15 resultados para Calling Cards

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The maned wolf (Chrysocyon brachyurus Illiger 1815) is the biggest canid in South America and it is considered a “near threatened” species by IUCN. Because of its nocturnal, territorial and solitary habits, there are still many understudied aspects of their behavior in natural environments, including acoustic communication. In its vocal repertoire, the wolf presents a longdistance call named “roar-bark” which, according to literature, functions for spacing maintenance between individuals and/or communication between members of the reproductive pair inside the territory. In this context, this study aimed: 1) to compare four methods for detecting maned wolf’s roar-barks in recordings made in a natural environment, in order to elect the most efficient one for our project; 2) to understand the night emission pattern of these vocalizations, verifying possible weather and moon phases influences in roarbark’s emission rates; and 3) to test Passive Acoustic Monitoring as a tool to identify the presence of maned wolves in a natural environment. The study area was the Serra da Canastra National Park (Minas Gerais, Brazil), where autonomous recorders were used for sound acquisition, recording all night (from 06pm to 06am) during five days in December/2013 and every day from April to July/2014. Roar-barks’ detection methods were tested and compared regarding time needed to analyze files, number of false positives and number of correctly identified calls. The mixed method (XBAT + manual) was the most efficient one, finding 100% of vocalizations in almost half of the time the manual method did, being chosen for our data analysis. By studying roarbarks’ temporal variation we verified that the wolves vocalize more in the early hours of the evening, suggesting an important social function for those calls at the beginning of its period of most intense activity. Average wind speed negatively influenced vocalization rate, which may indicate lower sound reception of recorders or a change in behavioral patterns of wolves in high speed wind conditions. A better understanding of seasonal variation of maned wolves’ vocal activity is required, but our study already shows that it is possible to detect behavioral patterns of wild animals only by sound, validating PAM as a tool in this species’ conservation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The artificial lifting of oil is needed when the pressure of the reservoir is not high enough so that the fluid contained in it can reach the surface spontaneously. Thus the increase in energy supplies artificial or additional fluid integral to the well to come to the surface. The rod pump is the artificial lift method most used in the world and the dynamometer card (surface and down-hole) is the best tool for the analysis of a well equipped with such method. A computational method using Artificial Neural Networks MLP was and developed using pre-established patterns, based on its geometry, the downhole card are used for training the network and then the network provides the knowledge for classification of new cards, allows the fails diagnose in the system and operation conditions of the lifting system. These routines could be integrated to a supervisory system that collects the cards to be analyzed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present paper is a doctorate thesis, in the area of Education, that has as a goal to describe and to reflect on the construction/systematization of a relation between family and institution of Childhood Education, in favor of sharing the care and education actions of children, in the context of creation of a County Center of Childhood Education, located in the city of Natal-RN. Our intension with this paper is to share some of the ideas and actions collectively constructed by this experience, with the intention of bringing a contribution for the thematic debates concerning Childhood Education - as modality of education, in a general way; and the relations between families and Institutions of Childhood Education, in a more specific way. The paper presented here is endorsed by the postulates of the qualitative research with characteristics of a research-action, having as main instruments of the data construction the open or half-structuralized interviews, the personal notebook of registers, the participant s index cards characterizing the children and comments. Authors as Aries (1981); Bassedas, Huguet and Solé (1999); Bhering and Blatchford (1999); Brasil (1998); Bujes (2001); Didonet (2002 - 2003); Formosinho (2007); Gómez (2000); Heywood (2004); Kramer (2005); Marchesi and Martín (2003); Marschal and Zohar (2006); Thiollent (2004); Tiriba (2006), amongst others, had theoretically based this paper. The experience described here points to the possibilities of sharing the care and education actions between family and Institution of Childhood Education, emphasizing the relevance of participative praxis in the interior of the institution, so that its job can propitiate this sharing with the families, throughout activities as meetings, lectures, workshops, participation in didactic projects, open expositions to the community, commemorative parties and valuation of the local culture, amongst other chances of dialogue and interaction between the educative institution and the families

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this research, we invite to reflection by a phenomenological gaze on the body, through the description of some works of contemporary Brazilian dance company Grupo Corpo. This Company was chosen intentionally to give us elements in their creations to interrogate the understanding of the body and sensitive. Thus, as we launch issues in this dissertation: that body dance in Grupo Corpo? And as we can see, a phenomenological approach, an understanding of the body and sensitive works in that company? Building on this, the works are to be questioned Benguelê (1998/2003), Lecuona (2004) and Onqotô (2005). It is intended, through these works, coreological approaching the discourse of philosophical discourse and give movement to phenomenological thought of Maurice Merleau-Ponty, in special the sensitive, flesh of the body, the investment in the sensory world as a merger, calling the know body and its power to take chances, to incorporate the world, language, culture, create and choose. Thus, these openings is where thought enters this research. This consistency, we used the phenomenological attitude of Maurice Merleau-Ponty as a methodological approach, since in their study the philosopher takes a look expressive on the body, forming a sensitive language that is expressed in the movements, which deepens the arguments of the Phenomenology a new arrangement for knowledge as a result of our experience in the lived world. The reflections presented here aim to take us to the amazement, the unthinking, whom many still impose epistemological challenges, including understanding the body of knowledge and sensitive

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The precision and the fast identification of abnormalities of bottom hole are essential to prevent damage and increase production in the oil industry. This work presents a study about a new automatic approach to the detection and the classification of operation mode in the Sucker-rod Pumping through dynamometric cards of bottom hole. The main idea is the recognition of the well production status through the image processing of the bottom s hole dynamometric card (Boundary Descriptors) and statistics and similarity mathematics tools, like Fourier Descriptor, Principal Components Analysis (PCA) and Euclidean Distance. In order to validate the proposal, the Sucker-Rod Pumping system real data are used

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper aims to present the feasibility of using a composite using discarded material from the cultivation of banana tree (pseudostem), which is fibrillated together with synthetic resin replacing glass fiber to be used in structural elements that do not demand large mechanical stress such as reservoirs, troughs, domes, sewage pipes etc.. For this, there were studies about the mechanical properties of a composite made with polyester resin and fiber of banana tree (Musa sp, musac), in which the splints were removed from the pseudostem, being made fibrillation by hand, with the aid of a brush steel, followed by natural drying. After treatment for cleaning and removal of wax, the fiber was cut into pieces of approximately 60 mm to 100 mm, for, together with synthetic resin, make cards of a features fiber composite with random orientation relative to the weight of the resin. We used three different percentages of fiber (3%, 6% and 9%), in order to make a comparative study between them and what would be the one with the best performance. Were manufactured specimens of each material and then subjected to uniaxial tensile tests, three point bending, moisture absorption and thermal characteristics. The results show that, in general, the use of banana tree fiber is feasible simply by an improvement in the production process (machining of the procedure) and greater care in the manufacture of parts

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This treatise analyzes the identitary setting called Veneza Brasileira (Brazilian Venice) which is subscribed to the discoursive materialization related to the imagetic setting (literary and mediatic) produced about the city of Recife. The main investigation of this research is to examine the way how the identitary setting called Veneza Brasileira has been constructed in the imagetic setting practices about the city of Recife in the nineteenth and twentieth centuries. This study is subscribed to the Applied Linguistics and considers the theoretical perspectives that come from the Cultural Studies which investigation basis is focused on authors such as: Hall (2006); Bauman (1999; 2001;2005); Silva (2000); and Castells (2000) related to the discussion over identity, as well as the discussion over Urban Studies presented in Santos (1997; 1999); Ferrara (1998); and Pesavento (2001). Moreover it is also based on the theoretical basis found in Foucault (2004; 2006; 2007). Furthermore theoretical-methodological approaches rely on the French Discourse Analysis (DA) found in Orlandi (2001); Gregolin (2007); and Courtine (2006). On being so, this treatise aims to: analyze the meaning effects over the production of the identitary setting, especially the so-called Veneza Brasileira, in the imagetic setting discoursive practices (Poems, Post Cards and Touristic Guides) which are produced over the urban setting of the city of Recife. This research is characterized by being qualitative and interpretative and the theoretical analytical approaches contributed to the reading of both poetic and iconic images presented in the excerpts of poems from the nineteenth century and early twentieth century in: Manuel Bandeira s poems, Carlos Pena Filho s poems, and João Cabral de Melo Neto s poems which were produced in the early and late twentieth century. Moreover, this study observed some photographic images in Post Cards and Touristic Guides related to the visiting of historical sites in Recife. One could conclude that the imagetic setting discourse about Recife produced different identitary effects over the so-called Veneza Brasileira along these three centuries: in the nineteenth century, the poetry constructed the utopia city along with the meaning effect of identitary unit; as for the twentieth century, one observed an oscillation between a utopia/heteroutopia city meaning effect of both united and fragmented identity, the latter one is prevalent. As for the twenty-first century, the media reconstructed over again the utopia city, and consequently, produced meaning effect of identitary unit. These same meaning effects of identity either corroborate or contradict to/with the concepts of the postmodernism over identity along these three centuries. In other words, considering the imagetic setting, this oscillation occurs in the proportion of one finds an (ex) inclusion of social agents that construct these same identities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis A paz tensa da chama fugaz: a configuração do amor no romance contemporâneo, Lygia Fagundes Telles e Lídia Jorge aims to study the configuration of Love in contemporary novels. Their corpuses of study are the novels As horas nuas (1989), by the Brazilian writer Lygia Fagundes Telles; and O vento assobiando nas gruas (2002), by the Portuguese writer Lídia Jorge. The following research tries to understand how the characters from those texts deal with some love questions on the context of the contemporary narrative; it also tries to comprehend the love expression which is formed as a contradictorily fluid feeling and intensely wanted, which are important points concerning the love discourse at the present day. As a critic-comparative study, this research focuses on the problematic concerned love as a synonym of Eros, in other words, the relation between lovers, analyzed through social and philosophical perspective. Through that, this work broadens the study of two contemporary novels, and it also establish connections between the characters from those novels and the literary environment where they are placed, once it focuses on the human and social context presented in this books. The thesis ends calling attention to the dichotomy of love and death, to the image of love which grows through absence and through the longing of completeness of the human being; that is why this work sustains that the Lygia Fagundes Telles and Lídia Jorge update and materialized in their texts the plurality of contemporary love conception, which continues to be contradictory, fragmented and problematic

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cancer goes on to be a frightening disease by humanity, simetimes,it is considered as death, suffering and stigma synonym. Occurring at childhood, this meaning seems to acquire a more intense conotation, having in view of the perplexity and godliness feeling in the presence of the precocity of events, nearly always associated to the death. A psychologist co-existence with the cancer children is going acquiring, thus, a permeated sense by incognitas , fears and fantasy, which raised us the following question: how does the psychologist that answers children with cancer lives this experience? Therefore, the aim this research was to understand this co-existence experience. Our theoretical perspective comes from an existencial fenomenology and, more specifically, the Humanistic Approach and Martin Heidegger Existencial Ontology. The metodology is qualitative of phenomenological character. The access instrument to the experience was the narrative, such as purpose by Walter Benjamin. They were carried out nine semi-open interviews with psychologists who work on pediatric oncology services of Natal-RN city. Such interviews were recorded in cassette, transcripted and later, re-educated. These interviews were recorded, transcribed and later on edited with the help of the interviewee and turned into a text. The narrative comprehension was carried out on Heidegger Existencial Ontology, on dada exaustive reading and the clipping of indicative passages of experience sense of being psychologist on this area. The research suggests that the experience is oriented of clinic kowing-doing, being crossed by implications of key thematics which indicate the care as central ontologic element that orientates the way as these professionals come being in the world in association with the clientèle. Besides, the caring experience of these children acquire the sense of true living experience, since the cancer undoes the immortality illusion, launching the psychologist to his/her condition of being to the death and with that, calling him/her the authenticity. Is is only not dealt with to experience the anguish and the death imminence, but above all, re-meaning them in favour of a continual learning, of quality answering , besides other possibilities. Working with child cancer brings news perspectives and world views, making the psychologist a more human people and sensitive to the distracted needs. And we believe that, regardless of area which actuates, being psychologist is a particular way which choose to be citizen. Is is a project that will be delimited by society, history and culture and after all, by us like human being. Therefore, we understand that the results this research suggest the discussed thematic deepening on this intervention field in order to new sense possibilities can arise giving origin to other reflections about the clinical practice, the professional formation in Psychology and other possible developments

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smart card applications represent a growing market. Usually this kind of application manipulate and store critical information that requires some level of security, such as financial or confidential information. The quality and trustworthiness of smart card software can be improved through a rigorous development process that embraces formal techniques of software engineering. In this work we propose the BSmart method, a specialization of the B formal method dedicated to the development of smart card Java Card applications. The method describes how a Java Card application can be generated from a B refinement process of its formal abstract specification. The development is supported by a set of tools, which automates the generation of some required refinements and the translation to Java Card client (host) and server (applet) applications. With respect to verification, the method development process was formalized and verified in the B method, using the Atelier B tool [Cle12a]. We emphasize that the Java Card application is translated from the last stage of refinement, named implementation. This translation process was specified in ASF+SDF [BKV08], describing the grammar of both languages (SDF) and the code transformations through rewrite rules (ASF). This specification was an important support during the translator development and contributes to the tool documentation. We also emphasize the KitSmart library [Dut06, San12], an essential component of BSmart, containing models of all 93 classes/interfaces of Java Card API 2:2:2, of Java/Java Card data types and machines that can be useful for the specifier, but are not part of the standard Java Card library. In other to validate the method, its tool support and the KitSmart, we developed an electronic passport application following the BSmart method. We believe that the results reached in this work contribute to Java Card development, allowing the generation of complete (client and server components), and less subject to errors, Java Card applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Formal methods should be used to specify and verify on-card software in Java Card applications. Furthermore, Java Card programming style requires runtime verification of all input conditions for all on-card methods, where the main goal is to preserve the data in the card. Design by contract, and in particular, the JML language, are an option for this kind of development and verification, as runtime verification is part of the Design by contract method implemented by JML. However, JML and its currently available tools for runtime verification were not designed with Java Card limitations in mind and are not Java Card compliant. In this thesis, we analyze how much of this situation is really intrinsic of Java Card limitations and how much is just a matter of a complete re-design of JML and its tools. We propose the requirements for a new language which is Java Card compliant and indicate the lines on which a compiler for this language should be built. JCML strips from JML non-Java Card aspects such as concurrency and unsupported types. This would not be enough, however, without a great effort in optimization of the verification code generated by its compiler, as this verification code must run on the card. The JCML compiler, although being much more restricted than the one for JML, is able to generate Java Card compliant verification code for some lightweight specifications. As conclusion, we present a Java Card compliant variant of JML, JCML (Java Card Modeling Language), with a preliminary version of its compiler

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Java Card technology allows the development and execution of small applications embedded in smart cards. A Java Card application is composed of an external card client and of an application in the card that implements the services available to the client by means of an Application Programming Interface (API). Usually, these applications manipulate and store important information, such as cash and confidential data of their owners. Thus, it is necessary to adopt rigor on developing a smart card application to improve its quality and trustworthiness. The use of formal methods on the development of these applications is a way to reach these quality requirements. The B method is one of the many formal methods for system specification. The development in B starts with the functional specification of the system, continues with the application of some optional refinements to the specification and, from the last level of refinement, it is possible to generate code for some programming language. The B formalism has a good tool support and its application to Java Card is adequate since the specification and development of APIs is one of the major applications of B. The BSmart method proposed here aims to promote the rigorous development of Java Card applications up to the generation of its code, based on the refinement of its formal specification described in the B notation. This development is supported by the BSmart tool, that is composed of some programs that automate each stage of the method; and by a library of B modules and Java Card classes that model primitive types, essential Java Card API classes and reusable data structures

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of smart card applications requires a high level of reliability. Formal methods provide means for this reliability to be achieved. The BSmart method and tool contribute to the development of smart card applications with the support of the B method, generating Java Card code from B specifications. For the development with BSmart to be effectively rigorous without overloading the user it is important to have a library of reusable components built in B. The goal of KitSmart is to provide this support. A first research about the composition of this library was a graduation work from Universidade Federal do Rio Grande do Norte, made by Thiago Dutra in 2006. This first version of the kit resulted in a specification of Java Card primitive types byte, short and boolean in B and the creation of reusable components for application development. This work provides an improvement of KitSmart with the addition of API Java Card specification made in B and a guide for the creation of new components. The API Java Card in B, besides being available to be used for development of applications, is also useful as a documentation of each API class. The reusable components correspond to modules to manipulate specific structures, such as date and time. These structures are not available for B or Java Card. These components for Java Card are generated from specifications formally verified in B. The guide contains quick reference on how to specify some structures and how some situations were adapted from object-orientation to the B Method. This work was evaluated through a case study made through the BSmart tool, that makes use of the KitSmart library. In this case study, it is possible to see the contribution of the components in a B specification. This kit should be useful for B method users and Java Card application developers

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The widespread growth in the use of smart cards (by banks, transport services, and cell phones, etc) has brought an important fact that must be addressed: the need of tools that can be used to verify such cards, so to guarantee the correctness of their software. As the vast majority of cards that are being developed nowadays use the JavaCard technology as they software layer, the use of the Java Modeling Language (JML) to specify their programs appear as a natural solution. JML is a formal language tailored to Java. It has been inspired by methodologies from Larch and Eiffel, and has been widely adopted as the de facto language when dealing with specification of any Java related program. Various tools that make use of JML have already been developed, covering a wide range of functionalities, such as run time and static checking. But the tools existent so far for static checking are not fully automated, and, those that are, do not offer an adequate level of soundness and completeness. Our objective is to contribute to a series of techniques, that can be used to accomplish a fully automated and confident verification of JavaCard applets. In this work we present the first steps to this. With the use of a software platform comprised by Krakatoa, Why and haRVey, we developed a set of techniques to reduce the size of the theory necessary to verify the specifications. Such techniques have yielded very good results, with gains of almost 100% in all tested cases, and has proved as a valuable technique to be used, not only in this, but in most real world problems related to automatic verification