882 resultados para Google Cloud Functions,Serverless,Google Cloud
Resumo:
Las revistas académico-científicas son uno de los principales canales de comunicación y difusión de los resultados de investigación. Sin embargo no todas tienen el mismo prestigio y grado de influencia en la comunidad científica. De su calidad y visibilidad dependen, en gran medida, las posibilidades de que un trabajo sea conocido, leído y citado. Esta investigación se propone determinar la visibilidad en Google Scholar de un conjunto de revistas latinoamericanas de Bibliotecología y Ciencia de la Información, y clasificarlas según su grado de visibilidad. Utilizando la aplicación Publish or Perish para recuperar las citas de las revistas se calcularon indicadores basados en la citación. Se combinaron técnicas de análisis multivariado de datos para realizar agrupamientos de revistas según su grado de visibilidad, y se elaboraron representaciones gráficas que facilitan la interpretación de los resultados y la identificación de los grupos de revistas con alta, media y baja visibilidad
Resumo:
Con unos días de diferencia las Salas de lo Civil y de lo Contencioso-Administrativo del Tribunal Supremo han realizado interpretaciones contradictorias del concepto de “responsable del tratamiento de datos personales” y su aplicación con respecto a la responsabilidad –civil y administrativa- derivada del incumplimiento de la legislación de datos personales por el buscador Google. Semejante resultado pone en riesgo la exigencia de interpretación uniforme de ese concepto autónomo de gran importancia en el Derecho de la UE en materia de protección de datos personales.
Resumo:
We present NH_3(1,1) and (2,2) observations of MBM 12, the closest known molecular cloud (65-pc distance), aimed at finding evidence for on-going star formation processes, No local temperature (with a T_rot upper limit of 12 K) or linewidth enhancement is found, which suggests that the area of the cloud that we have mapped (∼ 15-arcmin size) is not currently forming stars. Therefore this nearby 'starless' molecular gas region is an ideal laboratory to study the physical conditions preceding new star formation. A radio continuum source has been found in Very Large Array archive data, close to but outside the NH_3 emission. This source is likely to be a background object.
Resumo:
Cloud Agile Manufacturing is a new paradigm proposed in this article. The main objective of Cloud Agile Manufacturing is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge — or at least without having to be experts — in managing the required resources. The proposal takes advantage of many of the benefits that can offer technologies and models like: Business Process Management (BPM), Cloud Computing, Service Oriented Architectures (SOA) and Ontologies. To develop the proposal has been taken as a starting point the Semantic Industrial Machinery as a Service (SIMaaS) proposed in previous work. This proposal facilitates the effective integration of industrial machinery in a computing environment, offering it as a network service. The work also includes an analysis of the benefits and disadvantages of the proposal.
Resumo:
This paper proposes a new manufacturing paradigm, we call Cloud Agile Manufacturing, and whose principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge — or at least without having to be experts — in managing the required resources. The proposal takes advantage of many of the benefits that can offer technologies and models like: Business Process Management (BPM), Cloud Computing, Service Oriented Architectures (SOA) and Ontologies. To develop the proposal has been taken as a starting point the Semantic Industrial Machinery as a Service (SIMaaS) proposed in previous work. This proposal facilitates the effective integration of industrial machinery in a computing environment, offering it as a network service. The work also includes an analysis of the benefits and disadvantages of the proposal.
Resumo:
Fundamentos: Geocodificar es asignar coordenadas geográficas a puntos del espacio, frecuentemente direcciones postales. El error cometido al aplicar este proceso puede introducir un sesgo en las estimaciones de modelos espacio-temporales en estudios epidemiológicos. No se han encontrado estudios que midan este error en ciudades españolas. El objetivo es evaluar los errores en magnitud y direccionalidad de dos recursos gratuitos (Google y Yahoo) respecto a GPS en dos ciudades de España. Método: Se geocodificaron 30 direcciones aleatorias con los dos recursos citados y con GPS en Santa Pola (Alicante) y en Alicante. Se calculó la mediana y su IC95% del error en metros entre los recursos y GPS, para el total y por el status reportado. Se evaluó la direccionalidad del error calculando el cuadrante de localización y aplicando un test Chi-Cuadrado. Se evaluó el error del GPS midiendo 11 direcciones dos veces en un intervalo de 4 días. Resultados: La mediana del error total desde Google-GPS fue de 23,2 metros (16,0-32,2) para Santa Pola y 21,4 metros (14,9-31,1) en Alicante. Para Yahoo fue de 136,0 (19,2-318,5) para Santa Pola y 23,8 (13,6-29,2) para Alicante. Por status, se geocodificó entre un 73% y 90% como ‘exactas o interpoladas’ (menor error), tanto Google como Yahoo tuvieron una mediana del error de entre 19 y 22 metros en las dos ciudades. El error del GPS fue de 13,8 (6,7-17,8) metros. No se detectó direccionalidad. Conclusiones: El error de Google es asumible y estable en las dos ciudades, siendo un recurso fiable para geocodificar direcciones postales en España en estudios epidemiológicos.
Resumo:
The use of 3D data in mobile robotics applications provides valuable information about the robot’s environment but usually the huge amount of 3D information is unmanageable by the robot storage and computing capabilities. A data compression is necessary to store and manage this information but preserving as much information as possible. In this paper, we propose a 3D lossy compression system based on plane extraction which represent the points of each scene plane as a Delaunay triangulation and a set of points/area information. The compression system can be customized to achieve different data compression or accuracy ratios. It also supports a color segmentation stage to preserve original scene color information and provides a realistic scene reconstruction. The design of the method provides a fast scene reconstruction useful for further visualization or processing tasks.
Resumo:
These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.
Resumo:
El sistema tradicional de evaluación continua implica asumir, en muchas ocasiones, algunas dificultades en cuanto al seguimiento y valoración del trabajo del alumnado. La existencia de grupos numerosos y la necesidad de agilizar la comunicación profesor-alumno y entre alumnos, nos lleva a investigar las posibilidades que ofrecen las nuevas tecnologías con el fin de actualizar los métodos de aprendizaje y facilitar la valoración del trabajo de los alumnos dentro y fuera del aula. La presente experiencia docente se centra en estudiar las posibilidades que ofrece Google, a través de distintas aplicaciones web o Apps -Groups, Forms, Drive, Mail y Calendar- e incorporarlas como herramientas integradas en el trabajo del aula. Concretamente, se aplica simultáneamente esta metodología a dos asignaturas diferentes del área de Urbanística y Ordenación del Territorio -Urbanismo 2 y Urbanismo 4- en las que se integra al alumnado en un grupo virtual a través del cual, se realizan distintas actividades -resolución de dudas, intercambio de información, exámenes, etc.- que permiten al profesor gestionar y evaluar, de forma eficiente, cuestiones como la asistencia y la participación en la asignatura conociendo de forma inmediata la respuesta de los estudiantes ante los conceptos trabajados.
Resumo:
The development of applications as well as the services for mobile systems faces a varied range of devices with very heterogeneous capabilities whose response times are difficult to predict. The research described in this work aims to respond to this issue by developing a computational model that formalizes the problem and that defines adjusting computing methods. The described proposal combines imprecise computing strategies with cloud computing paradigms in order to provide flexible implementation frameworks for embedded or mobile devices. As a result, the imprecise computation scheduling method on the workload of the embedded system is the solution to move computing to the cloud according to the priority and response time of the tasks to be executed and hereby be able to meet productivity and quality of desired services. A technique to estimate network delays and to schedule more accurately tasks is illustrated in this paper. An application example in which this technique is experimented in running contexts with heterogeneous work loading for checking the validity of the proposed model is described.
Resumo:
Uno de los aspectos peor valorados por los estudiantes de las nuevas titulaciones de grado es la coordinación entre asignaturas del mismo curso en cuanto a la distribución de controles y otro tipo de pruebas objetivas a lo largo del cuatrimestre, que afecta a la carga de trabajo no presencial en determinados momentos. En la guía docente de cada asignatura aparece la información sobre las pruebas a realizar dentro de un cronograma aproximado por semanas, y está disponible antes del comienzo del curso. Sin embargo, esa distribución puede variar ligeramente una vez empezado el curso debido a diversos motivos, y no se dispone de la información para todas las asignaturas del cuatrimestre en un mismo documento, lo que facilitaría su visualización. En este trabajo se propone el uso de la herramienta Google Calendar con el objetivo de tener un mayor control de este aspecto y poder detectar y corregir conflictos que puedan surgir, aplicándolo al Grado en Ingeniería Química.
Resumo:
Se realizó una experiencia con los futuros maestros del Grado de Magisterio con el doble objetivo de que investigaran sobre las rutas más importantes de la Historia usando la cartografía y localización que permite Google Earth, así como la biografía de los personajes que las llevaron a cabo. El instrumento-juego utilizado fue una yincana a través del globo terráqueo. Los resultados fueron muy alentadores en cuanto a motivación y aprendizajes.
Resumo:
In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.
Resumo:
Countless bilateral disputes continue to plague the Balkan region; daily reminders of the region's troubled history. Not only are they the cause of tension between the countries of the region both inside and outside the EU, they also undermine efforts to integrate the region into the EU. To avoid the risk of instability and further erosion of the credibility of the EU's enlargement strategy, urgent action is required. The author sets out four recommendations for the EU to pursue without delay.