2,272 research outputs found

    o «desenrascanço» linguístico dos portugueses nas trincheiras da Grande Guerra

    Get PDF
    Os militares portugueses enviados para as trincheiras da Grande Guerra, pedaços vivos do Portugal rural do princípio do século XX, eram na sua maioria homens analfabetos ou com escassa instrução. A actuação militar em território estrangeiro e inserida num contexto que obrigava à comunicação com tropas de outros países, propiciava o estabelecimento de pontes comunicativas que passavam invariavelmente pela transposição linguística. Todavia, a forma improvisada, inventiva e/ou criativa como os portugueses se expressavam ante soldados e civis franceses, ainda que errónea e por vezes confusa à luz da gramática oficial, não constituiu por si só um obstáculo ao entendimento e à compreensão.The Portuguese army soldiers sent to the World War I trenches, pieces of the rural Portugal of the beginning of the 20th century, were mostly illiterate or uneducated men. The military action in foreign territories, in a context that led to the communication with troops of other nationalities, provided the creation of communicative bridges which were made invariably through the linguistic transposition. However, the improvised, inventive and/or creative way the Portuguese expressed themselves to the military or civil French people, despite being erroneous and sometimes grammatically confusing, did not reveal itself as an obstacle to the understanding and comprehension

    Multi-level Architecture of Experience-based Neural Representations

    Get PDF

    administration and leadership from the high representative´s perspective

    Get PDF
    Esta tese analisa a arquitetura legal da Política Externa e de Segurança Comum, o regime administrativo, e aspetos financeiros, abordando a evolução dos Tratados da União Europeia no que concerne a política externa, segurança e defesa. Procura questionar a validade de visões canónicas continuamente reproduzidas academicamente, nomeadamente o peso que o Intergovernamentalismo e o Requerimento de Unanimidade têm em limitar a Política Externa e de Segurança Comum. Enquanto que a maioria dos estudos exagera o papel desempenhado pela Soberania, estes fazem-no partindo do pressuposto que Estados-Nação são inerentemente aversos à cooperação, logo, naturalmente ou política externa da UE não existe, ou tem um teto autoimposto. Os estudos que chegam a abordar outros aspetos contribuintes para falhas de desempenho da Política Externa e de Segurança Comum são maioritariamente ou mono temáticos, ou de raiz puramente ancorada à Ciência Política, ao invés do Direito. Esta tese realça padrões comuns encontrados no anterior, expondo tendências comuns e como se relacionam e influenciam mutuamente, enquanto reconhece também o valor do posterior. Esta tese adota uma análise holística, contribuindo para o mundo académico ao comparar e articular pontos frequentemente desconexos e negligenciados.This thesis analyzes the Common Foreign and Security Policy’s legal architecture, administrative regime, and financial aspects, addressing the European Union’s Treaty evolution concerning foreign, security and defense. It aims at questioning the validity of canonically held views continuously reproduced throughout academia, namely the weight that Intergovernmentalism and the Unanimity Requirement have on limiting the Common Foreign and Security Policy. While most studies exaggerate the role Sovereignty plays, they do so starting from the assumption that Nation-States are inherently uncooperative, ergo, naturally EU foreign policy either doesn’t exist, or has a self-imposed ceiling. Those studies that do approach other aspects contributing to the Common Foreign and Security Policy’s shortcomings are mostly either single-issue focused, or purely within the realm of Political Science, rather than Law. This thesis highlights the common patterns found in the former, exposing common trends and how they relate and influence each other, whilst also acknowledging the value in the latter’s insights. This thesis adopts a holistic analysis, contributing to the academic field in comparing and articulating often disconnected and overlooked points

    Self-healing radio maps of wireless networks for indoor positioning

    Get PDF
    Programa Doutoral em Telecomunicações MAP-tele das Universidades do Minho, Aveiro e PortoA Indústria 4.0 está a impulsionar a mudança para novas formas de produção e otimização em tempo real nos espaços industriais que beneficiam das capacidades da Internet of Things (IoT) nomeadamente, a localização de veículos para monitorização e optimização de processos. Normalmente os espaços industriais possuem uma infraestrutura Wi-Fi que pode ser usada para localizar pessoas, bens ou veículos, sendo uma oportunidade para aumentar a produtividade. Os mapas de rádio são importantes para os sistemas de posicionamento baseados em Wi-Fi, porque representam o ambiente de rádio e são usados para estimar uma posição. Os mapas de rádio são constituídos por amostras Wi-Fi recolhidas em posições conhecidas e degradam-se ao longo do tempo devido a vários fatores, por exemplo, efeitos de propagação, adição/remoção de APs, entre outros. O processo de construção do mapa de rádio costuma ser exigente em termos de tempo e recursos humanos, constituindo um desafio considerável. Os veículos, que operam em ambientes industriais podem ser explorados para auxiliar na construção de mapas de rádio, desde que seja possível localizá-los e rastreá-los. O objetivo principal desta tese é desenvolver um sistema de posicionamento para veículos industriais com mapas de rádio auto-regenerativos (capaz de manter os mapas de rádio atualizados). Os veículos são localizados através da fusão sensorial de Wi-Fi com sensores de movimento, que permitem anotar novas amostras Wi-Fi para o mapa de rádio auto-regenerativo. São propostas duas abordagens de fusão sensorial, baseadas em Loose Coupling e Tight Coupling, para a localização dos veículos. A abordagem Tight Coupling inclui uma métrica de confiança para determinar quando é que as amostras de Wi-Fi devem ser anotadas. Deste modo, esta solução não requer calibração nem esforço humano para a construção e manutenção do mapa de rádio. Os resultados obtidos em experiências sugerem que esta solução tem potencial para a IoT e a Indústria 4.0, especialmente em serviços de localização, mas também na monitorização, suporte à navegação autónoma, e interconectividade.Industry 4.0 is driving change for new forms of production and real-time optimization in factories, which benefit from the Industrial Internet of Things (IoT) capabilities to locate industrial vehicles for monitoring, improving safety, and operations. Most industrial environments have a Wi-Fi infrastructure that can be exploited to locate people, assets, or vehicles, providing an opportunity for enhancing productivity and interconnectivity. Radio maps are important for Wi-Fi-based Indoor Position Systems (IPSs) since they represent the radio environment and are used to estimate a position. Radio maps comprise a set of Wi- Fi samples collected at known positions, and degrade over time due to several aspects, e.g., propagation effects, addition/removal of Access Points (APs), among others, hence they should be periodically updated to maintain the IPS performance. The process to build and maintain radio maps is usually time-consuming and demanding in terms of human resources, thus being challenging to perform. Vehicles, commonly present in industrial environments, can be explored to help build and maintain radio maps, as long as it is possible to locate and track them. The main objective of this thesis is to develop an IPS for industrial vehicles with self-healing radio maps (capable of keeping radio maps up to date). Vehicles are tracked using sensor fusion of Wi-Fi with motion sensors, which allows to annotate new Wi-Fi samples to build the self-healing radio maps. Two sensor fusion approaches based on Loose Coupling and Tight Coupling are proposed to track vehicles. The Tight Coupling approach includes a reliability metric to determine when Wi-Fi samples should be annotated. As a result, this solution does not depend on any calibration or human effort to build and maintain the radio map. Results obtained in real-world experiments suggest that this solution has potential for IoT and Industry 4.0, especially in location services, but also in monitoring and analytics, supporting autonomous navigation, and interconnectivity between devices.MAP-Tele Doctoral Programme scientific committee and the FCT (Fundação para a Ciência e Tecnologia) for the PhD grant (PD/BD/137401/2018

    Co-evolution of morphology and controller for a robot

    Get PDF
    Genetic algorithms are inspired by the process of natural selection that exists in nature. This process is what leads species to evolve and adapt to their surroundings, with the fittest species reproducing, leading to new generations that can take advantage of their surroundings better than before. This type of process can be used in evolutionary robotics to achieve controllers that are able to solve specific tasks to evolve morphologies for a specific purpose such as to walk, swim, grasp objects, among others. Robotic grippers are used in most factories nowadays, as well as in other workplaces such as hospitals and laboratories. They are used in tasks such as grabbing/moving objects, painting, surgeries, among many other uses. Grippers are therefore a case study with several possibilities that lend themselves to evolving morphologies through genetic algorithms. In this dissertation, we explore morphology generation through genetic algorithms. Using grippers as our case study, we were able to generate grippers capable of grabbing and lifting an object. To evolve these grippers, we created a simulated environment where grippers followed a script with instructions to grab the object and then move up. In total 120 different grippers were generated in these experiments. Out of those 120 generated grippers, 28% were able to grab and lift an object successfully. After the evaluation process was completed, we experimented with the grippers in five different scenarios to test their robustness. In these scenarios, the object’s starting conditions were different from those in the evaluation process.Os algoritmos genéticos são inspirados pelo processo de seleção natural que existe na natureza. Este processo leva espécies a evoluir e adaptar-se ao meio ambiente envolvente, com as espécies mais aptas reproduzindo, levando a que novas gerações possam tirar um melhor proveito do ambiente que as rodeia. Este tipo de processo pode ser utilizado na robótica evolucionária para evoluir controladores capazes de resolver tarefas de forma a evoluir morfologias para uma finalidade específica, tais como andar, nadar, agarrar objetos, entre outros. Garras robóticas são utilizadas na maioria das fábricas, assim como noutros locais de trabalho tais como hospitais e laboratórios. Podem ser utilizadas em tarefas como agarrar/mover objetos, pintura, cirurgias, entre outros usos. São, portanto, um caso de estudo com várias possibilidades que se prestam à evolução de morfologias através de algoritmos genéticos. Nesta dissertação, exploramos a geração de morfologia através de algoritmos genéticos. Utilizando garras como o nosso caso de estudo, conseguimos gerar garras capazes de agarrar e levantar um objeto. Para evoluir essas garras, criamos um ambiente simulado onde cada garra seguiu um script com instruções para agarrar o objeto e, em seguida, mover para cima. No total, 120 garras diferentes foram geradas nestas experiências. Dessas garras geradas 120, 28% foram capazes de capturar e levantar um objeto com êxito. Após a conclusão do processo de avaliação, experimentamos as garras em cinco cenários diferentes para testar a sua robustez. Nesses cenários, as condições iniciais em que os objetos começam eram diferentes das do processo de avaliação

    A Mobile Secure Bluetooth-Enabled Cryptographic Provider

    Get PDF
    The use of digital X509v3 public key certificates, together with different standards for secure digital signatures are commonly adopted to establish authentication proofs between principals, applications and services. One of the robustness characteristics commonly associated with such mechanisms is the need of hardware-sealed cryptographic devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled tokens or dongles. These devices support internal functions for management and storage of cryptographic keys, allowing the isolated execution of cryptographic operations, with the keys or related sensitive parameters never exposed. The portable devices most widely used are USB-tokens (or security dongles) and internal ships of smart cards (as it is also the case of citizen cards, banking cards or ticketing cards). More recently, a new generation of Bluetooth-enabled smart USB dongles appeared, also suitable to protect cryptographic operations and digital signatures for secure identity and payment applications. The common characteristic of such devices is to offer the required support to be used as secure cryptographic providers. Among the advantages of those portable cryptographic devices is also their portability and ubiquitous use, but, in consequence, they are also frequently forgotten or even lost. USB-enabled devices imply the need of readers, not always and not commonly available for generic smartphones or users working with computing devices. Also, wireless-devices can be specialized or require a development effort to be used as standard cryptographic providers. An alternative to mitigate such problems is the possible adoption of conventional Bluetooth-enabled smartphones, as ubiquitous cryptographic providers to be used, remotely, by client-side applications running in users’ devices, such as desktop or laptop computers. However, the use of smartphones for safe storage and management of private keys and sensitive parameters requires a careful analysis on the adversary model assumptions. The design options to implement a practical and secure smartphone-enabled cryptographic solution as a product, also requires the approach and the better use of the more interesting facilities provided by frameworks, programming environments and mobile operating systems services. In this dissertation we addressed the design, development and experimental evaluation of a secure mobile cryptographic provider, designed as a mobile service provided in a smartphone. The proposed solution is designed for Android-Based smartphones and supports on-demand Bluetooth-enabled cryptographic operations, including standard digital signatures. The addressed mobile cryptographic provider can be used by applications running on Windows-enabled computing devices, requesting digital signatures. The solution relies on the secure storage of private keys related to X509v3 public certificates and Android-based secure elements (SEs). With the materialized solution, an application running in a Windows computing device can request standard digital signatures of documents, transparently executed remotely by the smartphone regarded as a standard cryptographic provider

    Wireless mesh networks for smart-grids

    Get PDF
    Tese de mestrado. Mestrado Integrado em Engenharia Electrotécnica e de Computadores - Major Telecomunicações. Faculdade de Engenharia. Universidade do Porto. 201

    Optical fiber sensors and sensing networks: overview of the main principles and applications

    Get PDF
    Optical fiber sensors present several advantages in relation to other types of sensors. These advantages are essentially related to the optical fiber properties, i.e., small, lightweight, resistant to high temperatures and pressure, electromagnetically passive, among others. Sensing is achieved by exploring the properties of light to obtain measurements of parameters, such as temperature, strain, or angular velocity. In addition, optical fiber sensors can be used to form an Optical Fiber Sensing Network (OFSN) allowing manufacturers to create versatile monitoring solutions with several applications, e.g., periodic monitoring along extensive distances (kilometers), in extreme or hazardous environments, inside structures and engines, in clothes, and for health monitoring and assistance. Most of the literature available on this subject focuses on a specific field of optical sensing applications and details their principles of operation. This paper presents a more broad overview, providing the reader with a literature review that describes the main principles of optical sensing and highlights the versatility, advantages, and different real-world applications of optical sensing. Moreover, it includes an overview and discussion of a less common architecture, where optical sensing and Wireless Sensor Networks (WSNs) are integrated to harness the benefits of both worlds.This work was supported by FCT—Fundação para a Ciência e Tecnologia within the R&D Units Project Scope: UIDB/00319/2020
    corecore