30 resultados para fuzzy vault, multiple biometrics, biometric cryptosystem, biometrics and cryptography


Relevância:

100.00% 100.00%

Publicador:

Resumo:

En el presente documento se hablará acerca del desarrollo de un proyecto para la mejora de un programa de análisis de señales; con ese fin, se hará uso de técnicas de optimización del software y de tecnologías de aceleración, mediante el aprovechamiento del paralelismo del programa. Además se hará un análisis de acerca del uso de dos tecnologías basadas en diferentes paradigmas de programación paralela; una mediante múltiples hilos con memoria compartida y la otra mediante el uso de GPUs como dispositivos de coprocesamiento. This paper will talk about the development of a Project to improve a program that does signals analysis; to that end, it will make use of software optimization techniques and acceleration technologies by exploiting parallelism in the program. In Addition will be done an analysis on the use of two technologies based on two different paradigms; one using multiple threads with shared memory and the other using GPU as co-processing devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La seguridad verificada es una metodología para demostrar propiedades de seguridad de los sistemas informáticos que se destaca por las altas garantías de corrección que provee. Los sistemas informáticos se modelan como programas probabilísticos y para probar que verifican una determinada propiedad de seguridad se utilizan técnicas rigurosas basadas en modelos matemáticos de los programas. En particular, la seguridad verificada promueve el uso de demostradores de teoremas interactivos o automáticos para construir demostraciones completamente formales cuya corrección es certificada mecánicamente (por ordenador). La seguridad verificada demostró ser una técnica muy efectiva para razonar sobre diversas nociones de seguridad en el área de criptografía. Sin embargo, no ha podido cubrir un importante conjunto de nociones de seguridad “aproximada”. La característica distintiva de estas nociones de seguridad es que se expresan como una condición de “similitud” entre las distribuciones de salida de dos programas probabilísticos y esta similitud se cuantifica usando alguna noción de distancia entre distribuciones de probabilidad. Este conjunto incluye destacadas nociones de seguridad de diversas áreas como la minería de datos privados, el análisis de flujo de información y la criptografía. Ejemplos representativos de estas nociones de seguridad son la indiferenciabilidad, que permite reemplazar un componente idealizado de un sistema por una implementación concreta (sin alterar significativamente sus propiedades de seguridad), o la privacidad diferencial, una noción de privacidad que ha recibido mucha atención en los últimos años y tiene como objetivo evitar la publicación datos confidenciales en la minería de datos. La falta de técnicas rigurosas que permitan verificar formalmente este tipo de propiedades constituye un notable problema abierto que tiene que ser abordado. En esta tesis introducimos varias lógicas de programa quantitativas para razonar sobre esta clase de propiedades de seguridad. Nuestra principal contribución teórica es una versión quantitativa de una lógica de Hoare relacional para programas probabilísticos. Las pruebas de correción de estas lógicas son completamente formalizadas en el asistente de pruebas Coq. Desarrollamos, además, una herramienta para razonar sobre propiedades de programas a través de estas lógicas extendiendo CertiCrypt, un framework para verificar pruebas de criptografía en Coq. Confirmamos la efectividad y aplicabilidad de nuestra metodología construyendo pruebas certificadas por ordendor de varios sistemas cuyo análisis estaba fuera del alcance de la seguridad verificada. Esto incluye, entre otros, una meta-construcción para diseñar funciones de hash “seguras” sobre curvas elípticas y algoritmos diferencialmente privados para varios problemas de optimización combinatoria de la literatura reciente. ABSTRACT The verified security methodology is an emerging approach to build high assurance proofs about security properties of computer systems. Computer systems are modeled as probabilistic programs and one relies on rigorous program semantics techniques to prove that they comply with a given security goal. In particular, it advocates the use of interactive theorem provers or automated provers to build fully formal machine-checked versions of these security proofs. The verified security methodology has proved successful in modeling and reasoning about several standard security notions in the area of cryptography. However, it has fallen short of covering an important class of approximate, quantitative security notions. The distinguishing characteristic of this class of security notions is that they are stated as a “similarity” condition between the output distributions of two probabilistic programs, and this similarity is quantified using some notion of distance between probability distributions. This class comprises prominent security notions from multiple areas such as private data analysis, information flow analysis and cryptography. These include, for instance, indifferentiability, which enables securely replacing an idealized component of system with a concrete implementation, and differential privacy, a notion of privacy-preserving data mining that has received a great deal of attention in the last few years. The lack of rigorous techniques for verifying these properties is thus an important problem that needs to be addressed. In this dissertation we introduce several quantitative program logics to reason about this class of security notions. Our main theoretical contribution is, in particular, a quantitative variant of a full-fledged relational Hoare logic for probabilistic programs. The soundness of these logics is fully formalized in the Coq proof-assistant and tool support is also available through an extension of CertiCrypt, a framework to verify cryptographic proofs in Coq. We validate the applicability of our approach by building fully machine-checked proofs for several systems that were out of the reach of the verified security methodology. These comprise, among others, a construction to build “safe” hash functions into elliptic curves and differentially private algorithms for several combinatorial optimization problems from the recent literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern embedded applications typically integrate a multitude of functionalities with potentially different criticality levels into a single system. Without appropriate preconditions, the integration of mixed-criticality subsystems can lead to a significant and potentially unacceptable increase of engineering and certification costs. A promising solution is to incorporate mechanisms that establish multiple partitions with strict temporal and spatial separation between the individual partitions. In this approach, subsystems with different levels of criticality can be placed in different partitions and can be verified and validated in isolation. The MultiPARTES FP7 project aims at supporting mixed- criticality integration for embedded systems based on virtualization techniques for heterogeneous multicore processors. A major outcome of the project is the MultiPARTES XtratuM, an open source hypervisor designed as a generic virtualization layer for heterogeneous multicore. MultiPARTES evaluates the developed technology through selected use cases from the offshore wind power, space, visual surveillance, and automotive domains. The impact of MultiPARTES on the targeted domains will be also discussed. In a number of ongoing research initiatives (e.g., RECOMP, ARAMIS, MultiPARTES, CERTAINTY) mixed-criticality integration is considered in multicore processors. Key challenges are the combination of software virtualization and hardware segregation and the extension of partitioning mechanisms to jointly address significant non-functional requirements (e.g., time, energy and power budgets, adaptivity, reliability, safety, security, volume, weight, etc.) along with development and certification methodology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este Proyecto Fin de Grado se centra en la definición de unos interfaces y el desarrollo de unos módulos que los ofrezcan y que permitan desarrollar un sistema para Smartphone mediante el que se puedan obtener medidas tanto de dispositivos biométricos como de una red inalámbrica de sensores (WSN – Wireless Sensor Network). Estos dos tipos de medidas deben poder ser mostradas de manera que se observe gráficamente su correlación espacio-temporal. Por tanto, estos interfaces ofrecen, principalmente, la posibilidad de gestionar un número indeterminado de dispositivos biométricos y tomar medidas de ellos, además de mecanismos de almacenamiento para dichas medidas. También existe la posibilidad de crear una representación gráfica de dichas medidas. Por último, se desarrolla un interfaz para obtener información proveniente de una red de sensores inalámbricos instalada en un determinado entorno en el cual el usuario estará realizando sus propias medidas. Además, se lleva a cabo la creación de la aplicación comentada, que hace uso de las interfaces especificadas, para realizar la correlación de las medidas. La aplicación permite al usuario mantener una lista de dispositivos, pudiendo consultar los parámetros de configuración de los mismos y tomar las medidas de aquellos que desee. Podrá visualizar en todo momento las medidas que se van realizando, y, por último, podrá representarlas gráficamente en pantalla. Los interfaces están creados de forma que sean flexibles de modo que puedan añadirse nuevas funciones en un futuro y permitan ser utilizados para diferentes aplicaciones. Los módulos que ofrecen estos interfaces están desarrollados para cumplir todas las funcionalidades que esperamos llevar a cabo en la aplicación creada. ABSTRACT. This Final Degree Project is focused on the definition of a set of interfaces, together with the implementation of the modules that comply with them, with the aim of creating a smartphone-based system to obtain measurements from both biometric devices and a wireless sensor network (WSN). These two types of measurements have to be graphically shown in order to observe their spatial and temporal correlation. Thus, the main purpose of the aforementioned interfaces is to manage an indeterminate number of biometric devices in order to obtain and store the measurements provided by them. There is also the possibility of creating a graphical representation of the data. In addition to all this, an interface has been developed for obtaining the information coming from a wireless sensor network deployed in the area where the user is taking his/her measurements. Also as part of the work performed, the smartphone application that utilizes the specified interfaces has been implemented, in order to actually perform the measurements correlation. This application allows the user to maintain the biometric devices list and control their configuration, including the activation of the measurements taking process. These data can be visualized anytime and, moreover, they can be represented graphically in the smartphone screen. The design of the interfaces is flexible in the sense that new functionality may be easily added to them in the future and new applications with different purposes may make use of them. The modules implemented as part of this Final Degree Project have been developed in order to comply with all the requirements of the smartphone system described above.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study of lateral dynamics of running trains on bridges is of importance mainly for the safety of the traffic, and may be relevant for laterally compliant bridges. These studies require threedimensional coupled vehicle-bridge models, wheree consideration of wheel to rail contact is a key aspect. Furthermore, an adequate evaluation of safety of rail traffic requires nonlinear models. A nonlinear coupled model is proposed here for vehicle-structure vertical and lateral dynamics. Vehicles are considered as fully three-dimensional multibody systems including gyroscopic terms and large rotation effects. The bridge structure is modeled by means of finite elements which may be of beam, shell or continuum type and may include geometric or material nonlinearities. The track geometry includes distributed track alignment irregularities. Both subsystems (bridge and vehicles) are described with coordinates in absolute reference frames, as opposed to alternative approaches which describe the multibody system with coordinates relative to the base bridge motion. The wheelrail contact employed is a semi-Hertzian model based on realistic wheel-rail profiles. It allows a detailed geometrical description of the contact patch under each wheel including multiple-point contact, flange contact and uplift. Normal and tangential stresses in each contact are integrated at each time-step to obtain the resultant contact forces. The models have been implemented within an existing finite element analysis software with multibody capabilities, Abaqus (Simulia Ltd., 2010). Further details of the model are presented in Antolín et al. (2012). Representative applications are presented for railway vehicles under lateral wind action on laterally compliant viaducts, showing the relevance of the nonlinear wheel-rail contact model as well as the interaction between bridge and vehicle.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A computer solution to analyze nonprismatic folded plate structures is shown. Arbitrary cross-sections (simple and multiple), continuity over intermediate supports and general loading and longitudinal boundary conditions are dealt with. The folded plates are assumed to be straight and long (beam like structures) and some simplifications are introduced in order to reduce the computational effort. The formulation here presented may be very suitable to be used in the bridge deck analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advances in non-destructive imaging techniques, such as X-ray computed tomography (CT), make it possible to analyse pore space features from the direct visualisation from soil structures. A quantitative characterisation of the three-dimensional solid-pore architecture is important to understand soil mechanics, as they relate to the control of biological, chemical, and physical processes across scales. This analysis technique therefore offers an opportunity to better interpret soil strata, as new and relevant information can be obtained. In this work, we propose an approach to automatically identify the pore structure of a set of 200-2D images that represent slices of an original 3D CT image of a soil sample, which can be accomplished through non-linear enhancement of the pixel grey levels and an image segmentation based on a PFCM (Possibilistic Fuzzy C-Means) algorithm. Once the solids and pore spaces have been identified, the set of 200-2D images is then used to reconstruct an approximation of the soil sample by projecting only the pore spaces. This reconstruction shows the structure of the soil and its pores, which become more bounded, less bounded, or unbounded with changes in depth. If the soil sample image quality is sufficiently favourable in terms of contrast, noise and sharpness, the pore identification is less complicated, and the PFCM clustering algorithm can be used without additional processing; otherwise, images require pre-processing before using this algorithm. Promising results were obtained with four soil samples, the first of which was used to show the algorithm validity and the additional three were used to demonstrate the robustness of our proposal. The methodology we present here can better detect the solid soil and pore spaces on CT images, enabling the generation of better 2D?3D representations of pore structures from segmented 2D images.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

During the last years many researchers have been working on the active matching or on non-Foster matching networks for one- and two-port electrically small antennas (ESAs). A new parameter on the sensitivity of the two-port electrically small antenna when loaded with a non-F oster network is presented. This sensitivity analysis will allow us to choose what kind of antennas can be properly matched with non-Foster networks and their position in order to optimi ze the performance of the design. Then, a typical high Q two-port antenna will be harder to match over a broad bandwidth, since |S21| is very small and only agrees with |S11| over very small frequency bands, yielding very large sensitivity values. However, for these two-port antennas, if high levels of coupling can be engineered for a high Q multiple-port antenna, the return and insertion losses can be similar over larger bandwidths and, hence, the sensitivity can be kept low over larger bandwidths, enabling broader impedance matched bandwidths to be achieved, even for highly resonant antennas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aircraft tracking plays a key and important role in the Sense-and-Avoid system of Unmanned Aerial Vehicles (UAVs). This paper presents a novel robust visual tracking algorithm for UAVs in the midair to track an arbitrary aircraft at real-time frame rates, together with a unique evaluation system. This visual algorithm mainly consists of adaptive discriminative visual tracking method, Multiple-Instance (MI) learning approach, Multiple-Classifier (MC) voting mechanism and Multiple-Resolution (MR) representation strategy, that is called Adaptive M3 tracker, i.e. AM3. In this tracker, the importance of test sample has been integrated to improve the tracking stability, accuracy and real-time performances. The experimental results show that this algorithm is more robust, efficient and accurate against the existing state-of-art trackers, overcoming the problems generated by the challenging situations such as obvious appearance change, variant surrounding illumination, partial aircraft occlusion, blur motion, rapid pose variation and onboard mechanical vibration, low computation capacity and delayed information communication between UAVs and Ground Station (GS). To our best knowledge, this is the first work to present this tracker for solving online learning and tracking freewill aircraft/intruder in the UAVs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En esta tesis se aborda el problema de la externalización segura de servicios de datos y computación. El escenario de interés es aquel en el que el usuario posee datos y quiere subcontratar un servidor en la nube (“Cloud”). Además, el usuario puede querer también delegar el cálculo de un subconjunto de sus datos al servidor. Se presentan dos aspectos de seguridad relacionados con este escenario, en concreto, la integridad y la privacidad y se analizan las posibles soluciones a dichas cuestiones, aprovechando herramientas criptográficas avanzadas, como el Autentificador de Mensajes Homomórfico (“Homomorphic Message Authenticators”) y el Cifrado Totalmente Homomórfico (“Fully Homomorphic Encryption”). La contribución de este trabajo es tanto teórica como práctica. Desde el punto de vista de la contribución teórica, se define un nuevo esquema de externalización (en lo siguiente, denominado con su término inglés Outsourcing), usando como punto de partida los artículos de [3] y [12], con el objetivo de realizar un modelo muy genérico y flexible que podría emplearse para representar varios esquemas de ”outsourcing” seguro. Dicho modelo puede utilizarse para representar esquemas de “outsourcing” seguro proporcionando únicamente integridad, únicamente privacidad o, curiosamente, integridad con privacidad. Utilizando este nuevo modelo también se redefine un esquema altamente eficiente, construido en [12] y que se ha denominado Outsourcinglin. Este esquema permite calcular polinomios multivariados de grado 1 sobre el anillo Z2k . Desde el punto de vista de la contribución práctica, se ha construido una infraestructura marco (“Framework”) para aplicar el esquema de “outsourcing”. Seguidamente, se ha testado dicho “Framework” con varias implementaciones, en concreto la implementación del criptosistema Joye-Libert ([18]) y la implementación del esquema propio Outsourcinglin. En el contexto de este trabajo práctico, la tesis también ha dado lugar a algunas contribuciones innovadoras: el diseño y la implementación de un nuevo algoritmo de descifrado para el esquema de cifrado Joye-Libert, en colaboración con Darío Fiore. Presenta un mejor comportamiento frente a los algoritmos propuestos por los autores de [18];la implementación de la función eficiente pseudo-aleatoria de forma amortizada cerrada (“amortized-closed-form efficient pseudorandom function”) de [12]. Esta función no se había implementado con anterioridad y no supone un problema trivial, por lo que este trabajo puede llegar a ser útil en otros contextos. Finalmente se han usado las implementaciones durante varias pruebas para medir tiempos de ejecución de los principales algoritmos.---ABSTRACT---In this thesis we tackle the problem of secure outsourcing of data and computation. The scenario we are interested in is that in which a user owns some data and wants to “outsource” it to a Cloud server. Furthermore, the user may want also to delegate the computation over a subset of its data to the server. We present the security issues related to this scenario, namely integrity and privacy and we analyse some possible solutions to these two issues, exploiting advanced cryptographic tools, such as Homomorphic Message Authenticators and Fully Homomorphic Encryption. Our contribution is both theoretical and practical. Considering our theoretical contribution, using as starting points the articles of [3] and [12], we introduce a new cryptographic primitive, called Outsourcing with the aim of realizing a very generic and flexible model that might be employed to represent several secure outsourcing schemes. Such model can be used to represent secure outsourcing schemes that provide only integrity, only privacy or, interestingly, integrity with privacy. Using our new model we also re-define an highly efficient scheme constructed in [12], that we called Outsourcinglin and that is a scheme for computing multi-variate polynomials of degree 1 over the ring Z2k. Considering our practical contribution, we build a Framework to implement the Outsourcing scheme. Then, we test such Framework to realize several implementations, specifically the implementation of the Joye-Libert cryptosystem ([18]) and the implementation of our Outsourcinglin scheme. In the context of this practical work, the thesis also led to some novel contributions: the design and the implementation, in collaboration with Dario Fiore, of a new decryption algorithm for the Joye-Libert encryption scheme, that performs better than the algorithms proposed by the authors in [18]; the implementation of the amortized-closed-form efficient pseudorandom function of [12]. There was no prior implementation of this function and it represented a non trivial work, which can become useful in other contexts. Finally we test the implementations to execute several experiments for measuring the timing performances of the main algorithms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Emotion is generally argued to be an influence on the behavior of life systems, largely concerning flexibility and adaptivity. The way in which life systems acts in response to a particular situations of the environment, has revealed the decisive and crucial importance of this feature in the success of behaviors. And this source of inspiration has influenced the way of thinking artificial systems. During the last decades, artificial systems have undergone such an evolution that each day more are integrated in our daily life. They have become greater in complexity, and the subsequent effects are related to an increased demand of systems that ensure resilience, robustness, availability, security or safety among others. All of them questions that raise quite a fundamental challenges in control design. This thesis has been developed under the framework of the Autonomous System project, a.k.a the ASys-Project. Short-term objectives of immediate application are focused on to design improved systems, and the approaching of intelligence in control strategies. Besides this, long-term objectives underlying ASys-Project concentrate on high order capabilities such as cognition, awareness and autonomy. This thesis is placed within the general fields of Engineery and Emotion science, and provides a theoretical foundation for engineering and designing computational emotion for artificial systems. The starting question that has grounded this thesis aims the problem of emotion--based autonomy. And how to feedback systems with valuable meaning has conformed the general objective. Both the starting question and the general objective, have underlaid the study of emotion, the influence on systems behavior, the key foundations that justify this feature in life systems, how emotion is integrated within the normal operation, and how this entire problem of emotion can be explained in artificial systems. By assuming essential differences concerning structure, purpose and operation between life and artificial systems, the essential motivation has been the exploration of what emotion solves in nature to afterwards analyze analogies for man--made systems. This work provides a reference model in which a collection of entities, relationships, models, functions and informational artifacts, are all interacting to provide the system with non-explicit knowledge under the form of emotion-like relevances. This solution aims to provide a reference model under which to design solutions for emotional operation, but related to the real needs of artificial systems. The proposal consists of a multi-purpose architecture that implement two broad modules in order to attend: (a) the range of processes related to the environment affectation, and (b) the range or processes related to the emotion perception-like and the higher levels of reasoning. This has required an intense and critical analysis beyond the state of the art around the most relevant theories of emotion and technical systems, in order to obtain the required support for those foundations that sustain each model. The problem has been interpreted and is described on the basis of AGSys, an agent assumed with the minimum rationality as to provide the capability to perform emotional assessment. AGSys is a conceptualization of a Model-based Cognitive agent that embodies an inner agent ESys, the responsible of performing the emotional operation inside of AGSys. The solution consists of multiple computational modules working federated, and aimed at conforming a mutual feedback loop between AGSys and ESys. Throughout this solution, the environment and the effects that might influence over the system are described as different problems. While AGSys operates as a common system within the external environment, ESys is designed to operate within a conceptualized inner environment. And this inner environment is built on the basis of those relevances that might occur inside of AGSys in the interaction with the external environment. This allows for a high-quality separate reasoning concerning mission goals defined in AGSys, and emotional goals defined in ESys. This way, it is provided a possible path for high-level reasoning under the influence of goals congruence. High-level reasoning model uses knowledge about emotional goals stability, letting this way new directions in which mission goals might be assessed under the situational state of this stability. This high-level reasoning is grounded by the work of MEP, a model of emotion perception that is thought as an analogy of a well-known theory in emotion science. The work of this model is described under the operation of a recursive-like process labeled as R-Loop, together with a system of emotional goals that are assumed as individual agents. This way, AGSys integrates knowledge that concerns the relation between a perceived object, and the effect which this perception induces on the situational state of the emotional goals. This knowledge enables a high-order system of information that provides the sustain for a high-level reasoning. The extent to which this reasoning might be approached is just delineated and assumed as future work. This thesis has been studied beyond a long range of fields of knowledge. This knowledge can be structured into two main objectives: (a) the fields of psychology, cognitive science, neurology and biological sciences in order to obtain understanding concerning the problem of the emotional phenomena, and (b) a large amount of computer science branches such as Autonomic Computing (AC), Self-adaptive software, Self-X systems, Model Integrated Computing (MIC) or the paradigm of models@runtime among others, in order to obtain knowledge about tools for designing each part of the solution. The final approach has been mainly performed on the basis of the entire acquired knowledge, and described under the fields of Artificial Intelligence, Model-Based Systems (MBS), and additional mathematical formalizations to provide punctual understanding in those cases that it has been required. This approach describes a reference model to feedback systems with valuable meaning, allowing for reasoning with regard to (a) the relationship between the environment and the relevance of the effects on the system, and (b) dynamical evaluations concerning the inner situational state of the system as a result of those effects. And this reasoning provides a framework of distinguishable states of AGSys derived from its own circumstances, that can be assumed as artificial emotion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La zona de Madrid al Este del Retiro ha estado indefectiblemente condicionada en su tardío desarrollo urbano por su posición a espaldas del Real Sitio. La construcción hacia 1640 de las tapias que rodeaban los reales jardines transformó la red de caminos que partían hacia oriente, aisló los terrenos ubicados más al Este de la ciudad, con la que ya sólo se podrían comunicar por las carreteras de Aragón y Valencia, y condenó las expectativas de desarrollo urbano reduciendo los precios de las propiedades, lo cual determinó durante décadas los usos y la arquitectura de la zona. El Anteproyecto de Ensanche de Carlos María de Castro constituye el germen a partir del cual, durante un lento proceso de casi cien años, fue configurándose la ciudad que hoy conocemos. La identificación en el Archivo de Villa del primer plano general del Ensanche trazado por Castro, del cual anteriores trabajos advirtieron de su existencia aunque se desconocía su localización, es la principal aportación de esta investigación. Por un lado, este primer plano general del Ensanche manuscrito es, por sí mismo, un documento de indudable importancia en la historia del urbanismo madrileño. En segundo lugar, el análisis de su contenido arroja nueva luz sobre la propuesta original de Castro, parcialmente censurada por la Dirección General de Obras Públicas antes de la aprobación del plan en 1860. Especialmente en lo referente a la zona de Madrid al Este del Retiro, proyectada como barrio obrero del Ensanche, este documento ha aportado un enfoque desconocido hasta ahora sobre el paisaje urbano concebido por Castro para la más ambiciosa propuesta planteada en mucho tiempo al problema de la vivienda obrera. Finalmente, el análisis de la factura del plano revela la superposición de varias capas de dibujo, evidenciando que durante un tiempo fue un documento vivo, utilizado como plano de trabajo por el equipo de Castro durante aproximadamente diez años, hasta la destitución del ingeniero en 1868. Posteriores análisis del plano sobre otros ámbitos de la ciudad arrojarán sin duda nuevos datos sobre el proceso proyectual del conjunto del Ensanche. Pero la dinámica de lo real, sintetizable en múltiples factores de índole social, económica y legislativa, transformó durante las primeras décadas de andadura del Ensanche la ciudad proyectada por Castro al Este del Retiro. El dibujo de la ciudad, entendido como herramienta de análisis y empleado con éxito en trabajos de investigación realizados por otros autores en la misma línea, ha permitido deducir la reconstitución gráfica del estado de la ciudad en diferentes momentos singulares del desarrollo urbanístico de la zona, así como de la propuesta original de barrio obrero de Castro. No hay que olvidar que, a pesar del escaso interés que suscitaba entre los inversores inmobiliarios el ámbito geográfico de estudio de esta tesis, fue objeto, durante casi un siglo, de numerosas propuestas de ordenación y urbanización que, aunque no llegaron a materializarse, fueron configurando una suerte de desarrollo virtual de la ciudad paralelo al devenir de la realidad. De esta forma, el dibujo se constituye en esta tesis como fuente de información, herramienta de pensamiento y resultado de la investigación en sí mismo, ilustrando y contribuyendo al mejor conocimiento de la forma urbana. ABSTRACT The area of Madrid to the East of the Retiro has been inevitably conditioned in its late urban development by its position behind the Royal Site. The construction of the walls surrounding the royal gardens around 1640 transformed the network of roads departing eastward, isolated land located to the East of the city, with which already only could communicate by roads of Aragon and Valencia, condemned the expectations of urban development by reducing the prices of the properties, and determined for decades uses and architecture of the area. The Carlos María de Castro preliminary design of City Expansion is the germ from which, during a slow process of almost one hundred years, the city which we know today was setting up. The discovery in the City Archive of the City Expansion first drawing traced by Castro, which previous investigations warned of its existence although its location was unknown, is the main contribution of this research. Firstly, this hand drawn general plan of the city expansion is by itself a document of undoubted importance in the history of Madrid urbanism. Secondly, the analysis of its content sheds new light on Castro´s original proposal, partially censored by the Dirección General de Obras Públicas before the approval of the plan in 1860. Especially concerning the area of Madrid to the East of the Retiro, projected as a workingclass district of the City Expansion, this document has provided an unknown up to now approach on the urban landscape designed by Castro for the more ambitious proposal put forward in a long time to the problem of worker housing. Finally, analysis of hand drawn plan reveals the superposition of several layers of drawing, demonstrating that for a time it was a living document, used as a work plan by the Castro team for approximately ten years, until the dismissal of the engineer in 1868. Subsequent analysis of the drawing on other areas of the city will have no doubt new data on the design process of the whole City Expansion. But the dynamics of reality, synthesizable on multiple factors in social, economic and legislative, transformed during the first decades of existence of the City Expansion designed by Castro to the East of the Retiro. Drawing of the city, understood as a tool of analysis and used successfully in research works done by other authors on the same line, has allowed to deduct graphic reconstitution of the city status in different and singular moments in the urban development of the area, as well as the original Castro´s proposal of working-class district. It should not be forgotten that, despite the lack of interest which raised among investors the geographic scope of this thesis study, it was the object, for nearly a century, of numerous proposals for urbanization which, although they didn´t materialize, were setting up a sort of virtual development of the city parallel to the becoming of the reality. In this way, drawing is used in the thesis as a source of information, tool of thought and outcome of the research itself, illustrating and contributing to a better understanding of urban form.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Según Heidegger, la esencia de la arquitectura, de la construcción, descansa en un no espacio: en la materia con que se construyen las fronteras que otorgan espacios, irradiando sobre ellos aquello que los caracteriza. Si hay alguna materia, de las utilizadas por la arquitectura a lo largo de su historia para construir fronteras, que haya mantenido una especial relación con la luz y la visión, dando un carácter inconfundible a los espacios aviados por ellas, esta es el vidrio; algunas de las etimologías de su nombre: zakû (ser claro), hyalos (diáfano) o vitrum (ver), así lo evidencian. Posiblemente, sea la pregnancia de este modo fascinante de relacionarse con la luz, la que ha hecho del vidrio, a lo largo del tiempo que lleva siendo usado en arquitectura, y aún antes, el material que ha provocado en el imaginario humano la ilusión de ser aquel en que, en último término, podrían llegar a sublimarse todos los demás, dando lugar con ello a lo que en la tesis hemos denominado el sueño de la arquitectura de cristal. Siendo la luz, siempre, energía, consideraremos en la tesis luz-energía, a aquella que ilumina y calienta; es una luz científica y mesurable. Cuando la luz se “hace visible”, desvelando un mensaje “contenido” en el vidrio, hablaremos de luz-información. Esta luz, no puede medirse científicamente. La luz-energía y la luz-información, se manifiestan al conjuro de la arquitectura de vidrio. Es la segunda la que ha conformado las fronteras de vidrio enmascarado, y la que se estudia con más detenimiento en la tesis. Los distintos modos de usar en arquitectura la infinita combinatoria de las propiedades de absortancia, reflectancia, transmitancia y translucencia del vidrio, ha condicionado al hombre en su manera de “ver” el mundo. Unas veces, “inmerso” en él, puesto que solo lo separa del mismo, una frontera transparente, y “deseadamente” invisible: ese modo de usar el vidrio, ha sido el sueño imposible de una parte importante de la arquitectura del siglo XX. Otras veces, para “aislarse” de él, el hombre ha manipulado la luz y el vidrio para construir mundos diferentes. Las fronteras de vidrio enmascarado de color, mosaicos, vidrieras, pantallas y lo que hemos llamado vidrios complejos (con un cometido similar al que Schiller atribuía al coro en la tragedia griega, aislar a esta del “mundo real”, para mantener su libertad poética), son las fronteras que han construido el sueño posible de la arquitectura de cristal. Ambas actitudes, en distintos momentos de la historia de la arquitectura, han sido dos formas de querer materializar un mismo sueño. La capacidad del vidrio para adaptarse a tantos modos de presentarse ante nosotros, y a poder ser interpretado de tantas formas diferentes, es la que ha servido para dar título a la tesis, pues hasta en su faceta más transparente, el vidrio, de una forma o de otra, se ha mostrado siempre como un material enmascarado en el más amplio sentido de la palabra: se enmascara, incluso cuando apela a la transparencia o se convierte en espejo, para hacernos caer en la ilusión de que no está presente. Cuando el hombre construyó fronteras de vidrio e incluso antes, cuando soñó que con él podría llegar a construirlas, condensó en ellas toda la mítica, la mística y la epistemología en torno a la luz y la visión, dando lugar a una serie de arquetipos arquitectónicos. En la iglesia bizantina, la luz sobre, o la luz desde, los mosaicos, construyó una frontera titilante; y en la catedral gótica, la luz a través de las vidrieras construyó una frontera radiante; en ambos casos con el fin de alcanzar anagógicamente lo Inteligible. En el siglo XIX, con el descubrimiento de la electricidad y su incorporación a la arquitectura, las fronteras se vuelven fulgurantes, aviando, en este caso, el espacio urbano. Poco antes, en este mismo siglo, el espíritu del gótico tiene un efímero resurgir del que se nutrirá, a comienzos del siglo XX, el expresionismo cristalino, en el que la luz anagógica se hace laica. El espacio urbano fulgurante prefigurado por este movimiento y presente en las ciudades desde principios del siglo XX, fue potenciado a mediados de ese siglo con la aparición de las pantallas, extendiéndose desde entonces, imparable, por todo el planeta. La reciente emergencia de los vidrios complejos, ha abierto la posibilidad de construir fronteras a la carta (de vidrios de propiedades múltiples, seleccionadas de forma voluntaria y variable en cada momento). En principio, se pensó que, el uso de estos vidrios como cerramiento, podría llegar a constituirse como la panacea de los problemas del material relacionados con la luz-energía, sin necesidad de recurrir a “prótesis”, y manteniendo por tanto la seductora tersura de la fachada; aunque parece que, por ahora, esa posibilidad es, cuando menos, lejana. Sin embargo, en el campo de las megapantallas urbanas (y ,en general, en el de las pantallas de información), ubicuas actualmente en nuestras vidas, los vidrios complejos ayudan a construir los espesos velos de ilusión, que según Lefebvre sirven para mantener el capitalismo, siendo el último estadio de un desarrollo tecnológico, impuesto por el principio de economía del hombre, que como un metrónomo inexorable, y a modo de contrapunto, ha acompañado siempre (de nuevo en palabras de Lefebvre), a la necesidad del gasto, del juego, de la lucha, del arte, de la fiesta. La tecnología y el arte forman parte de la cultura producida por la sociedad y como señala Lévi-Strauss, esa cultura imprime orden; por el contrario, la sociedad, entendida como el conjunto de relaciones que los hombres mantienen entre sí, produce desorden. Del equilibrio entre esos extremos, surge el progreso, incluido el de la arquitectura. Las fronteras de vidrio que analizamos en la tesis –que avían espacios para la espiritualidad, el fasto y el espectáculo o, desde otro punto de vista, para las distintas manifestaciones del poder: la iglesia, la monarquía, el estado o el mercado– también han surgido de esa concomitancia entre el desorden y el orden; y forma parte de ese desorden, la aventura que ha impulsado al genio individual de místicos, alquimistas, geómetras, abades, reyes, inventores, poetas y arquitectos, a explorar, como escribe Apollinaire, vastos y extraños territorios donde el misterio en flor, se ofrece a quien quiera cogerlo, hogueras nuevas de colores nunca vistos, mil fantasmas imponderables a los que dar cuerpo. ABSTRACT According to Heidegger, the essence of architecture, building, lies in a non-space: the material that creates the boundaries from which something begins its presencing, radiating onto them that which characterizes them. If there is any single material amongst all those used throughout the history of architecture to build boundaries which has maintained a special relationship with light and vision, which has bestowed a distinctive character on spaces avid for them, it is glass. This is evidenced in some of its etymologies: zakû (to be clear), hyalos (transparent), vitrum (see). The rich potential of this fascinating way of relating to light in the history of the architectural use of glass, and even before, is possibly what has triggered the illusion in human imagination of being something that can ultimately sublimate all others, giving rise to what in this thesis we call The Dream of Crystal Architecture. Given that light is always energy, in this thesis we consider energy-light to be that which illuminates and warms. This is scientific, measurable light. When light "becomes visible" and reveals a message “contained” in glass, we speak of information-light. This light cannot be measured scientifically. Energy-light and information-light are manifested under the spell of glass architecture. The latter is what has shaped the boundaries of coloured glass, which is studied in this thesis. Architecture's different ways of using the infinite combinations of the absorptance, reflectance, transmittance and translucency of glass has affected the way we humans "see" the world. Sometimes we are "immersed" in it, since only an invisible, transparent boundary separates us from it: this use of glass has characterized a considerable part of 20th century architecture. In other cases, in order to "isolate" us from it, we have manipulated light and glass to build different worlds: the boundaries of glass "masked" by colour, mosaics, stained glass, screens and what we have called complex glazing, which plays a similar role to what Schiller attributed to the chorus in Greek tragedy, isolating it from the "real world" in order to maintain its poetic license. These are the boundaries that have built the viable dream of crystal architecture. These two approaches have been different ways of making same dream come true at different times in the history of architecture. The ability of glass to adapt to so many forms of manifestation, and interpretation, is what has given rise to the title of the thesis. Even in its most transparent facet, glass has one way or another always been a masking material in the broadest sense of the word: it is masked even when it invites transparency or becomes a mirror, triggering the illusion that it is not present. When man began to build glass boundaries, and even before, when he dreamed that he could build them, he condensed in them all the mythology, mysticism and epistemology concerning light and vision, which gave rise to a series of architectural archetypes. In the Byzantine church, light on or from mosaics created tenuous boundaries. In Gothic cathedrals, the light through the stained glass windows constructed radiant boundaries. In both cases the aim was to achieve, in an anagogical way, the Intelligible. In the 19th, the discovery of electricity and its use in architecture led to the production of dazzling boundaries, in this case employed in urban spaces. Earlier in the same century, the Gothic spirit had a short-lived revival, which in the early 20th century drew from crystalline expressionism in which anagogic light became secular. The dazzling urban space prefigured by this movement, present in cities since the early 20th century, was intensified in the mid-century with the emergence of screens, and since then it has spread unstoppably across the world. The recent emergence of complex glasses has made it possible to build boundaries on demand in glass with multiple properties, chosen at will and at whim at any time. Initially it was thought that the use of this glass as a wall could eventually become the panacea for the material problems related to energy-light, without needing to resort to "prosthesis" and thereby maintain the seductive smoothness of the facade. For now, that possibility seems remote, to say the least. In the realm of urban megascreens and information screens in general, now ubiquitous in our lives, complex glasses help to build the thick veils of illusion which, according to Lefebvre, serve to maintain capitalism. Like an inexorable metronome, in counterpoint, this ultimate state of technological development imposed by man's principle of economy has in fact always accompanied (again in the words of Lefebvre), the need to spend, play, fight, art, and party. Technology and art are part of the culture produced by society. As Levi-Strauss says, this culture imposes order. On the contrary, society, understood as a set of relationships amongst people, produces disorder. Progress, including that of architecture, arises from the balance between these two extremes. The glass boundaries analyzed in this thesis, which propitiate spaces for spirituality, pomp and spectacle or, from a different perspective, for the various manifestations of power: the church, the monarchy, the state and the market, have also emerged from the concomitance of order and disorder. One aspect of this disorder is the adventure that has inspired the individual genius of mystics, alchemists, surveyors, abbots, kings, inventors, poets and architects to explore, as Apollinaire says, vast, strange domains where flowering mystery offers itself to whoever wishes to pluck it, new fires, colours you have never seen before, a thousand intangible phantasms still awaiting reality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El habla es la principal herramienta de comunicación de la que dispone el ser humano que, no sólo le permite expresar su pensamiento y sus sentimientos sino que le distingue como individuo. El análisis de la señal de voz es fundamental para múltiples aplicaciones como pueden ser: síntesis y reconocimiento de habla, codificación, detección de patologías, identificación y reconocimiento de locutor… En el mercado se pueden encontrar herramientas comerciales o de libre distribución para realizar esta tarea. El objetivo de este Proyecto Fin de Grado es reunir varios algoritmos de análisis de la señal de voz en una única herramienta que se manejará a través de un entorno gráfico. Los algoritmos están siendo utilizados en el Grupo de investigación en Aplicaciones MultiMedia y Acústica de la Universidad Politécnica de Madrid para llevar a cabo su tarea investigadora y para ofertar talleres formativos a los alumnos de grado de la Escuela Técnica Superior de Ingeniería y Sistemas de Telecomunicación. Actualmente se ha encontrado alguna dificultad para poder aplicar los algoritmos ya que se han ido desarrollando a lo largo de varios años, por distintas personas y en distintos entornos de programación. Se han adaptado los programas existentes para generar una única herramienta en MATLAB que permite: . Detección de voz . Detección sordo/sonoro . Extracción y revisión manual de frecuencia fundamental de los sonidos sonoros . Extracción y revisión manual de formantes de los sonidos sonoros En todos los casos el usuario puede ajustar los parámetros de análisis y se ha mantenido y, en algunos casos, ampliado la funcionalidad de los algoritmos existentes. Los resultados del análisis se pueden manejar directamente en la aplicación o guardarse en un fichero. Por último se ha escrito el manual de usuario de la aplicación y se ha generado una aplicación independiente que puede instalarse y ejecutarse aunque no se disponga del software o de la versión adecuada de MATLAB. ABSTRACT. The speech is the main communication tool which has the human that as well as allowing to express his thoughts and feelings distinguishes him as an individual. The analysis of speech signal is essential for multiple applications such as: synthesis and recognition of speech, coding, detection of pathologies, identification and speaker recognition… In the market you can find commercial or open source tools to perform this task. The aim of this Final Degree Project is collect several algorithms of speech signal analysis in a single tool which will be managed through a graphical environment. These algorithms are being used in the research group Aplicaciones MultiMedia y Acústica at the Universidad Politécnica de Madrid to carry out its research work and to offer training workshops for students at the Escuela Técnica Superior de Ingeniería y Sistemas de Telecomunicación. Currently some difficulty has been found to be able to apply the algorithms as they have been developing over several years, by different people and in different programming environments. Existing programs have been adapted to generate a single tool in MATLAB that allows: . Voice Detection . Voice/Unvoice Detection . Extraction and manual review of fundamental frequency of voiced sounds . Extraction and manual review formant voiced sounds In all cases the user can adjust the scan settings, we have maintained and in some cases expanded the functionality of existing algorithms. The analysis results can be managed directly in the application or saved to a file. Finally we have written the application user’s manual and it has generated a standalone application that can be installed and run although the user does not have MATLAB software or the appropriate version.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Uno de los capítulos más interesantes del gótico europeo lo constituyen las bóvedas sexpartitas, sin lugar a dudas una de las bóvedas más singulares jamás creadas dentro de este estilo. Las primeras bóvedas góticas, en cruce de ojivas y de planta cuadrada, limitaban su uso a espacios relativamente pequeños, pero ante la necesidad de cubrir espacios de considerables dimensiones, apareció una nueva bóveda de características muy peculiares; la sexpartita. Esta bóveda en cruce de ojivas está reforzada por el centro con un arco paralelo a los arcos fajones que la divide por la mitad y que fragmenta el arco formero en dos, creando una pareja de ventanales en cada lado. La sencilla superficie en bóveda de arista, en el origen de las bóvedas de crucería, se complica extraordinariamente creando una volumetría de gran complejidad con seis cuarteles de plementería y con seis apoyos de distinto tamaño, cuatros esquineros y dos centrales más pequeños. Las dificultades que implica la construcción de este tipo de bóvedas explican quizás su abandono prematuro y la vuelta a la bóveda de crucería simple, ahora de tramos rectangulares. No obstante, a pesar de su corta existencia, la bóveda sexpartita fue la gran protagonista de los inicios del gótico y con ella se llevaron a cabo importantes abovedamientos, desde Inglaterra hasta Rumanía. La disciplina de la Historia de la Construcción se vio extraordinariamente favorecida por los estudios realizados en el siglo XIX, sin embargo su investigación se abandona durante el siglo XX para ser recuperada recientemente. Viollet-le-Duc, a finales del s. XIX, hace una sucinta explicación de este tipo de bóvedas. También Auguste Choisy, más tarde, dedica unas páginas a la bóveda sexpartita francesa; desde entonces, este tema, ha merecido escasísimas referencias en los estudios posteriores. Esta investigación se enmarca en este contexto y pretende poner de manifiesto los conocimientos geométricos y constructivos que hicieron posible la realización de las bóvedas sexpartitas europeas. Para ello se ha llevado a cabo la investigación de las principales bóvedas en Europa occidental; Francia, España, Inglaterra, Alemania, Suiza e Italia. Su estudio comparativo nos ha permitido poner de manifiesto sus características constructivas comunes y aquellos aspectos propios de cada país, así como algunos de los canales de comunicación que permitieron la expansión de esta arquitectura. Las nuevas tecnologías de medición, el escáner láser, la estación total, la fotogrametría, etc., han supuesto una revolución para la documentación y restauración del Patrimonio y un salto cualitativo formidable para el análisis de las bóvedas góticas, permitiendo estudios de la arquitectura histórica hasta ahora inabordables. Para realizar el análisis de las bóvedas sexpartitas europeas se ha llevado a cabo un levantamiento exhaustivo de las mismas, lo que ha permitido definir su despiece, obteniendo la forma de la talla de cada uno de los elementos constructivos que la componen; jarjas, dovelas, claves y plementería. La obtención de estos datos nos ha permitido abordar un profundo estudio de su estereotomía y construcción, aportando datos inéditos hasta el momento. Por otro lado se ha llevado a cabo la detección y catalogación de las principales bóvedas sexpartitas que aún se conservan en Europa. Los estudios realizados nos permiten afirmar que la bóveda sexpartita surge en Francia en la segunda mitad del siglo XII, utilizándose en las principales catedrales francesas, como Notre Dame de Paris, Bourges o Laon. A comienzos del siglo XIII cae en desuso en Francia y comienza su expansión por el resto de Europa, donde se abandona medio siglo después, desapareciendo definitivamente del gótico europeo. Mientras que los ejemplos que datan del siglo XII muestran soluciones escasamente desarrolladas y propias del románico, las bóvedas construidas en el siglo XIII muestran soluciones enormemente complejas, con grandes jarjamentos e inteligentes estrategias constructivas y geométricas que permiten la simplificación de sus estructuras auxiliares y una mayor libertad en su diseño. Estas bóvedas son el reflejo del desarrollo de la estereotomía gótica en sus comienzos por lo que su estudio nos ha permitido conocer el desarrollo y la evolución del gótico primitivo en Europa. ABSTRACT One of the most interesting chapters of European Gothic is the sexpartite vault, without doubt one of the most remarkable vaults ever created within this style. The first Gothic vaults, with crossed ribs on a square base, were restricted to relatively small areas, but a new vault, with very particular characteristics emerged to address the need to cover spaces of considerable size; the sexpartite vault. This cross-ribbed vault is reinforced in the centre by an arch that runs parallel to the transverse arches, divides the vault in half and splits the wall arch in two, creating a pair of windows, one on each side. The simple groin vault surface, the source of ribbed vaults, was greatly complicated creating a highly complex volume with six sections of severies and with six supports of different sizes, four on the corners and two smaller central ones. The construction difficulties involved in building this type of vault may explain its premature abandonment and a return to the simple cross-ribbed vault, now in rectangular sections. However, despite its brief existence, the sexpartite vault was the great protagonist of the beginnings of Gothic architecture and important vaulting was built using this system from England to Romania. Studies undertaken in the 19th century helped the History of Construction as a discipline tremendously. Research was abandoned during the twentieth century however, and has only recently been taken up again. Towards the end of the 19th century, Viollet-le-Duc gave a brief description of this type of vault. Later, Auguste de Choisy also devoted some pages to the French sexpartite vault; since then, later studies have made very few references to it. Against this background, this research now attempts to bring to light the knowledge of geometry and construction that made the construction of the European sexpartite vault possible. To this end, the main vaults in Western Europe - France, Spain, England, Germany, Switzerland and Italy, have been studied. By making a comparative study we have been able to reveal the common construction features and those that are specific to each country, as well as some of the channels of communication that enabled this architecture to spread. New measuring technologies, the laser scanner, total station, photogrammetry, etc., have given rise to a revolution in heritage documentation and restoration, as well as facilitating a huge qualitative leap for the analysis of Gothic vaults, enabling studies of historical architecture that until now were inaccessible. A comprehensive survey was carried out to be able to analyse European sexpartite vaults. We could thus create an exploded view, which enabled us to obtain the form of each of the elements; tas-de-charges, voussoirs, keystones and severies. The data gathered provided previously unknown facts that enabled us to make an in-depth study of stereotomy and construction. Furthermore, the main sexpartite vaults still preserved in Europe have been identified and categorised. The studies undertaken allowed us to affirm that the sexpartite vault appeared in France in the second half of the twelfth century, being used in the main French cathedrals, such as Notre Dame de Paris, Bourges or Laon. At the beginning of the thirteenth century it fell into disuse in France and began to expand throughout the rest of Europe, where it was abandoned half a century later, disappearing from European Gothic for good. While the examples dating back to the 12th century display poorly developed solutions more characteristic of the Romanesque, the vaults built in the 13th century reveal enormously complex solutions, with large tas-de-charges and intelligent construction and geometric strategies that allowed auxiliary support structures to be simplified, and gave more freedom to design. These vaults reflect the beginnings of Gothic stereotomy and by studying them we have been able to learn more about the development and evolution of Early Gothic architecture in Europe.