8 resultados para Program parameters
em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal
Resumo:
Poly(hydroxybutyrate) (PHB) obtained from sugar cane was dissolved in a blend of chloroform and dimethylformamide (DMF) and electrospun at 40 ºC. By adding DMF to the solution, the electrospinning process for the PHB polymer becomes more stable, allowing complete polymer crystallization during the jet travelling between the tip and the grounded collector. The influence of processing parameters on fiber size and distribution was systematically studied. It was observed that an increase of tip inner diameter promotes a decrease of the fiber average size and a broader distribution. On the other hand, an increase of the electric field and flow rate produces an increase of fiber diameter until a maximum of ~2.0 m, but for electric fields higher than 1.5 kV.cm-1, a decrease of the fiber diameter was observed. Polymer crystalline phase seems to be independent of the processing conditions and a crystallinity degree of 53 % was found. Moreover, thermal degradation of the as-spun membrane occurs in single step degradation with activation energy of 91 kJ/mol. Furthermore, MC-3T3-E1 cell adhesion was not inhibited by the fiber mats preparation, indicating their potential use for biomedical applications.
Resumo:
Poly(vinylidene fluoride-trifluoethylene) electrospun membranes were obtained from a blend of dimethylformamide (DMF) and methylethylketone (MEK) solvents. The inclusion of the MEK to the solvent system promotes a faster solvent evaporation allowing complete polymer crystallization during the jet travelling between the tip and the grounded collector. Several processing parameters were systematically changed to study their influence on fiber dimensions. Applied voltage and inner needle diameter do not have large influence on the electrospun fiber average diameter but in the fiber diameter distribution. On the other hand, the increase of the distance between the needle tip to collector results in fibers with larger average diameter. Independently on the processing conditions, all mats are produced in the electroactive phase of the polymer. Further, MC-3T3-E1cell adhesion was not inhibited by the fiber mats preparation, indicating their potential use for biomedical applications.
Resumo:
By identifying energy waste streams in vehicles fuel consumption and introducing the concept of lean driving systems, a technological gap for reducing fuel consumption was identified. This paper proposes a solution to overcome this gap, through a modular vehicle architecture aligned with driving patterns. It does not address detailed technological solutions; instead it models the potential effects in fuel consumption through a modular concept of a vehicle and quantifies their dependence on vehicle design parameters (manifesting as the vehicle mass) and user behavior parameters (driving patterns manifesting as the use of a modular car in lighter and heavier mode, in urban and highway cycles). Modularity has been functionally applied in automotive industry as manufacture and assembly management strategies; here it is thought as a product development strategy for flexibility in use, driven by environmental concerns and enabled by social behaviors. The authors argue this concept is a step forward in combining technological solutions and social behavior, of which eco-driving is a vivid example, and potentially evolutionary to a lean, more sustainable, driving culture.
Resumo:
Wireless medical systems are comprised of four stages, namely the medical device, the data transport, the data collection and the data evaluation stages. Whereas the performance of the first stage is highly regulated, the others are not. This paper concentrates on the data transport stage and argues that it is necessary to establish standardized tests to be used by medical device manufacturers to provide comparable results concerning the communication performance of the wireless networks used to transport medical data. Besides, it suggests test parameters and procedures to be used to produce comparable communication performance results.
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs
Resumo:
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
The current level of demand by customers in the electronics industry requires the production of parts with an extremely high level of reliability and quality to ensure complete confidence on the end customer. Automatic Optical Inspection (AOI) machines have an important role in the monitoring and detection of errors during the manufacturing process for printed circuit boards. These machines present images of products with probable assembly mistakes to an operator and him decide whether the product has a real defect or if in turn this was an automated false detection. Operator training is an important aspect for obtaining a lower rate of evaluation failure by the operator and consequently a lower rate of actual defects that slip through to the following processes. The Gage R&R methodology for attributes is part of a Six Sigma strategy to examine the repeatability and reproducibility of an evaluation system, thus giving important feedback on the suitability of each operator in classifying defects. This methodology was already applied in several industry sectors and services at different processes, with excellent results in the evaluation of subjective parameters. An application for training operators of AOI machines was developed, in order to be able to check their fitness and improve future evaluation performance. This application will provide a better understanding of the specific training needs for each operator, and also to accompany the evolution of the training program for new components which in turn present additional new difficulties for the operator evaluation. The use of this application will contribute to reduce the number of defects misclassified by the operators that are passed on to the following steps in the productive process. This defect reduction will also contribute to the continuous improvement of the operator evaluation performance, which is seen as a quality management goal.