219 research outputs found

    Caça i protecció d'espècies protegides a Espanya

    Get PDF
    Treball presentat a l'assignatura de Deontologia i Veterinària Legal (21223

    A new species of Loxosceles (Araneae, Sicariidae) from Tunisia

    Get PDF
    A new species of the spider genus Loxosceles, L. mrazig sp. n., found in Tunisia is described and illustrated. The male bulb shows a high degree of morphological similarity to that of L. gaucho from Brazil, but the pro- portions of the palpal segments and the general colouration of the body reveal significant differences between the two species. A distance analysis of the sequences of the mitochondrial gene cox1 reveals that the specimen from Tunisia shows high genetic distance from L. gaucho (more than 20%). The American species L. gaucho and L. laeta form a sister group to the Mediterranean representatives (L. rufescens and the Tunisian specimen). Taxonomy, Araneae, Loxosceles, new species, Tunisia

    The Mediterranean as a melting pot: phylogeography of Loxosceles rufescens (Sicariidae) in the Mediterranean Basin

    Get PDF
    The species Loxosceles rufescens is native to the Mediterranean but considered cosmopolitan because it has been dispersed worldwide. A previous study revealed 11 evolutionary lineages across the Mediterranean, grouped into two main clades, without any clear phylogeographic pattern. The high genetic diversity within this species (p-distances of up to 7.8% in some Mediterranean lineages), together with the results obtained with different species delimitation methods (GMYC, TCS) could indicate the existence of cryptic species. Here we compare the mitochondrial and microsatellite diversity to elucidate if the lineages of L. rufescens in the Mediterranean should be considered different species (cryptic species) or populations of the same species. To do so, we analyzed the cox1 diversity of 196 individuals, of which, we genotyped 148, sampled from 19 localities across the Mediterranean. STRUCTURE analyses of microsatellite data identified two genetic clusters of L. rufescens. One cluster included individuals from Western Mediterranean localities (Iberian Peninsula, Morocco, Balearic Islands) and Israel, while the second one grouped individuals from Italian and Greek localities, including Sardinia, Sicily and Tunisia. These patterns suggest that geographic proximity is the more significant factor in the clustering with microsatellite data and shows the existence of gene flow between the nearest geographic areas, even if the individuals belong to different mitochondrial lineages or clades. The lack of correspondence between both genetic markers suggests that the evolutionary lineages found within L. rufescens should not be considered different species. We conclude that these phylogenetic linages and their distribution may be the result of the maternal evolutionary history of the species and human-mediated dispersion

    Juventud, políticas públicas y crisis en España: ¿Triángulo mágico o triángulo de las Bermudas?

    Get PDF
    En tiempos de crisis, las políticas de juventud están experimentando enormes recortes y transformaciones hasta el punto que hemos llegado a preguntarnos si realmente existen como políticas públicas con entidad propia. La situación en la que se encuentran muchos sujetos jóvenes en España les lleva a preguntarse dónde están las redes de protección tradicionales: la familia, las ONG's o el Estado de Bienestar, cuando realmente se los necesita. Nuestro objetivo en este artículo es presentar y discutir la situación de las políticas de juventud en España en el contexto actual de austeridad y drásticos recortes sociales. Este análisis lo llevamos a cabo a partir de los parámetros del triángulo mágico que unen las políticas, la investigación y el trabajo social con jóve

    Factors that enhance and limit youth empowerment, according to social educators

    Get PDF
    Altres ajuts: acords transformatius de la UABPurpose: This study aims to identify the contextual and relational factors that enhance and limit the empowerment of young people from the perspective of social education professionals. Design/methodology/approach: Bronfenbrenner's bioecological model made it possible to locate the narratives of the educators in the territory. These narratives include field diaries, i.e. hybrid narratives that include visual, written and spoken materials, and focus groups with 11 educators from different fields of action and related to youth empowerment projects. Findings: According to these educators, the most important factors for empowering young people are their immediate environment, and the issues that affect them most. For these factors to be empowering, young people need to be accompanied, with support based on connectedness, horizontality and the creation of safe spaces and learning experiences. Both the microsystem and the mesosystem form the immediate reality for their action. Aware of this, educators do the work of connecting with the exosystem. Practical implications: It is evident why communities are spaces with opportunities for youth empowerment, and the authors observe the need for more transversal and less welfare-based social and youth policies that generate empowerment instead of dependency. Social implications: This methodology evidenced the environmental structures of educators and the dissimilar levels to explore and understand the work of educators and the complex interrelationships, which play an important role in empowerment processes. Originality/value: This research presents a new perspective that allows traditional qualitative reflection to be embedded in the bioecological model. All of this sheds light on relational ecosystems with young people and proposes youth policies, in this case, oriented towards empowerment

    Enabling hardware randomization across the cache hierarchy in Linux-Class processors

    Get PDF
    The most promising secure-cache design approaches use cache-set randomization to index cache contents thus thwarting cache side-channel attacks. Unfortunately, existing randomization proposals cannot be sucessfully applied to processors’ cache hierarchies due to the overhead added when dealing with coherency and virtual memory. In this paper, we solve existing limitations of hardware randomization approaches and propose a cost-effective randomization implementation to the whole cache hierarchy of a Linux-capable RISC-V processor.This work has been supported by the European HiPEAC Network of Excellence, by the Spanish Ministry of Economy and Competitiveness (contract TIN2015-65316-P), and by Generalitat de Catalunya (contracts 2017-SGR-1414 and 2017- SGR-1328). The DRAC project is co-financed by the European Union Regional Development Fund within the framework of the ERDF Operational Program of Catalonia 2014-2020 with a grant of 50% of total cost eligible. We also thank Red-RISCV for the efforts to promote activities around open hardware. This work has received funding from the EU Horizon2020 programme under grant agreement no. 871467 (SELENE). M. Doblas has been partially supported by the Agency for Management of University and Research Grants (AGAUR) of the Government of Catalonia under Beques de Col·laboració d’estudiants en departaments universitaris per al curs 2019- 2020. V. Kostalabros has been partially supported by the Agency for Management of University and Research Grants (AGAUR) of the Government of Catalonia under Ajuts per a la contractació de personal investigador novell fellowship number 2019FI_ B01274. M. Moreto has been partially supported by the Spanish Ministry of Economy, Industry and Competitiveness under Ramón y Cajal fellowship number RYC- 2016-21104.Peer ReviewedPostprint (published version

    Regional differences in transport, lipid composition, and fluidity of apical membranes of small intestine of chicken

    Get PDF
    Na+-dependent D-glucose transport was studied in brush-border membrane vesicles from duodenum, jejunum, and ileum of 5- to 6-wk-old chickens. Regional differences were found, and both initial rates and accumulation ratio of D-glucose were higher in the proximal part of the small intestine than in the ileum. To establish the mechanism(s) underlying these differences we have studied the density of Na+-dependent D-glucose cotransporter (SGLT1) as well as lipid composition and fluidity. Phlorizin-specific binding and Western blot analysis indicated a decrease in the amount of SGLT1 in the ileum when compared to the duodenum and jejunum. The distal part of the small intestine also showed a decrease in free cholesterol content and saturated-to-unsaturated fatty acid ratio together with an increase in lipid content and phosphatidylcholine-to-sphingomyelin ratio. These results were associated with a decrease in the diphenylhextriene fluorescence polarization found in brush-border membranes of the ileum. We can conclude that the decrease in the apical D-glucose transport found in the ileum is primarily due to a reduction in the amount of SGLT1 present in the brush-border membrane rather than the differences in the lipid composition and fluidity.Ministerio de Educación y Cultura de España. PB96/1255Generalitat de Catalunya.1999-SGR-0027

    A security model for randomization-based protected caches

    Get PDF
    Cache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several microarchitectural attacks. As a promising solution, recent work proposes Randomization-based Protected Caches (RPCs). RPCs randomize cache addresses, changing keys periodically so as to avoid long-term leakage. Unfortunately, recent attacks have called the security of state-of-the-art RPCs into question. In this work, we tackle the problem of formally defining and analyzing the security properties of RPCs. We first give security definitions against access-based cache sidechannel attacks that capture security against known attacks such as Prime+Probe and Evict+Probe. Then, using these definitions, we obtain results that allow to guarantee security by adequately choosing the rekeying period, the key generation algorithm and the cache randomizer, thus providing security proofs for RPCs under certain assumptions.This research was supported by the European Union Regional Development Fund withinthe framework of the ERDF Operational Program of Catalonia 2014-2020 with a grant of50% of the total cost eligible, under the DRAC project [001-P-001723], and by the SpanishGovernment, under the CONSENT project [RTI2018-095094-B-C21]. Carles Hernándezis partially supported by Spanish Ministry of Science, Innovation and Universities under“Ramón y Cajal”, fellowship No. RYC2020-030685-I. Vatistas Kostalabros is partiallysupported by the Agency for Management of University and Research Grants (AGAUR) ofthe Government of Catalonia, under “Ajuts per a la contractació de personal investigadornovell”, fellowship No. 2019FI B01274. Miquel Moretó is partially supported by theSpanish Ministry of Economy, Industry and Competitiveness under “Ramón y Cajal”,fellowship No. RYC-2016-21104.Peer ReviewedPostprint (published version

    HLS-based HW/SW co-design of the post-quantum classic McEliece cryptosystem

    Get PDF
    While quantum computers are rapidly becoming more powerful, the current cryptographic infrastructure is imminently threatened. In a preventive manner, the U.S. National Institute of Standards and Technology (NIST) has initiated a process to evaluate quantum-resistant cryptosystems, to form the first post-quantum (PQ) cryptographic standard. Classic McEliece (CM) is one of the most prominent cryptosystems considered for standardization in NIST’s PQ cryptography contest. However, its computational cost poses notable challenges to a big fraction of existing computing devices. This work presents an HLS-based, HW/SW co-design acceleration of the CM Key Encapsulation Mechanism (CM KEM). We demonstrate significant maximum speedups of up to 55.2 ×, 3.3 ×, and 8.7 × in the CM KEM algorithms of key generation, encapsulation, and decapsulation respectively, comparing to a SW-only scalar implementation.This research was supported by the European Union Regional Development Fund within the framework of the ERDF Operational Program of Catalonia 2014-2020 with a grant of 50% of the total cost eligible, under the DRAC project [001- P-001723]. It was also supported by the Spanish goverment (grant RTI2018-095094-B-C21 “CONSENT”), by the Spanish Ministry of Science and Innovation (contracts PID2019- 107255GB-C21, PID2019-107255GB-C21) and by the Catalan Government (contracts 2017-SGR-1414, 2017-SGR-705). This work has also received funding from the European Union Horizon 2020 research and innovation programme under grant agreement No. 871467. V. Kostalabros has been partially supported by the Agency for Management of University and Research Grants (AGAUR) of the Government of Catalonia under "Ajuts per a la contractació de personal investigador novell" fellowship No. 2019FI B01274. M. Moreto was also partially supported by the Spanish Ministry of Economy, Industry and Competitiveness under "Ramón y Cajal" fellowship No. RYC-2016-21104.Peer ReviewedPostprint (author's final draft

    A security model for randomization-based protected caches

    Get PDF
    Cache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several microarchitectural attacks. As a promising solution, recent work proposes Randomization-based Protected Caches (RPCs). RPCs randomize cache addresses, changing keys periodically so as to avoid long-term leakage. Unfortunately, recent attacks have called the security of state-of-the-art RPCs into question. In this work, we tackle the problem of formally defining and analyzing the security properties of RPCs. We first give security definitions against access-based cache sidechannel attacks that capture security against known attacks such as Prime+Probe and Evict+Probe. Then, using these definitions, we obtain results that allow to guarantee security by adequately choosing the rekeying period, the key generation algorithm and the cache randomizer, thus providing security proofs for RPCs under certain assumptions.This research was supported by the European Union Regional Development Fund withinthe framework of the ERDF Operational Program of Catalonia 2014-2020 with a grant of50% of the total cost eligible, under the DRAC project [001-P-001723], and by the SpanishGovernment, under the CONSENT project [RTI2018-095094-B-C21]. Carles Hernándezis partially supported by Spanish Ministry of Science, Innovation and Universities under“Ramón y Cajal”, fellowship No. RYC2020-030685-I. Vatistas Kostalabros is partiallysupported by the Agency for Management of University and Research Grants (AGAUR) ofthe Government of Catalonia, under “Ajuts per a la contractació de personal investigadornovell”, fellowship No. 2019FI B01274. Miquel Moretó is partially supported by theSpanish Ministry of Economy, Industry and Competitiveness under “Ramón y Cajal”,fellowship No. RYC-2016-21104.Peer ReviewedPostprint (published version
    corecore