15 resultados para grahics cards

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The artificial lifting of oil is needed when the pressure of the reservoir is not high enough so that the fluid contained in it can reach the surface spontaneously. Thus the increase in energy supplies artificial or additional fluid integral to the well to come to the surface. The rod pump is the artificial lift method most used in the world and the dynamometer card (surface and down-hole) is the best tool for the analysis of a well equipped with such method. A computational method using Artificial Neural Networks MLP was and developed using pre-established patterns, based on its geometry, the downhole card are used for training the network and then the network provides the knowledge for classification of new cards, allows the fails diagnose in the system and operation conditions of the lifting system. These routines could be integrated to a supervisory system that collects the cards to be analyzed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present paper is a doctorate thesis, in the area of Education, that has as a goal to describe and to reflect on the construction/systematization of a relation between family and institution of Childhood Education, in favor of sharing the care and education actions of children, in the context of creation of a County Center of Childhood Education, located in the city of Natal-RN. Our intension with this paper is to share some of the ideas and actions collectively constructed by this experience, with the intention of bringing a contribution for the thematic debates concerning Childhood Education - as modality of education, in a general way; and the relations between families and Institutions of Childhood Education, in a more specific way. The paper presented here is endorsed by the postulates of the qualitative research with characteristics of a research-action, having as main instruments of the data construction the open or half-structuralized interviews, the personal notebook of registers, the participant s index cards characterizing the children and comments. Authors as Aries (1981); Bassedas, Huguet and Solé (1999); Bhering and Blatchford (1999); Brasil (1998); Bujes (2001); Didonet (2002 - 2003); Formosinho (2007); Gómez (2000); Heywood (2004); Kramer (2005); Marchesi and Martín (2003); Marschal and Zohar (2006); Thiollent (2004); Tiriba (2006), amongst others, had theoretically based this paper. The experience described here points to the possibilities of sharing the care and education actions between family and Institution of Childhood Education, emphasizing the relevance of participative praxis in the interior of the institution, so that its job can propitiate this sharing with the families, throughout activities as meetings, lectures, workshops, participation in didactic projects, open expositions to the community, commemorative parties and valuation of the local culture, amongst other chances of dialogue and interaction between the educative institution and the families

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The precision and the fast identification of abnormalities of bottom hole are essential to prevent damage and increase production in the oil industry. This work presents a study about a new automatic approach to the detection and the classification of operation mode in the Sucker-rod Pumping through dynamometric cards of bottom hole. The main idea is the recognition of the well production status through the image processing of the bottom s hole dynamometric card (Boundary Descriptors) and statistics and similarity mathematics tools, like Fourier Descriptor, Principal Components Analysis (PCA) and Euclidean Distance. In order to validate the proposal, the Sucker-Rod Pumping system real data are used

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper aims to present the feasibility of using a composite using discarded material from the cultivation of banana tree (pseudostem), which is fibrillated together with synthetic resin replacing glass fiber to be used in structural elements that do not demand large mechanical stress such as reservoirs, troughs, domes, sewage pipes etc.. For this, there were studies about the mechanical properties of a composite made with polyester resin and fiber of banana tree (Musa sp, musac), in which the splints were removed from the pseudostem, being made fibrillation by hand, with the aid of a brush steel, followed by natural drying. After treatment for cleaning and removal of wax, the fiber was cut into pieces of approximately 60 mm to 100 mm, for, together with synthetic resin, make cards of a features fiber composite with random orientation relative to the weight of the resin. We used three different percentages of fiber (3%, 6% and 9%), in order to make a comparative study between them and what would be the one with the best performance. Were manufactured specimens of each material and then subjected to uniaxial tensile tests, three point bending, moisture absorption and thermal characteristics. The results show that, in general, the use of banana tree fiber is feasible simply by an improvement in the production process (machining of the procedure) and greater care in the manufacture of parts

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This treatise analyzes the identitary setting called Veneza Brasileira (Brazilian Venice) which is subscribed to the discoursive materialization related to the imagetic setting (literary and mediatic) produced about the city of Recife. The main investigation of this research is to examine the way how the identitary setting called Veneza Brasileira has been constructed in the imagetic setting practices about the city of Recife in the nineteenth and twentieth centuries. This study is subscribed to the Applied Linguistics and considers the theoretical perspectives that come from the Cultural Studies which investigation basis is focused on authors such as: Hall (2006); Bauman (1999; 2001;2005); Silva (2000); and Castells (2000) related to the discussion over identity, as well as the discussion over Urban Studies presented in Santos (1997; 1999); Ferrara (1998); and Pesavento (2001). Moreover it is also based on the theoretical basis found in Foucault (2004; 2006; 2007). Furthermore theoretical-methodological approaches rely on the French Discourse Analysis (DA) found in Orlandi (2001); Gregolin (2007); and Courtine (2006). On being so, this treatise aims to: analyze the meaning effects over the production of the identitary setting, especially the so-called Veneza Brasileira, in the imagetic setting discoursive practices (Poems, Post Cards and Touristic Guides) which are produced over the urban setting of the city of Recife. This research is characterized by being qualitative and interpretative and the theoretical analytical approaches contributed to the reading of both poetic and iconic images presented in the excerpts of poems from the nineteenth century and early twentieth century in: Manuel Bandeira s poems, Carlos Pena Filho s poems, and João Cabral de Melo Neto s poems which were produced in the early and late twentieth century. Moreover, this study observed some photographic images in Post Cards and Touristic Guides related to the visiting of historical sites in Recife. One could conclude that the imagetic setting discourse about Recife produced different identitary effects over the so-called Veneza Brasileira along these three centuries: in the nineteenth century, the poetry constructed the utopia city along with the meaning effect of identitary unit; as for the twentieth century, one observed an oscillation between a utopia/heteroutopia city meaning effect of both united and fragmented identity, the latter one is prevalent. As for the twenty-first century, the media reconstructed over again the utopia city, and consequently, produced meaning effect of identitary unit. These same meaning effects of identity either corroborate or contradict to/with the concepts of the postmodernism over identity along these three centuries. In other words, considering the imagetic setting, this oscillation occurs in the proportion of one finds an (ex) inclusion of social agents that construct these same identities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smart card applications represent a growing market. Usually this kind of application manipulate and store critical information that requires some level of security, such as financial or confidential information. The quality and trustworthiness of smart card software can be improved through a rigorous development process that embraces formal techniques of software engineering. In this work we propose the BSmart method, a specialization of the B formal method dedicated to the development of smart card Java Card applications. The method describes how a Java Card application can be generated from a B refinement process of its formal abstract specification. The development is supported by a set of tools, which automates the generation of some required refinements and the translation to Java Card client (host) and server (applet) applications. With respect to verification, the method development process was formalized and verified in the B method, using the Atelier B tool [Cle12a]. We emphasize that the Java Card application is translated from the last stage of refinement, named implementation. This translation process was specified in ASF+SDF [BKV08], describing the grammar of both languages (SDF) and the code transformations through rewrite rules (ASF). This specification was an important support during the translator development and contributes to the tool documentation. We also emphasize the KitSmart library [Dut06, San12], an essential component of BSmart, containing models of all 93 classes/interfaces of Java Card API 2:2:2, of Java/Java Card data types and machines that can be useful for the specifier, but are not part of the standard Java Card library. In other to validate the method, its tool support and the KitSmart, we developed an electronic passport application following the BSmart method. We believe that the results reached in this work contribute to Java Card development, allowing the generation of complete (client and server components), and less subject to errors, Java Card applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Formal methods should be used to specify and verify on-card software in Java Card applications. Furthermore, Java Card programming style requires runtime verification of all input conditions for all on-card methods, where the main goal is to preserve the data in the card. Design by contract, and in particular, the JML language, are an option for this kind of development and verification, as runtime verification is part of the Design by contract method implemented by JML. However, JML and its currently available tools for runtime verification were not designed with Java Card limitations in mind and are not Java Card compliant. In this thesis, we analyze how much of this situation is really intrinsic of Java Card limitations and how much is just a matter of a complete re-design of JML and its tools. We propose the requirements for a new language which is Java Card compliant and indicate the lines on which a compiler for this language should be built. JCML strips from JML non-Java Card aspects such as concurrency and unsupported types. This would not be enough, however, without a great effort in optimization of the verification code generated by its compiler, as this verification code must run on the card. The JCML compiler, although being much more restricted than the one for JML, is able to generate Java Card compliant verification code for some lightweight specifications. As conclusion, we present a Java Card compliant variant of JML, JCML (Java Card Modeling Language), with a preliminary version of its compiler

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Java Card technology allows the development and execution of small applications embedded in smart cards. A Java Card application is composed of an external card client and of an application in the card that implements the services available to the client by means of an Application Programming Interface (API). Usually, these applications manipulate and store important information, such as cash and confidential data of their owners. Thus, it is necessary to adopt rigor on developing a smart card application to improve its quality and trustworthiness. The use of formal methods on the development of these applications is a way to reach these quality requirements. The B method is one of the many formal methods for system specification. The development in B starts with the functional specification of the system, continues with the application of some optional refinements to the specification and, from the last level of refinement, it is possible to generate code for some programming language. The B formalism has a good tool support and its application to Java Card is adequate since the specification and development of APIs is one of the major applications of B. The BSmart method proposed here aims to promote the rigorous development of Java Card applications up to the generation of its code, based on the refinement of its formal specification described in the B notation. This development is supported by the BSmart tool, that is composed of some programs that automate each stage of the method; and by a library of B modules and Java Card classes that model primitive types, essential Java Card API classes and reusable data structures

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of smart card applications requires a high level of reliability. Formal methods provide means for this reliability to be achieved. The BSmart method and tool contribute to the development of smart card applications with the support of the B method, generating Java Card code from B specifications. For the development with BSmart to be effectively rigorous without overloading the user it is important to have a library of reusable components built in B. The goal of KitSmart is to provide this support. A first research about the composition of this library was a graduation work from Universidade Federal do Rio Grande do Norte, made by Thiago Dutra in 2006. This first version of the kit resulted in a specification of Java Card primitive types byte, short and boolean in B and the creation of reusable components for application development. This work provides an improvement of KitSmart with the addition of API Java Card specification made in B and a guide for the creation of new components. The API Java Card in B, besides being available to be used for development of applications, is also useful as a documentation of each API class. The reusable components correspond to modules to manipulate specific structures, such as date and time. These structures are not available for B or Java Card. These components for Java Card are generated from specifications formally verified in B. The guide contains quick reference on how to specify some structures and how some situations were adapted from object-orientation to the B Method. This work was evaluated through a case study made through the BSmart tool, that makes use of the KitSmart library. In this case study, it is possible to see the contribution of the components in a B specification. This kit should be useful for B method users and Java Card application developers

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The widespread growth in the use of smart cards (by banks, transport services, and cell phones, etc) has brought an important fact that must be addressed: the need of tools that can be used to verify such cards, so to guarantee the correctness of their software. As the vast majority of cards that are being developed nowadays use the JavaCard technology as they software layer, the use of the Java Modeling Language (JML) to specify their programs appear as a natural solution. JML is a formal language tailored to Java. It has been inspired by methodologies from Larch and Eiffel, and has been widely adopted as the de facto language when dealing with specification of any Java related program. Various tools that make use of JML have already been developed, covering a wide range of functionalities, such as run time and static checking. But the tools existent so far for static checking are not fully automated, and, those that are, do not offer an adequate level of soundness and completeness. Our objective is to contribute to a series of techniques, that can be used to accomplish a fully automated and confident verification of JavaCard applets. In this work we present the first steps to this. With the use of a software platform comprised by Krakatoa, Why and haRVey, we developed a set of techniques to reduce the size of the theory necessary to verify the specifications. Such techniques have yielded very good results, with gains of almost 100% in all tested cases, and has proved as a valuable technique to be used, not only in this, but in most real world problems related to automatic verification

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research aims at studying the use of greeting cards, here understood as a literacy practice widely used in American society of the United States. In American culture, these cards become sources of information and memory about people‟s cycles of life, their experiences and their bonds of sociability enabled by means of the senses that the image and the word comprise. The main purpose of this work is to describe how this literacy practice occurs in American society. Theoretically, this research is based on studies of literacy (BARTON, HAMILTON, 1998; BAYHAM, 1995; HAMILTON, 2000; STREET, 1981, 1984, 1985, 1993, 2003), the contributions of social semiotics, associated with systemic-functional grammar (HALLIDAY; HASAN 1978, 1985, HALLIDAY, 1994, HALLIDAY; MATTHIESSEN, 2004), and the grammar of visual design (KRESS; LEITE-GARCIA, VAN LEEUWEN, 1997, 2004, 2006; KRESS; MATTHIESSEN, 2004). Methodologically, it is a study that falls within the qualitative paradigm of interpretative character, which adopts ethnographic tools in data generation. From this perspective, it makes use of “looking and asking” techniques (ERICKSON, 1986, p. 119), complemented by the technique of "registering", proposed by Paz (2008). The corpus comprises 104 printed cards, provided by users of this cultural artifact, from which we selected 24, and 11 e-cards, extracted from the internet, as well as verbalizations obtained by applying a questionnaire prepared with open questions asked in order to gather information about the perceptions and actions of these cards users with respect to this literacy practice. Data analysis reveals cultural, economic and social aspects of this practice and the belief that literacy practice of using printed greeting cards, despite the existence of virtual alternatives, is still very fruitful in American society. The study also allows users to comprehend that the cardholders position themselves and construct identities that are expressed in verbal and visual interaction in order to achieve the desired effect. As a result, it is understood that greeting cards are not unintentional, but loaded with ideology and power relations, among other aspects that are constitutive of them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The great amount of data generated as the result of the automation and process supervision in industry implies in two problems: a big demand of storage in discs and the difficulty in streaming this data through a telecommunications link. The lossy data compression algorithms were born in the 90’s with the goal of solving these problems and, by consequence, industries started to use those algorithms in industrial supervision systems to compress data in real time. These algorithms were projected to eliminate redundant and undesired information in a efficient and simple way. However, those algorithms parameters must be set for each process variable, becoming impracticable to configure this parameters for each variable in case of systems that monitor thousands of them. In that context, this paper propose the algorithm Adaptive Swinging Door Trending that consists in a adaptation of the Swinging Door Trending, as this main parameters are adjusted dynamically by the analysis of the signal tendencies in real time. It’s also proposed a comparative analysis of performance in lossy data compression algorithms applied on time series process variables and dynamometer cards. The algorithms used to compare were the piecewise linear and the transforms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The artificial lifting of oil is needed when the pressure of the reservoir is not high enough so that the fluid contained in it can reach the surface spontaneously. Thus the increase in energy supplies artificial or additional fluid integral to the well to come to the surface. The rod pump is the artificial lift method most used in the world and the dynamometer card (surface and down-hole) is the best tool for the analysis of a well equipped with such method. A computational method using Artificial Neural Networks MLP was and developed using pre-established patterns, based on its geometry, the downhole card are used for training the network and then the network provides the knowledge for classification of new cards, allows the fails diagnose in the system and operation conditions of the lifting system. These routines could be integrated to a supervisory system that collects the cards to be analyzed