Journal articles on the topic 'Proofs of Retrievability (POR)'

To see the other types of publications on this topic, follow the link: Proofs of Retrievability (POR).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 44 journal articles for your research on the topic 'Proofs of Retrievability (POR).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lavauzelle, Julien, and Françoise Levy-dit-Vehel. "Generic constructions of PoRs from codes and instantiations." Journal of Mathematical Cryptology 13, no. 2 (June 1, 2019): 81–106. http://dx.doi.org/10.1515/jmc-2018-0018.

Full text
Abstract:
Abstract In this paper, we show how to construct – from any linear code – a Proof of Retrievability ( {\mathsf{PoR}} ) which features very low computation complexity on both the client ( {\mathsf{Verifier}} ) and the server ( {\mathsf{Prover}} ) sides, as well as small client storage (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [PoRs: Proofs of retrievability for large files, Proceedings of the 2007 ACM Conference on Computer and Communications Security—CCS 2007, ACM, New York 2007, 584–597] to fit into the framework of Paterson, Stinson and Upadhyay [A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage, J. Math. Cryptol. 7 2013, 3, 183–216], from which our construction evolves. We thus provide a rigorous treatment of the security of our generic design; more precisely, we sharply bound the extraction failure of our protocol according to this security model. Next we instantiate our formal construction with codes built from tensor-products as well as with Reed–Muller codes and lifted codes, yielding {\mathsf{PoR}} s with moderate communication complexity and (server) storage overhead, in addition to the aforementioned features.
APA, Harvard, Vancouver, ISO, and other styles
2

Paterson, Maura B., Douglas R. Stinson, and Jalaj Upadhyay. "Multi-prover proof of retrievability." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 203–20. http://dx.doi.org/10.1515/jmc-2018-0012.

Full text
Abstract:
Abstract There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover the file given any “proving algorithm” that has a sufficiently high success probability. This forms the basis of proof-of-retrievability (PoR) systems. In this paper, we study multiple server PoR systems. We formalize security definitions for two possible scenarios: (i) A threshold of servers succeeds with high enough probability (worst case), and (ii) the average of the success probability of all the servers is above a threshold (average case). We also motivate the study of confidentiality of the outsourced message. We give MPoR schemes which are secure under both these security definitions and provide reasonable confidentiality guarantees even when there is no restriction on the computational power of the servers. We also show how classical statistical techniques previously used by us can be extended to evaluate whether the responses of the provers are accurate enough to permit successful extraction. We also look at one specific instantiation of our construction when instantiated with the unconditionally secure version of the Shacham–Waters scheme. This scheme gives reasonable security and privacy guarantee. We show that, in the multi-server setting with computationally unbounded provers, one can overcome the limitation that the verifier needs to store as much secret information as the provers.
APA, Harvard, Vancouver, ISO, and other styles
3

Omote, Kazumasa, and Tran Phuong Thao. "MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability." International Journal of Distributed Sensor Networks 11, no. 6 (January 2015): 586720. http://dx.doi.org/10.1155/2015/586720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.

Full text
Abstract:
Data owners outsource their data to remote storage providers without keeping local replicas to save their precious storage resources. However, the ownership and management of data are separated after outsourcing. How to ensure the integrity and recoverability of outsourced data becomes a significant problem. Provable Data Possession (PDP) and Proofs of Retrievability (POR) are two cryptographic protocols that enable users to verify the integrity of outsourced data. Nevertheless, the state-of-the-art PDP and POR schemes either need users to perform the complicated audit tasks by themselves or delegate these tasks to a Third-Party Auditor (TPA). Moreover, these schemes are constructed on a centralized storage framework which vulnerably suffers single-point-of-failure. In this paper, we propose a blockchain-based decentralized self-auditing scheme with batch verification. Firstly, data owners outsource their data to decentralized storage nodes, which can achieve self-auditing based on blockchain without TPA. Secondly, our scheme uses Pedersen-based polynomial commitment to significantly reduce the number of authenticators. Furthermore, we propose a batch verification algorithm, which can verify multiple proofs from different storage nodes to improve the verification efficiency. Finally, we analyze the security of our scheme and implement a gas-efficient system prototype using the smart contracts of the Ethereum Reposten test network. The results demonstrate that the scheme is practical.
APA, Harvard, Vancouver, ISO, and other styles
5

Lei, Ming Yue, Zheng Huang, Qiao Yan Wen, and Chun Ye Hu. "A Secure Cloud Computing Scaling Model." Applied Mechanics and Materials 411-414 (September 2013): 60–66. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.60.

Full text
Abstract:
Since many Internet enterprises employ the computing resources provided by Cloud Service Provider (CSP), how to dynamically adjust the number of rented servers and improve service quality becomes a crucial subject. A lot of efforts have been made to achieve intelligent energy saving capacity adjustment but scarcely any of them takes the security issue of cloud data into account. In this paper, we focus on the cloud storage security in the cloud computing capacity scaling. We design the security part of the whole model based on the idea of Proofs of Retrievability (POR). In the scaling part of the model, we determine the scaling strategy according to email server instances CPU utilization. With simulation and performance evaluation, we conclude that the designed model is able to enable verifier to check the integrity of the information in the cloud storage and maintain satisfied response time target within Service Level Agreement (SLA).
APA, Harvard, Vancouver, ISO, and other styles
6

OMOTE, Kazumasa, and Phuong-Thao TRAN. "D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 816–29. http://dx.doi.org/10.1587/transinf.2015icp0014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jian Hong, and Wen Jing Tang. "Security Analysis on a Public POR Scheme in Cloud Storage." Applied Mechanics and Materials 556-562 (May 2014): 5395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5395.

Full text
Abstract:
Data integrity is one of the biggest concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. Recently, a proof-of-retrievability scheme proposed by Yuan et al. has addressed the issue, and security proof of the scheme was provided. Unfortunately, in this work we show that the scheme is insecure. Namely, the cloud server who maliciously modifies the data file can pass the verification, and the client who executes the cloud storage auditing can recover the whole data file through the interactive process. Furthermore, we also show that the protocol is vulnerable to an efficient active attack, which means that the active attacker is able to arbitrarily modify the cloud data without being detected by the auditor in the auditing process. After giving the corresponding attacks to Yuan et al.’s scheme, we suggest a solution to fix the problems.
APA, Harvard, Vancouver, ISO, and other styles
8

Alomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (January 27, 2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.

Full text
Abstract:
The auditing services of the outsourced data, especially big data, have been an active research area recently. Many schemes of remotely data auditing (RDA) have been proposed. Both categories of RDA, which are Provable Data Possession (PDP) and Proof of Retrievability (PoR), mostly represent the core schemes for most researchers to derive new schemes that support additional capabilities such as batch and dynamic auditing. In this paper, we choose the most popular PDP schemes to be investigated due to the existence of many PDP techniques which are further improved to achieve efficient integrity verification. We firstly review the work of literature to form the required knowledge about the auditing services and related schemes. Secondly, we specify a methodology to be adhered to attain the research goals. Then, we define each selected PDP scheme and the auditing properties to be used to compare between the chosen schemes. Therefore, we decide, if possible, which scheme is optimal in handling big data auditing.
APA, Harvard, Vancouver, ISO, and other styles
9

Shacham, Hovav, and Brent Waters. "Compact Proofs of Retrievability." Journal of Cryptology 26, no. 3 (September 1, 2012): 442–83. http://dx.doi.org/10.1007/s00145-012-9129-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Yan, HuaiXi Wang, ZeXing Hu, Gail-Joon Ahn, and HongXin Hu. "Zero-knowledge proofs of retrievability." Science China Information Sciences 54, no. 8 (May 30, 2011): 1608–17. http://dx.doi.org/10.1007/s11432-011-4293-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cash, David, Alptekin Küpçü, and Daniel Wichs. "Dynamic Proofs of Retrievability Via Oblivious RAM." Journal of Cryptology 30, no. 1 (September 22, 2015): 22–57. http://dx.doi.org/10.1007/s00145-015-9216-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Xiao, Shengli Liu, and Shuai Han. "Proofs of retrievability from linearly homomorphic structure-preserving signatures." International Journal of Information and Computer Security 11, no. 2 (2019): 178. http://dx.doi.org/10.1504/ijics.2019.098205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Han, Shuai, Shengli Liu, and Xiao Zhang. "Proofs of retrievability from linearly homomorphic structure-preserving signatures." International Journal of Information and Computer Security 11, no. 2 (2019): 178. http://dx.doi.org/10.1504/ijics.2019.10018857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ren, Zhengwei, Lina Wang, Qian Wang, and Mingdi Xu. "Dynamic Proofs of Retrievability for Coded Cloud Storage Systems." IEEE Transactions on Services Computing 11, no. 4 (July 1, 2018): 685–98. http://dx.doi.org/10.1109/tsc.2015.2481880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Song, Xiuli, and Hongyao Deng. "Lightweight Proofs of Retrievability for Electronic Evidence in Cloud." Information 4, no. 3 (July 5, 2013): 262–82. http://dx.doi.org/10.3390/info4030262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Xu, Jian, Fucai Zhou, Zhihao Jiang, and Rui Xue. "Dynamic proofs of retrievability with square-root oblivious RAM." Journal of Ambient Intelligence and Humanized Computing 7, no. 5 (February 22, 2015): 611–21. http://dx.doi.org/10.1007/s12652-015-0258-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Yuan, Jiawei, and Shucheng Yu. "PCPOR: Public and constant-cost proofs of retrievability in cloud1." Journal of Computer Security 23, no. 3 (July 2, 2015): 403–25. http://dx.doi.org/10.3233/jcs-150525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Baoyu An, Liang Zhou, Zhe Gong, Da Xiao, Yixian Yang, and Guosheng Xu. "Light-weight Proofs of Retrievability in Cloud Archive Storage with Replications." International Journal of Digital Content Technology and its Applications 6, no. 10 (June 30, 2012): 127–35. http://dx.doi.org/10.4156/jdcta.vol6.issue10.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Dian, Haobo Yuan, Shengshan Hu, Qian Wang, and Cong Wang. "BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication." IEEE Transactions on Parallel and Distributed Systems 32, no. 4 (April 1, 2021): 786–98. http://dx.doi.org/10.1109/tpds.2020.3030063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sengupta, Binanda, and Sushmita Ruj. "Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage." IEEE Transactions on Cloud Computing 8, no. 1 (January 1, 2020): 138–51. http://dx.doi.org/10.1109/tcc.2017.2767584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Xu, Jian, Zhihao Jiang, Andi Wang, and Chen Wang and Fucai Zhou. "Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM." Computers, Materials & Continua 57, no. 3 (2018): 589–602. http://dx.doi.org/10.32604/cmc.2018.03820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.

Full text
Abstract:
Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA). However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR) have been proposed to further protect against the malicious TPA and collusion among any two entities, the original OPOR scheme applies only to the static data, which is the limitation that should be solved for enabling data dynamics. In this paper, we design a novel authenticated data structure called bv23Tree, which enables client to batch-verify the indices and values of any number of appointed leaves all at once for efficiency. By utilizing bv23Tree and a hierarchical storage structure, we present the first solution for Dynamic OPOR (DOPOR), which extends the OPOR model to support dynamic updates of the outsourced data. Extensive security and performance analyses show the reliability and effectiveness of our proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

Guo, Wei, Sujuan Qin, Jun Lu, Fei Gao, Zhengping Jin, and Qiaoyan Wen. "Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage." Computer Journal 63, no. 8 (January 2, 2020): 1216–30. http://dx.doi.org/10.1093/comjnl/bxz151.

Full text
Abstract:
Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.
APA, Harvard, Vancouver, ISO, and other styles
24

Gritti, Clémentine, and Hao Li. "Efficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage." Advances in Science, Technology and Engineering Systems Journal 7, no. 1 (February 2022): 107–24. http://dx.doi.org/10.25046/aj070111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wood, Gareth. "How to Interpret Galdós’s Tormento? What the Galley Proofs Tell Us." Revista Canadiense de Estudios Hispánicos 39, no. 3 (April 7, 2015): 695–718. http://dx.doi.org/10.18192/rceh.v39i3.1637.

Full text
Abstract:
A lo largo de los últimos sesenta años los críticos de Galdós han mantenido una discusión sobre cómo interpretar la novela Tormento. Por un lado, algunos estudiosos han sostenido que ésta narra la historia de una mujer perspicaz, seductora y egoísta que consigue hacerse de forma deshonesta con un marido riquísimo pero ingenuo. Por otro lado, hay estudiosos de la novela que han argumentado que su protagonista, Amparo Sánchez Calderón, es la víctima de una sociedad cruel e injusta que logra salvarse milagrosamente de un futuro empobrecido. Hasta la fecha y pese a la existencia de varias ediciones críticas de Tormento no se han mirado las pruebas de imprenta de la novela para determinar si ofrecen pruebas a favor o en contra de una interpretación u otra. Por lo tanto, en este trabajo se argumenta que los cambios que el propio autor incorporó a su texto a la hora de corregir las pruebas de imprenta demuestran de forma significativa que Galdós no veía en su protagonista a una mujer interesada e inmoral, sino todo lo contrario.
APA, Harvard, Vancouver, ISO, and other styles
26

Ducuara Nieto, Jeisson Alberto. "“La única libertad que tienen estos infelices es la de solicitar amo”. Esclavos y justicia en Ibagué 1750-1810." Revista Grafía- Cuaderno de trabajo de los profesores de la Facultad de Ciencias Humanas. Universidad Autónoma de Colombia 13, no. 2 (July 20, 2016): 29. http://dx.doi.org/10.26564/16926250.670.

Full text
Abstract:
ResumenEste artículo analiza el uso del sistema jurídico judicial por parte de los esclavos de la ciudad de Ibagué como estrategia para cambiar de amo en el período comprendido de 1750-1810. Igualmente, presenta las posibilidades que la legislación les brindaba a los esclavos para defenderse y hace una breve descripción de los oficios en los que se les utilizaba. En este sentido se entiende que los esclavos usaban de manera oportuna argumentos, pruebas y testigos, lo que les permitió fortalecer su demanda. Este trabajo se realiza tomando como referencia las peticiones judiciales interpuestas por esclavos en el Cabildo local y en la Real Audiencia.Palabras clave: Esclavos, justicia, ley, cultura judicial, resistencia. **********************************************************************“The only freedom these miserable people have is to ask for a master”. Slaves and justice in Ibague 1750-1810AbstractThis article provides an analysis of the use of the legal judicial system by slaves at Ibague City as a strategy to change their masters between 1750-1810. It also presents the possibilities that legislation made available for the slaves to defend themselves, and offers a brief description of the trades in which they were used. In this sense, it is understood that slaves used opportunely arguments, proofs and witnesses, which allowed them to strengthen their demand. This work uses as a reference judicial petitions brought by slaves at the town council and at the Royal Audience.Key words: Slaves, justice, law, judicial culture, resistance.**********************************************************************“A única liberdade que os infelizes têm é solicitar amo”. Escravos e justiça em Ibague, 1750-1810ResumoEste artigo faz análise das estratégias usadas pelos escravos para mudar de amo por meio do sistema jurídico judicial na cidade de Ibagué, no período de 1750-1810. Assim, o texto apresenta as possibilidades de defesa dos escravos oferecidas pela legislação e descreve os ofícios que estavam obrigados a realizar. Graças ao aproveitamento desta legislação a través do uso oportuno de argumentos, provas e testemunhas, a demanda dos escravos foi aumentando. Este trabalho foi realizado pegando como referência as petições judiciais impostas pelos escravos no Cabildo Local e na Real Audiencia.Palavras Chave: Escravos, justiça, lei, cultura judicial, resistência
APA, Harvard, Vancouver, ISO, and other styles
27

Carvalho, Alexandre Filordi de, and Silvio Gallo. "É preciso defender a amizade." Educação e Filosofia 36, no. 78 (January 4, 2023): 1763–97. http://dx.doi.org/10.14393/revedfil.v36n78a2022-66281.

Full text
Abstract:
Este artigo homenageia a atualidade do curso A hermenêutica do sujeito, proferido por Foucault no Collège de France em 1982. Sabe-se que o tema central do curso é o cuidado de si como tekhné tou biou, examinado pelo filósofo nos momentos socrático-platônico, helenístico e cristão. Porém, tomaremos a questão da amizade, que atravessa as técnicas de si antigas analisadas por Foucault, para problematizar nosso presente. Após discutir a recepção que fazemos do curso quarenta anos depois, discutimos o atual momento do neoliberalismo e as políticas de inimizade por ele engendradas, de modo a pensar a prática da amizade como contraconduta, como prática de resistência. A amizade anarquista como forma de associação é tomada como máquina de guerra possível contra as atuais políticas de inimizade neoliberais. Palavras-chave: amizade; técnicas de si; ética; política; anarquismo. In defense of friendship: life’s proofs in the subjecvity wars of the contemporary enmity policies Abstract: This article pays homage to the actuality of the course The hermeneutics of the subject, given by Foucault at the Collège de France in 1982. It is known that the central theme of the course is the care of the self as tekhné tou biou, examined by the philosopher in three moments: Socratic-Platonic, Hellenistic, and Christian. However, we will take the question of friendship, which crosses the ancient techniques of the self analyzed by Foucault, to problematize our present. After discussing our reception of the course forty years later, we discuss the current moment of neoliberalism and the enmity policies engendered by it, in order to think about the practice of friendship as a counter-conduct, as a practice of resistance. Anarchist friendship as a form of association is taken as a possible war machine against current neoliberal policies of enmity. Key words: friendship; techniques of the self; ethics; politics; anarchism. En defensa de la amistad: pruebas de vida en las guerras de subjetividad de las políticas de enemistad contemporáneas Resumen: En este artículo prestamos homenaje a la actualidad del curso La hermenéutica del sujeto, presentado por Foucault en 1982 en el Collège de France. Se sabe que el tema que es el centro del curso ha sido la inquietud de sí como tekhné tou biou, examinada por el filósofo en tres momentos de la antigüedad: el socrático-platónico, el helenístico y el cristiano. Aún así, tomamos la cuestión de la amistad, que es transversal a las técnicas de sí antiguas analizadas por Foucault, para problematizar nuestro tiempo presente. Después de discutir la recepción que nosotros hacemos del curso cuarenta años más tarde, ponemos en debate el momento actual del neoliberalismo y sus políticas de enemistad, de manera a pensar la práctica de la amistad como contra conducta, como práctica de resistencia. Tomamos la amistad anarquista como como forma de asociación como posible maquina de guerra contra las políticas de enemistad neoliberales actuales. Palabras clave: amistad; técnicas de sí; ética; política; anarquismo Data de registro: 10/07/2022 Data de aceite: 26/10/2022
APA, Harvard, Vancouver, ISO, and other styles
28

Solaguren-Beascoa Fernández, Manuel, and Laura Moreno Delgado. "Las tutorías académicas en carreras de ingeniería: una visión actual." Revista de Investigación Educativa 37, no. 1 (December 31, 2018): 251–67. http://dx.doi.org/10.6018/rie.37.1.320931.

Full text
Abstract:
En las asignaturas de carreras de ingeniería, en las que abundan los contenidos técnicos, las tutorías académicas suponen una importante herramienta de enseñanza/aprendizaje a menudo infrautilizada. El objetivo del presente trabajo es analizar los diferentes factores que influyen en el aprovechamiento de las tutorías. Para ello se aplicó un cuestionario sobre una muestra de estudiantes de distintas titulaciones técnicas de la Universidad de Burgos. En él se recogía información sobre el perfil del alumnado, la frecuencia y número de asignaturas a las que habían acudido a tutorías, factores que influyen en ésta relativos a las asignaturas, al docente o a otras causas, y contenía, asimismo, una escala de actitudes hacia las tutorías. El estudio muestra que la asistencia a tutorías se ve fuertemente influenciada por la carga de trabajo del estudiante, por la dificultad del contenido de cada asignatura, por la abundancia de pruebas de evaluación y por las capacidades docentes y personales del profesorado. Muestra asimismo un alumnado seguro pero desmotivado/desinteresado: es el alumnado más joven el que presenta inseguridad a la hora de acudir a tutorías, la cual vencen acudiendo en grupo; mientras que la desmotivación o falta de interés es general, y es el pragmatismo de aprobar sus estudios el que guía las acciones de los estudiantes. Como acciones de mejora se propone la potenciación de habilidades sociales específicas en el profesorado, así como el desarrollo de actividades de seguimiento/evaluación que fomenten el compromiso de los estudiantes con su devenir académico y su futuro profesional. In the subjects of engineering degrees, with abundant technical content, academic tutoring is an important tool for the teaching/learning process that is often considered underutilized. The aim of this paper is to analyze the different factors that influence the use of tutoring. To do this, a questionnaire was applied to a sample of students from technical careers at the University of Burgos. It provided information on the profile of students, the frequency and number of subjects where they went for tutoring, factors influencing tutoring relative to the subjects, the teacher or other causes, and it also contained an attitude scale towards tutoring.The study shows that attendance to tutoring sessions is strongly influenced by the student workload, by the difficulty of each subject, by the frequency of evaluation proofs, and by personal and teaching competencies of the teacher. It also shows that students are secure with tutoring, but unmotivated and uninterested. The youngest students present insecurity when attending tutoring, which they overcome by being accompanied. Meanwhile, the lack of motivation or lack of interest is general and it is the pragmatism of approving their studies which guides the actions of the students. To improve this, it is proposed to enhance specific social skills within the teaching staff or the development of monitoring/evaluation activities that promote student engagement in their academic evolution and in their professional future.
APA, Harvard, Vancouver, ISO, and other styles
29

Cruz, Willian José. "A Hipótese dos Experimentos Mentais na Construção de Conceitos em Matemática." Jornal Internacional de Estudos em Educação Matemática 11, no. 2 (June 30, 2018): 104. http://dx.doi.org/10.17921/2176-5634.2018v11n2p104-110.

Full text
Abstract:
Este artigo tem a intenção de apresentar a hipótese dos experimentos mentais e suas caracterizações, com a pretensão de justificar ainda mais o interesse em atividades de investigação matemática, por meio dos experimentos mentais, e das bases semióticas da matemática. Parte desse trabalho foi resultado de uma pesquisa teórica desenvolvida no âmbito do programa de doutorado em Educação Matemática, pela Universidade Anhanguera de São Paulo, e teve como objetivo construir e analisar as características dos experimentos mentais na matemática e suas consequências no âmbito da Educação Matemática. Buscou-se também uma analogia entre os experimentos mentais e as provas matemáticas formais. Experimentos mentais são formas que o sujeito tem de colocar seus próprios pensamentos, dentro de um contexto previamente considerado, como objetos de considerações numa dada atividade e/ou problema, por meio de representações. Esses pensamentos são considerados abdutivos, ou seja, implicam generalizações na Matemática e exige uma teoria de experimentação e de análise. Buscar-se-á nesse texto esclarecer, com a construção de um cálculo de segmentos, quais aspectos se julgam importantes na dinâmica de considerar os experimentos mentais na construção do pensamento matemático, sem desconsiderar a importância de provas matemáticas formais.Palavras-chave: Experimentos Mentais. Semiótica. Intuição. Pensamento Abdutivo.AbstractThis text intends to present the theory of thought experiments and their characterizations, with the aim of further justifying the interest in mathematical research activities, by means of thought experiments, and the semiotic bases of mathematics. Part of this work was the result of a theoretical research developed within the PhD Program in Mathematical Education, by the Anhanguera University of São Paulo, and had the objective of constructing and analyzing the characteristics of thought experiments in mathematics and its consequences in Mathematical Education. An analogy was also sought between mental experiments and formal mathematical proofs. Thought experiments are forms that the subject has to put his own thinking, within a previously considered context, as objects of considerations in a given activity and / or problem, by means of representations. These thinking are considered abductive, that is, they imply generalizations in Mathematics and require a theory of experimentation and analysis. It will be sought in this text to clarify, with the construction of a segment calculus, which aspects are considered important in the dynamics of considering the thought experiments in the construction of mathematical thinking, without disregard the importance of formal mathematical proofs.Keywords: Thought Experiments. Semiotics. Intuition. Thinking Abductive.
APA, Harvard, Vancouver, ISO, and other styles
30

Susin, Luiz Carlos. "O “calcanhar de Aquiles” da iniciação à vida cristã." Revista Eclesiástica Brasileira 79, no. 312 (June 18, 2019): 34. http://dx.doi.org/10.29386/reb.v79i312.1814.

Full text
Abstract:
Este artigo examina a atual condição da iniciação para a vida cristã no seio de uma sociedade com estruturas secularizadas e pluralismo religioso. Analisa a diferença e a distância entre a comunidade cristã e a sociedade em seu entorno, e os impasses de uma formação para a comunidade sem a correspondente formação para a vida cidadã, ou seja, para a formação à vida adulta como cristão e como cidadão responsável. O processo de iniciação levaria hoje a uma pertença infantil à comunidade ou a um dualismo insustentável cujo resultado é a desistência. Recorrendo ao dinamismo antropológico do rito de passagem de iniciação à vida adulta, o autor sugere uma atualização do mesmo em termos de sociedade atual por parte do cristão, insistindo em contatos, riscos, provas e treinos junto aos porões e margens da sociedade como parte da pedagogia preparatória para os sacramentos da Primeira Eucaristia e sobretudo Crisma. Abstract: This article examines the present condition of the initiation to the Christian life in the midst of a society with secularized structures and a religious pluralism. It analyses the difference and the distance between the Christian community and the society around it, and the impasses of a development of this community without an equivalent development towards a civil life, that is, the development of an adult life as a Christian and as a responsible citizen. The process of initiation nowadays would lead to a type of childlike belongingness to the community or to an unsustainable dualism the result of which is desistance. Resorting to the anthropological dynamism of the rite of passage to adult life, the author suggests an updating of the same in terms of the present society by the Christians, insisting in contacts, risks, proofs and training in the holds and margins of the society as part of the preparatory pedagogy for the sacraments of the First Holy Communion and in particular of the Confirmation.Keywords: Rite of passage; Initiation; Evidences; Trainings.
APA, Harvard, Vancouver, ISO, and other styles
31

Kuhn, Malcus Cassiano, and Arno Bayer. "As Operações de Adição e Subtração nas Aritméticas Editadas para as Escolas Paroquiais Luteranas do Século XX no Rio Grande do Sul." Jornal Internacional de Estudos em Educação Matemática 10, no. 3 (February 6, 2018): 141. http://dx.doi.org/10.17921/2176-5634.2017v10n3p141-153.

Full text
Abstract:
O artigo discute as operações de adição e subtração com números naturais nas aritméticas editadas pela Igreja Evangélica Luterana do Brasil, por meio da Casa Publicadora Concórdia de Porto Alegre, para as escolas paroquiais luteranas do século XX no Rio Grande do Sul. Baseando-se na pesquisa histórica e no conceito de cultura escolar, analisaram-se a Primeira Aritmética da série Ordem e Progresso, a Primeira Aritmética da série Concórdia e duas edições da Segunda Aritmética da série Concórdia. Essas aritméticas apresentam algumas propostas de ensino alicerçadas no método intuitivo, enquanto outras refletem a tradição pedagógica da memorização, com ênfase no desenvolvimento de habilidades para o cálculo mental e escrito, com precisão e foco nos algoritmos e procedimentos de cálculo das operações de adição e subtração. As edições da Segunda Aritmética ainda trazem exercícios e problemas contextualizados com a realidade dos alunos das escolas paroquiais luteranas gaúchas e apresentam as provas reais da adição e subtração, destacando-se a ideia da adição e subtração como operações inversas e a prova dos 9.Palavras-chave: História da Educação Matemática. Adição. Subtração. Livros de Aritmética. Cultura Escolar.AbstractThe article discusses the operations of addition and subtraction with natural numbers in the arithmetic edited by Evangelical Lutheran Church of Brazil, through Concordia Publishing House of Porto Alegre, to the Lutheran parochial schools of the 20th century in Rio Grande do Sul. Basing on historical research and on concept of school culture, analyzing the First Arithmetic of the Order and Progress series, the First Arithmetic of the Concordia series and two editions of the Second Arithmetic of the Concordia series. These arithmetic present some teaching proposals grounded in the intuitive method, while others reflect the pedagogical tradition of memorization, with emphasis on the development of skills for the mental and written calculation, with precision and focus in the algorithms and procedures of calculation of the operations of addition and subtraction . The editions of the Second Arithmetic still bring exercises and problems contextualized with the reality of the students of the gaucho Lutheran parochial schools and present the real proofs of addition and subtraction, emphasizing the idea of addition and subtraction as inverse operations and the proof of the 9.Keywords: History of the Mathematics Education. Addition. Subtraction. Arithmetic Books. School Culture.
APA, Harvard, Vancouver, ISO, and other styles
32

Walker, Ieuan, Chaminda Hewage, and Ambikesh Jayal. "Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data." SN Computer Science 3, no. 1 (November 24, 2021). http://dx.doi.org/10.1007/s42979-021-00968-z.

Full text
Abstract:
AbstractA growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend prompts several interesting privacy and security issues. One of the biggest concerns with third-party data storage providers is accountability. This article, critically reviews two schemas/algorithms that allow users to check the integrity and availability of their outsourced data on untrusted data stores (i.e., third-party data storages). The reviewed schemas are provable data possession (PDP) and proofs of retrievability (POR). Both are cryptographic protocols designed to provide clients the assurance that their data are secure on the untrusted data storages. Furthermore, a conceptual framework is proposed to mitigate the weaknesses of the current storage solutions.
APA, Harvard, Vancouver, ISO, and other styles
33

Armknecht, Frederik, Jens-Matthias Bohli, Ghassan Karame, and Wenting Li. "Outsourcing Proofs of Retrievability." IEEE Transactions on Cloud Computing, 2019, 1. http://dx.doi.org/10.1109/tcc.2018.2865554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

"Secure Enterprise and Read Performance Enhancement in Data Deduplication for Secondary Storage." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 443–48. http://dx.doi.org/10.35940/ijrte.b1067.0982s1119.

Full text
Abstract:
With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. we propose solutions for different data types (text, image and video) for secure data de-duplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes. proposes a method to improve the read performance by investigating the recently accessed chunks and their locality in the backup set (data stream). Based on this study of the distribution of chunks in the data stream, few chunks are identified that need to be accumulated and stored to serve the future read requests better. This identification and accumulation happen on cached chunks. By this a small degree of duplication of the de-duplicated data is introduced, but by later caching them together during the restore of the same data stream, the read performance is improved. Finally the read performance results obtained through experiments with trace datasets are presented and analyzed to evaluate the design.
APA, Harvard, Vancouver, ISO, and other styles
35

Ji, Shan, Wei Zhou, Chuan Ma, Dafang Li, Kui Zhu, and Liming Fang. "Proofs of retrievability with tag outsourcing based on Goppa codes." Computer Standards & Interfaces, December 2022, 103719. http://dx.doi.org/10.1016/j.csi.2022.103719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cui, Hui, Xun Yi, Zhiguo Wan, Baodong Qin, and Huayi Qi. "Password-Authenticated Proofs of Retrievability for Multiple Devices Checking Cloud Data." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4109947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Alcolea Banegas, Jesús. "Razonamientos no rigurosos y demostraciones asistidas por ordenador." Contrastes. Revista Internacional de Filosofía 12 (February 27, 2007). http://dx.doi.org/10.24310/contrastescontrastes.v12i0.1432.

Full text
Abstract:
RESUMENPresentamos la contribución de Th. Tymoczko a la filosofía de la matemática y analizamos y evaluamos las demostraciones asistidas por ordenador y los razonamientos no rigurosos en la matemática experimental, con particular referencia al Teorema de los Cuatro Colores.PALABRAS CLAVETYMOCZKO – CUASI-EMPIRISMO – MATEMÁTICA EXPERIMENTAL – RAZONAMIENTO NO RIGUROSO – DEMOSTRACIONES ASISTIDAS POR ORDENADORABSTRACTWe present Th. Tymoczko’s contribution to the philosophy of mathematics, and we analyze and evaluate the computer-assisted proofs and the non-rigorous reasonings in the experimental mathematics, particularly in reference to the Four-Colour Theorem.KEYWORDTYMOCZKO – QUASI-EMPIRICISM – EXPERIMENTAL MATHEMATICS – NON-RIGOROUS REASONING – COMPUTER-ASSISTED PROOF
APA, Harvard, Vancouver, ISO, and other styles
38

Neele, Thomas, Antti Valmari, and Tim A. C. Willemse. "A Detailed Account of The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction." Logical Methods in Computer Science Volume 17, Issue 3 (July 27, 2021). http://dx.doi.org/10.46298/lmcs-17(3:8)2021.

Full text
Abstract:
One of the most popular state-space reduction techniques for model checking is partial-order reduction (POR). Of the many different POR implementations, stubborn sets are a very versatile variant and have thus seen many different applications over the past 32 years. One of the early stubborn sets works shows how the basic conditions for reduction can be augmented to preserve stutter-trace equivalence, making stubborn sets suitable for model checking of linear-time properties. In this paper, we identify a flaw in the reasoning and show with a counter-example that stutter-trace equivalence is not necessarily preserved. We propose a stronger reduction condition and provide extensive new correctness proofs to ensure the issue is resolved. Furthermore, we analyse in which formalisms the problem may occur. The impact on practical implementations is limited, since they all compute a correct approximation of the theory. Comment: arXiv admin note: substantial text overlap with arXiv:1910.09829
APA, Harvard, Vancouver, ISO, and other styles
39

Faggion, Andrea Luisa Bucchile. "Refutação do Argumento Ontológico, ou Filosofia Crítica versus Filosofia Dogmática." Veritas (Porto Alegre) 56, no. 2 (August 30, 2011). http://dx.doi.org/10.15448/1984-6746.2011.2.8282.

Full text
Abstract:
Em seu artigo “Kant’s Critique of the Three Theistic Proofs [partial], from Kant’s Rational Theology”, incluído no livro Kant’s Critique of Pure Reason. Critical Essays, Allen Wood pretende mostrar que Kant não teria provado que a existência não poderia ser um predicado real ou determinante. Em seu artigo “Anselm’s Ontological Arguments”, publicado na revista The Philosophical Review, Norman Malcolm pretende mostrar que Kant não teria provado que a existência necessária não poderia ser um predicado real ou determinante. Lidando com as defesas de Wood e Malcolm para o argumento ontológico contra as críticas de Kant, pretendo sugerir, primeiramente, que o argumento de Kant funciona e, em segundo lugar, que ele não depende dos seus Postulados do Pensamento Empírico. Na verdade, advogo a tese de que o segundo Postulado poderia ser justificado por um apelo às conclusões de Kant sobre a existência, na seção “Sobre a impossibilidade de uma prova ontológica da existência de Deus”.
APA, Harvard, Vancouver, ISO, and other styles
40

Embid Irujo, Antonio. "Norma, Economía y Lenguaje en el derecho de la crisis económica. El control judicial de la actividad administrativa en la economía. Algunas reflexiones." Documentación Administrativa, no. 1 (June 11, 2014). http://dx.doi.org/10.24965/da.v0i1.10166.

Full text
Abstract:
<p align="justify">La crisis económica ha realzado el interés del estudio jurídico de la actividad económica frente al predominio tradicional del papel de los economistas. Las palabras utilizadas por el derecho de la crisis no siempre son neutras sino que aparecen, usualmente, con una connotación valorativa nada clara. Eso sucede singularmente con la “racionalización” o la “sostenibilidad”, no susceptibles de valoración unívoca, como la misma evolución de este derecho prueba. Por otra parte y a partir del lenguaje usado, el control judicial de la actividad económica se hace especialmente difícil, como se muestra en alguna sentencia del Tribunal Constitucional. </p> <p align="justify"><b>he economic crisis has emphasized the interest of a juridical study of economic activity, opposed to the traditionally predominant role of the economists on the matter. Words used by the law of the crisis are not allways neutral, implying usually unclear values. This happens with words as “rationalization” or “sustainability”, which as their juridical evolution proofs, remain undeterminate concepts. Besides, as is shown on some decissions of the Constitutional Court, this unclear use of lenguage makes judicial control on economic activities quite difficult. </b></p>
APA, Harvard, Vancouver, ISO, and other styles
41

Gómez Gómez, Mauricio. "FICCIONES DE DISCIPLINAMIENTO EN LAS RELACIONES DE MÉRITOS DE CONQUISTADORES VETERANOS. NUEVO REINO DE GRANADA, SIGLO XVI." Tiempo Histórico, no. 9 (August 29, 2019). http://dx.doi.org/10.25074/th.v0i9.1404.

Full text
Abstract:
Mediante las relaciones de méritos y servicios, los conquistadores construyeron de sí mismos una figura de súbditos perfectos, con cuyos actos heroicos ayudaron a conformar el Imperio español en el Nuevo Mundo. Este tipo de documento permitió la vinculación del conquistador con la estructura burocrática imperial, inscrita en la retórica de conquista. Sus relatos se consideran ficciones (del latín fingěre), no para discutir su veracidad, sino porque a través de ellos los conquistadores se configuraron como individuos disciplinados, que eran valientes, generosos y leales. Su escritura tenía por fin recibir premios a cambio de los méritos de sus actos, que eran descritos en detalle siguiendo fórmulas comunes. Esta fuente demuestra la existencia de un comportamiento disciplinado, heredado del sometimiento de los súbditos a la Corona, que se vio representado en la conformación de una élite continuadora de la cultura española en ultramar. ABSTRACT By the relaciones de méritos y servicios, the conquerors built themselves a figure of perfect subjects with which heroics helped create the Spanish Empire in the New World. This document linked the conqueror to the bureaucratic structure of the empire, entered in the rhetoric of conquest. Their stories are considered fiction (from the latin fingere) not to discuss their veracity, but because through them the conquerors were configured as disciplined individuals who were brave, generous and loyal. The writing of these proofs was intended to receive rewards in return for the merits of their actions, which were escribed in detail following common formulas. This source shows that there was a disciplined behavior, inherited from the submission of the subjects to the Crown, which was represented in the creation of a elite that continued the spanish culture overseas.
APA, Harvard, Vancouver, ISO, and other styles
42

Burlando, Giannina. "Suárez y la Filosofía Moderna." EDUCAÇÃO E FILOSOFIA 35, no. 74 (January 11, 2022). http://dx.doi.org/10.14393/revedfil.v35n74a2021-63279.

Full text
Abstract:
Suárez y la Filosofía Moderna Resumen: Los intérpretes de hoy debaten sobre el estatuto y la asociación de Francisco Suárez con la Filosofía Moderna. Este estudio enfoca los principales aspectos de la filosofía especulativa y práctica del pensador jesuita, con el propósito de mostrar que, en las diversas disciplinas abordadas, Suárez ha tomado en cuenta genealógicamente, la formalización de las teorías precedentes: las ha re-formulado en términos metodológicos para progresar. A su preferencia parcial por pruebas a priori, agrega datos de experiencia con respecto a los postulados de la metafísica. Por otra parte, innova en la adopción del lenguaje médico imperante en materias de psicología moral y en la intrincación de las disciplinas teológicas y jurídica, en materias políticas. Con este proceder, que se distingue del estrictamente propedéutico para la investigación científica, alcanza una comprensión adecuada de los fenómenos y, a partir de sus replanteamientos establece el curso de figuras representativas del pensamiento moderno. Palabras clave: Suárez; ontologia; epistemologia; psicología moral; filosofía política; filosofía moderna. Suárez and Modern Philosophy Abstract: Today's interpreters debate the status and association of Francisco Suárez with Modern Philosophy. This paper focuses on the main aspects of the speculative and practical philosophy of the Jesuit thinker, with the purpose of showing that, in the various disciplines approached, Suárez has taken into account genealogically the formalization of the preceding theories: he has reformulated them in methodological terms to progress. To his partial preference for a priori proofs, he adds data of experience regarding the postulates of metaphysics. On the other hand, he innovates in the adoption of the prevailing medical language in matters of moral psychology and in the intricacy of theological and legal disciplines, in political matters. With this procedure, which differs from the strictly propaedeutic for scientific research, he reaches an adequate understanding of the phenomena and, from the rethinking of it, establishes the course of representative figures of modern thought. Key-words: Suárez; ontology; epistemology; moral psicology; political philosophy; Modern philosophy. Suárez e a Filosofia Moderna Resumo: Os intérpretes de hoje debatem o estatuto e a associação de Francisco Suárez com a Filosofia Moderna. Este estudo enfoca os principais aspectos da filosofia especulativa e prática do pensador jesuíta, com o propósito de mostrar que, nas várias disciplinas abordadas, Suárez teve em conta genealogicamente a formalização das teorias precedentes: ele reformulou em termos metodológicos para o progresso. À sua preferência parcial por provas a priori, ele adiciona dados da experiência sobre os postulados da metafísica. Por outro lado, inova na adoção da linguagem médica predominante em questões de psicologia moral e na complexidade das disciplinas teológicas e jurídicas, em questões políticas. Com esse procedimento, que difere do estritamente propedêutico para a pesquisa científica, ele chega a uma compreensão adequada dos fenômenos e, a partir de seu repensar, estabelece o curso de figuras representativas do pensamento moderno. Palavras-chave: Suárez; ontologia; epistemologia; psicologia moral; filosofia política; filosofia moderna. Data de registro: 16/09/2021 Data de aceite: 01/12/2021
APA, Harvard, Vancouver, ISO, and other styles
43

Machiaveli, Gabriel Reis Moraes. "O IMPEACHMENT DE DILMA ROUSSEFF (PT) E A CASSAÇÃO DE EDUARDO CUNHA (PMDB) EM COMENTÁRIOS NO FACEBOOK." Revista DisSoL - Discurso, Sociedade e Linguagem, no. 6 (December 22, 2017). http://dx.doi.org/10.35501/dissol.v0i6.257.

Full text
Abstract:
O presente artigo tem o propósito de identificar e mapear os imaginários sociodiscursivos arregimentadas em comentários e réplicas de enunciados no site de rede social (SRS) Facebook, sob o pano de fundo de dois acontecimentos políticos: o impeachment de Dilma Rousseff (PT) e a cassação de Eduardo Cunha (PMDB). Utilizamos a Teoria Semiolinguística (TS) como método analítico destes imaginários sob a conceptualização de imaginários sociodiscursivos (CHARAUDEAU, 2007, 2015a, 2015b). Entendemos imaginários sociodiscursivos como dimensões tangíveis das representações sociais, divididas entre saberes de crença e conhecimento, movidas pelos sujeitos por meio das provas retóricas do pathos, ethos e logos. Para a interpretação dos ethé, utilizamos as contribuições de Maingueneau (2013; 2015). O ethos é uma noção discursiva que se dá no e pelo discurso. Constatamos, de início, que a arena ideológica proporcionada pelo Facebook ainda é tomada pelo discurso emocional da crença, não definindo caminhos para a solução de problemas, mas para a gestão do dissenso. Abstract: The purpose of this article is to identify and map the social representations gathered in comments and replies of statements on the social networking site (SRS) Facebook, under the background of two political events: the impeachment of Dilma Rousseff (PT) and the Cassation of Eduardo Cunha (PMDB). We use Semiolinguistic Theory (TS) as an analytical method of these representations under the conceptualization of sociodiscursive imaginaries (CHARAUDEAU, 2007, 2015a, 2015b). We understand sociodiscursive imaginaries as tangible dimensions of social representations, divided between knowledge of belief and knowledge, moved by the subjects through rhetorical proofs of pathos, ethos and logos. For the interpretation of ethé we use the contributions of Maingueneau (2013; 2015). The ethos is a discursive notion that is given in and for discourse. We note, at the outset, that an ideological arena provided by Facebook is still taken by the emotional discourse of belief, not defining ways to solve problems, but to a management of dissent
APA, Harvard, Vancouver, ISO, and other styles
44

"Determinación del Relieve 3D de la Superficie de Marte usando un UAV." Revista ECIPeru, December 15, 2018, 31–37. http://dx.doi.org/10.33017/reveciperu2015.0005/.

Full text
Abstract:
Determinación del Relieve 3D de la Superficie de Marte usando un UAV Mars Surface 3D relief using a UAV Drone, UAV, Marte, relieve 3D, procesamiento de imagen, fotogrametría. Universidad Tecnológica del Perú, Lima 001 DOI: https://doi.org/10.33017/RevECIPeru2015.0005/ Resumen En este artículo se presenta el desarrollo de un UAV (Quadcopter) para la determinación del relieve en 3D de la superficie del planeta Marte, el propósito de esta investigación es proveer una herramienta moderna y confiable a los tripulantes en futuras exploraciones espaciales, los cuales tendrán la oportunidad de enviar al equipo para realizar el reconocimiento y mapeo de un área específica. El objetivo del desarrollo de este dispositivo es asegurar la integridad física de las personas en cualquier misión de investigación y exploración de lugares desconocidos, ya que podrá ser monitoreado remotamente y brindar información relevante previa a la exploración humana lo que dará una mejor visión del terreno a investigar. Este proyecto fue desarrollado en el programa de experimentación y simulación en el MDRS (Mars Desert Research Station) organizado por The Mars Society, estación ubicada en el desierto de Utah, Estados Unidos, en este lugar se desarrolló también la simulación de supervivencia marciana. El desarrollo del equipo constó de dos etapas principales, la primera parte se enfocó en el análisis de hardware y software para el Quadcopter, se seleccionaron las diferentes piezas, el frame principal y los parámetros de control para un vuelo estable, la segunda parte se orientó a la creación del algoritmo para el procesamiento de las imágenes y la determinación del relieve en 3D, todo ello desarrollado en Matlab. En la estación de investigación MDRS se desarrollaron las simulaciones, pruebas de vuelo y toma de datos. El Quadcopter puede ser piloteado usando un control remoto para mapear diversas zonas, además de ello, gracias al GPS con el que cuenta, tiene la capacidad de establecer puntos en el aire para realizar un recorrido predeterminado y mapear una región definida. El principio que se emplea en el procesamiento de imágenes es la fotogrametría, la cual emplea fotografías digitales, mediante las cuales se realiza un reconocimiento de patrones y puntos de referencia para poder determinar la superficie fotografiada en 3D. Una cámara GoPro fue utilizada para la recolección de imágenes ya que brinda fotografías de buena calidad además de ser resistente a ambientes adversos como el polvo y a humedad. Las zonas contiguas a la estación en el Desierto de Utah fueron los lugares de experimentación, lo cual sirvió para poder calibrar los parámetros de control de vuelo del Quadcopter y los del algoritmo para el procesamiento de imágenes en Matlab. Los resultados obtenidos durante las primeras pruebas fueron óptimos, lo que demuestra que los métodos utilizados son los adecuados, pero aún no se han alcanzado resultados precisos, ya que se tiene un porcentaje de error mayor al esperado. Actualmente se viene trabajando en el mejoramiento del hardware del Quadcopter y en el programa de procesamiento de imágenes para obtener mejores resultados. Este trabajo es un aporte a la literatura científica en el área de exploración espacial, ya que este tema no ha sido muy desarrollado, se espera que esta investigación sirva como base para el desarrollo de nuevos aparatos relacionados a este contenido. Palabras clave: Drone, UAV, Marte, relieve 3D, procesamiento de imagen, fotogrametría. Abstract In this article its presented the development of an UAV (Quadcopter) about 3D relief obtainment of Mars surface, the purpose of the research it to provide a modern and reliable tool to crewmembers on future space explorations, which will have the opportunity of send this machine to perform recognizing and mapping mission of an specific area. The main objective about the development of this device is to ensure the phisic integrity of people in any research mission or exploration mission of unknown places. It could be driven remotely and receive precise relevant information previously to the human exploration, which give a better vision of the researched area. This project was developed in the simulation program at MDRS (Mars Desert Research Station) organized by The Mars Society, the station is located in Utah desert in the USA. In that place was performed the simulation of mars survival. The development of the entire project consisted into two main stages, the first part was focused on hardware and software analysis of the Quadcopter. It was selected the main components, main frame and control parameters for a stable flight. The second part was oriented to the creation of an image processing algorithm and 3D relief obtaining, which was built on Matlab. On the Research Station the simulations, flight proofs and data collection were performed. The Quadcopter could be operated using a remote controller for mapping many zones, also it is provided of a GPS unit, which allow to set points in the air and follow a given range recording a defined region. The principle used in image processing is called photogrammetry, which use digital photos. Then, patterns and reference points are recognized to define the photographed surface into a 3D model. A GoPro camera was used to get pictures because this kind of devices are very resistant to dust and humidity also it gives high quality photos, important for the subsequent analysis. Close places to the station in the Utah desert were experimentation places. It helped to calibrate control flight parameters of quadcopter and image processing parameters on Matlab. Reached results during first tests were optimum, which demonstrate that methods used are correct, but precise results haven’t reached yet, because there is an average error percentage. Currently it’s been working on the improvement of the Quadcopter hardware and in the image processing program to get better results. This work is a contribution to the scientific literature in the space exploration field. This specific topic was not well developed, so it’s hoped that it serve as base for many new projects and the development of innovative devices related to this. Keywords: Drone, UAV, Mars, 3D relief, image processing, photogrammetry.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography