5 resultados para Educational software Scratch
em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal
Resumo:
Experimental scratch resistance testing provides two numbers: the penetration depth Rp and the healing depth Rh. In molecular dynamics computer simulations, we create a material consisting of N statistical chain segments by polymerization; a reinforcing phase can be included. Then we simulate the movement of an indenter and response of the segments during X time steps. Each segment at each time step has three Cartesian coordinates of position and three of momentum. We describe methods of visualization of results based on a record of 6NX coordinates. We obtain a continuous dependence on time t of positions of each of the segments on the path of the indenter. Scratch resistance at a given location can be connected to spatial structures of individual polymeric chains.
Resumo:
Part replacement and repair is needed in structures with moving parts because of scratchability and wear. In spite of some accumulation of experimental evidence, scratch resistance is still not well understood. We have applied molecular dynamics to study scratch resistance of amorphous polymeric materials through computer simulations. As a first approach, a coarse grain model was created for high density polyethylene at the mesoscale. We have also extended the traditional approach and used real units rather than reduced units (to our knowledge, for the first time), which enable an improved quantification of simulation results. The obtained results include analysis of penetration depth, residual depth and recovery percentage related to indenter force and size. Our results show there is a clear effect from these parameters on the tribological properties. We also discuss a "crooked smile" effect on the scratched surface and the reasons for its appearance.
Resumo:
GUIsurfer: A Reverse Engineering Framework for User Interface Software
Resumo:
What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.