by the European Commission as part of H2020 call SEC-12-FCT-2016-thrtopic3 under the project VICTORIA (No. 740754). This publication reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. The authors would like to thank Colombian National Police and its Office of Telematics for their support on development of this project.Salcedo-González, ML.; Suarez-Paez, JE.; Esteve Domingo, M.; Gomez, J.; Palau Salvador, CE. (2020). A Novel Method of Spatiotemporal Dynamic Geo-Visualization of Criminal Data, Applied to Command and Control Centers for Public Safety. ISPRS International Journal of Geo-Information. 9(3):1-17. https://doi.org/10.3390/ijgi9030160S11793Lacinák, M., & Ristvej, J. (2017). Smart City, Safety and Security. Procedia Engineering, 192, 522-527. doi:10.1016/j.proeng.2017.06.090Neumann, M., & Elsenbroich, C. (2016). Introduction: the societal dimensions of organized crime. Trends in Organized Crime, 20(1-2), 1-15. doi:10.1007/s12117-016-9294-zPhillips, P., & Lee, I. (2012). Mining co-distribution patterns for large crime datasets. Expert Systems with Applications, 39(14), 11556-11563. doi:10.1016/j.eswa.2012.03.071Linning, S. J. (2015). Crime seasonality and the micro-spatial patterns of property crime in Vancouver, BC and Ottawa, ON. Journal of Criminal Justice, 43(6), 544-555. doi:10.1016/j.jcrimjus.2015.05.007Spicer, V., & Song, J. (2017). The impact of transit growth on the perception of crime. Journal of Environmental Psychology, 54, 151-159. doi:10.1016/j.jenvp.2017.09.002Beland, L.-P., & Brent, D. A. (2018). Traffic and crime. Journal of Public Economics, 160, 96-116. doi:10.1016/j.jpubeco.2018.03.002Newspaper of National Circulation in Colombia, E.T. Robos en Trancones en El Tintal—Bogotá—.ELTIEMPO.COM https://www.eltiempo.com/bogota/robos-en-trancones-en-el-tintal-168226Nueva Modalidad de Atraco a Conductores en Los Trancones de Bogotá|ELESPECTADOR.COM http://www.elespectador.com/noticias/bogota/nueva-modalidad-de-atraco-conductores-en-los-trancones-de-bogota-articulo-697716Carrillo, P. E., Lopez-Luzuriaga, A., & Malik, A. S. (2018). Pollution or crime: The effect of driving restrictions on criminal activity. Journal of Public Economics, 164, 50-69. doi:10.1016/j.jpubeco.2018.05.007Twinam, T. (2017). Danger zone: Land use and the geography of neighborhood crime. Journal of Urban Economics, 100, 104-119. doi:10.1016/j.jue.2017.05.006Sadler, R. C., Pizarro, J., Turchan, B., Gasteyer, S. P., & McGarrell, E. F. (2017). Exploring the spatial-temporal relationships between a community greening program and neighborhood rates of crime. Applied Geography, 83, 13-26. doi:10.1016/j.apgeog.2017.03.017Roth, R. E., Ross, K. S., Finch, B. G., Luo, W., & MacEachren, A. M. (2013). Spatiotemporal crime analysis in U.S. law enforcement agencies: Current practices and unmet needs. Government Information Quarterly, 30(3), 226-240. doi:10.1016/j.giq.2013.02.001Sustainable Development Goals|UNDP https://www.undp.org/content/undp/en/home/sustainable-development-goals.htmlGiménez-Santana, A., Caplan, J. M., & Drawve, G. (2018). Risk Terrain Modeling and Socio-Economic Stratification: Identifying Risky Places for Violent Crime Victimization in Bogotá, Colombia. European Journal on Criminal Policy and Research, 24(4), 417-431. doi:10.1007/s10610-018-9374-5Kim, S., Jeong, S., Woo, I., Jang, Y., Maciejewski, R., & Ebert, D. S. (2018). Data Flow Analysis and Visualization for Spatiotemporal Statistical Data without Trajectory Information. IEEE Transactions on Visualization and Computer Graphics, 24(3), 1287-1300. doi:10.1109/tvcg.2017.2666146Kounadi, O., & Leitner, M. (2014). Spatial Information Divergence: Using Global and Local Indices to Compare Geographical Masks Applied to Crime Data. Transactions in GIS, 19(5), 737-757. doi:10.1111/tgis.12125Khalid, S., Shoaib, F., Qian, T., Rui, Y., Bari, A. I., Sajjad, M., … Wang, J. (2017). Network Constrained Spatio-Temporal Hotspot Mapping of Crimes in Faisalabad. Applied Spatial Analysis and Policy, 11(3), 599-622. doi:10.1007/s12061-017-9230-xLopez-Cuevas, A., Medina-Perez, M. A., Monroy, R., Ramirez-Marquez, J. E., & Trejo, L. A. (2018). FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness. IEEE Transactions on Affective Computing, 9(3), 372-382. doi:10.1109/taffc.2017.2741478Xue, Y., & Brown, D. E. (2006). Spatial analysis with preference specification of latent decision makers for criminal event prediction. Decision Support Systems, 41(3), 560-573. doi:10.1016/j.dss.2004.06.007Nakaya, T., & Yano, K. (2010). Visualising Crime Clusters in a Space-time Cube: An Exploratory Data-analysis Approach Using Space-time Kernel Density Estimation and Scan Statistics. Transactions in GIS, 14(3), 223-239. doi:10.1111/j.1467-9671.2010.01194.xAnuar, N. B., & Yap, B. W. (2018). Data Visualization of Violent Crime Hotspots in Malaysia. Soft Computing in Data Science, 350-363. doi:10.1007/978-981-13-3441-2_27Malik, A., Maciejewski, R., Towers, S., McCullough, S., & Ebert, D. S. (2014). Proactive Spatiotemporal Resource Allocation and Predictive Visual Analytics for Community Policing and Law Enforcement. IEEE Transactions on Visualization and Computer Graphics, 20(12), 1863-1872. doi:10.1109/tvcg.2014.2346926Arietta, S. M., Efros, A. A., Ramamoorthi, R., & Agrawala, M. (2014). City Forensics: Using Visual Elements to Predict Non-Visual City Attributes. IEEE Transactions on Visualization and Computer Graphics, 20(12), 2624-2633. doi:10.1109/tvcg.2014.2346446Hu, Y., Wang, F., Guin, C., & Zhu, H. (2018). A spatio-temporal kernel density estimation framework for predictive crime hotspot mapping and evaluation. Applied Geography, 99, 89-97. doi:10.1016/j.apgeog.2018.08.001Yang, D., Heaney, T., Tonon, A., Wang, L., & Cudré-Mauroux, P. (2017). CrimeTelescope: crime hotspot prediction based on urban and social media data fusion. World Wide Web, 21(5), 1323-1347. doi:10.1007/s11280-017-0515-4ToppiReddy, H. K. R., Saini, B., & Mahajan, G. (2018). Crime Prediction & Monitoring Framework Based on Spatial Analysis. Procedia Computer Science, 132, 696-705. doi:10.1016/j.procs.2018.05.075Devia, N., & Weber, R. (2013). Generating crime data using agent-based simulation. Computers, Environment and Urban Systems, 42, 26-41. doi:10.1016/j.compenvurbsys.2013.09.001Kuo, P.-F., Lord, D., & Walden, T. D. (2013). Using geographical information systems to organize police patrol routes effectively by grouping hotspots of crash and crime data. Journal of Transport Geography, 30, 138-148. doi:10.1016/j.jtrangeo.2013.04.006Camacho-Collados, M., & Liberatore, F. (2015). A Decision Support System for predictive police patrolling. Decision Support Systems, 75, 25-37. doi:10.1016/j.dss.2015.04.012Kagawa, T., Saiki, S., & Nakamura, M. (2019). Analyzing street crimes in Kobe city using PRISM. International Journal of Web Information Systems, 15(2), 183-200. doi:10.1108/ijwis-04-2018-0032Jentner, W., Sacha, D., Stoffel, F., Ellis, G., Zhang, L., & Keim, D. A. (2018). Making machine intelligence less scary for criminal analysts: reflections on designing a visual comparative case analysis tool. The Visual Computer, 34(9), 1225-1241. doi:10.1007/s00371-018-1483-0Suarez-Paez, J., Salcedo-Gonzalez, M., Esteve, M., Gómez, J. A., Palau, C., & Pérez-Llopis, I. (2018). Reduced computational cost prototype for street theft detection based on depth decrement in Convolutional Neural Network. Application to Command and Control Information Systems (C2IS) in the National Police of Colombia. International Journal of Computational Intelligence Systems, 12(1), 123. doi:10.2991/ijcis.2018.25905186Suarez-Paez, J., Salcedo-Gonzalez, M., Climente, A., Esteve, M., Gómez, J. A., Palau, C. E., & Pérez-Llopis, I. (2019). A Novel Low Processing Time System for Criminal Activities Detection Applied to Command and Control Citizen Security Centers. Information, 10(12), 365. doi:10.3390/info10120365Esteve, M., Perez-Llopis, I., & Palau, C. E. (2013). Friendly Force Tracking COTS solution. IEEE Aerospace and Electronic Systems Magazine, 28(1), 14-21. doi:10.1109/maes.2013.6470440Esteve, M., Perez-Llopis, I., Hernandez-Blanco, L. E., Palau, C. E., & Carvajal, F. (2007). SIMACOP: Small Units Management C4ISR System. Multimedia and Expo, 2007 IEEE International Conference on. doi:10.1109/icme.2007.4284862OpenStreetMap http://www.openstreetmap.or

    A Novel Low Processing Time System for Criminal Activities Detection Applied to Command and Control Citizen Security Centers

    Full text link
    [EN] This paper shows a Novel Low Processing Time System focused on criminal activities detection based on real-time video analysis applied to Command and Control Citizen Security Centers. This system was applied to the detection and classification of criminal events in a real-time video surveillance subsystem in the Command and Control Citizen Security Center of the Colombian National Police. It was developed using a novel application of Deep Learning, specifically a Faster Region-Based Convolutional Network (R-CNN) for the detection of criminal activities treated as "objects" to be detected in real-time video. In order to maximize the system efficiency and reduce the processing time of each video frame, the pretrained CNN (Convolutional Neural Network) model AlexNet was used and the fine training was carried out with a dataset built for this project, formed by objects commonly used in criminal activities such as short firearms and bladed weapons. In addition, the system was trained for street theft detection. The system can generate alarms when detecting street theft, short firearms and bladed weapons, improving situational awareness and facilitating strategic decision making in the Command and Control Citizen Security Center of the Colombian National Police.This work was co-funded by the European Commission as part of H2020 call SEC-12-FCT-2016-Subtopic3 under the project VICTORIA (No. 740754). This publication reflects the views only of the authors and the Commission cannot be held responsible for any use which may be made of the information contained therein.Suarez-Paez, J.; Salcedo-Gonzalez, M.; Climente, A.; Esteve Domingo, M.; Gomez, J.; Palau Salvador, CE.; Pérez Llopis, I. (2019). A Novel Low Processing Time System for Criminal Activities Detection Applied to Command and Control Citizen Security Centers. Information. 10(12):1-19. https://doi.org/10.3390/info10120365S1191012Wang, L., Rodriguez, R. M., & Wang, Y.-M. (2018). A dynamic multi-attribute group emergency decision making method considering expertsr hesitation. International Journal of Computational Intelligence Systems, 11(1), 163. doi:10.2991/ijcis.11.1.13Esteve, M., Perez-Llopis, I., & Palau, C. E. (2013). Friendly Force Tracking COTS solution. IEEE Aerospace and Electronic Systems Magazine, 28(1), 14-21. doi:10.1109/maes.2013.6470440Senst, T., Eiselein, V., Kuhn, A., & Sikora, T. (2017). Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation. IEEE Transactions on Information Forensics and Security, 12(12), 2945-2956. doi:10.1109/tifs.2017.2725820Shi, Y., Tian, Y., Wang, Y., & Huang, T. (2017). Sequential Deep Trajectory Descriptor for Action Recognition With Three-Stream CNN. IEEE Transactions on Multimedia, 19(7), 1510-1520. doi:10.1109/tmm.2017.2666540Arunnehru, J., Chamundeeswari, G., & Bharathi, S. P. (2018). Human Action Recognition using 3D Convolutional Neural Networks with 3D Motion Cuboids in Surveillance Videos. Procedia Computer Science, 133, 471-477. doi:10.1016/j.procs.2018.07.059Kamel, A., Sheng, B., Yang, P., Li, P., Shen, R., & Feng, D. D. (2019). Deep Convolutional Neural Networks for Human Action Recognition Using Depth Maps and Postures. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(9), 1806-1819. doi:10.1109/tsmc.2018.2850149Zhang, B., Wang, L., Wang, Z., Qiao, Y., & Wang, H. (2018). Real-Time Action Recognition With Deeply Transferred Motion Vector CNNs. IEEE Transactions on Image Processing, 27(5), 2326-2339. doi:10.1109/tip.2018.2791180Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2016). Region-Based Convolutional Networks for Accurate Object Detection and Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 38(1), 142-158. doi:10.1109/tpami.2015.2437384Suarez-Paez, J., Salcedo-Gonzalez, M., Esteve, M., Gómez, J. A., Palau, C., & Pérez-Llopis, I. (2018). Reduced computational cost prototype for street theft detection based on depth decrement in Convolutional Neural Network. Application to Command and Control Information Systems (C2IS) in the National Police of Colombia. International Journal of Computational Intelligence Systems, 12(1), 123. doi:10.2991/ijcis.2018.25905186Ren, S., He, K., Girshick, R., & Sun, J. (2017). Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(6), 1137-1149. doi:10.1109/tpami.2016.2577031Hao, S., Wang, P., & Hu, Y. (2019). Haze Image Recognition Based on Brightness Optimization Feedback and Color Correction. Information, 10(2), 81. doi:10.3390/info10020081Peng, M., Wang, C., Chen, T., & Liu, G. (2016). NIRFaceNet: A Convolutional Neural Network for Near-Infrared Face Identification. Information, 7(4), 61. doi:10.3390/info7040061NVIDIA CUDA® Deep Neural Network library (cuDNN)https://developer.nvidia.com/cuda-downloadsWu, X., Lu, X., & Leung, H. (2018). A Video Based Fire Smoke Detection Using Robust AdaBoost. Sensors, 18(11), 3780. doi:10.3390/s18113780Park, J. H., Lee, S., Yun, S., Kim, H., & Kim, W.-T. (2019). Dependable Fire Detection System with Multifunctional Artificial Intelligence Framework. Sensors, 19(9), 2025. doi:10.3390/s19092025García-Retuerta, D., Bartolomé, Á., Chamoso, P., & Corchado, J. M. (2019). Counter-Terrorism Video Analysis Using Hash-Based Algorithms. Algorithms, 12(5), 110. doi:10.3390/a12050110Zhao, B., Zhao, B., Tang, L., Han, Y., & Wang, W. (2018). Deep Spatial-Temporal Joint Feature Representation for Video Object Detection. Sensors, 18(3), 774. doi:10.3390/s18030774He, Z., & He, H. (2018). Unsupervised Multi-Object Detection for Video Surveillance Using Memory-Based Recurrent Attention Networks. Symmetry, 10(9), 375. doi:10.3390/sym10090375Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., & Baik, S. W. (2018). Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Transactions on Industrial Informatics, 14(8), 3679-3689. doi:10.1109/tii.2018.2791944Barthélemy, J., Verstaevel, N., Forehead, H., & Perez, P. (2019). Edge-Computing Video Analytics for Real-Time Traffic Monitoring in a Smart City. Sensors, 19(9), 2048. doi:10.3390/s19092048Aqib, M., Mehmood, R., Alzahrani, A., Katib, I., Albeshri, A., & Altowaijri, S. M. (2019). Smarter Traffic Prediction Using Big Data, In-Memory Computing, Deep Learning and GPUs. Sensors, 19(9), 2206. doi:10.3390/s19092206Xu, S., Zou, S., Han, Y., & Qu, Y. (2018). Study on the Availability of 4T-APS as a Video Monitor and Radiation Detector in Nuclear Accidents. Sustainability, 10(7), 2172. doi:10.3390/su10072172Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349-357. doi:10.1016/j.future.2017.09.082Jha, S., Dey, A., Kumar, R., & Kumar-Solanki, V. (2019). A Novel Approach on Visual Question Answering by Parameter Prediction using Faster Region Based Convolutional Neural Network. International Journal of Interactive Multimedia and Artificial Intelligence, 5(5), 30. doi:10.9781/ijimai.2018.08.004Cho, S., Baek, N., Kim, M., Koo, J., Kim, J., & Park, K. (2018). Face Detection in Nighttime Images Using Visible-Light Camera Sensors with Two-Step Faster Region-Based Convolutional Neural Network. Sensors, 18(9), 2995. doi:10.3390/s18092995Zhang, J., Xing, W., Xing, M., & Sun, G. (2018). Terahertz Image Detection with the Improved Faster Region-Based Convolutional Neural Network. Sensors, 18(7), 2327. doi:10.3390/s18072327Bakheet, S., & Al-Hamadi, A. (2016). A Discriminative Framework for Action Recognition Using f-HOL Features. Information, 7(4), 68. doi:10.3390/info7040068(2018). Robust Eye Blink Detection Based on Eye Landmarks and Savitzky–Golay Filtering. Information, 9(4), 93. doi:10.3390/info9040093Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2017). ImageNet classification with deep convolutional neural networks. Communications of the ACM, 60(6), 84-90. doi:10.1145/3065386Jetson Embedded Development Kit|NVIDIAhttps://developer.nvidia.com/embedded-computingNVIDIA TensorRT|NVIDIA Developerhttps://developer.nvidia.com/tensorrtNVIDIA DeepStream SDK|NVIDIA Developerhttps://developer.nvidia.com/deepstream-sdkFraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16(10), 1644. doi:10.3390/s16101644Gomez, C., Shami, A., & Wang, X. (2018). Machine Learning Aided Scheme for Load Balancing in Dense IoT Networks. Sensors, 18(11), 3779. doi:10.3390/s18113779AMD Embedded RadeonTMhttps://www.amd.com/en/products/embedded-graphic

    Propuesta de mejoras para las políticas de seguridad de la información de la fundación universitaria los libertadores

    Get PDF
    Con este proyecto queremos identificar y analizar algunas políticas de Seguridad que se están aplicando en la Fundación Universidad Los Libertadores con relación a la norma ISO 27001 (NORMA TÉCNICA NTC-ISO-IEC COLOMBIANA 27001-2013), y según los hallazgos encontrados propondremos mejoras a nivel de procedimientos, seguimientos y normatividad. Partiremos de lo que existe actualmente en la Institución a nivel de seguridad y con guía de la ISO 27001 del 2013, realizaremos nuevas propuestas o sugerencias sobre temas que se deban y puedan aplicar a la universidad, siempre en pro de mejora de la seguridad de la Información a nivel del área de Informática, y del beneficio institucional eliminando posibles brechas de seguridad y vulnerabilidades que se puedan encontrar.With the project, we want to identify and analyze some security policies that are being applied in the Fundación Universitaria Los Libertadores about the ISO 27001 standard (NTC-ISO-IEC COLOMBIANA 27001-2013), and according to the findings, we will propose improvements at the level of procedures, monitoring, and regulations. We will start, with that currently exists in the institution, in terms of security and with the guidance of ISO 27001 of 2013, of new suggestions or proposed topics that should and can be applied to the university, always in favor of improving information security at the level of the IT area, and the institutional benefit by eliminating possible security gaps and vulnerabilities that can be found

    Detecting and defeating advanced man-in-the-middle attacks against TLS

    Get PDF
    Sobre los derechos de acceso: Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE.TLS es un bloque esencial para la construcción de redes privadas. Un aspecto crítico para la seguridad de TLS es la autenticación y el intercambio de claves, que habitualmente se realiza mediante certificados. Un intercambio inseguro de claves puede conducir a un ataque de hombre en el medio (MITM). La confianza en los certificados se consigue habitualmente gracias a la utilización de una infraestructura de clave pública (PKI), que emplea autoridades de certificación (CA) de confianza para el establecimiento de cadenas de validez de certificados. En los últimos años, han surgido una serie de problemas relacionados con el uso del PKI: lo certificados pueden ser emitidos para cualquier entidad de Internet, con independencia de la posición de la CA en el árbol jerárquico. Esto implica que un ataque exitoso contra una CA tiene el potencial de permitir la generación de certificados válidos que posibilitarán la realización de ataques de hombre en el medio. No podemos descartar la posibilidad de usos malicioso de CA intermedias para llevar a cabo ataques dirigidos mediante la emisión de certificados ad-hoc, que serían extremadamente difíciles de detectar. La infraestructura PKI actual es susceptible a este tipo de ataques, por lo que se hace necesaria la creación de nuevos mecanismos para la detección y neutralización de los mismos. El IETF y otros organismos de estandarización han lanzado distintas iniciativas para posibilitar la detección de certificados falsificados. La mayoría de estas iniciativas intentan solucionar los problemas existentes mantenimiento el modelo PKI y agregando la técnica de 'certificate pinning', que asocia certificados concretos a servidores. Estas técnicas tienen limitaciones significativas, como la necesidad de un proceso de arranque seguro, o el establecimiento de la asociación para cada host de forma individual y uno por uno. Este trabajo proporciona una evolución desde el esquema de 'pinning' realizado en el host a un esquema de 'pinning' en la red, mediante la habilitación de mecanismos para la validación de certificados cuando atraviesan una red determinada. Los certificados se clasificarán como confiables o no como resultado del cruce de información obtenida de distintas fuentes. Esto resultaría en la detección temprana de certificados sospechosos y lanzaría mecanismos para rechazar el ataque, minimizar su impacto y recopilar información sobre los atacantes. Junto con lo anterior, se podría realizar un análisis más detallado y pormenorizado.TLS is an essential building block for virtual private networks. A critical aspect for the security of TLS dialogs is authentication and key exchange, usually performed by means of certificates. An insecure key exchange can lead to a man-in-the-middle attack (MITM). Trust in certificates is generally achieved using Public Key Infrastructures (PKIs), which employ trusted certificate authorities (CAs) to establish certificate validity chains. In the last years, a number of security concerns regarding PKI usage have arisen: certificates can be issued for entities in the Internet, regardless of its position in the CA hierarchy tree. This means that successful attacks on CAs have the potential to generate valid certificates enabling man-in-the-middle attacks. The possibility of malicious use of intermediate CAs to perform targeted attacks through ad-hoc certificates cannot be neglected and are extremely difficult to detect. Current PKI infrastructure for TLS is prone to MITM attacks, and new mechanisms for detection and avoidance of those attacks are needed. IETF and other standardization bodies have launched several initiatives to enable the detection of “forged” certificates. Most of these initiatives attempt to solve the existing problems by maintaining the current PKI model and using certificate pinning, which associates certificates and servers on use. These techniques have significant limitations, such as the need of a secure bootstrap procedure, or pinning requiring some host-by-host basis. This study proposes an evolution from pinning-in-the-host to pinning-in-the-net, by enabling mechanisms to validate certificates as they travel through a given network. Certificates would be classified as trusted or not trusted as a result of cross-information obtained from different sources. This would result in early detection of suspicious certificates and would trigger mechanisms to defeat the attack; minimize its impact; and gather information on the attackers. Additionally, a more detailed and thorough analysis could be performed

    La imagen y la narrativa como herramientas para el abordaje psicosocial en escenarios de violencia. Departamento de Norte de Santander.

    Get PDF
    En el presente trabajo se planteó la temática de la aplicación de la imagen y la narrativa como herramienta psicosocial en entornos de violencia haciendo un abordaje desde los contextos enmarcados por dicha problemática; dejando ver una realidad que muchas personas tienen que afrontar y el impacto que esta tiene sobre sus vidas. De igual manera, se realiza una descripción de los relatos por medio de las preguntas resueltas en el trascurso del tema, donde se evidencia la postura de las figuras gubernamentales y personal especializado tales como abogados, trabajadores sociales, médicos y psicólogos, entre otros. A sí mismo, el uso de preguntas reflexivas, circulares y estratégicas, nos permiten descubrir lo que realmente un individuo siente, piensa y como se percibe en medio de una nueva realidad luego de haber sufrido daños físicos y psicológicos, ya sea por el hecho de violencia agresivo, un desplazamiento forzado, una amenaza de muerte o la muerte de un tercero. No obstante, se hace referencia a los emergentes psicosociales y la realización de estrategias, para el caso de peñas coloradas donde se revela un proceso social y sus vivencias; analizando lo referente a la subjetividad colectiva, dando a conocer que las personas tienen la capacidad de narrar hechos y de forma natural se replantean para dejar atrás una historia que aunque marque sus vidas de forma permanente, pueden dejar de ser víctimas, para que a través de sus experiencias enseñen a otros a superar temores y situaciones de frustración, sin dejar de lado el acompañamiento que los profesionales de la salud mental puedan brindar en su intervención. Palabras claves: Víctima, Psicosocial, Emergente, EstrategiaIn the present work, the theme of the application of the image and the narrative as a psychosocial tool in environments of violence was raised, making an approach from the contexts framed by said problem; revealing a reality that many people have to face and the impact it has on their lives. In the same way, a description of the stories is made through the questions resolved in the course of the topic, where the position of government figures and specialized personnel such as lawyers, social workers, doctors and psychologists, among others, is evidenced. To himself, the use of reflective, circular, and strategic questions, allow to discover what an individual really feels, thinks and how he is perceived in the middle of a new reality after having suffered physical and psychological damage, either by the fact of violence aggressive, forced displacement, death threat or the death of a third party. However, reference is made to psychosocial emergencies and the realization of strategies, in the case of peñas coloradas where a social process and its experiences are revealed; analyzing what refers to collective subjectivity, making known that people have the ability to narrate events and naturally rethink themselves to leave behind a story that, although it marks their lives permanently, they can stop being victims, so that through from their experiences teach others to overcome fears and situations of frustration, without neglecting the support that mental health professionals can provide in their intervention. Keywords: Victim, Psychosocial, Emergent, Strategy

    La imagen y la narrativa como herramientas para el abordaje psicosocial en escenarios de violencia. Departamento de La Guajira

    Get PDF
    El siguiente informe es un trabajo académico el cual desarrolla con el objetivo trabajar en grupo y analizar las diferentes estrategias de diagnóstico, evaluación y acompañamiento a víctimas las cuales han pasado o están pasando por situaciones traumáticas o episodios de violencia difíciles de superar. Para lo cual es necesario adquirir capacidades de análisis entorno a la lectura de historias y vivencias reales las cuales impactan el entorno social, político, familiar, económico, etc., de las víctimas de un país tan golpeado por la violencia como lo es Colombia, en el cual sus habitantes sufren de desplazamiento forzoso, maltrato, abusos físicos y sexuales, desigualdad, olvido del estado, entre otras. En las cuales los grandes protagonistas y autores de estos episodios de violencia son las FARC y de más grupos al margen de la ley, quienes engañan el pueblo con ideologías que solo los benefician a ellos y traen tragedia a los habitantes de pueblos y veredas. Como es el caso de Carlos Arturo, un pequeño 14 años al que la guerra le cambio la vida y le borro la inocencia, pues con su corta edad debe enfrentarse a las consecuencias de una guerra que solo es de los que la forman, pero va dejando miles de víctimas a su paso. Es por esta razón que el desarrollo de esta fase requiere de la aplicación de las ciencias sociales para desde el área de la psicología identificar el fenómeno social que rodea la situación de Carlos y así lograr desarrollar un diagnóstico e intervenir de forma positiva en el caso, de igual forma finalizar con una reflexión que permita profundizar y caracterizar el caso de estudio.The following report is an academic work which is developed with the objective of working in groups and analyzing the different strategies of diagnosis, evaluation and accompaniment of victims who have gone through or are going through traumatic situations or episodes of violence that are difficult to overcome. For which it is necessary to acquire analysis skills around the reading of stories and real experiences which impact the social, political, family, economic environment, etc., of the victims of a country as hit by violence as Colombia, in which its inhabitants suffer from forced displacement, mistreatment, physical and sexual abuse, inequality, neglect of the state, among others. In which the great protagonists and authors of these episodes of violence are the FARC and other groups outside the law, who deceive the people with ideologies that only benefit them and bring tragedy to the inhabitants of towns and villages. As is the case of Carlos Arturo, a little 14-year-old boy whose life was changed by the war and his innocence erased, because at his young age he must face the consequences of a war that only belongs to those who form it, but he goes leaving thousands of victims in its wake. It is for this reason that the development of this phase requires the application of social sciences from the area of psychology to identify the social phenomenon that surrounds Carlos' situation and thus be able to develop a diagnosis and intervene positively in the case. In the same way, end with a reflection that allows deepening and characterizing the case study

    Extracción secuencial de metales pesados en dos suelos contaminados (Andisol y Vertisol) enmendados con ácidos húmicos

    Get PDF
    En suelos Andisoles y Vertisoles, bajo condiciones controladas, se evaluó el efecto de ácidos húmicos purificados en concentraciones de 0%, 2.5% y 5% (peso/peso)) sobre la extracción secuencial de metales pesados después de incubación a 60 y 90 días.  El fraccionamiento de los metales (Ni, Cu, Zn, Cd y Pb) en suelos contaminados y enmendados con ácidos húmicos se realizó mediante extracción secuencial de Tessier.  La movilidad de los metales se redujo con la adición de dichos ácidos, con mayor retención de Ni, Cu, Zn y Cd en la matriz del suelo (fracción residual).  El Pb en ambos suelos y el Zn en Vertisol experimentaron incremento significativo en su movilidad, mayor biodisponibilidad y potencial de afectación de diferentes componentes del medio-ambiente.  El incremento del tiempo de incubación permitió la interacción de los metales con los componentes de los suelos, generando disminución de su movilidad por mecanismos como formación de complejos estables y/o incremento de la capacidad de intercambio catiónico (CIC) de los suelos.  Los ácidos húmicos pueden ser utilizados, en general, como enmienda orgánica para la recuperación de suelos contaminados con metales pesados

    Estudio no destructivo de material sólido extraído en el dragado del Río Paraguay por espectroscopia Raman.

    Get PDF
    Con la utilización de un sistema portátil de espectroscopia Raman del laboratorio de Paleontología de la Facultad de Ciencias Exactas y Naturales de la Universidad Nacional de Asunción, fue realizada la identificación de la composición elemental de fragmentos fósiles extraídos de un dragado realizado en el Río Paraguay en la zona de Remanso, por una entidad que ha donado los restos fósiles hallados en dicha zona al laboratorio anteriormente mencionado. Mediante la técnica utilizada se pretende determinar la composición de los restos fósiles del dragado. En este trabajo mostramos los resultados de estudio mediante espectroscopia Raman de restos fósiles encontrados en el dragado del Río Paraguay, con el objeto principal de identificar en estas muestras la presencia de grupos orgánicos.CONACYT - Consejo Nacional de Ciencia y TecnologíaPROCIENCI
    corecore