746 research outputs found
Feasibility study for the use of iophenoxic acid as a reference marker for plasma proteins Final report
Equilibrium dialysis experiments of human and bovine albumin with iophenoxic acid - feasibility of acid as reference marker for plasma protein
Εξέταση και αξιολόγηση τελικού προϊόντος προερχόμενο από κομποστοποίηση προδιαλεγμένων βιοαποβλήτων
Excited States of Nucleic Acids Probed by Proton Relaxation Dispersion NMR Spectroscopy
In this work an improved stable isotope labeling protocol for nucleic acids is introduced. The novel building blocks eliminate/minimize homonuclear 13C and 1H scalar couplings thus allowing proton relaxation dispersion (RD) experiments to report accurately on the chemical exchange of nucleic acids. Using site-specific 2H and 13C labeling, spin topologies are introduced into DNA and RNA that make 1H relaxation dispersion experiments applicable in a straightforward manner. The novel RNA/DNA building blocks were successfully incorporated into two nucleic acids. The A-site RNA was previously shown to undergo a two site exchange process in the micro- to millisecond time regime. Using proton relaxation dispersion experiments the exchange parameters determined earlier could be recapitulated, thus validating the proposed approach. We further investigated the dynamics of the cTAR DNA, a DNA transcript that is involved in the viral replication cycle of HIV-1. Again, an exchange process could be characterized and quantified. This shows the general applicablility of the novel labeling scheme for 1H RD experiments of nucleic acids
Strategies and challenges to facilitate situated learning in virtual worlds post-Second Life
Virtual worlds can establish a stimulating environment to support a situated learning approach in which students simulate a task within a safe environment. While in previous years Second Life played a major role in providing such a virtual environment, there are now more and more alternative—often OpenSim-based—solutions deployed within the educational community. By drawing parallels to social networks, we discuss two aspects: how to link individually hosted virtual worlds together in order to implement context for immersion and how to identify and avoid “fake” avatars so people behind these avatars can be held accountable for their actions
Recommended from our members
Reducing Third Parties in the Network through Client-Side Intelligence
The end-to-end argument describes the communication between a client and server using functionality that is located at the end points of a distributed system. From a security and privacy perspective, clients only need to trust the server they are trying to reach instead of intermediate system nodes and other third-party entities. Clients accessing the Internet today and more specifically the World Wide Web have to interact with a plethora of network entities for name resolution, traffic routing and content delivery. While individual communications with those entities may some times be end to end, from the user's perspective they are intermediaries the user has to trust in order to access the website behind a domain name. This complex interaction lacks transparency and control and expands the attack surface beyond the server clients are trying to reach directly. In this dissertation, we develop a set of novel design principles and architectures to reduce the number of third-party services and networks a client's traffic is exposed to when browsing the web. Our proposals bring additional intelligence to the client and can be adopted without changes to the third parties.
Websites can include content, such as images and iframes, located on third-party servers. Browsers loading an HTML page will contact these additional servers to satisfy external content dependencies. Such interaction has privacy implications because it includes context related to the user's browsing history. For example, the widespread adoption of "social plugins" enables the respective social networking services to track a growing part of its members' online activity. These plugins are commonly implemented as HTML iframes originating from the domain of the respective social network. They are embedded in sites users might visit, for instance to read the news or do shopping. Facebook's Like button is an example of a social plugin. While one could prevent the browser from connecting to third-party servers, it would break existing functionality and thus be unlikely to be widely adopted. We propose a novel design for privacy-preserving social plugins that decouples the retrieval of user-specific content from the loading of third-party content. Our approach can be adopted by web browsers without the need for server-side changes. Our design has the benefit of avoiding the transmission of user-identifying information to the third-party server while preserving the original functionality of the plugins.
In addition, we propose an architecture which reduces the networks involved when routing traffic to a website. Users then have to trust fewer organizations with their traffic. Such trust is necessary today because for example we observe that only 30% of popular web servers offer HTTPS. At the same time there is evidence that network adversaries carry out active and passive attacks against users. We argue that if end-to-end security with a server is not available the next best thing is a secure link to a network that is close to the server and will act as a gateway. Our approach identifies network vantage points in the cloud, enables a client to establish secure tunnels to them and intelligently routes traffic based on its destination. The proliferation of infrastructure-as-a-service platforms makes it practical for users to benefit from the cloud. We determine that our architecture is practical because our proposed use of the cloud aligns with existing ways end-user devices leverage it today. Users control both endpoints of the tunnel and do not depend on the cooperation of individual websites. We are thus able to eliminate third-party networks for 20% of popular web servers, reduce network paths to 1 hop for an additional 20% and shorten the rest.
We hypothesize that user privacy on the web can be improved in terms of transparency and control by reducing the systems and services that are indirectly and automatically involved. We also hypothesize that such reduction can be achieved unilaterally through client-side initiatives and without affecting the operation of individual websites
Estimación robusta de la diferencia del tiempo de tránsito del pulso sanguíneo a partir de señales fotopletismográficas
En el presente trabajo se va a estudiar la posibilidad de detectar estrés mental utilizando técnicas no invasivas basadas en la señal fotopletismográfica de pulso (PPG). Para ello se pretende detectar cambios en la velocidad de pulso arterial (PWV), utilizando señales de PPG tomadas en dos puntos distintos del árbol arterial con las que poder medir el tiempo de llegada de pulso arterial a la periferia (PAT) y la diferencia de ese tiempo de llegada entre dos puntos de la periferia distintos (PTTD). Tanto el PAT como el PTTD han sido propuestas en la bibliografía como medidas influenciados por el Tiempo de Tránsito de Pulso (PTT), este último capaz de medir cambios en la dinámica cardiovascular. Sin embargo, el PTTD, al contrario que el PAT, no necesita del electrocardiograma (ECG) para ser obtenido y no está influenciado por el periodo de pre-eyección (PEP) -un intervalo de tiempo en la sístole ventricular que cambia pulso a pulso- el cual genera que el PAT pierda la relación con el PTT, dos factores importantes que aventajan al PTTD frente al PAT. Primero, se estudia de fiabilidad de los puntos fiduciales para la detección de los pulsos de la señal PPG y con ésto comprobar cuál es el método con la mayor precisión. Se demuestra mediante diversos análisis que el mejor punto para detectar los pulsos corresponde al valor de la PPG en el instante de máxima pendiente (valor máximo en la primera derivada). Resulta necesario implementar un detector de artefactos ya que el método de adquisición de la PPG es muy sensible a ellos pudiendo llegar a haber segmentos en los que la señal registrada es absolutamente inutilizable. Posteriormente, se analizan 14 voluntarios sanos sometidos a un protocolo de estrés y se realiza un test estadístico para comprobar la validez del método propuesto. Los resultados muestran que la desviación estándar de la PTTD tiene la capacidad estadística suficiente como para discernir entre estados de estrés y de relajación, para cada uno de los sujetos por separado. Además, se puede ver una tendencia descendente generalizada del descenso de la PTTD en situación de estrés con respecto a relajación. %Sin embargo, resultará necesario repetir el análisis con una muestra de señales mayor ya que se dispone de pocos sujetos en la base de datos utilizada, ya que la calidad de la señal de PPG que se registró en la frente es muy mala y hay muy pocos sujetos con los que se puede computar la PTTD. A modo de conclusión, se ha visto que la PTTD contiene información fisiológica que puede ser interesante para la detección de estrés. A su vez, también es una técnica potencialmente interesante para otros tipos de aplicaciones clínicas tales como la estimación no invasiva de la presión arterial o la evaluación de la rigidez arterial, pero se necesita estudiar la adecuación de ésta en cada escenario en particular. Además, como la PTTD se puede medir a partir de únicamente dos señales PPG, la técnica es idónea para dispositivos wearable y smartphones
- …
