841 research outputs found

    Fundamentos lógicos de la programación

    Get PDF
    Este manuscrito cubre los contenidos de la asignatura Fundamentos Lógicos de la Programación. Incluye demostración formal y semántica de la lógica proposicional, semántica y deducción en lógica de primer orden. Por último se describe el principio de resolución para deducción automática.This manuscript covers the contents of the course Principles of logic in programming. It includes both formal and semantic propositional logic, first order logic, and resolution principle for automatic theorem proving

    A new neutron monitor at the Juan Carlos I Spanish Antarctic Station (Livingston Island-Antarctic Peninsula)

    Get PDF
    Last January 2019, a new neutron monitor was installed at Juan Carlos I Spanish Antarctic Station (62º 39’ 46’’ S, 60º23’20’’ W, 12 m asl) located in Livingston Island (South Shetland Archipelago) close to the Antarctic Peninsula. The vertical rigidity cut-off for this new station is estimated as 3.52 GV. This new station (ORC) is composed of a BF3-based 3NM64 (ORCA) and 3 bare BF3 counters (ORCB). The neutron monitor is complemented by a muon telescope sharing a common room in a single stack. ORCA and ORCB with the Castilla-La Mancha neutron monitor (CaLMa) are the Spanish contributions to the Neutron Monitor Data Base. Because Juan Carlos I station is a summer station, one minute data is providing once a day during the Antarctic summer. One hour data are sent once a day during Antarctic winter. First measurements and future plans are provided in this work

    An MDA approach for developing secure OLAP applications: Metamodels and transformations

    Get PDF
    Decision makers query enterprise information stored in DataWarehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which employ specific views or cubes from the corporate DW or Data Marts, based on multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized access. In previous work we defined a Model-Driven based approach for developing a secure DW repository by following a relational approach. Nevertheless, it is also important to define security constraints in the metadata layer that connects the DW repository with the OLAP tools; that is, over the same multidimensional structures that end users manage. This paper incorporates a proposal for developing secure OLAP applications within our previous approach: it improves a UML profile for conceptual modelling; it defines a logical metamodel for OLAP applications; and it defines and implements transformations from conceptual to logical models, as well as from logical models to secure implementation in a specific OLAP tool (SQL Server Analysis Services). © 2015 ComSIS Consortium. All rights reserved.This research is part of the following projects: SIGMA-CC (TIN2012-36904), GEODAS-BC (TIN2012-37493-C01) and GEODAS-BI (TIN2012-37493-C03) funded by the Ministerio de Economía y Competitividad and Fondo Europeo de Desarrollo Regional FEDER

    Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications

    Get PDF
    Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by using On-Line Analytical Processing (OLAP) tools. The establishment of security constraints in all development stages and operations of the DW is highly important since otherwise, unauthorized users may discover vital business information. The final users of OLAP tools access and analyze the information from the corporate DW by using specific views or cubes based on the multidimensional modelling containing the facts and dimensions (with the corresponding classification hierarchies) that a decision maker or group of decision makers are interested in. Thus, it is important that security constraints will be also established over this metadata layer that connects the DW's repository with the decision makers, that is, directly over the multidimensional structures that final users manage. In doing so, we will not have to define specific security constraints for every particular user, thereby reducing the developing time and costs for secure OLAP applications. In order to achieve this goal, a model driven architecture to automatically develop secure OLAP applications from models has been defined. This paper shows the benefits of this architecture by applying it to a case study in which an OLAP application for an airport DW is automatically developed from models. The architecture is composed of: (1) the secure conceptual modelling by using a UML profile; (2) the secure logical modelling for OLAP applications by using an extension of CWM; (3) the secure implementation into a specific OLAP tool, SQL Server Analysis Services (SSAS); and (4) the transformations needed to automatically generate logical models from conceptual models and the final secure implementation.This research is part of the following projects: SERENIDAD (PEII11- 037-7035) financed by the ”Viceconsejería de Ciencia y Tecnología de la Junta de Comunidades de Castilla-La Mancha” (Spain) and FEDER, and SIGMA-CC (TIN2012-36904) and GEODAS (TIN2012-37493-C03-01) financed by the ”Ministerio de Economía y Competitividad” (Spain)

    An architecture for automatically developing secure OLAP applications from models

    Get PDF
    Context: Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which use specific views or cubes from the corporate DW or Data Marts, based on the multidimensional modeling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized accesses. Objective: In previous work we have defined a Model-Driven based approach for developing a secure DWs repository by following a relational approach. Nevertheless, is also important to define security constraints in the metadata layer that connects the DWs repository with the OLAP tools, that is, over the same multidimensional structures that final users manage. This paper defines a proposal to develop secure OLAP applications and incorporates it into our previous approach. Method: Our proposal is composed of models and transformations. Our models have been defined using the extension capabilities from UML (conceptual model) and extending the OLAP package of CWM with security (logical model). Transformations have been defined by using a graphical notation and implemented into QVT and MOFScript. Finally, this proposal has been evaluated through case studies. Results: A complete MDA architecture for developing secure OLAP applications. The main contributions of this paper are: improvement of a UML profile for conceptual modeling; definition of a logical metamodel for OLAP applications; and definition and implementation of transformations from conceptual to logical models, and from logical models to the secure implementation into a specific OLAP tool (SSAS). Conclusion: Our proposal allows us to develop secure OLAP applications, providing a complete MDA architecture composed of several security models and automatic transformations towards the final secure implementation. Security aspects are early identified and fitted into a most robust solution that provides us a better information assurance and a saving of time in maintenance.This research is part of the following Projects: SIGMA-CC (TIN2012-36904), GEODAS-BC (TIN2012-37493-C01) and GEODAS-BI (TIN2012-37493-C03) funded by the Ministerio de Economía y Competitividad and Fondo Europeo de Desarrollo Regional FEDER. SERENIDAD (PEII11-037-7035) and MOTERO (PEII11- 0399-9449) funded by the Consejería de Educación, Ciencia y Cultura de la Junta de Comunidades de Castilla La Mancha, and Fondo Europeo de Desarrollo Regional FEDER

    Trajectory determination of muons using scintillators and a novel self-organizative map

    Get PDF
    In this work we propose a method for the determination of the impact point of muons in scintillators using a novel type of self-organizative maps called Self-Equalizing Map (SEM) and comparing the relative pulse height obtained by four photomultipliers (PMTs) at each scintillator. Using two 1 m2{^2} scintillators and calculating the impact point in both of them, we can also estimate the angle of incidence of these particles. This method has been specifically designed for a muon telescope called MITO (Muon Impact Tracer and Observer) which is part of the ORCA (Antarctic Cosmic Ray Observatory). Data from tests using MITO in Livingston Island, Antarctica have been used to evaluate the feasibility of this method. The obtained directions have been found to be consistent with the expected incident directions of atmospheric muons produced by the interaction between CRs and atmospheric atoms.Agencia Estatal de Investigació

    Trajectory determination at Muon Impact Tracer and Observer (MITO) using artificial neural networks

    Get PDF
    We propose a method for the determination of the impact point of muons in each of the two detection planes of the Muon Impact Tracer and Observer (MITO) telescope, which is part of the ORCA (Antarctic Cosmic Ray Observatory). The method uses the relative pulse height obtained by the four photomultipliers associated to the scintillator with the Adaptable and Reconfigurable Acquisition Con- cept for Nuclear Electronics (ARACNE) data adquisition module. These pulses are processed with an Artificial Neural Network (ANN) previously trained with the GEANT4 model of the detector. With the impact point in both MITO planes, we estimate the angle of inci- dence of these particles with in order to evaluate the isotropy of the incident particles. To validate the method, real data from recorded by MITO in Livingston Island, Antarctica have been used to evaluate the feasibility of this method and its application to space weather.Agencia Estatal de Investigació

    Cosmic ray observations from Livingston Island

    Get PDF
    ORCA, from the Spanish name Observatorio de Rayos Cósmicos Antártico, is a cosmic ray detector devoted to the observation of secondary cosmic rays at Juan Carlos I Spanish Antarctic Base (62° 39′ 46″ S, 60° 23′ 20″ W, 12 m above sea level). ORCA was installed at the beginning of January 2019 after performing a latitudinal survey from Vigo (Spain) to Livingston Island aboard the Sarmiento de Gamboa Research Vessel. ORCA was in commissioning phase from January 2019 to March 2020, being in normal operation mode from March 2020. A vertical cutoff rigidity of 2.37GV has been computed at ORCA location and during the first year of operation, i. e. from March 2020 to March 2021. ORCA consists of three detectors stacked in a shared structure that maintains the relative distances between the detectors. A muon telescope (ORCM), a neutron monitor without any shielding around (ORCB) and a 3NM64 neutron monitor (ORCA). This configuration allows the measurement of neutron count rates at two different energy thresholds, muon count rate and muon incident directions. Measurements recorded during the first year of operation and ORCA potential capabilities are shown in this work.Agencia Estatal de Investigació

    GMM-based classifiers for the automatic detection of obstructive sleep apnea

    Get PDF
    The aim of automatic pathological voice detection systems is to serve as tools, to medical specialists, for a more objective, less invasive and improved diagnosis of diseases. In this respect, the gold standard for those system include the usage of a optimized representation of the spectral envelope, either based on cepstral coefficients from the mel-scaled Fourier spectral envelope (Mel-Frequency Cepstral Coefficients) or from an all-pole estimation (Linear Prediction Coding Cepstral Coefficients) forcharacterization, and Gaussian Mixture Models for posterior classification. However, the study of recently proposed GMM-based classifiers as well as Nuisance mitigation techniques, such as those employed in speaker recognition, has not been widely considered inpathology detection labours. The present work aims at testing whether or not the employment of such speaker recognition tools might contribute to improve system performance in pathology detection systems, specifically in the automatic detection of Obstructive Sleep Apnea. The testing procedure employs an Obstructive Sleep Apnea database, in conjunction with GMM-based classifiers looking for a better performance. The results show that an improved performance might be obtained by using such approach
    corecore