341 research outputs found

    p53: A New Kingpin in the Stem Cell Arena

    Get PDF
    Identifying new regulators of the stem cell state offers potential for future gains in biomedicine. Evidence that the tumor suppressor p53 is a key regulator of the stem cell state (Cicalese et al., 2009) suggests a broad role for this protein and its pathways in the control of normal tissue homeostasis and tumor formation

    Proposing 3D Thermal Technology for Heritage Building Energy Monitoring

    Full text link
    [EN] The energy monitoring of heritage buildings has, to date, been governed by methodologies and standards that have been defined in terms of sensors that record scalar magnitudes and that are placed in specific positions in the scene, thus recording only some of the values sampled in that space. In this paper, however, we present an alternative to the aforementioned technologies in the form of new sensors based on 3D computer vision that are able to record dense thermal information in a three-dimensional space. These thermal computer vision-based technologies (3D-TCV) entail a revision and updating of the current building energy monitoring methodologies. This paper provides a detailed definition of the most significant aspects of this new extended methodology and presents a case study showing the potential of 3D-TCV techniques and how they may complement current techniques. The results obtained lead us to believe that 3D computer vision can provide the field of building monitoring with a decisive boost, particularly in the case of heritage buildingsThis research was funded by the European Regional Development Fund (SBPLY/19/180501/000094 project) and the Ministry of Science and Innovation (PID2019-108271RB-C31 and PID2019108271RB-C33).Adan, A.; Pérez, V.; Vivancos, J.; Aparicio Fernandez, CS.; Prieto, SA. (2021). Proposing 3D Thermal Technology for Heritage Building Energy Monitoring. Remote Sensing. 13(8):1-25. https://doi.org/10.3390/rs13081537S12513

    Evaluación de condiciones tecnológicas, legales y operativas para el diseño de un modelo de registro y ubicación de bicicletas para disminuir el robo en la ciudad de Bogotá

    Get PDF
    123 páginasEste trabajo se desarrolló pensando en contribuir desde la ingeniería a la solución de la problemática existente relacionada con el hurto de bicicletas y asalto a ciclistas en la ciudad de Bogotá y el impacto que este hecho genera al desestimular su uso masivo cotidiano como medio alternativo de transporte. Desde hace tiempo la ciudad ha hecho innumerables esfuerzos por lograr que la ciudadanía use este y otros medios de transporte con la finalidad de reducir la dependencia por el uso del vehículo particular, el cual ha generado graves problemas de movilidad y contaminación, se considera que el presente trabajo sirve para entender a fondo uno de los factores que ha impedido el avance de esta estrategia y a su vez dar luces acerca del papel de la tecnología y su posible implementación para resolverlo o mitigarlo. En el mismo sentido, Se presenta una propuesta de modelo, que integra tecnologías existentes y un proceso operativo entorno a la bicicleta que permite mitigar y controlar la inseguridad de las bicicletas en la ciudad de Bogotá

    Effect of Oral Nutritional Supplements with Sucromalt and Isomaltulose versus Standard Formula on Glycaemic Index, Entero-Insular Axis Peptides and Subjective Appetite in Patients with Type 2 Diabetes: A Randomised Cross-Over Study

    Get PDF
    Oral diabetes-specific nutritional supplements (ONS-D) induce favourable postprandial responses in subjects with type 2 diabetes (DM2), but they have not been correlated yet with incretin release and subjective appetite (SA). This randomised, double-blind, cross-over study compared postprandial e ects of ONS-D with isomaltulose and sucromalt versus standard formula (ET) on glycaemic index (GI), insulin, glucose-dependent insulinotropic polypeptide (GIP), glucagon-like peptide 1 (GLP-1) and SA in 16 individuals with DM2. After overnight fasting, subjects consumed a portion of supplements containing 25 g of carbohydrates or reference food. Blood samples were collected at baseline and at 30, 60, 90, 120, 150 and 180 min; and SA sensations were assessed by a visual analogue scale on separate days. Glycaemic index values were low for ONS-D and intermediate for ET (p < 0.001). The insulin area under the curve (AUC0–180 min) (p < 0.02) and GIP AUC (p < 0.02) were lower after ONS-D and higher GLP-1 AUC when compared with ET (p < 0.05). Subjective appetite AUC was greater after ET than ONS-D (p < 0.05). Interactions between hormones, hunger, fullness and GI were found, but not within the ratings of SA; isomaltulose and sucromalt may have influenced these factor

    Analyzing the influence of the sampling rate in the detection of malicious traffic on flow data

    Get PDF
    [EN] Cyberattacks are a growing concern for companies and public administrations. The literature shows that analyzing network-layer traffic can detect intrusion attempts. However, such detection usually implies studying every datagram in a computer network. Therefore, routers routing a significant volume of network traffic do not perform an in-depth analysis of every packet. Instead, they analyze traffic patterns based on network flows. However, even gathering and analyzing flow data has a high-computational cost, and therefore routers usually apply a sampling rate to generate flow data. Adjusting the sampling rate is a tricky problem. If the sampling rate is low, much information is lost and some cyberattacks may be neglected, but if the sampling rate is high, routers cannot deal with it. This paper tries to characterize the influence of this parameter in different detection methods based on machine learning. To do so, we trained and tested malicious-traffic detection models using synthetic flow data gathered with several sampling rates. Then, we double-check the above models with flow data from the public BoT-IoT dataset and with actual flow data collected on RedCAYLE, the Castilla y León regional academic network.S

    SQL injection attack detection in network flow data

    Get PDF
    [EN] SQL injections rank in the OWASP Top 3. The literature shows that analyzing network datagrams allows for detecting or preventing such attacks. Unfortunately, such detection usually implies studying all packets flowing in a computer network. Therefore, routers in charge of routing significant traffic loads usually cannot apply the solutions proposed in the literature. This work demonstrates that detecting SQL injection attacks on flow data from lightweight protocols is possible. For this purpose, we gathered two datasets collecting flow data from several SQL injection attacks on the most popular database engines. After evaluating several machine learning-based algorithms, we get a detection rate of over 97% with a false alarm rate of less than 0.07% with a Logistic Regression-based model.SIInstituto Nacional de Ciberseguridad de España (INCIBE)Universidad de Leó

    El procedimiento de liquidación oficiosa y su aplicación al impuesto sobre la renta como mecanismo de prevención y control de la evasión fiscal en El Salvador

    Get PDF
    En El Salvador existen rigurosos esfuerzos por parte de la Administración Tributaria, para prevenir y controlar la evasión fiscal, en esta ocasión nos ocupa la liquidación o determinación de oficio de los contribuyentes a quienes cometan conductas defraudatorias con la finalidad de no pagar el impuesto sobre la renta, es decir, no llevan a cabo la autoliquidación, que consiste en que el mismo contribuyente realiza el pago por medio de una declaración tributaria, sin la necesidad que el Ministerio de Hacienda intervenga. La consecuencia de no pagar impuestos, genera el desfinanciamiento del gasto público. Es por ello, que se enfatiza como la Administración Tributaria aplica el procedimiento, su procedencia, métodos y efectos. La evasión fiscal es un fenómeno que es causado por aspectos económicos y políticos, siendo importante combatir la evasión fiscal para el correcto funcionamiento de una economía moderna, constituyendo un reto indispensable, desde el punto de vista ético, jurídico, económico y social, pese a los errores de técnica legislativa que adolece la legislación salvadoreña, causando ambigüedades y contradicciones conceptuales en la regulación de la evasión fiscal. Las operaciones fraudulentas más comunes de evasión fiscal son, la omisión de la declaración, uso de prestanombres, domicilio en el extranjero, paraísos fiscales, no facturación y doble facturación. La eficacia del procedimiento de liquidación de oficio es afectado por diferentes factores, como la falta de idoneidad de los empleados de la Administración Tributaria, es decir, la falta de formación profesional, lo que nos remite a la escases de capital humano, para la universalidad de contribuyentes generando excesiva carga laboral, falta de experiencia en el personal operativo, fallas en las estrategias de fiscalización y control, y la baja cultura tributaria
    corecore