341 research outputs found
p53: A New Kingpin in the Stem Cell Arena
Identifying new regulators of the stem cell state offers potential for future gains in biomedicine. Evidence that the tumor suppressor p53 is a key regulator of the stem cell state (Cicalese et al., 2009) suggests a broad role for this protein and its pathways in the control of normal tissue homeostasis and tumor formation
Proposing 3D Thermal Technology for Heritage Building Energy Monitoring
[EN] The energy monitoring of heritage buildings has, to date, been governed by methodologies and standards that have been defined in terms of sensors that record scalar magnitudes and that are placed in specific positions in the scene, thus recording only some of the values sampled in that space. In this paper, however, we present an alternative to the aforementioned technologies in the form of new sensors based on 3D computer vision that are able to record dense thermal information in a three-dimensional space. These thermal computer vision-based technologies (3D-TCV) entail a revision and updating of the current building energy monitoring methodologies. This paper provides a detailed definition of the most significant aspects of this new extended methodology and presents a case study showing the potential of 3D-TCV techniques and how they may complement current techniques. The results obtained lead us to believe that 3D computer vision can provide the field of building monitoring with a decisive boost, particularly in the case of heritage buildingsThis research was funded by the European Regional Development Fund (SBPLY/19/180501/000094 project) and the Ministry of Science and Innovation (PID2019-108271RB-C31 and PID2019108271RB-C33).Adan, A.; Pérez, V.; Vivancos, J.; Aparicio Fernandez, CS.; Prieto, SA. (2021). Proposing 3D Thermal Technology for Heritage Building Energy Monitoring. Remote Sensing. 13(8):1-25. https://doi.org/10.3390/rs13081537S12513
Evaluación de condiciones tecnológicas, legales y operativas para el diseño de un modelo de registro y ubicación de bicicletas para disminuir el robo en la ciudad de Bogotá
123 páginasEste trabajo se desarrolló pensando en contribuir desde la ingeniería a la solución de la problemática existente relacionada con el hurto de bicicletas y asalto a ciclistas en la ciudad de Bogotá y el impacto que este hecho genera al desestimular su uso masivo cotidiano como medio alternativo de transporte. Desde hace tiempo la ciudad ha hecho innumerables esfuerzos por lograr que la ciudadanía use este y otros medios de transporte con la finalidad de reducir la dependencia por el uso del vehículo particular, el cual ha generado graves problemas de movilidad y contaminación, se considera que el presente trabajo sirve para entender a fondo uno de los factores que ha impedido el avance de esta estrategia y a su vez dar luces acerca del papel de la tecnología y su posible implementación para resolverlo o mitigarlo. En el mismo sentido, Se presenta una propuesta de modelo, que integra tecnologías existentes y un proceso operativo entorno a la bicicleta que permite mitigar y controlar la inseguridad de las bicicletas en la ciudad de Bogotá
Recommended from our members
Expression microarray reproducibility is improved by optimising purification steps in RNA amplification and labelling.
BACKGROUND: Expression microarrays have evolved into a powerful tool with great potential for clinical application and therefore reliability of data is essential. RNA amplification is used when the amount of starting material is scarce, as is frequently the case with clinical samples. Purification steps are critical in RNA amplification and labelling protocols, and there is a lack of sufficient data to validate and optimise the process. RESULTS: Here the purification steps involved in the protocol for indirect labelling of amplified RNA are evaluated and the experimentally determined best method for each step with respect to yield, purity, size distribution of the transcripts, and dye coupling is used to generate targets tested in replicate hybridisations. DNase treatment of diluted total RNA samples followed by phenol extraction is the optimal way to remove genomic DNA contamination. Purification of double-stranded cDNA is best achieved by phenol extraction followed by isopropanol precipitation at room temperature. Extraction with guanidinium-phenol and Lithium Chloride precipitation are the optimal methods for purification of amplified RNA and labelled aRNA respectively. CONCLUSION: This protocol provides targets that generate highly reproducible microarray data with good representation of transcripts across the size spectrum and a coefficient of repeatability significantly better than that reported previously.RIGHTS : This article is licensed under the BioMed Central licence at http://www.biomedcentral.com/about/license which is similar to the 'Creative Commons Attribution Licence'. In brief you may : copy, distribute, and display the work; make derivative works; or make commercial use of the work - under the following conditions: the original author must be given credit; for any reuse or distribution, it must be made clear to others what the license terms of this work are
Effect of Oral Nutritional Supplements with Sucromalt and Isomaltulose versus Standard Formula on Glycaemic Index, Entero-Insular Axis Peptides and Subjective Appetite in Patients with Type 2 Diabetes: A Randomised Cross-Over Study
Oral diabetes-specific nutritional supplements (ONS-D) induce favourable postprandial
responses in subjects with type 2 diabetes (DM2), but they have not been correlated yet with incretin
release and subjective appetite (SA). This randomised, double-blind, cross-over study compared
postprandial e ects of ONS-D with isomaltulose and sucromalt versus standard formula (ET) on
glycaemic index (GI), insulin, glucose-dependent insulinotropic polypeptide (GIP), glucagon-like
peptide 1 (GLP-1) and SA in 16 individuals with DM2. After overnight fasting, subjects consumed
a portion of supplements containing 25 g of carbohydrates or reference food. Blood samples were
collected at baseline and at 30, 60, 90, 120, 150 and 180 min; and SA sensations were assessed
by a visual analogue scale on separate days. Glycaemic index values were low for ONS-D and
intermediate for ET (p < 0.001). The insulin area under the curve (AUC0–180 min) (p < 0.02) and GIP
AUC (p < 0.02) were lower after ONS-D and higher GLP-1 AUC when compared with ET (p < 0.05).
Subjective appetite AUC was greater after ET than ONS-D (p < 0.05). Interactions between hormones,
hunger, fullness and GI were found, but not within the ratings of SA; isomaltulose and sucromalt
may have influenced these factor
Analyzing the influence of the sampling rate in the detection of malicious traffic on flow data
[EN] Cyberattacks are a growing concern for companies and public administrations. The literature shows that analyzing network-layer traffic can detect intrusion attempts. However, such detection usually implies studying every datagram in a computer network. Therefore, routers routing a significant volume of network traffic do not perform an in-depth analysis of every packet. Instead, they analyze traffic patterns based on network flows. However, even gathering and analyzing flow data has a high-computational cost, and therefore routers usually apply a sampling rate to generate flow data. Adjusting the sampling rate is a tricky problem. If the sampling rate is low, much information is lost and some cyberattacks may be neglected, but if the sampling rate is high, routers cannot deal with it. This paper tries to characterize the influence of this parameter in different detection methods based on machine learning. To do so, we trained and tested malicious-traffic detection models using synthetic flow data gathered with several sampling rates. Then, we double-check the above models with flow data from the public BoT-IoT dataset and with actual flow data collected on RedCAYLE, the Castilla y León regional academic network.S
SQL injection attack detection in network flow data
[EN] SQL injections rank in the OWASP Top 3. The literature shows that analyzing network datagrams allows for detecting or preventing such attacks. Unfortunately, such detection usually implies studying all packets flowing in a computer network. Therefore, routers in charge of routing significant traffic loads usually cannot apply the solutions proposed in the literature. This work demonstrates that detecting SQL injection attacks on flow data from lightweight protocols is possible. For this purpose, we gathered two datasets collecting flow data from several SQL injection attacks on the most popular database engines. After evaluating several machine learning-based algorithms, we get a detection rate of over 97% with a false alarm rate of less than 0.07% with a Logistic Regression-based model.SIInstituto Nacional de Ciberseguridad de España (INCIBE)Universidad de Leó
El procedimiento de liquidación oficiosa y su aplicación al impuesto sobre la renta como mecanismo de prevención y control de la evasión fiscal en El Salvador
En El Salvador existen rigurosos esfuerzos por parte de la Administración Tributaria, para prevenir y controlar la evasión fiscal, en esta ocasión nos ocupa la liquidación o determinación de oficio de los contribuyentes a quienes cometan conductas defraudatorias con la finalidad de no pagar el impuesto sobre la renta, es decir, no llevan a cabo la autoliquidación, que consiste en que el mismo contribuyente realiza el pago por medio de una declaración tributaria, sin la necesidad que el Ministerio de Hacienda intervenga. La consecuencia de no pagar impuestos, genera el desfinanciamiento del gasto público.
Es por ello, que se enfatiza como la Administración Tributaria aplica el procedimiento, su procedencia, métodos y efectos.
La evasión fiscal es un fenómeno que es causado por aspectos económicos y políticos, siendo importante combatir la evasión fiscal para el correcto funcionamiento de una economía moderna, constituyendo un reto indispensable, desde el punto de vista ético, jurídico, económico y social, pese a los errores de técnica legislativa que adolece la legislación salvadoreña, causando ambigüedades y contradicciones conceptuales en la regulación de la evasión fiscal.
Las operaciones fraudulentas más comunes de evasión fiscal son, la omisión de la declaración, uso de prestanombres, domicilio en el extranjero, paraísos fiscales, no facturación y doble facturación. La eficacia del procedimiento de liquidación de oficio es afectado por diferentes factores, como la falta de idoneidad de los empleados de la Administración Tributaria, es decir, la falta de formación profesional, lo que nos remite a la escases de capital humano, para la universalidad de contribuyentes generando excesiva carga laboral, falta de experiencia en el personal operativo, fallas en las estrategias de fiscalización y control, y la baja cultura tributaria
- …