4 resultados para ILLIP (Computer system)
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Resumo:
PURPOSE: To investigate the facial symmetry of high and low dose methotrexate (MTX) treated rats submitted to experimentally displaced mandibular condyle fracture through the recording of cephalometric measurements. METHODS: One hundred male Wistar rats underwent surgery using an experimental model of right condylar fracture. Animals were divided into four groups: A - saline solution (1mL/week); B - dexamethasone (DEX) (0,15mg/Kg); C - MTX low dose (3 mg/Kg/week); D - MTX high dose (30 mg/Kg). Animals were sacrificed at 1, 7, 15, 30 and 90 days postoperatively (n=5). Body weight was recorded. Specimens were submitted to axial radiographic incidence, and cephalometric mensurations were made using a computer system. Linear measurements of skull and mandible, as well as angular measurements of mandibular deviation were taken. Data were subjected to statistical analyses among the groups, periods of sacrifice and between the sides in each group (alpha=0.05). RESULTS: Animals regained body weight over time, except in group D. There was reduction in the mandibular length and also changes in the maxilla as well as progressive deviation in the mandible in relation to the skull basis in group D. CONCLUSION: Treatment with high dose methotrexate had deleterious effect on facial symmetry of rats submitted to experimentally displaced condylar process fracture.
Resumo:
Access control is a key component of security in any computer system. In the last two decades, the research on Role Basead Access Control Models was intense. One of the most important components of a Role Based Model is the Role-Permission Relationship. In this paper, the technique of systematic mapping is used to identify, extract and analyze many approaches applied to establish the Role-Permission Relationship. The main goal of this mapping is pointing directions of significant research in the area of Role Based Access Control Models.
Resumo:
Controlled vocabularies are tools of representation of information necessary to standardize the content description and classification of information, making information systems consistent and also minimizing the dispersion of information. One of the most critical points of controlled vocabularies is the need to constantly update, in terminology and the computer system. The purpose of this paper is to share the experience of the Sistema Integrado de Bibliotecas da Universidade de São Paulo - (SIBiUSP) in planning and developing an innovation plan for your Controlled Vocabulary, reporting their goals and actions. Such actions are in different stages of referral, so there are provisional results. The article also brings the description of his movements and the difficulties encountered as collaboration and knowledge for professionals that working and researching with the theme controlled vocabularies
Resumo:
Aspects related to the users' cooperative work are not considered in the traditional approach of software engineering, since the user is viewed independently of his/her workplace environment or group, with the individual model generalized to the study of collective behavior of all users. This work proposes a process for software requirements to address issues involving cooperative work in information systems that provide distributed coordination in the users' actions and the communication among them occurs indirectly through the data entered while using the software. To achieve this goal, this research uses ergonomics, the 3C cooperation model, awareness and software engineering concepts. Action-research is used as a research methodology applied in three cycles during the development of a corporate workflow system in a technological research company. This article discusses the third cycle, which corresponds to the process that deals with the refinement of the cooperative work requirements with the software in actual use in the workplace, where the inclusion of a computer system changes the users' workplace, from the face to face interaction to the interaction mediated by the software. The results showed that the highest degree of users' awareness about their activities and other system users contribute to a decrease in their errors and in the inappropriate use of the system.