Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto
El objetivo principal de este trabajo de grado es la comparación entre dos paradigmas de programación: síncrono contra el paradigma asíncrono (reactivo)al realizar una tarea bloqueante de cifrado asimétrico de cadenas de texto. Se utilizaron los módulos del framework Spring web y Spring webflux para...
- Autores:
-
García Betancourt, Roberto
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2022
- Institución:
- Fundación Universitaria Konrand Lorenz
- Repositorio:
- Fundación Universitaria Konrand Lorenz
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.konradlorenz.edu.co:001/5714
- Acceso en línea:
- https://repositorio.konradlorenz.edu.co/handle/001/5714
- Palabra clave:
- Programación imperativa
Programación estructurada
Programación concurrente
Microservicios
Sincrónico
Reactivo
Cifrado
Asimétrico
- Rights
- License
- Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)
id |
Konrad2_f8670bcba402390714d7725cd46b1153 |
---|---|
oai_identifier_str |
oai:repositorio.konradlorenz.edu.co:001/5714 |
network_acronym_str |
Konrad2 |
network_name_str |
Fundación Universitaria Konrand Lorenz |
repository_id_str |
|
dc.title.none.fl_str_mv |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
title |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
spellingShingle |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto Programación imperativa Programación estructurada Programación concurrente Microservicios Sincrónico Reactivo Cifrado Asimétrico |
title_short |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
title_full |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
title_fullStr |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
title_full_unstemmed |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
title_sort |
Evaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de texto |
dc.creator.fl_str_mv |
García Betancourt, Roberto |
dc.contributor.advisor.none.fl_str_mv |
Rodríguez Portela, Arles Ernesto |
dc.contributor.author.none.fl_str_mv |
García Betancourt, Roberto |
dc.contributor.editor.none.fl_str_mv |
Fundación Universitaria Konrad Lorenz |
dc.contributor.researchgroup.none.fl_str_mv |
Promente-Konrad |
dc.subject.classification.none.fl_str_mv |
Programación imperativa Programación estructurada Programación concurrente |
topic |
Programación imperativa Programación estructurada Programación concurrente Microservicios Sincrónico Reactivo Cifrado Asimétrico |
dc.subject.proposal.none.fl_str_mv |
Microservicios Sincrónico Reactivo Cifrado Asimétrico |
description |
El objetivo principal de este trabajo de grado es la comparación entre dos paradigmas de programación: síncrono contra el paradigma asíncrono (reactivo)al realizar una tarea bloqueante de cifrado asimétrico de cadenas de texto. Se utilizaron los módulos del framework Spring web y Spring webflux para la creación de dos microservicios, los cuales fueron sometidos a un conjunto de pruebas de carga controladas utilizando la herramienta JMeter. Para el esquema de pruebas ejecutado se encontró un mejor rendimiento del microservicio sincrónico logrando completar la mayor cantidad de peticiones con tiempos de duración de las pruebas cortos. Los resultados de este trabajo, nos permitió ver el comportamiento de los dos paradigmas y se espera que sirva de base para proponer nuevos escenarios de comparación de estos paradigmas utilizados en la industria del desarrollo. |
publishDate |
2022 |
dc.date.issued.none.fl_str_mv |
2022 |
dc.date.accessioned.none.fl_str_mv |
2024-06-06T15:10:55Z |
dc.date.available.none.fl_str_mv |
2024-06-06T15:10:55Z |
dc.type.none.fl_str_mv |
Trabajo de grado - Pregrado |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.content.none.fl_str_mv |
Text |
format |
http://purl.org/coar/resource_type/c_7a1f |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.konradlorenz.edu.co/handle/001/5714 |
url |
https://repositorio.konradlorenz.edu.co/handle/001/5714 |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.references.none.fl_str_mv |
Laigner, R., Kalinowski, M., Diniz, P., (...), Lifschitz, S., Zhou, Y., “Modeling Microservices with DDD”, IEEE International Conference on Software Architecture Companion, 2020, pp. 7-8. Santana, C. , Andrade, L. , Delicato, FC , Prazeres, C., “Increasing the availability of IoT applications with reactive microservices”, Service Oriented Computing and Applications, 2020. Goel, D., Nayak, A., “Reactive Microservices in Commodity Resources”, IEEE International Conference on Big Data, 2019, pp. 3658-3665. Santana, C. , Andrade, L. , Mello, B. , (...), Sampaio, JV , Prazeres, C.,”A reliable architecture based on reactive microservices for IoT applications”,Proceedings of the 25th Brazillian Symposium on Multimedia and the Web, 2019, pp. 15-19 De Santana, CJL , De Mello Alencar, B. , Serafim Prazeres, CV, “Reactive microservices for the internet of things: A case study in Fog Computing”, Proceedings of the ACM Symposium on Applied Computing Part F147772, 2019, pp. 1243-1251. Rudrabhatla, C. K. (2018). Comparison of event choreography and orchestration techniques in Microservice Architecture. International Journal of Advanced Computer Science and Applications, 9(8), 18–22. https://doi.org/10.14569/ijacsa.2018.090804 Bartocci, E., Ferrère, T., Henzinger, T. A., Nickovic, D., & da Costa, A. O. (2021). Flavours of Sequential Information Flow. http://arxiv.org/abs/2105.02013 Nassar, A. A., & Almagor, S. (2021). Simulation by Rounds of Letter-to-Letter Transducers. 23, 1–18. http://arxiv.org/abs/2105.01512 Li, S., Zhang, H., Jia, Z., Zhong, C., Zhang, C., Shan, Z., Shen, J., & Babar, M. A. (2021). Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Information and Software Technology, 131(October 2020), 106449. https://doi.org/10.1016/j.infsof.2020.106449 reactivemanifesto, “El manifiesto de sistemas reactivos”, 2014. [Online]. Available: https://www.reactivemanifesto.org/es. [Accessed: May. 09, 2021] Spring. “Spring boot,” 01 10 2002. [Online]. Available https://spring.io/projects/spring-boot. [Accessed: jul. 07, 2021]. Spring. “Spring Reactive”, [Online]. Available https://spring.io/reactive. [Accessed: jul. 07, 2021]. Apache. “Jmeter”, [Online]. Available https://jmeter.apache.org. [Accessed: jul. 07, 2021]. Docker. “Docker docs”, [Online]. Available https://docs.docker.com [Accessed: Jul. 07, 2021]. Google. “Google cloud”, [Online]. Available https://cloud.google.com/docs?hl=es [Accessed: Jul. 01, 2021]. B. Schwartz. (2015). Practical Scalability Analysis With The Universal Scalability Law [Online]. https://cdn2.hubspot.net/hubfs/498921/eBooks/scalability_new.pdf gluttony777. (20, Jun 2020). “Difference Between Symmetric and Asymmetric Key Encryption”. [Online]. Available https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/. [Accessed: Jul 01, 2021]. A. Shvets. Sumérgete en los patrones de diseño. Refactoring.Guru. 2019 Sunardi, A., & Suharjito. (2019). MVC architecture: A comparative study between laravel framework and slim framework in freelancer project monitoring system web based. Procedia Computer Science, 157, 134–141. https://doi.org/10.1016/j.procs.2019.08.150 Github. (2021, October). The State of the Octoverse | The State of the Octoverse explores a year of change with new deep dives into writing code faster, creating documentation and how we build sustainable communities on GitHub. https://octoverse.github.com/#top-languages-over-the-years GitHub - google/guava: Google core libraries for Java. (n.d.). Retrieved April 6, 2022, from https://github.com/google/guava Project Lombok. (n.d.). Retrieved April 6, 2022, from https://projectlombok.org/ Codec – Home. (n.d.). Retrieved April 6, 2022, from https://commons.apache.org/proper/commons-codec/ Gradle User Manual. (n.d.). Retrieved April 6, 2022, from https://docs.gradle.org/current/userguide/userguide.html OpenSSL. (n.d.). Retrieved April 6, 2022, from https://www.openssl.org/ Apache JMeter - Apache JMeterTM. (n.d.). Retrieved April 6, 2022, from https://jmeter.apache.org/ Java Cryptography Architecture Oracle Providers Documentation. (n.d.). Retrieved April 29, 2022, from https://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html Pérez, L. J., & Salvachúa, J. (2021). An approach to build e-health iot reactive multi-services based on technologies around cloud computing for elderly care in smart city homes. Applied Sciences (Switzerland), 11(11). https://doi.org/10.3390/app11115172 Debski, A., Szczepanik, B., Malawski, M., Spahr, S., & Muthig, D. (2018). A scalable, reactive architecture for cloud applications. IEEE Software, 35(2), 62–71. https://doi.org/10.1109/MS.2017.265095722 Mockito. (n.d.). Retrieved Junio 8, 2022, from https://site.mockito.org/ |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_14cb |
dc.rights.license.none.fl_str_mv |
Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) |
dc.rights.uri.none.fl_str_mv |
https://creativecommons.org/licenses/by-nc/4.0/ |
rights_invalid_str_mv |
Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) https://creativecommons.org/licenses/by-nc/4.0/ http://purl.org/coar/access_right/c_14cb |
dc.format.extent.none.fl_str_mv |
42 páginas: tablas ; figuras |
dc.format.mimetype.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Bogotá D.C. : Fundación Universitaria Konrad Lorenz, 2022 |
dc.publisher.faculty.none.fl_str_mv |
Facultad de Matemáticas e Ingenierías |
dc.publisher.program.none.fl_str_mv |
Ingeniería de Sistemas |
dc.publisher.place.none.fl_str_mv |
Colombia |
publisher.none.fl_str_mv |
Bogotá D.C. : Fundación Universitaria Konrad Lorenz, 2022 |
institution |
Fundación Universitaria Konrand Lorenz |
bitstream.url.fl_str_mv |
https://repositorio.konradlorenz.edu.co/bitstreams/3141c071-5257-47c7-80fd-efb9da7d3fd9/download https://repositorio.konradlorenz.edu.co/bitstreams/c683ee4f-73ee-4413-9965-711b7b27ddca/download https://repositorio.konradlorenz.edu.co/bitstreams/20603a16-1c3c-43e5-a052-562e61832491/download https://repositorio.konradlorenz.edu.co/bitstreams/c857d4d1-472c-4cec-8bb0-9f6094919b28/download https://repositorio.konradlorenz.edu.co/bitstreams/4747d8ae-01c8-4308-9ee9-5f7401c742dc/download https://repositorio.konradlorenz.edu.co/bitstreams/5fe19bae-c6fe-4018-ba31-d71936e35933/download https://repositorio.konradlorenz.edu.co/bitstreams/51be9710-f3fe-4c0d-a565-b8ecd725f618/download https://repositorio.konradlorenz.edu.co/bitstreams/a77f554f-7987-4e5d-ba50-32c2310721fa/download https://repositorio.konradlorenz.edu.co/bitstreams/e6e97507-bc82-40e3-845c-d76aa8c935b1/download https://repositorio.konradlorenz.edu.co/bitstreams/38e12bfa-ef7c-49c8-b8ee-a88afabadff9/download https://repositorio.konradlorenz.edu.co/bitstreams/9502c29f-4c27-4bd6-9434-a44644594f4e/download https://repositorio.konradlorenz.edu.co/bitstreams/4c85435a-6071-441b-9ad6-ec36adf29de6/download https://repositorio.konradlorenz.edu.co/bitstreams/8bfeaf51-7047-4882-bc4f-45c65b1d827a/download |
bitstream.checksum.fl_str_mv |
db829f8f29cd53b0f9d198e7b807875a 5fb31d1e9750994d83ee1e489afd4642 d38e1acce1cbb535eda1462affb7a32e a383ec11650374ca409b25916d821a8f f5801f8b77d851629ff0633e9edd621d 5c9322256801a3d674ef1d59c3e386a2 418505de433d71695a0c15370ef5c2b1 6ea984b2188f968d39076cb610cd1693 70274cf724b6d3f9b85268d23fc286b5 2cbd99c78d666a98f9093f3bc9f6f925 2590f5398c03d61ddc779a02e2a900f5 23314231112ab631db420373c566f727 c6050079448084bfcdcc62889c32f5f4 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio - Fundación Universitaria Konrad Lorenz |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1811852027388493824 |
spelling |
Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)d.c rights --- Atribucion - Nocomercial - Sinderivar: permite que otros puedan descargar las obras y compartirlas con otras personas, siempre que se reconozca su autoría, pero no se pueden cambiar de ninguna manera ni se pueden utilizar comercialmentehttps://creativecommons.org/licenses/by-nc/4.0/http://purl.org/coar/access_right/c_14cbRodríguez Portela, Arles ErnestoGarcía Betancourt, RobertoFundación Universitaria Konrad LorenzPromente-Konrad2024-06-06T15:10:55Z2024-06-06T15:10:55Z2022https://repositorio.konradlorenz.edu.co/handle/001/5714El objetivo principal de este trabajo de grado es la comparación entre dos paradigmas de programación: síncrono contra el paradigma asíncrono (reactivo)al realizar una tarea bloqueante de cifrado asimétrico de cadenas de texto. Se utilizaron los módulos del framework Spring web y Spring webflux para la creación de dos microservicios, los cuales fueron sometidos a un conjunto de pruebas de carga controladas utilizando la herramienta JMeter. Para el esquema de pruebas ejecutado se encontró un mejor rendimiento del microservicio sincrónico logrando completar la mayor cantidad de peticiones con tiempos de duración de las pruebas cortos. Los resultados de este trabajo, nos permitió ver el comportamiento de los dos paradigmas y se espera que sirva de base para proponer nuevos escenarios de comparación de estos paradigmas utilizados en la industria del desarrollo.The main objective of this degree work is the comparison between two programing paradigms: synchronous against the asynchronous (reactive) paradigm when performing a blocking task such as asymmetric encryption of text strings. The modules of the Spring web and Spring webflux framework were used to create two microservices, which are subjected to a set of load controlled tests to be carried out using the JMeter tool. In terms of the executed test time scheme, a better performance of the synchronous microservice was found, managing to complete the largest number of requests with the duration of some short tests. This information allowed us to see the behavior of the two paradigms and it is hoped to be a baseline to propose new benchmark scenarios of these paradigms used in the development industry.Ingeniero(a) de SistemasPregradoDesarrollo y arquitectura de software42 páginas: tablas ; figurasapplication/pdfspaBogotá D.C. : Fundación Universitaria Konrad Lorenz, 2022Facultad de Matemáticas e IngenieríasIngeniería de SistemasColombiaProgramación imperativaProgramación estructuradaProgramación concurrenteMicroserviciosSincrónicoReactivoCifradoAsimétricoEvaluación de rendimiento de microservicios en operaciones de cifrado asimétrico de cadenas de textoTrabajo de grado - Pregradohttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesisTextLaigner, R., Kalinowski, M., Diniz, P., (...), Lifschitz, S., Zhou, Y., “Modeling Microservices with DDD”, IEEE International Conference on Software Architecture Companion, 2020, pp. 7-8.Santana, C. , Andrade, L. , Delicato, FC , Prazeres, C., “Increasing the availability of IoT applications with reactive microservices”, Service Oriented Computing and Applications, 2020.Goel, D., Nayak, A., “Reactive Microservices in Commodity Resources”, IEEE International Conference on Big Data, 2019, pp. 3658-3665.Santana, C. , Andrade, L. , Mello, B. , (...), Sampaio, JV , Prazeres, C.,”A reliable architecture based on reactive microservices for IoT applications”,Proceedings of the 25th Brazillian Symposium on Multimedia and the Web, 2019, pp. 15-19De Santana, CJL , De Mello Alencar, B. , Serafim Prazeres, CV, “Reactive microservices for the internet of things: A case study in Fog Computing”, Proceedings of the ACM Symposium on Applied Computing Part F147772, 2019, pp. 1243-1251.Rudrabhatla, C. K. (2018). Comparison of event choreography and orchestration techniques in Microservice Architecture. International Journal of Advanced Computer Science and Applications, 9(8), 18–22. https://doi.org/10.14569/ijacsa.2018.090804Bartocci, E., Ferrère, T., Henzinger, T. A., Nickovic, D., & da Costa, A. O. (2021). Flavours of Sequential Information Flow. http://arxiv.org/abs/2105.02013Nassar, A. A., & Almagor, S. (2021). Simulation by Rounds of Letter-to-Letter Transducers. 23, 1–18. http://arxiv.org/abs/2105.01512Li, S., Zhang, H., Jia, Z., Zhong, C., Zhang, C., Shan, Z., Shen, J., & Babar, M. A. (2021). Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Information and Software Technology, 131(October 2020), 106449. https://doi.org/10.1016/j.infsof.2020.106449reactivemanifesto, “El manifiesto de sistemas reactivos”, 2014. [Online]. Available: https://www.reactivemanifesto.org/es. [Accessed: May. 09, 2021]Spring. “Spring boot,” 01 10 2002. [Online]. Available https://spring.io/projects/spring-boot. [Accessed: jul. 07, 2021].Spring. “Spring Reactive”, [Online]. Available https://spring.io/reactive. [Accessed: jul. 07, 2021].Apache. “Jmeter”, [Online]. Available https://jmeter.apache.org. [Accessed: jul. 07, 2021].Docker. “Docker docs”, [Online]. Available https://docs.docker.com [Accessed: Jul. 07, 2021].Google. “Google cloud”, [Online]. Available https://cloud.google.com/docs?hl=es [Accessed: Jul. 01, 2021].B. Schwartz. (2015). Practical Scalability Analysis With The Universal Scalability Law [Online]. https://cdn2.hubspot.net/hubfs/498921/eBooks/scalability_new.pdfgluttony777. (20, Jun 2020). “Difference Between Symmetric and Asymmetric Key Encryption”. [Online]. Available https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/. [Accessed: Jul 01, 2021].A. Shvets. Sumérgete en los patrones de diseño. Refactoring.Guru. 2019Sunardi, A., & Suharjito. (2019). MVC architecture: A comparative study between laravel framework and slim framework in freelancer project monitoring system web based. Procedia Computer Science, 157, 134–141. https://doi.org/10.1016/j.procs.2019.08.150Github. (2021, October). The State of the Octoverse | The State of the Octoverse explores a year of change with new deep dives into writing code faster, creating documentation and how we build sustainable communities on GitHub. https://octoverse.github.com/#top-languages-over-the-yearsGitHub - google/guava: Google core libraries for Java. (n.d.). Retrieved April 6, 2022, from https://github.com/google/guavaProject Lombok. (n.d.). Retrieved April 6, 2022, from https://projectlombok.org/Codec – Home. (n.d.). Retrieved April 6, 2022, from https://commons.apache.org/proper/commons-codec/Gradle User Manual. (n.d.). Retrieved April 6, 2022, from https://docs.gradle.org/current/userguide/userguide.htmlOpenSSL. (n.d.). Retrieved April 6, 2022, from https://www.openssl.org/Apache JMeter - Apache JMeterTM. (n.d.). Retrieved April 6, 2022, from https://jmeter.apache.org/Java Cryptography Architecture Oracle Providers Documentation. (n.d.). Retrieved April 29, 2022, from https://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.htmlPérez, L. J., & Salvachúa, J. (2021). An approach to build e-health iot reactive multi-services based on technologies around cloud computing for elderly care in smart city homes. Applied Sciences (Switzerland), 11(11). https://doi.org/10.3390/app11115172Debski, A., Szczepanik, B., Malawski, M., Spahr, S., & Muthig, D. (2018). A scalable, reactive architecture for cloud applications. IEEE Software, 35(2), 62–71. https://doi.org/10.1109/MS.2017.265095722Mockito. (n.d.). Retrieved Junio 8, 2022, from https://site.mockito.org/PublicationORIGINALTrabajo.pdfTrabajo.pdfapplication/pdf903256https://repositorio.konradlorenz.edu.co/bitstreams/3141c071-5257-47c7-80fd-efb9da7d3fd9/downloaddb829f8f29cd53b0f9d198e7b807875aMD51RAI.pdfRAI.pdfapplication/pdf153036https://repositorio.konradlorenz.edu.co/bitstreams/c683ee4f-73ee-4413-9965-711b7b27ddca/download5fb31d1e9750994d83ee1e489afd4642MD52Autorizacion.pdfAutorizacion.pdfapplication/pdf217163https://repositorio.konradlorenz.edu.co/bitstreams/20603a16-1c3c-43e5-a052-562e61832491/downloadd38e1acce1cbb535eda1462affb7a32eMD53Acta.pdfActa.pdfapplication/pdf453524https://repositorio.konradlorenz.edu.co/bitstreams/c857d4d1-472c-4cec-8bb0-9f6094919b28/downloada383ec11650374ca409b25916d821a8fMD54LICENSElicense.txtlicense.txttext/plain; charset=utf-81383https://repositorio.konradlorenz.edu.co/bitstreams/4747d8ae-01c8-4308-9ee9-5f7401c742dc/downloadf5801f8b77d851629ff0633e9edd621dMD55TEXTTrabajo.pdf.txtTrabajo.pdf.txtExtracted texttext/plain51938https://repositorio.konradlorenz.edu.co/bitstreams/5fe19bae-c6fe-4018-ba31-d71936e35933/download5c9322256801a3d674ef1d59c3e386a2MD56RAI.pdf.txtRAI.pdf.txtExtracted texttext/plain19382https://repositorio.konradlorenz.edu.co/bitstreams/51be9710-f3fe-4c0d-a565-b8ecd725f618/download418505de433d71695a0c15370ef5c2b1MD58Autorizacion.pdf.txtAutorizacion.pdf.txtExtracted texttext/plain3743https://repositorio.konradlorenz.edu.co/bitstreams/a77f554f-7987-4e5d-ba50-32c2310721fa/download6ea984b2188f968d39076cb610cd1693MD510Acta.pdf.txtActa.pdf.txtExtracted texttext/plain3515https://repositorio.konradlorenz.edu.co/bitstreams/e6e97507-bc82-40e3-845c-d76aa8c935b1/download70274cf724b6d3f9b85268d23fc286b5MD512THUMBNAILTrabajo.pdf.jpgTrabajo.pdf.jpgGenerated Thumbnailimage/jpeg7708https://repositorio.konradlorenz.edu.co/bitstreams/38e12bfa-ef7c-49c8-b8ee-a88afabadff9/download2cbd99c78d666a98f9093f3bc9f6f925MD57RAI.pdf.jpgRAI.pdf.jpgGenerated Thumbnailimage/jpeg8742https://repositorio.konradlorenz.edu.co/bitstreams/9502c29f-4c27-4bd6-9434-a44644594f4e/download2590f5398c03d61ddc779a02e2a900f5MD59Autorizacion.pdf.jpgAutorizacion.pdf.jpgGenerated Thumbnailimage/jpeg13343https://repositorio.konradlorenz.edu.co/bitstreams/4c85435a-6071-441b-9ad6-ec36adf29de6/download23314231112ab631db420373c566f727MD511Acta.pdf.jpgActa.pdf.jpgGenerated Thumbnailimage/jpeg10825https://repositorio.konradlorenz.edu.co/bitstreams/8bfeaf51-7047-4882-bc4f-45c65b1d827a/downloadc6050079448084bfcdcc62889c32f5f4MD513001/5714oai:repositorio.konradlorenz.edu.co:001/57142024-06-07 03:00:28.136https://creativecommons.org/licenses/by-nc/4.0/d.c rights --- Atribucion - Nocomercial - Sinderivar: permite que otros puedan descargar las obras y compartirlas con otras personas, siempre que se reconozca su autoría, pero no se pueden cambiar de ninguna manera ni se pueden utilizar comercialmenterestrictedhttps://repositorio.konradlorenz.edu.coRepositorio - Fundación Universitaria Konrad Lorenzbdigital@metabiblioteca.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 |