<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>vol. 4, nº 3, march 2017</title>
<link>https://reunir.unir.net/handle/123456789/11711</link>
<description/>
<pubDate>Thu, 24 Oct 2024 08:16:23 GMT</pubDate>
<dc:date>2024-10-24T08:16:23Z</dc:date>
<item>
<title>Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing</title>
<link>https://reunir.unir.net/handle/123456789/11735</link>
<description>Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
Saidi, Abdelali; Bendriss, Elmehdi; Kartit, Ali; El Marraki, Mohamed
Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T11:28:39Z
No. of bitstreams: 1
ijimai20174_3_12_pdf_18434.pdf: 424695 bytes, checksum: 80619174bcf2b426a578ebe1cea358e9 (MD5); Made available in DSpace on 2021-08-25T11:28:39Z (GMT). No. of bitstreams: 1
ijimai20174_3_12_pdf_18434.pdf: 424695 bytes, checksum: 80619174bcf2b426a578ebe1cea358e9 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11735</guid>
</item>
<item>
<title>Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment</title>
<link>https://reunir.unir.net/handle/123456789/11734</link>
<description>Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
Toumi, Hicham; Marzak, Bouchra; Talea, Amal; Eddaoui, Ahmed; Talea, Mohamed
Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T11:03:57Z
No. of bitstreams: 1
ijimai20174_3_11_pdf_15245.pdf: 582327 bytes, checksum: 455f95d6419a11d6f17fbdc31c3ac6e3 (MD5); Made available in DSpace on 2021-08-25T11:03:57Z (GMT). No. of bitstreams: 1
ijimai20174_3_11_pdf_15245.pdf: 582327 bytes, checksum: 455f95d6419a11d6f17fbdc31c3ac6e3 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11734</guid>
</item>
<item>
<title>A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers</title>
<link>https://reunir.unir.net/handle/123456789/11733</link>
<description>A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers
Talbi, Jamal; Haqiq, Abdelkrim
Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs) increase and require secure, reliable and trustworthy cloud service providers (CSPs) from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs) that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T10:45:34Z
No. of bitstreams: 1
ijimai20174_3_10_pdf_18425.pdf: 514212 bytes, checksum: d119adcda0e3154776289465b4abf421 (MD5); Made available in DSpace on 2021-08-25T10:45:34Z (GMT). No. of bitstreams: 1
ijimai20174_3_10_pdf_18425.pdf: 514212 bytes, checksum: d119adcda0e3154776289465b4abf421 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11733</guid>
</item>
<item>
<title>Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems</title>
<link>https://reunir.unir.net/handle/123456789/11732</link>
<description>Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T10:26:57Z
No. of bitstreams: 1
ijimai20174_3_9_pdf_60303.pdf: 695166 bytes, checksum: 410cca118f02b28b0ed757db4843a535 (MD5); Made available in DSpace on 2021-08-25T10:26:57Z (GMT). No. of bitstreams: 1
ijimai20174_3_9_pdf_60303.pdf: 695166 bytes, checksum: 410cca118f02b28b0ed757db4843a535 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11732</guid>
</item>
<item>
<title>Analysis of Security Mechanisms Based on Clusters IoT Environments</title>
<link>https://reunir.unir.net/handle/123456789/11731</link>
<description>Analysis of Security Mechanisms Based on Clusters IoT Environments
Montenegro-Marin, Carlos Enrique; Gaona-García, Paulo Alonso; Prieto, Juan David; Nieto Acevedo, Yuri Vanessa
Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT), security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T08:59:45Z
No. of bitstreams: 1
ijimai20174_3_8_pdf_20224.pdf: 545586 bytes, checksum: e893e697bb6a2e05e4455d1da03f0c68 (MD5); Made available in DSpace on 2021-08-25T08:59:45Z (GMT). No. of bitstreams: 1
ijimai20174_3_8_pdf_20224.pdf: 545586 bytes, checksum: e893e697bb6a2e05e4455d1da03f0c68 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11731</guid>
</item>
<item>
<title>Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems</title>
<link>https://reunir.unir.net/handle/123456789/11719</link>
<description>Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Pan, Yao; White, Jules; Schmidt, Douglas; Elhabashy, Ahmad; Sturm, Logan; Camelio, Jaime; Williams, Christopher
The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T12:36:05Z
No. of bitstreams: 1
ijimai20174_3_7_pdf_53997.pdf: 2228524 bytes, checksum: a307ab650960548be2a91cb5462ecf59 (MD5); Made available in DSpace on 2021-08-19T12:36:05Z (GMT). No. of bitstreams: 1
ijimai20174_3_7_pdf_53997.pdf: 2228524 bytes, checksum: a307ab650960548be2a91cb5462ecf59 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11719</guid>
</item>
<item>
<title>Migrating C/C++ Software to Mobile Platforms in the ADM Context</title>
<link>https://reunir.unir.net/handle/123456789/11718</link>
<description>Migrating C/C++ Software to Mobile Platforms in the ADM Context
Martinez, Liliana; Pereira, Claudia; Favre, Liliana
Software technology is constantly evolving and therefore the development of applications requires adapting software components and applications in order to be aligned to new paradigms such as Pervasive Computing, Cloud Computing and Internet of Things. In particular, many desktop software components need to be migrated to mobile technologies. This migration faces many challenges due to the proliferation of different mobile platforms. Developers usually make applications tailored for each type of device expending time and effort. As a result, new programming languages are emerging to integrate the native behaviors of the different platforms targeted in development projects. In this direction, the Haxe language allows writing mobile applications that target all major mobile platforms. Novel technical frameworks for information integration and tool interoperability such as Architecture-Driven Modernization (ADM) proposed by the Object Management Group (OMG) can help to manage a huge diversity of mobile technologies. The Architecture-Driven Modernization Task Force (ADMTF) was formed to create specifications and promote industry consensus on the modernization of existing applications. In this work, we propose a migration process from C/C++ software to different mobile platforms that integrates ADM standards with Haxe. We exemplify the different steps of the process with a simple case study, the migration of “the Set of Mandelbrot” C++ application. The proposal was validated in Eclipse Modeling Framework considering that some of its tools and run-time environments are aligned with ADM standards.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T12:00:49Z
No. of bitstreams: 1
ijimai20174_3_6_pdf_64266.pdf: 1297721 bytes, checksum: 160f133fe6d0512742abe6ea1479d3dc (MD5); Made available in DSpace on 2021-08-19T12:00:49Z (GMT). No. of bitstreams: 1
ijimai20174_3_6_pdf_64266.pdf: 1297721 bytes, checksum: 160f133fe6d0512742abe6ea1479d3dc (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11718</guid>
</item>
<item>
<title>Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT</title>
<link>https://reunir.unir.net/handle/123456789/11717</link>
<description>Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT
Solanki, Vijender Kumar; Venkaesan, M; Katiyar, Somesh
Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were wasted, in urban as well as rural area. Resource (electricity) was wasted as beside the point operation of Highway &amp; High Mast Lamp; while wastage of water followed by improper trends and methodologies imparted for watering of city park, road side plantation and highway plantation. Thus as per Energy survey statistics of a City (Lucknow, India) it was found that major portion of resources (water and electricity) were being wasted due to negligent activities of officials who were in charge of resource management. So to facilitate energy saving trends and to completely modernize it to autonomous system, module below is proposed which incorporates modern technological peripheral and has its base ingrained in IoT (Internet of Things) which when put into consideration would result in large scale resource and energy saving.This developed module incorporates the peripherals such as Arduino, Texas Instruments ultra low power kits etc. in accordance with software technology including Lab View which help to monitor as well as control the various operation from the base station, located far away from the site. Lab View Interface interacts with all the module located at various city parks, subways and highway lighting modules. Later below in several section a detailed pattern and application frame has been put up.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T11:27:41Z
No. of bitstreams: 1
ijimai20174_3_5_pdf_17263.pdf: 754383 bytes, checksum: dc63671370052c38dc8d0b3dc17dcd25 (MD5); Made available in DSpace on 2021-08-19T11:27:41Z (GMT). No. of bitstreams: 1
ijimai20174_3_5_pdf_17263.pdf: 754383 bytes, checksum: dc63671370052c38dc8d0b3dc17dcd25 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11717</guid>
</item>
<item>
<title>Performance Evaluation of AODV Routing Protocol in VANET with NS2</title>
<link>https://reunir.unir.net/handle/123456789/11716</link>
<description>Performance Evaluation of AODV Routing Protocol in VANET with NS2
Rathi, Divya; Welekar, Rashmi
In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET) is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV) routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T10:46:54Z
No. of bitstreams: 1
ijimai20174_3_4_pdf_60277.pdf: 644997 bytes, checksum: e03050ebe8ba07cdbd9fda3b09d3ae21 (MD5); Made available in DSpace on 2021-08-19T10:46:54Z (GMT). No. of bitstreams: 1
ijimai20174_3_4_pdf_60277.pdf: 644997 bytes, checksum: e03050ebe8ba07cdbd9fda3b09d3ae21 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11716</guid>
</item>
<item>
<title>An IoT Based Predictive Connected Car Maintenance Approach</title>
<link>https://reunir.unir.net/handle/123456789/11715</link>
<description>An IoT Based Predictive Connected Car Maintenance Approach
Solanki, Vijender Kumar; Dhall, Rohit
Internet of Things (IoT) is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T09:39:38Z
No. of bitstreams: 1
ijimai20174_3_3_pdf_12469.pdf: 1749944 bytes, checksum: a97a1cce138bc42de1309c519b43184a (MD5); Made available in DSpace on 2021-08-19T09:39:38Z (GMT). No. of bitstreams: 1
ijimai20174_3_3_pdf_12469.pdf: 1749944 bytes, checksum: a97a1cce138bc42de1309c519b43184a (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11715</guid>
</item>
<item>
<title>An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network</title>
<link>https://reunir.unir.net/handle/123456789/11714</link>
<description>An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network
Punetha, Deepak; Bahuguna, Yogita; Verma, Pooja
A wireless sensor network contains various nodes having certain sensing, processing &amp; communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size &amp; battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security &amp; military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity &amp; coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T09:33:38Z
No. of bitstreams: 1
ijimai20174_3_2_pdf_19641.pdf: 685669 bytes, checksum: 4ae65293a62857a1617c571a1d0c374a (MD5); Made available in DSpace on 2021-08-19T09:33:38Z (GMT). No. of bitstreams: 1
ijimai20174_3_2_pdf_19641.pdf: 685669 bytes, checksum: 4ae65293a62857a1617c571a1d0c374a (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11714</guid>
</item>
<item>
<title>A review about Smart Objects, Sensors, and Actuators</title>
<link>https://reunir.unir.net/handle/123456789/11713</link>
<description>A review about Smart Objects, Sensors, and Actuators
González García, Cristian; Meana-Llorián, Daniel; Pelayo García-Bustelo, B. Cristina; Cueva-Lovelle, Juan Manuel
Smart Objects and the Internet of Things are two ideas which describe the future, walk together, and complement each other. Thus, the interconnection among objects can make them more intelligent or expand their intelligence to unsuspected limits. This could be achieved with a new network that interconnects each object around the world. However, to achieve this goal, the objects need a network that supports heterogeneous and ubiquitous objects, a network where exists more traffic among objects than among humans, but supporting for both types. For these reasons, both concepts are very close. Cities, houses, cars, machines, or any another object that can sense, respond, work, or make easier the lives of their owner. This is a part of the future, an immediate future. Notwithstanding, first of all, there are to resolve a series of problems. The most important problem is the heterogeneity of objects. This article is going to show a theoretical frame and the related work about Smart Object. The article will explain what are Smart Objects, doing emphasis in their difference with Not- Smart Objects. After, we will present one of the different object classification system, in our opinion, the most complete.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2021-08-19T08:39:57Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_3_1_pdf_15525.pdf: 429222 bytes, checksum: 17a5ecca66ee772722b067a54ca1dcf9 (MD5); Made available in DSpace on 2021-08-19T08:39:57Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_3_1_pdf_15525.pdf: 429222 bytes, checksum: 17a5ecca66ee772722b067a54ca1dcf9 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11713</guid>
</item>
<item>
<title>IJIMAI Editor's Note - Vol. 4 Issue 3</title>
<link>https://reunir.unir.net/handle/123456789/11712</link>
<description>IJIMAI Editor's Note - Vol. 4 Issue 3
García-Díaz, Vicente
The Internet of Things is the networks of physical devices, embedded with electronics, software, sensors, actuators and security and connectivity mechanisms that enables them to collect and exchange data. It is a very important research topic nowadays in which many scientific papers are focusing on its bases.&#13;
This Special Issue tries to show some of the latest researches related to IoT with special emphasis on the basic components of IoT, some of the major applications in which researchers and practitioners are working and especially in aspects related to security, one of the main areas of research related to IoT, with a special emphasis on cloud-based systems. Next, I present a summary of the works that are included in this special issue.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2021-08-19T08:13:17Z
No. of bitstreams: 1
ijimai20174_3_0_pdf_20281.pdf: 129462 bytes, checksum: ce7330eed4a1912a329674ddbe406445 (MD5); Made available in DSpace on 2021-08-19T08:13:17Z (GMT). No. of bitstreams: 1
ijimai20174_3_0_pdf_20281.pdf: 129462 bytes, checksum: ce7330eed4a1912a329674ddbe406445 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/11712</guid>
</item>
</channel>
</rss>
