160 research outputs found

    Memoria, resistencia y resiliencia en la literatura postcolonial africana escrita por mujeres

    Get PDF
    The initial approach which makes this research relevant is a reformulation of the perspectives which Western Feminist criticism has interpreted African women´s literature. The initial hypothesis proposes the necessity of a balance of the Ghanaian writer Ayesha Harruna Attah´s novels from a postcolonial feminism focus. There are many studies within postcolonial feminist theory which mention the repercussions of memory in literature, as well as those strategies employed by different authors to give voice to those collectives forgotten by Western hegemonic discourse. Barbara Harlow contends in Resistance Literature that narrations of resistance go deeply into the analysis of the relations which support the system of domination and exploitation giving a detailed historical analysis of those circumstances of economic, political and cultural domination and repression while they analyze the impact of the past in the present and they use it to find new ways to resist in both the present and the future. Sarah Bracke, in “Bouncing Back. Vulnerability and Resistance in Times of Resilience”, analyzes the power exerted by resilience on subjects besides the different ways in which those subjects exist and do not give way. For that reason, the impact of memory in Attah´s work is relevant, as well as the conceptual implication of agency and resistance together with the power exerted by resilience on those subjects. The impact of memory in postcolonial literature in Africa has been proved by means of the revision of the conceptual implication of agency and resistance as analyzing the power that resilience exerts on the subjects. Within the frame of postcolonial feminism, it has been undertaken the importance of mechanisms of resistance and resilience in African women´s literature in English. It has also been shown that vulnerability is an enabling condition. Furthermore, by means of the comparative analysis of the chosen corpus, it can be concluded that storytelling, as an artistic manifestation, proves as healing response to trauma and marginalization.El planteamiento de partida que hace pertinente esta investigación es una reformulación de las perspectivas con las que la literatura africana escrita por mujeres se ha interpretado desde la crítica feminista occidental. Como hipótesis de partida planteamos la necesidad de hacer, desde esta perspectiva, un balance del sentido de la obra de la escritora ghanesa Ayesha Harrunah Attah, desde el enfoque del feminismo postcolonial. Dentro del marco del feminismo postcolonial son varios los estudios que hacen referencia a la repercusión de la memoria en la literatura, así como de las estrategias empleadas por distintas autoras para dar voz a los colectivos olvidados por el discurso hegemónico occidental. Para Barbara Harlow en Resistance Literature las narraciones de resistencia ahondan en el análisis de las relaciones que sustentan el sistema de dominación y explotación proporcionando un análisis histórico detallado de las circunstancias de dominación y represión económicas, políticas y culturales, mientras analizan el impacto del pasado en el presente y lo utilizan para encontrar nuevas formas de resistir en el presente y en el futuro. Sarah Bracke en “Bouncing Back. Vulnerability and Resistance in Times of Resilience” analiza el poder que la resiliencia ejerce en los sujetos y las distintas formas en las que tales sujetos existen y se mantienen. Para ello, consideramos relevante el impacto de la memoria en la obra de Attah, Harmattan Rain (2009), Saturday´s Shadows (2015) y The Hundred Wells of Salaga (2018), así como la implicación conceptual de agencia y resistencia y el poder que la resiliencia ejerce en los sujetos. Hemos constatado el impacto de la memoria en la literatura postcolonial africana, tanto revisando la implicación conceptual de agencia y resistencia, como analizando el poder que la resiliencia ejerce en los sujetos. En el marco del feminismo postcolonial, hemos abordado la importancia de mecanismos de resistencia y resiliencia en la literatura africana escrita por mujeres en lengua inglesa. Hemos demostrado la concepción de la vulnerabilidad como condición capacitadora y, a través del análisis comparativo de nuestro corpus, concluimos que la narración, como manifestación artística, se confirma como respuesta sanadora al trauma y la marginalización

    Blockchain-based trust management and authentication of devices in smart grid

    Get PDF
    The digitalization of the power grid and advancement in intelligent technologies have enabled the service provider to convert the existing electrical grid into a smart grid. The transformation of the grid will help in integrating cleaner energy technologies with energy management to improve power network efficiency. Internet of things (IoT) and various network components need to be deployed to harness the full potential of the smart grid. Also, integrating intermittent renewable energy sources, energy storage, intelligent control of selected power-intensive loads, etc will improve energy efficiency. But deployment of this information and communication technologies will make the grid more vulnerable to cyber attacks from hackers. In this work, blockchain-based self-sovereign identification and authentication technique is presented to avert identity theft and masquerading. The proposed approach can minimize the chances of identity-based security breaches in the smart grid. This paper provides an overview of the model of identification and authentication of IoT devices in Smart Grid based on Blockchain technology. The Blockchain based implementation of identification and authentication of devices is proposed to validate the model in the distributed electrical energy network. The model is able to authenticate the device using Blockchain in a trusted model. The system works according to plan validating the authenticity of transaction in a node in log(n) time, which justifies presented result.publishedVersio

    Segurança de computadores por meio de autenticação intrínseca de hardware

    Get PDF
    Orientadores: Guido Costa Souza de Araújo, Mario Lúcio Côrtes e Diego de Freitas AranhaTese (doutorado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: Neste trabalho apresentamos Computer Security by Hardware-Intrinsic Authentication (CSHIA), uma arquitetura de computadores segura para sistemas embarcados que tem como objetivo prover autenticidade e integridade para código e dados. Este trabalho está divido em três fases: Projeto da Arquitetura, sua Implementação, e sua Avaliação de Segurança. Durante a fase de projeto, determinamos como integridade e autenticidade seriam garantidas através do uso de Funções Fisicamente Não Clonáveis (PUFs) e propusemos um algoritmo de extração de chaves criptográficas de memórias cache de processadores. Durante a implementação, flexibilizamos o projeto da arquitetura para fornecer diferentes possibilidades de configurações sem comprometimento da segurança. Então, avaliamos seu desempenho levando em consideração o incremento em área de chip, aumento de consumo de energia e memória adicional para diferentes configurações. Por fim, analisamos a segurança de PUFs e desenvolvemos um novo ataque de canal lateral que circunvê a propriedade de unicidade de PUFs por meio de seus elementos de construçãoAbstract: This work presents Computer Security by Hardware-Intrinsic Authentication (CSHIA), a secure computer architecture for embedded systems that aims at providing authenticity and integrity for code and data. The work encompassed three phases: Design, Implementation, and Security Evaluation. In design, we laid out the basic ideas behind CSHIA, namely, how integrity and authenticity are employed through the use of Physical Unclonable Functions (PUFs), and we proposed an algorithm to extract cryptographic keys from the intrinsic memories of processors. In implementation, we made CSHIA¿s design more flexible, allowing different configurations without compromising security. Then, we evaluated CSHIA¿s performance and overheads, such as area, energy, and memory, for multiple configurations. Finally, we evaluated security of PUFs, which led us to develop a new side-channel-based attack that enabled us to circumvent PUFs¿ uniqueness property through their architectural elementsDoutoradoCiência da ComputaçãoDoutor em Ciência da Computação2015/06829-2; 2016/25532-3147614/2014-7FAPESPCNP

    Holistic Resource Management for Sustainable and Reliable Cloud Computing:An Innovative Solution to Global Challenge

    Get PDF
    Minimizing the energy consumption of servers within cloud computing systems is of upmost importance to cloud providers towards reducing operational costs and enhancing service sustainability by consolidating services onto fewer active servers. Moreover, providers must also provision high levels of availability and reliability, hence cloud services are frequently replicated across servers that subsequently increases server energy consumption and resource overhead. These two objectives can present a potential conflict within cloud resource management decision making that must balance between service consolidation and replication to minimize energy consumption whilst maximizing server availability and reliability, respectively. In this paper, we propose a cuckoo optimization-based energy-reliability aware resource scheduling technique (CRUZE) for holistic management of cloud computing resources including servers, networks, storage, and cooling systems. CRUZE clusters and executes heterogeneous workloads on provisioned cloud resources and enhances the energy-efficiency and reduces the carbon footprint in datacenters without adversely affecting cloud service reliability. We evaluate the effectiveness of CRUZE against existing state-of-the-art solutions using the CloudSim toolkit. Results indicate that our proposed technique is capable of reducing energy consumption by 20.1% whilst improving reliability and CPU utilization by 17.1% and 15.7% respectively without affecting other Quality of Service parameters
    corecore