93 resultados para Sistemas de recuperação da informação - Logistica
Resumo:
This work aims to analyze risks related to information technology (IT) in procedures related to data migration. This is done considering ALEPH, Integrated Libray System (ILS) that migrated data to the Library Module present in the software called Sistema Integrado de Gestão de Atividades Acadêmicas (SIGAA) at the Zila Mamede Central Library at the Federal University of Rio Grande do Norte (UFRN) in Natal/Brazil. The methodological procedure used was of a qualitative exploratory research with the realization of case study at the referred library in order to better understand this phenomenon. Data collection was able once there was use of a semi-structured interview that was applied with (11) subjects that are employed at the library as well as in the Technology Superintendence at UFRN. In order to examine data Content analysis as well as thematic review process was performed. After data migration the results of the interview were then linked to both analysis units and their system register with category correspondence. The main risks detected were: data destruction; data loss; data bank communication failure; user response delay; data inconsistency and duplicity. These elements point out implication and generate disorders that affect external and internal system users and lead to stress, work duplicity and hassles. Thus, some measures were taken related to risk management such as adequate planning, central management support, and pilot test simulations. For the advantages it has reduced of: risk, occurrence of problems and possible unforeseen costs, and allows achieving organizational objectives, among other. It is inferred therefore that the risks present in data bank conversion in libraries exist and some are predictable, however, it is seen that librarians do not know or ignore and are not very worried in the identification risks in data bank conversion, their acknowledge would minimize or even extinguish them. Another important aspect to consider is the existence of few empirical research that deal specifically with this subject and thus presenting the new of new approaches in order to promote better understanding of the matter in the corporate environment of the information units
Resumo:
Este estudo aborda a utilização da tecnologia da informação de forma competitiva em um Arranjo Produtivo Local APL. Realizou-se no APL da carcinicultura no Estado do Rio Grande do Norte e teve por objetivo buscar a compreensão de como o uso da tecnologia da informação (TI) contribui para o aumento da competitividade na atividade do APL citado. APL pode ser conceituado como uma aliança entre organizações que possuem um projeto coletivo, para elevar a sua competitividade e participação no mercado. Para atingir este objetivo, foi realizada uma pesquisa descritiva, através da utilização de múltiplos casos selecionados dentre as empresas que compõem o APL da carcinicultura no RN. Os dados coletados foram analisados qualitativamente. Os resultados da pesquisa indicaram que as empresas percebem a importância do uso da TI, mas que, na prática, a sua utilização é limitada, principalmente em se tratando de Sistemas Integrados de Gestão e Comércio Eletrônico. Outro resultado encontrado foi que as empresas, embora façam parte do APL, ainda não colaboram entre si, seja através da troca de informações, ou através de Sistemas de Informação Interorganizacional. As principais recomendações diante destes resultados é que as empresas atuem ativamente para o fortalecimento do APL. No que se refere ao uso da TI faz-se necessário que elas invistam na aquisição de sistemas integrados de gestão e sistemas de informação interorganizacional para o melhor gerenciamento das informações ao longo da cadeia
Bibliotecas digitais em Arquitetura e urbanismo: um estudo sobre a arquitetura da informação digital
Resumo:
The goal of this paper was to search the state of the art from the Digital Libraries in Architecture and Urbanism in the Higher Education Institutions (IES) through conceptualizations and showing the importance of Digital Libraries in the disclosure and easing of information transferring. Questions about digital information architecture, usability, digital preservation and accessibility were approached. The research was made in the websites of Brazilian Universities, firstly to identify the institutions which offered the Architecture and Urbanism course, focusing on postgraduate education. After identifying the offering, the research was done by analyzing the contents, storage and dissemination and access to information, these libraries. It was found that the digital libraries are increasingly and taking part of organizations and educational institutions focusing on the knowledge dissemination releasing digitally information that may be needed for institution or the individual. A monitoring was done over of the physical and computational restructuring of the Board of Studies and Research in Architecture and Urbanism (Câmara de Estudos e Pesquisa em Arquitetura e Urbanismo, CEPAU), from the Architecture and Urbanism Course of the Federal University of Rio Grande do Norte (UFRN), showing the need of installing a Digital Library to integrate the databases of PPGAU s research groups, which today remain independent, with no interface among themselves. The research chosen area was Architecture and Urbanism, because there is a gap and little documentation about digital libraries in this area
Resumo:
In Brazilian Northeast there are reservoirs with heavy oil, which use steam flooding as a recovery method. This process allows to reduce oil viscosity, increasing its mobility and consequently its oil recovery. Steam injection is a thermal method and can occurs in continues or cyclic form. Cyclic steam stimulation (CSS) can be repeated several times. Each cycle consisting of three stages: steam injection, soaking time and production phase. CSS becomes less efficient with an increase of number of cycles. Thus, this work aims to study the influence of compositional models in cyclic steam injection and the effects of some parameters, such like: flow injection, steam quality and temperature of steam injected, analyzing the influence of pseudocomponents numbers on oil rate, cumulative oil, oil recovery and simulation time. In the situations analyzed was compared the model of fluid of three phases and three components known as Blackoil . Simulations were done using commercial software (CMG), it was analyzed a homogeneous reservoir with characteristics similar to those found in Brazilian Northeast. It was observed that an increase of components number, increase the time spent in simulation. As for analyzed parameters, it appears that the steam rate, and steam quality has influence on cumulative oil and oil recovery. The number of components did not a lot influenced on oil recovery, however it has influenced on gas production
Resumo:
Os nascimentos ocorridos em uma população consistem em informação de grande valia para diversos estudos e planejamento de políticas públicas. O Sistema de informações sobre Nascidos Vivos (SINASC) representa uma promissora fonte de informação sobre o tema, uma vez que coleta continuamente e no âmbito municipal, dados sobre nascimentos. Tendo em vista a necessidade de avaliação contínua do SINASC e o panorama do declínio da fecundidade no Nordeste, objetivou-se avaliar a qualidade das informações provenientes do SINASC para o Nordeste, estados e microrregiões, nos anos 2000 e 2010, utilizando o Censo Demográfico como informação de referência, avaliando a cobertura do SINASC e identificando níveis e padrões de fecundidade. Pretendeu-se ainda verificar a relação entre os níveis de fecundidade, o grau de cobertura do SINASC e as condições socioeconômicas das microrregiões sintetizadas pelo Índice Social de Desenvolvimento Municipal (ISDM), utilizando-se a análise de cluster, associada à análise de variância (ANOVA) e o teste de Tukey. Por último, analisou-se a incompletude no preenchimento dos campos da Declaração de Nascido Vivo (DNV). De acordo com os resultados, observou-se que houve ampliação da qualidade das informações do SINASC no período estudado, resultando em uma maior aproximação das TFTs oriundas das duas fontes de dados consideradas no estudo. Maranhão e Paraíba foram os estados com maiores ganhos em cobertura das TFTs no período, e os estados do Rio Grande do Norte e Sergipe revelaram um grau de cobertura ligeiramente inferior em 2010 frente aos resultados de 2000, bem como ainda persistem várias microrregiões com TFTs oriundas do SINASC bem abaixo daquelas estimadas pelo Censo. Na verificação da associação entre o ISDM, TFTs e cobertura, a análise de cluster resultou em três agrupamentos, GrISDM A com melhores coberturas, ISDM e mais baixas TFT; GrISDM B , intermediário e GrISDM C com piores coberturas, ISDM e TFT mais altas. Notou-se a evolução das condições socioeconômicas no Nordeste, tendo o GrISDM A passado de 8% do total de microrregiões em 2000 para 37% em 2010. Reiterou-se ainda que quanto melhores as condições socioeconômicas de uma população, menores são as TFTs e melhores as coberturas do SINASC. A análise de variância apontou interações significativas entre o ano estudado versus ISDM (p-valor < 0,016) e o ano versus fonte de informação (p-valor < 0,020), e o teste Tukey apontou que não houve similaridade entre as médias das TFT das fontes Censo versus SINASC no período, fato que aponta para a captação ainda deficiente do SINASC nas microrregiões. O resultado da análise de variância da cobertura do SINASC em relação ao Censo apresentou uma interação significativa entre as variáveis UF versus Ano (p-valor < 0,0001), causada pelos estados que apresentaram queda de cobertura entre 2000 e 2010. Quanto à incompletude dos itens da DNV, evidenciou-se uma melhor coleta no período, embora alguns itens ainda careçam de atenção, como o apgar no 1º e 5º minuto e ocupação da mãe, sendo esta a que apresenta maiores percentuais de informações ignoradas. Destaca-se a possibilidade de preenchimento inconsistente nas variáveis referentes ao histórico de gestações anteriores, com o uso da informação zero inserida no lugar da informação ignorado . Concluiu-se que o SINASC é uma importante base de dados sobre nascimentos e que dispõe de dados confiáveis para o acompanhamento dos nascimentos e de seu panorama epidemiológico no Nordeste brasileiro, embora para alguns estados, assim como para algumas microrregiões, ainda faz-se necessária a ampliação da cobertura do Sistema. As informações constantes na DNV podem servir como embasamento para diversos estudos sobre as condições epidemiológicas dos nascituros e das suas mães, e dos indicadores baseados as informações dos nascimentos
Resumo:
With the rapid growth of databases of various types (text, multimedia, etc..), There exist a need to propose methods for ordering, access and retrieve data in a simple and fast way. The images databases, in addition to these needs, require a representation of the images so that the semantic content characteristics are considered. Accordingly, several proposals such as the textual annotations based retrieval has been made. In the annotations approach, the recovery is based on the comparison between the textual description that a user can make of images and descriptions of the images stored in database. Among its drawbacks, it is noted that the textual description is very dependent on the observer, in addition to the computational effort required to describe all the images in database. Another approach is the content based image retrieval - CBIR, where each image is represented by low-level features such as: color, shape, texture, etc. In this sense, the results in the area of CBIR has been very promising. However, the representation of the images semantic by low-level features is an open problem. New algorithms for the extraction of features as well as new methods of indexing have been proposed in the literature. However, these algorithms become increasingly complex. So, doing an analysis, it is natural to ask whether there is a relationship between semantics and low-level features extracted in an image? and if there is a relationship, which descriptors better represent the semantic? which leads us to a new question: how to use descriptors to represent the content of the images?. The work presented in this thesis, proposes a method to analyze the relationship between low-level descriptors and semantics in an attempt to answer the questions before. Still, it was observed that there are three possibilities of indexing images: Using composed characteristic vectors, using parallel and independent index structures (for each descriptor or set of them) and using characteristic vectors sorted in sequential order. Thus, the first two forms have been widely studied and applied in literature, but there were no records of the third way has even been explored. So this thesis also proposes to index using a sequential structure of descriptors and also the order of these descriptors should be based on the relationship that exists between each descriptor and semantics of the users. Finally, the proposed index in this thesis revealed better than the traditional approachs and yet, was showed experimentally that the order in this sequence is important and there is a direct relationship between this order and the relationship of low-level descriptors with the semantics of the users
Resumo:
This work presents a cooperative navigation systemof a humanoid robot and a wheeled robot using visual information, aiming to navigate the non-instrumented humanoid robot using information obtained from the instrumented wheeled robot. Despite the humanoid not having sensors to its navigation, it can be remotely controlled by infra-red signals. Thus, the wheeled robot can control the humanoid positioning itself behind him and, through visual information, find it and navigate it. The location of the wheeled robot is obtained merging information from odometers and from landmarks detection, using the Extended Kalman Filter. The marks are visually detected, and their features are extracted by image processing. Parameters obtained by image processing are directly used in the Extended Kalman Filter. Thus, while the wheeled robot locates and navigates the humanoid, it also simultaneously calculates its own location and maps the environment (SLAM). The navigation is done through heuristic algorithms based on errors between the actual and desired pose for each robot. The main contribution of this work was the implementation of a cooperative navigation system for two robots based on visual information, which can be extended to other robotic applications, as the ability to control robots without interfering on its hardware, or attaching communication devices
Resumo:
Currently, one of the biggest challenges for the field of data mining is to perform cluster analysis on complex data. Several techniques have been proposed but, in general, they can only achieve good results within specific areas providing no consensus of what would be the best way to group this kind of data. In general, these techniques fail due to non-realistic assumptions about the true probability distribution of the data. Based on this, this thesis proposes a new measure based on Cross Information Potential that uses representative points of the dataset and statistics extracted directly from data to measure the interaction between groups. The proposed approach allows us to use all advantages of this information-theoretic descriptor and solves the limitations imposed on it by its own nature. From this, two cost functions and three algorithms have been proposed to perform cluster analysis. As the use of Information Theory captures the relationship between different patterns, regardless of assumptions about the nature of this relationship, the proposed approach was able to achieve a better performance than the main algorithms in literature. These results apply to the context of synthetic data designed to test the algorithms in specific situations and to real data extracted from problems of different fields
Resumo:
Equipment maintenance is the major cost factor in industrial plants, it is very important the development of fault predict techniques. Three-phase induction motors are key electrical equipments used in industrial applications mainly because presents low cost and large robustness, however, it isn t protected from other fault types such as shorted winding and broken bars. Several acquisition ways, processing and signal analysis are applied to improve its diagnosis. More efficient techniques use current sensors and its signature analysis. In this dissertation, starting of these sensors, it is to make signal analysis through Park s vector that provides a good visualization capability. Faults data acquisition is an arduous task; in this way, it is developed a methodology for data base construction. Park s transformer is applied into stationary reference for machine modeling of the machine s differential equations solution. Faults detection needs a detailed analysis of variables and its influences that becomes the diagnosis more complex. The tasks of pattern recognition allow that systems are automatically generated, based in patterns and data concepts, in the majority cases undetectable for specialists, helping decision tasks. Classifiers algorithms with diverse learning paradigms: k-Neighborhood, Neural Networks, Decision Trees and Naïves Bayes are used to patterns recognition of machines faults. Multi-classifier systems are used to improve classification errors. It inspected the algorithms homogeneous: Bagging and Boosting and heterogeneous: Vote, Stacking and Stacking C. Results present the effectiveness of constructed model to faults modeling, such as the possibility of using multi-classifiers algorithm on faults classification
Resumo:
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems
Resumo:
The sharing of knowledge and integration of data is one of the biggest challenges in health and essential contribution to improve the quality of health care. Since the same person receives care in various health facilities throughout his/her live, that information is distributed in different information systems which run on platforms of heterogeneous hardware and software. This paper proposes a System of Health Information Based on Ontologies (SISOnt) for knowledge sharing and integration of data on health, which allows to infer new information from the heterogeneous databases and knowledge base. For this purpose it was created three ontologies represented by the patterns and concepts proposed by the Semantic Web. The first ontology provides a representation of the concepts of diseases Secretariat of Health Surveillance (SVS) and the others are related to the representation of the concepts of databases of Health Information Systems (SIS), specifically the Information System of Notification of Diseases (SINAN) and the Information System on Mortality (SIM)
Resumo:
The introduction of new digital services in the cellular networks, in transmission rates each time more raised, has stimulated recent research that comes studying ways to increase the data communication capacity and to reduce the delays in forward and reverse links of third generation WCDMA systems. These studies have resulted in new standards, known as 3.5G, published by 3GPP group, for the evolution of the third generation of the cellular systems. In this Masters Thesis the performance of a 3G WCDMA system, with diverse base stations and thousand of users is developed with assists of the planning tool NPSW. Moreover the performance of the 3.5G techniques hybrid automatic retransmission and multi-user detection with interference cancellation, candidates for enhance the WCDMA uplink capacity, is verified by means of computational simulations in Matlab of the increase of the data communication capacity and the reduction of the delays in the retransmission of packages of information
Resumo:
E-learning, which refers to the use of Internet-related technologies to improve knowledge and learning, has emerged as a complementary form of education, bringing advantages such as increased accessibility to information, personalized learning, democratization of education and ease of update, distribution and standardization of the content. In this sense, this paper aims to develop a tool, named ISE-SPL, whose purpose is the automatic generation of E-learning systems for medical education, making use of concepts of Software Product Lines. It consists of an innovative methodology for medical education that aims to assist professors of healthcare in their teaching through the use of educational technologies, all based on computing applied to healthcare (Informatics in Health). The tests performed to validate the ISE-SPL were divided into two stages: the first was made by using a software analysis tool similar to ISE-SPL, called SPLOT and the second was performed through usability questionnaires to healthcare professors who used ISESPL. Both tests showed positive results, proving it to be an efficient tool for generation of E-learning software and useful for professors in healthcare
Resumo:
The structure of Industrial Automation bases on a hierarchical pyramid, where restricted information islands are created. Those information islands are characterized by systems where hardware and software used are proprietors. In other words, they are supplied for just a manufacturer, doing with that customer is entailed to that supplier. That solution causes great damages to companies. Once the connection and integration with other equipments, that are not of own supplier, it is very complicated. Several times it is impossible of being accomplished, because of high cost of solution or for technical incompatibility. This work consists to specify and to implement the visualization module via Web of GERINF. GERINF is a FINEP/CTPetro project that has the objective of developing a software for information management in industrial processes. GERINF is divided in three modules: visualization via Web, compress and storage and communication module. Are presented results of the utilization of a proposed system to information management of a Natural Gas collected Unit of Guamar´e on the PETROBRAS UN-RNCE.
Resumo:
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents