Search results for "Defence"
showing 10 items of 472 documents
ES1D: A Deep Network for EEG-Based Subject Identification
2017
Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…
2018
Physical fitness is crucial to warfighters' performance in the battlefield. Previous studies have shown negative changes in their hormonal and neuromuscular responses induced by military field training (MFT). The purpose of this study was to investigate the changes in hormonal and immunological values and body composition during a prolonged MFT and to find out how warfighters' physical condition influences these changes. Conscripts (n = 49, age 20 ± 1 years, height 179 ± 9 cm, body mass 73.8 ± 7.8 kg, fat 12.6 ± 3.7% and BMI 23 kg/m²) were measured before, during, after MFT, and after a 4-day recovery period. Serum insulin-like growth factor-1 (IGF-1), tumor necrosis factor alpha (TNF-α), i…
Towards a Security Competence of Software Developers
2020
Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
From “Mano Dura” to “Enfrentamiento Directo”: swings of public policies in El Salvador
2019
RESUMEN Introduccion: El presente trabajo analiza las cuatro principales politicas publicas de seguridad contra las pandillas en El Salvador: Mano Dura (2003-2004), Super Mano Dura (2004-2009), Tregua entre pandillas (2012-2014) y Enfrentamiento Directo (2014-2019). El objetivo es identificar la influencia de estas politicas sobre la violencia. Materiales y Metodos: Se trata de una investigacion cualitativa apoyada en 12 entrevistas y el relato de vida con las que se explora la responsabilidad gubernamental frente al problema de la violencia en El Salvador. El trabajo de campo se efectuo durante 7 meses, entre septiembre de 2016 y marzo de 2017. El tratamiento de la informacion se efectuo m…
Ecological and genomic features of two widespread freshwater picocyanobacteria
2018
We present two genomes of widespread freshwater picocyanobacteria isolated by extinction dilution from a Spanish oligotrophic reservoir. Based on microscopy and genomic properties, both picocyanobacteria were tentatively designated Synechococcus lacustris Tous, formerly described as a metagenome assembled genome (MAG) from the same habitat, and Cyanobium usitatum Tous, described here for the first time. Both strains were purified in unicyanobacterial cultures, and their genomes were sequenced. They are broadly distributed in freshwater systems; the first seems to be a specialist on temperate reservoirs (Tous, Amadorio, Dexter, Lake Lanier, Sparkling), and the second appears to also be abund…
Non-canonical regulation of glutathione and trehalose biosynthesis characterizes non-Saccharomyces wine yeasts with poor performance in active dry ye…
2018
Several yeast species, belonging to Saccharomyces and non-Saccharomyces genera, play fundamental roles during spontaneous must grape fermentation, and recent studies have shown that mixed fermentations, co-inoculated with S. cerevisiae and non-Saccharomyces strains, can improve wine organoleptic properties. During active dry yeast (ADY) production, antioxidant systems play an essential role in yeast survival and vitality as both biomass propagation and dehydration cause cellular oxidative stress and negatively affect technological performance. Mechanisms for adaptation and resistance to desiccation have been described for S. cerevisiae, but no data are available on the physiology and oxidat…
Ancient Immunity. Phylogenetic Emergence of Recognition-Defense Mechanisms.
2021
Although still scarcely considered by the majority of the biomedical world, invertebrates have greatly contributed to the elucidation of fundamental biological problems [...]
ESMO consensus guidelines for the management of patients with metastatic colorectal cancer
2016
Contains fulltext : 165965.pdf (Publisher’s version ) (Closed access) Colorectal cancer (CRC) is one of the most common malignancies in Western countries. Over the last 20 years, and the last decade in particular, the clinical outcome for patients with metastatic CRC (mCRC) has improved greatly due not only to an increase in the number of patients being referred for and undergoing surgical resection of their localised metastatic disease but also to a more strategic approach to the delivery of systemic therapy and an expansion in the use of ablative techniques. This reflects the increase in the number of patients that are being managed within a multidisciplinary team environment and speciali…
Development of an RNA-based kit for easy generation of TCR-engineered lymphocytes to control T-cell assay performance.
2018
Cell-based assays to monitor antigen-specific T-cell responses are characterized by their high complexity and should be conducted under controlled conditions to lower multiple possible sources of assay variation. However, the lack of standard reagents makes it difficult to directly compare results generated in one lab over time and across institutions. Therefore TCR-engineered reference samples (TERS) that contain a defined number of antigen-specific T cells and continuously deliver stable results are urgently needed. We successfully established a simple and robust TERS technology that constitutes a useful tool to overcome this issue for commonly used T-cell immuno-assays. To enable users t…