1,242 research outputs found
Video streaming with quality adaption using collaborative active grid networks
Due to the services and demands of the end
users, Distributed Computing (Grid Technology,
Web Services, and Peer-to-Peer) has been
developedrapidJy in thelastyears. Theconvergence
of these architectures has been possible using
mechanisms such as Collaborative work and
Resources Sharing. Grid computing is a platform to
enable flexible, secure, controlled, scalable,
ubiquitous and heterogeneous services. On the
other hand, Video Streaming applications demand
a greater deployment over connected Internet users.
The present work uses the Acti ve Grid technology
as a fundamental platform to give a solution of
multimediacontentrecovery. This solution takes
into account the following key concepts:
collaborative work, multi-source recovery and
adapti ve quality. A new archi tecture is designed to
deliver video content over a Grid Network. The
acti ve and passi ve roles of the nodes are important
to guarantee a high quality and efficiency for the
video streaming system. The acti ve sender nodes
are the content suppliers, while the passive sender
nodes wiU perform the backup functions, based on
global resource control policies. The aim of the
backup node is minirnize the time to restore the
systemin caseoffailures. In this way, all participant
peers work in a collaborati ve manner following a
mul ti -source recovery scheme.
Furthermore, Video La yered Encoding is used
to manage the video data in a high scalable way,
di viding the video in multiple layers. This video
codification scheme enables thequality adaptation
according to the availability of system resources. In
addition, a buffer by sender peer and by layer is
needed for an effecti ve control ofthe video retrieve.
The QoS will fit considering the state of each buffer
and the measurement tools provide by the Acti ve
Grid on the network nodes. Ke ywords: Peer -to-Peer Grid Architecture,
Services for Active Grids, Streaming Media,
Layered Coding, Quality Adaptation, CoUaborative
Work.Peer Reviewe
Modelado semántico y ubicuo del comercio electrónico mediante Web Services
La demanda de interoperabilidad
semántica y ubicuidad tecnológica en aplicaciones
de comercio electrónico tiene un crecimiento
exponencial. Añadir propiedades inteligentes a la
Web actual, ya es una realidad a través del desarrollo
e implementación de Web Services basados en
estándares de fácil gestión y cada vez más estables,
cumpliendo con los requerimientos básicos de
Calidad de Servicio (QoS). Este trabajo presenta
un análisis de la tecnología de los Web Services con
el principal objetivo de aportar valor añadido a
aplicaciones de Comercio Electrónico; así como,
exponer una visión general del estado actual de los
Web Services y sus contribuciones a las necesidades
de las empresas en general.Peer Reviewe
Video streaming with quality adaption using collaborative active grid networks
Due to the services and demands of the end
users, Distributed Computing (Grid Technology,
Web Services, and Peer-to-Peer) has been
developedrapidJy in thelastyears. Theconvergence
of these architectures has been possible using
mechanisms such as Collaborative work and
Resources Sharing. Grid computing is a platform to
enable flexible, secure, controlled, scalable,
ubiquitous and heterogeneous services. On the
other hand, Video Streaming applications demand
a greater deployment over connected Internet users.
The present work uses the Acti ve Grid technology
as a fundamental platform to give a solution of
multimediacontentrecovery. This solution takes
into account the following key concepts:
collaborative work, multi-source recovery and
adapti ve quality. A new archi tecture is designed to
deliver video content over a Grid Network. The
acti ve and passi ve roles of the nodes are important
to guarantee a high quality and efficiency for the
video streaming system. The acti ve sender nodes
are the content suppliers, while the passive sender
nodes wiU perform the backup functions, based on
global resource control policies. The aim of the
backup node is minirnize the time to restore the
systemin caseoffailures. In this way, all participant
peers work in a collaborati ve manner following a
mul ti -source recovery scheme.
Furthermore, Video La yered Encoding is used
to manage the video data in a high scalable way,
di viding the video in multiple layers. This video
codification scheme enables thequality adaptation
according to the availability of system resources. In
addition, a buffer by sender peer and by layer is
needed for an effecti ve control ofthe video retrieve.
The QoS will fit considering the state of each buffer
and the measurement tools provide by the Acti ve
Grid on the network nodes. Ke ywords: Peer -to-Peer Grid Architecture,
Services for Active Grids, Streaming Media,
Layered Coding, Quality Adaptation, CoUaborative
Work.Peer Reviewe
Alternativas para el manejo y aprovechamiento de aguas termominerales post-uso del municipio de Paipa (Boyacá)
RESUMEN: El estudio presenta una recopilación de diversas alternativas para el manejo y aprovechamiento de las aguas termominerales provenientes de diversos hoteles y balnearios del municipio de Paipa (Boyacá), las cuales son vertidas a dos sistemas denominados dársenas cuya función es almacenar este tipo de aguas una vez han llegado a temperaturas inferiores a 25 °C, para posteriormente ser vertidas al río Chicamocha.
Para el desarrollo del estudio se evalúan parámetros fisicoquímicos y microbiológicos en cuatro puntos monitoreados distribuidos a lo largo de los sistemas dársena, evaluando las características del agua que ingresa desde la dársena 1 hasta el vertimiento final al rio Chicamocha, tales como pH, oxígeno disuelto, conductividad, temperatura, nutrientes, demanda química y biológica de oxígeno, así como coliformes totales y fecales. De esta manera, se realiza un análisis del impacto que puede generar el vertimiento de este tipo de aguas sobre la fuente receptora mediante la aplicación de diferentes índices de calidad, los cuales determinan el potencial contaminante de las aguas termominerales del municipio de Paipa.
Se realiza una recopilación de información referente a los diversos procesos que pueden ser aplicables para el tratamiento y aprovechamiento de las aguas termominerales objeto de estudio; métodos que usan la aplicación de la radiación solar, el uso de reactivos químicos para disminuir las altas concentraciones de sales así como tratamientos con estrategias combinadas que emplean el consumo de la electricidad para hidrolizar el agua, el cambio de temperaturas y presiones que separan los iones salobres, generando subproductos que dependiendo del uso, podrían ser aprovechados en estrategias de comercialización
Loss Allocation in Submarine Armored Three-core HVAC Power Cables
Loss allocation of the three different components (conductor, sheaths and
armor) of solidly bonded three-core separated lead-sheathed armored cables,
frequently employed in offshore wind farms, is challenging due to the lack of
accurate enough analytical expressions in the IEC standard. Also, loss
allocation through experimental tests leads to inaccurate results since it is
based on questionable assumptions. This paper improves both the IEC formulae
and experimental methods by means of different analytical corrections in the
conductor and sheath loss expressions. To this aim, an ad hoc application
interface (Virtual Lab) based on 3D numerical simulations (finite element
method) has been developed. This tool virtualizes and automates different test
setups to emulate, in few seconds, the most employed experimental procedures in
this type of cable. The analytical corrections have been derived from an
in-depth analysis of a first set of 368 cables, ranging from 30 to 275 kV. The
new loss expressions were successfully applied to a second set of 645 armored
cables of quite diverse features (voltages from 10 to 275 kV, sections and
dimensional parameters), hence bringing a general framework for any kind of
three-core armored cable
Los efectos del grado jurisdiccional de consulta en las sentencias proferidas por los juzgados municipales de pequeñas causas laborales en Santiago de Cali
En el presente documento abordaremos de manera detallada la aplicación del grado jurisdiccional de consulta en los procesos de única instancia en materia laboral, a fin de analizar cuales ha sido los efectos que se dieron en los despachos judiciales, posterior al pronunciamiento de la corte constitucional en el año 2015.In this document, we will cover in detail the application of the jurisdictional degree of consultation in the single-instance labor proceedings, in order to analyze the effects that have occurred in judicial offices, following the pronouncement of the constitutional court in the year 2015
Loss Allocation in Submarine Armored Three-core HVAC Power Cables
Loss allocation of the three different components (conductor, sheaths and armor) of solidly bonded three-core separated lead-sheathed armored cables, frequently employed in offshore wind farms, is challenging due to the lack of accurate enough analytical expressions in the IEC standard. Also, loss allocation through experimental tests leads to inaccurate results since it is based on questionable assumptions. This paper improves both the IEC formulae and experimental methods by means of different analytical corrections in the conductor and sheath loss expressions. To this aim, an ad hoc application interface (Virtual Lab) based on 3D numerical simulations (finite element method) has been developed. This tool virtualizes and automates different test setups to emulate, in few seconds, the most employed experimental procedures in this type of cable. The analytical corrections have been derived from an in-depth analysis of a first set of 368 cables, ranging from 30 to 275 kV. The new loss expressions were successfully applied to a second set of 645 armored cables of quite diverse features (voltages from 10 to 275 kV, sections and dimensional parameters), hence bringing a general framework for any kind of three-core armored cable
Research technology organisations as leaders of R&D collaboration with SMEs: role, barriers and facilitators
Research technology organisations or RTOs have attracted academic interest in the last decade
due to their role as technology transfer agents and R&D collaborative leaders for firms and
especially for small and medium enterprises (SMEs). Although their role within the diversity
of specialised structures in generating R&D for industry in National Innovation Systems is
recognised, there are scarce publications in relation to their strategies, performance or characteristic,
as leaders of R&D collaboration with SMEs. The aim of this work is to identify
the role, barriers and facilitators for RTOs performance as well as to develop a contingency
relationship between industry environment, strategy, organisational structure and other factors
for successful technology transfer from technology organisations to SMEs. This research is
based on a field study conducted on 14 technology organisations based in the Valencia region,
working with various industry sectors.Albors Garrigós, J.; Rincón Díaz, CA.; Igartua López, JI. (2014). Research technology organisations as leaders of R&D collaboration with SMEs: role, barriers and facilitators. Technology Analysis and Strategic Management. 26(1):37-53. doi:10.1080/09537325.2013.850159S375326
Animal models of maladaptive traits: disorders in sensorimotor gating and attentional quantifiable responses as possible endophenotypes
Traditional diagnostic scales are based on a number of symptoms to evaluate and classify mental diseases. In many cases, this process becomes subjective, since the patient must calibrate the magnitude of his/her symptoms and therefore the severity of his/her disorder. A completely different approach is based on the study of the more vulnerable traits of cognitive disorders. In this regard, animal models of mental illness could be a useful tool to characterize indicators of possible cognitive dysfunctions in humans. Specifically, several cognitive disorders such as schizophrenia involve a dysfunction in the mesocorticolimbic dopaminergic system during development. These variations in dopamine levels or dopamine receptor sensibility correlate with many behavioral disturbances. These behaviors may be included in a specific phenotype and may be analyzed under controlled conditions in the laboratory. The present study provides an introductory overview of different quantitative traits that could be used as a possible risk indicator for different mental disorders, helping to define a specific endophenotype. Specifically, we examine different experimental procedures to measure impaired response in attention linked to sensorimotor gating as a possible personality trait involved in maladaptive behaviors.Ministerio de Economía y Competitividad PSI2012- 3244
Uso de ingeniería inversa para hacer frente al malware
Este artículo es producto del proyecto de investigación “Cyber Security Architecture for Incident Management” desarrollado en la Escuela Colombiana de Ingeniería Julio Garavito en el año 2018.Introducción: La ingeniería inversa permite deconstruir y extraer conocimiento de objetos. El uso de la inge-niería inversa en el análisis de malware es extremadamente útil para comprender las funcionalidades y los propósitos de una muestra sospechosa.Métodos: Este artículo utiliza Radare, la cual es una de las herramientas de código abierto más populares para ingeniería inversa con el objetivo de hacer frente a las amenazas de malware.Resultados: Se presenta un caso de uso relacionado al análisis de malware anti-sandbox, de forma que sea posible analizar el comportamiento de la muestra utilizando una sandbox. Además, se presenta otro caso de uso en el que se desarrolla un análisis en profundidad de una aplicación maliciosa de Android dirigida a la audiencia de un evento popular (Copa Mundial de la FIFA 2018), que permite demostrar la relevancia de las técnicas de ingeniería inversa en las estrategias de protección al usuario final.Conclusiones: Este artículo muestra cómo los resultados de un proceso de ingeniería inversa se pueden inte-grar con reglas Yara, lo que permite detectar malware, y también muestra una alternativa para generar auto-máticamente reglas Yara a través del generador yarGen.Originalidad: El uso de soluciones de ingeniería inversa de código abierto por parte de las agencias de seguri-dad del estado no ha sido discutido anteriormente, lo que hace de este artículo un elemento notable de apoyo hacia la modernización de las fuerzas militares.Limitación: Se comparten diferentes enfoques y perspectivas sobre las limitaciones en el uso de ingeniería inversa por parte de las agencias de seguridad del estado.This paper is a product of the research Project “Cyber Security Architecture for Incident Management” develo-ped in the Colombian School of Engineering Julio Garavito in the year 2018.Introduction: Reverse engineering involves deconstructing and extracting knowledge about objects. The use of reverse engineering in malware analysis is extremely useful in understanding the functionalities and purposes of a suspicious sample.Methods: This paper makes use of Radare which is one of the most popular open source tools for reverse engineering, with the aim of dealing with malware. Results: A use case related to hacking of anti-sandbox malware is presented, in such a way that it is possible to analyze the behavior of the sample using a sandbox. Additionally, another use case is presented, where an in-depth analysis of a malicious Android application aimed to the audience of a popular event (FIFA World Cup 2018) is developed, making it possible to demonstrate the relevance of reverse engineering techniques in end-user protection strategies. Conclusions: This paper shows how the results of a reverse engineering process can be integrated with Yara rules, allowing for the detection of malware on the fly, and it also shows an alternative to automatically gene-rating Yara rules through the yarGen generator. Originality: Use of Open Source reversing solutions by Colombian Law Enforcement Agencies has not been discussed previously, making this paper a notable element toward the modernization of the military forces.Limitation: Different approaches and perspectives about the limitations in the use of reverse engineering by Law Enforcement Agencies are also shared.Este artigo é produto do projeto de pesquisa “Cyber Security Architecture for Incident Management” desenvol-vido na Escuela Colombiana de Ingeniería Julio Garavito em 2018.Introdução: a engenharia reversa permite desconstruir e extrair conhecimento de objetos. O uso da engenharia reversa na análise de malware é extremamente útil para compreender as funcionalidades e os propósitos de uma amostra suspeita.Métodos: para isso, utiliza-se Radare, que é uma das ferramentas de código aberto mais populares para en-genharia reversa com o objetivo de enfrentar as ameaças de malware.Resultados: apresenta-se um caso de uso relacionado à análise de malware anti-sandbox, de forma que seja possível analisar o comportamento da amostra utilizando uma sandbox. Além disso, apresenta-se outro caso de uso em que se desenvolve uma análise em profundidade de uma aplicação maliciosa de Android dirigida à audiência de um evento popular (Copa do Mundo da FIFA 2018), que permite demonstrar a relevância das técnicas de engenharia reversa nas estratégias de proteção do usuário final.Conclusões: este artigo mostra como os resultados de um processo de engenharia reversa podem ser integra-dos com regras Yara, o que permite detectar malware, e também mostra uma alternativa para gerar automati-camente regras Yara por meio do gerador yarGen.Originalidade: o uso de soluções de engenharia reversa de código aberto por parte das agências de segurança do Estado não tem sido discutido anteriormente, o que torna este estudo um elemento notável de apoio à modernização das forças militares.Limitação: compartilham-se diferentes abordagens e perspectivas sobre as limitações no uso de engenharia reversa por parte das agências de segurança do Estad
- …