2,272 research outputs found
Contributos da tradução para a historiografia portuguesa:Reflexões pré e para-tradutivas em torno da “Narrativa da Expedição a Portugal em 1832”
Orientadora: Doutora Clara Sarment
o «desenrascanço» linguístico dos portugueses nas trincheiras da Grande Guerra
Os militares portugueses enviados para as trincheiras da Grande Guerra, pedaços vivos do Portugal rural do princípio do século XX, eram na sua maioria homens analfabetos ou com escassa instrução. A actuação militar em território estrangeiro e inserida num contexto que obrigava à comunicação com tropas de outros países, propiciava o estabelecimento de pontes comunicativas que passavam invariavelmente pela transposição linguística. Todavia, a forma improvisada, inventiva e/ou criativa como os portugueses se expressavam ante soldados e civis franceses, ainda que errónea e por vezes confusa à luz da gramática oficial, não constituiu por si só um obstáculo ao entendimento e à compreensão.The Portuguese army soldiers sent to the World War I trenches, pieces of the rural Portugal of the beginning of the 20th century, were mostly illiterate or uneducated men. The military action in foreign territories, in a context that led to the communication with troops of other nationalities, provided the creation of communicative bridges which were made invariably through the linguistic transposition. However, the improvised, inventive and/or creative way the Portuguese expressed themselves to the military or civil French people, despite being erroneous and sometimes grammatically confusing, did not reveal itself as an obstacle to the understanding and comprehension
administration and leadership from the high representative´s perspective
Esta tese analisa a arquitetura legal da Política Externa e de Segurança Comum, o regime
administrativo, e aspetos financeiros, abordando a evolução dos Tratados da União
Europeia no que concerne a política externa, segurança e defesa. Procura questionar a
validade de visões canónicas continuamente reproduzidas academicamente,
nomeadamente o peso que o Intergovernamentalismo e o Requerimento de Unanimidade
têm em limitar a Política Externa e de Segurança Comum. Enquanto que a maioria dos
estudos exagera o papel desempenhado pela Soberania, estes fazem-no partindo do
pressuposto que Estados-Nação são inerentemente aversos à cooperação, logo,
naturalmente ou política externa da UE não existe, ou tem um teto autoimposto. Os
estudos que chegam a abordar outros aspetos contribuintes para falhas de desempenho da
Política Externa e de Segurança Comum são maioritariamente ou mono temáticos, ou de
raiz puramente ancorada à Ciência Política, ao invés do Direito. Esta tese realça padrões
comuns encontrados no anterior, expondo tendências comuns e como se relacionam e
influenciam mutuamente, enquanto reconhece também o valor do posterior. Esta tese
adota uma análise holística, contribuindo para o mundo académico ao comparar e articular
pontos frequentemente desconexos e negligenciados.This thesis analyzes the Common Foreign and Security Policy’s legal architecture,
administrative regime, and financial aspects, addressing the European Union’s Treaty
evolution concerning foreign, security and defense. It aims at questioning the validity of
canonically held views continuously reproduced throughout academia, namely the weight
that Intergovernmentalism and the Unanimity Requirement have on limiting the Common
Foreign and Security Policy. While most studies exaggerate the role Sovereignty plays,
they do so starting from the assumption that Nation-States are inherently uncooperative,
ergo, naturally EU foreign policy either doesn’t exist, or has a self-imposed ceiling. Those
studies that do approach other aspects contributing to the Common Foreign and Security
Policy’s shortcomings are mostly either single-issue focused, or purely within the realm
of Political Science, rather than Law. This thesis highlights the common patterns found
in the former, exposing common trends and how they relate and influence each other,
whilst also acknowledging the value in the latter’s insights. This thesis adopts a holistic
analysis, contributing to the academic field in comparing and articulating often
disconnected and overlooked points
Self-healing radio maps of wireless networks for indoor positioning
Programa Doutoral em Telecomunicações MAP-tele das Universidades do Minho, Aveiro e PortoA Indústria 4.0 está a impulsionar a mudança para novas formas de produção e otimização em tempo real
nos espaços industriais que beneficiam das capacidades da Internet of Things (IoT) nomeadamente,
a localização de veículos para monitorização e optimização de processos. Normalmente os espaços industriais
possuem uma infraestrutura Wi-Fi que pode ser usada para localizar pessoas, bens ou veículos,
sendo uma oportunidade para aumentar a produtividade. Os mapas de rádio são importantes para os
sistemas de posicionamento baseados em Wi-Fi, porque representam o ambiente de rádio e são usados
para estimar uma posição. Os mapas de rádio são constituídos por amostras Wi-Fi recolhidas em posições
conhecidas e degradam-se ao longo do tempo devido a vários fatores, por exemplo, efeitos de propagação,
adição/remoção de APs, entre outros. O processo de construção do mapa de rádio costuma ser exigente
em termos de tempo e recursos humanos, constituindo um desafio considerável. Os veículos, que operam
em ambientes industriais podem ser explorados para auxiliar na construção de mapas de rádio, desde que
seja possível localizá-los e rastreá-los. O objetivo principal desta tese é desenvolver um sistema de posicionamento
para veículos industriais com mapas de rádio auto-regenerativos (capaz de manter os mapas
de rádio atualizados). Os veículos são localizados através da fusão sensorial de Wi-Fi com sensores de
movimento, que permitem anotar novas amostras Wi-Fi para o mapa de rádio auto-regenerativo. São propostas
duas abordagens de fusão sensorial, baseadas em Loose Coupling e Tight Coupling, para a
localização dos veículos. A abordagem Tight Coupling inclui uma métrica de confiança para determinar
quando é que as amostras de Wi-Fi devem ser anotadas. Deste modo, esta solução não requer calibração
nem esforço humano para a construção e manutenção do mapa de rádio. Os resultados obtidos em experiências
sugerem que esta solução tem potencial para a IoT e a Indústria 4.0, especialmente em serviços
de localização, mas também na monitorização, suporte à navegação autónoma, e interconectividade.Industry 4.0 is driving change for new forms of production and real-time optimization in factories, which
benefit from the Industrial Internet of Things (IoT) capabilities to locate industrial vehicles for monitoring,
improving safety, and operations. Most industrial environments have a Wi-Fi infrastructure that can be
exploited to locate people, assets, or vehicles, providing an opportunity for enhancing productivity and
interconnectivity. Radio maps are important for Wi-Fi-based Indoor Position Systems (IPSs) since they
represent the radio environment and are used to estimate a position. Radio maps comprise a set of Wi-
Fi samples collected at known positions, and degrade over time due to several aspects, e.g., propagation
effects, addition/removal of Access Points (APs), among others, hence they should be periodically updated
to maintain the IPS performance. The process to build and maintain radio maps is usually time-consuming
and demanding in terms of human resources, thus being challenging to perform. Vehicles, commonly
present in industrial environments, can be explored to help build and maintain radio maps, as long as it
is possible to locate and track them. The main objective of this thesis is to develop an IPS for industrial
vehicles with self-healing radio maps (capable of keeping radio maps up to date). Vehicles are tracked
using sensor fusion of Wi-Fi with motion sensors, which allows to annotate new Wi-Fi samples to build the
self-healing radio maps. Two sensor fusion approaches based on Loose Coupling and Tight Coupling are
proposed to track vehicles. The Tight Coupling approach includes a reliability metric to determine when
Wi-Fi samples should be annotated. As a result, this solution does not depend on any calibration or human
effort to build and maintain the radio map. Results obtained in real-world experiments suggest that this
solution has potential for IoT and Industry 4.0, especially in location services, but also in monitoring and
analytics, supporting autonomous navigation, and interconnectivity between devices.MAP-Tele Doctoral Programme scientific committee and the FCT (Fundação para a Ciência e Tecnologia) for the PhD grant (PD/BD/137401/2018
Co-evolution of morphology and controller for a robot
Genetic algorithms are inspired by the process of natural selection that exists in
nature. This process is what leads species to evolve and adapt to their surroundings, with the fittest species reproducing, leading to new generations that can take
advantage of their surroundings better than before. This type of process can be
used in evolutionary robotics to achieve controllers that are able to solve specific
tasks to evolve morphologies for a specific purpose such as to walk, swim, grasp
objects, among others.
Robotic grippers are used in most factories nowadays, as well as in other workplaces
such as hospitals and laboratories. They are used in tasks such as grabbing/moving
objects, painting, surgeries, among many other uses. Grippers are therefore a
case study with several possibilities that lend themselves to evolving morphologies
through genetic algorithms.
In this dissertation, we explore morphology generation through genetic algorithms.
Using grippers as our case study, we were able to generate grippers capable of
grabbing and lifting an object. To evolve these grippers, we created a simulated
environment where grippers followed a script with instructions to grab the object
and then move up. In total 120 different grippers were generated in these experiments. Out of those 120 generated grippers, 28% were able to grab and lift an
object successfully.
After the evaluation process was completed, we experimented with the grippers
in five different scenarios to test their robustness. In these scenarios, the object’s
starting conditions were different from those in the evaluation process.Os algoritmos genéticos são inspirados pelo processo de seleção natural que existe
na natureza. Este processo leva espécies a evoluir e adaptar-se ao meio ambiente
envolvente, com as espécies mais aptas reproduzindo, levando a que novas gerações
possam tirar um melhor proveito do ambiente que as rodeia. Este tipo de processo
pode ser utilizado na robótica evolucionária para evoluir controladores capazes de
resolver tarefas de forma a evoluir morfologias para uma finalidade específica, tais
como andar, nadar, agarrar objetos, entre outros.
Garras robóticas são utilizadas na maioria das fábricas, assim como noutros locais
de trabalho tais como hospitais e laboratórios. Podem ser utilizadas em tarefas
como agarrar/mover objetos, pintura, cirurgias, entre outros usos. São, portanto,
um caso de estudo com várias possibilidades que se prestam à evolução de morfologias através de algoritmos genéticos.
Nesta dissertação, exploramos a geração de morfologia através de algoritmos genéticos. Utilizando garras como o nosso caso de estudo, conseguimos gerar garras
capazes de agarrar e levantar um objeto. Para evoluir essas garras, criamos um
ambiente simulado onde cada garra seguiu um script com instruções para agarrar
o objeto e, em seguida, mover para cima. No total, 120 garras diferentes foram
geradas nestas experiências. Dessas garras geradas 120, 28% foram capazes de
capturar e levantar um objeto com êxito.
Após a conclusão do processo de avaliação, experimentamos as garras em cinco
cenários diferentes para testar a sua robustez. Nesses cenários, as condições iniciais
em que os objetos começam eram diferentes das do processo de avaliação
A Mobile Secure Bluetooth-Enabled Cryptographic Provider
The use of digital X509v3 public key certificates, together with different standards
for secure digital signatures are commonly adopted to establish authentication proofs
between principals, applications and services. One of the robustness characteristics commonly
associated with such mechanisms is the need of hardware-sealed cryptographic
devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled
tokens or dongles. These devices support internal functions for management and storage
of cryptographic keys, allowing the isolated execution of cryptographic operations, with
the keys or related sensitive parameters never exposed.
The portable devices most widely used are USB-tokens (or security dongles) and internal
ships of smart cards (as it is also the case of citizen cards, banking cards or ticketing
cards). More recently, a new generation of Bluetooth-enabled smart USB dongles appeared,
also suitable to protect cryptographic operations and digital signatures for secure
identity and payment applications. The common characteristic of such devices is to offer
the required support to be used as secure cryptographic providers. Among the advantages
of those portable cryptographic devices is also their portability and ubiquitous use, but,
in consequence, they are also frequently forgotten or even lost. USB-enabled devices imply
the need of readers, not always and not commonly available for generic smartphones
or users working with computing devices. Also, wireless-devices can be specialized or
require a development effort to be used as standard cryptographic providers.
An alternative to mitigate such problems is the possible adoption of conventional
Bluetooth-enabled smartphones, as ubiquitous cryptographic providers to be used, remotely,
by client-side applications running in users’ devices, such as desktop or laptop
computers. However, the use of smartphones for safe storage and management of private
keys and sensitive parameters requires a careful analysis on the adversary model assumptions.
The design options to implement a practical and secure smartphone-enabled
cryptographic solution as a product, also requires the approach and the better use of
the more interesting facilities provided by frameworks, programming environments and
mobile operating systems services.
In this dissertation we addressed the design, development and experimental evaluation
of a secure mobile cryptographic provider, designed as a mobile service provided in a smartphone. The proposed solution is designed for Android-Based smartphones and
supports on-demand Bluetooth-enabled cryptographic operations, including standard
digital signatures. The addressed mobile cryptographic provider can be used by applications
running on Windows-enabled computing devices, requesting digital signatures.
The solution relies on the secure storage of private keys related to X509v3 public certificates
and Android-based secure elements (SEs). With the materialized solution, an
application running in a Windows computing device can request standard digital signatures
of documents, transparently executed remotely by the smartphone regarded as a
standard cryptographic provider
Wireless mesh networks for smart-grids
Tese de mestrado. Mestrado Integrado em Engenharia Electrotécnica e de Computadores - Major Telecomunicações. Faculdade de Engenharia. Universidade do Porto. 201
Optical fiber sensors and sensing networks: overview of the main principles and applications
Optical fiber sensors present several advantages in relation to other types of sensors. These advantages are essentially related to the optical fiber properties, i.e., small, lightweight, resistant to high temperatures and pressure, electromagnetically passive, among others. Sensing is achieved by exploring the properties of light to obtain measurements of parameters, such as temperature, strain, or angular velocity. In addition, optical fiber sensors can be used to form an Optical Fiber Sensing Network (OFSN) allowing manufacturers to create versatile monitoring solutions with several applications, e.g., periodic monitoring along extensive distances (kilometers), in extreme or hazardous environments, inside structures and engines, in clothes, and for health monitoring and assistance. Most of the literature available on this subject focuses on a specific field of optical sensing applications and details their principles of operation. This paper presents a more broad overview, providing the reader with a literature review that describes the main principles of optical sensing and highlights the versatility, advantages, and different real-world applications of optical sensing. Moreover, it includes an overview and discussion of a less common architecture, where optical sensing and Wireless Sensor Networks (WSNs) are integrated to harness the benefits of both worlds.This work was supported by FCT—Fundação para a Ciência e Tecnologia within the R&D Units Project Scope: UIDB/00319/2020
- …