11 resultados para Fiscalização e controlo da programação
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
The present work consists of studying to diffuse control of constitutionality in Brazil, with emphasis in a procedural alternative to the evolution of that model: the incident to challenge of unconstitutionality. Starting from the discussion about the new role of constitutional jurisdiction in peripheral countries and in the globalized society, without forgetting to face inevitable doubts about its legitimacy before other powers of the State, the Brazilian control of constitutionality is revealed, under a diffuse, non-dichotomical view, through a number of inconsistencies and misunderstandings, that compromise social peace, the credibility of democratic institutions and the supremacy of juridical security. In order to achieve the goal, the study in course discussed the main difficulties of the Brazilian mixed model of constitutionality control, as well as, directing its view to the incident of challenge of unconstitutionality, which the most adequate forms to assure its appropriateness, legitimacy, processing and decisory effects are. Is was essential, in this point of view, to establish the difference between the incident of challenge of unconstitutionality conceived in article of the Brazilian Federal Constitution and the incident of challenge of unconstitutionality such as it is known in the European models. The insertion of the incident of challenge of unconstitutionality based on European models in the Brazilian control system, without jeopardizing the North-American essence the Brazilian constitutional history presents since 1981, is the hypothesis that is presented as an improvement of constitutional protection
Resumo:
Due of industrial informatics several attempts have been done to develop notations and semantics, which are used for classifying and describing different kind of system behavior, particularly in the modeling phase. Such attempts provide the infrastructure to resolve some real problems of engineering and construct practical systems that aim at, mainly, to increase the productivity, quality, and security of the process. Despite the many studies that have attempted to develop friendly methods for industrial controller programming, they are still programmed by conventional trial-and-error methods and, in practice, there is little written documentation on these systems. The ideal solution would be to use a computational environment that allows industrial engineers to implement the system using high-level language and that follows international standards. Accordingly, this work proposes a methodology for plant and control modelling of the discrete event systems that include sequential, parallel and timed operations, using a formalism based on Statecharts, denominated Basic Statechart (BSC). The methodology also permits automatic procedures to validate and implement these systems. To validate our methodology, we presented two case studies with typical examples of the manufacturing sector. The first example shows a sequential control for a tagged machine, which is used to illustrated dependences between the devices of the plant. In the second example, we discuss more than one strategy for controlling a manufacturing cell. The model with no control has 72 states (distinct configurations) and, the model with sequential control generated 20 different states, but they only act in 8 distinct configurations. The model with parallel control generated 210 different states, but these 210 configurations act only in 26 distinct configurations, therefore, one strategy control less restrictive than previous. Lastly, we presented one example for highlight the modular characteristic of our methodology, which it is very important to maintenance of applications. In this example, the sensors for identifying pieces in the plant were removed. So, changes in the control model are needed to transmit the information of the input buffer sensor to the others positions of the cell
Resumo:
Outsourcing has emerged as one of the new ways of guiding the work. For its advantages and be consistent with the paradigms of managerial reform, outsourcing also started to be used in the Public Administration. However, taking into account the particularities of the latter, some issues are relevant when outsourcing concluded with the State. Gains notoriety, for example, the step of monitoring these contracts, to the extent that, from this activity, we can avoid the negative effects of outsourcing like the fact that the state will pay for labor and wage liens that are obligation of the company providing the services. This study aims to understand the perception that this process is under the Federal University of Rio Grande do Norte, from the point of view of different stakeholders, also explaining the motivations that these agents have to perform the supervisory process. As a theoretical basis was used the Agency Theory, which reinforces the supervisory activities as a necessary means to minimize moral hazard and adverse selection, seeking to understand not only the different motivations tax contracts to properly perform their duties, but also analyze other phenomena arising from this contractual relationship. To achieve the proposed objectives, were taken a literature review and a presentation of how to organize the management and oversight of contracts in UFRN. The methodological procedures included questionnaires and interviews with those involved in the process. After analyzing the results obtained in the survey instruments , and also based on the laws, regulations and instructions governing the procurement process within the UFRN, it was concluded that the process of overseeing the outsourcing of labor contracts in UFRN is not fully institutionalized, some points should be strengthened in order to have the consolidation of this process, highlighting the need for training of UFRN servers that act as tax, the knowledge that the contractual penalties are applied effectively, the need that there is a supervisor of tax of contractors and also the realization of the rotation system of outsourced employees
Resumo:
This work approaches the Scheduling Workover Rigs Problem (SWRP) to maintain the wells of an oil field, although difficult to resolve, is extremely important economical, technical and environmental. A mathematical formulation of this problem is presented, where an algorithmic approach was developed. The problem can be considered to find the best scheduling service to the wells by the workover rigs, taking into account the minimization of the composition related to the costs of the workover rigs and the total loss of oil suffered by the wells. This problem is similar to the Vehicle Routing Problem (VRP), which is classified as belonging to the NP-hard class. The goal of this research is to develop an algorithmic approach to solve the SWRP, using the fundamentals of metaheuristics like Memetic Algorithm and GRASP. Instances are generated for the tests to analyze the computational performance of the approaches mentioned above, using data that are close to reality. Thereafter, is performed a comparison of performance and quality of the results obtained by each one of techniques used
Resumo:
Neste trabalho, apresentamos uma ferramenta cujo intuito é auxiliar não-programadores, jogadores de videogame, na criação de extensões na forma de Add-ons para World of Warcraft, o jogo online. Nele, o usuário pode criar extensões customizando completamente sua interface, de forma a reinventar a sua experiência de jogo e melhorar sua jogabilidade. A criação de extensões para aplicativos e jogos surgiu da crescente necessidade de fornecer aos usuários mecanismos eficientes de Programação por Usuário Final, permitindo que os mesmos preenchessem suas necessidades singulares através da criação, customização e especificação de extensões em software. Em World of Warcraft mais especificamente, os Add-ons exploram um tipo de extensão na qual os jogadores passam a programar sua própria interface de usuário ou a fazer uso de interfaces criadas por outros usuários. No entanto, realizar a programação dessas extensões - os Add-ons - não é uma tarefa fácil. Dentro deste contexto, desenvolvemos a ferramenta EUPAT for WoW (do inglês, End-User Programming Assistance Tool for World of Warcraft) que oferece assistência à criação de Add-ons. Além disso, investigamos como usuários jogadores com e sem conhecimento de programação são beneficiados. Os resultados desta pesquisa permitiram refletir sobre as estratégias de assistência de programação por usuário final no contexto de jogos
Resumo:
New programming language paradigms have commonly been tested and eventually incorporated into hardware description languages. Recently, aspect-oriented programming (AOP) has shown successful in improving the modularity of object-oriented and structured languages such Java, C++ and C. Thus, one can expect that, using AOP, one can improve the understanding of the hardware systems under design, as well as make its components more reusable and easier to maintain. We apply AOP in applications developed using the SystemC library. Several examples will be presented illustrating how to combine AOP and SystemC. During the presentation of these examples, the benefits of this new approach will also be discussed
Resumo:
There is a growing interest of the Computer Science education community for including testing concepts on introductory programming courses. Aiming at contributing to this issue, we introduce POPT, a Problem-Oriented Programming and Testing approach for Introductory Programming Courses. POPT main goal is to improve the traditional method of teaching introductory programming that concentrates mainly on implementation and neglects testing. POPT extends POP (Problem Oriented Programing) methodology proposed on the PhD Thesis of Andrea Mendonça (UFCG). In both methodologies POPT and POP, students skills in dealing with ill-defined problems must be developed since the first programming courses. In POPT however, students are stimulated to clarify ill-defined problem specifications, guided by de definition of test cases (in a table-like manner). This paper presents POPT, and TestBoot a tool developed to support the methodology. In order to evaluate the approach a case study and a controlled experiment (which adopted the Latin Square design) were performed. In an Introductory Programming course of Computer Science and Software Engineering Graduation Programs at the Federal University of Rio Grande do Norte, Brazil. The study results have shown that, when compared to a Blind Testing approach, POPT stimulates the implementation of programs of better external quality the first program version submitted by POPT students passed in twice the number of test cases (professor-defined ones) when compared to non-POPT students. Moreover, POPT students submitted fewer program versions and spent more time to submit the first version to the automatic evaluation system, which lead us to think that POPT students are stimulated to think better about the solution they are implementing. The controlled experiment confirmed the influence of the proposed methodology on the quality of the code developed by POPT students
Resumo:
Digital games have been used as aiding tool for transmission of knowledge, allowing faster dissemination of content. Using this strategy of disseminating logical reasoning development for basic school children can be the motivating gear that helps in the learning process for any area. In this context, many games can be created and provided for the use of teacher and student. However, the complexity of construction of these games becomes a obstacle which can, often, prevent their construction. Thus, this paper presents a framework for creating games, which teach programming logic, presenting from their conception to their integration with the visual programming environment (Blockly) and scenarios created in HTML5.
Resumo:
The present investigation had as its study subject the history of professional monitoring, at the Regional Nursing Council of Rio Grande do Norte (Coren-RN). It assumes that the fiscalization by the Council is an important tool for improving the quality of nursing care. This study aims to analyze the history of monitoring of the nursing profession in Rio Grande do Norte, in the period from 1993 to 2013. It was marked in the ethical-philosophical contribution of Fourez and Vázquez. This is a study of social history, descriptive and analytical, with a qualitative approach, using the methods of documentary research and the technique of oral history. It had the Coren-RN as locus of the empirical research, with its documents and the participation of inspectors and presidents. The history of monitoring was built based on documents and interviews with those who lived through this path. The project was approved by the Research Ethics Committee of UFRN as Opinion 562 400/2014 (CAAE: 25452113.7.0000.5537). The results indicate that the Coren-RN, during these twenty years faced many difficulties such as the shortage of inspectors, the precarious reality of most health services, lack of professional qualification, the illegality of professional practice and structural deficiency in the institution. Nevertheless, it must be recognized that the monitoring process exercised by the Council, has evolved over the years. This evolution is expressed in increasing the number of inspectors, in the acquisition of a new seat and three vehicles, the creation of the subsections in the cities of Natal, Caicó and Pau dos Ferros, the referral of ethical procedures, among other achievements. Similarly, it is registered an improvement in the credibility of nursing professionals and other regulatory agencies. In summary, the monitoring as core activity of the Council is going through a process of transformation, in order to make the dialogue between the disciplinary design and the pedagogical design, in defense of nursing care quality. Therefore, it is an unfinished process, in continuous construction.
Resumo:
Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.
Resumo:
Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.