200 resultados para Programação orientada a objeto (computação)
Resumo:
This work proposes two optimization algorithms for the solution of the Berth Allocation Problem (PAB). Due to the economic development of the country, it became necessary for the improvement of means of transport, which mainly shipping. For this, you need a better system management port, you will receive a lot of ships carrying cargo. In this work the PAB is approached so that the goals are to reduce costs and time handling in ports. For this, we applied two computational techniques, genetic algorithms and optimization for cloud particles, to obtain the best results for this problem. The results obtained with each type of algorithm are compared to conclude which method is more efficient for the port system
Resumo:
This work presents a study about the use of standards and directions on parallel programming in distributed systems, using the MPI standard and PETSc toolkit, performing an analysis of their performances over certain mathematic operations involving matrices. The concepts are used to develop applications to solve problems involving Principal Components Analysis (PCA), which are executed in a Beowulf cluster. The results are compared to the ones of an analogous application with sequencial execution, and then it is analized if there was any performance boost on the parallel application
Resumo:
This project is comprised by an interactive mobile robotics’ environment, focused in human-robot interaction. The system was developed to work in a smartphone, with Android operating system, embedded in a small size mobile robot. Information provided by the smartphone’s camera and microp hone, as well as by proximity sensors embedded in the robot, is used as inputs of a control architecture, implemented in software. It is a behavior-based and receptive to human commands control architecture, to assist the robot’s navigation. The robot is controlled by its own behaviors or by commands em it ted by humans
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
This work, entitled Websislapam: People Rating System Based on Web Technologies, allows the creation of questionnaires, and the organization of entities and people who participate in evaluations. Entities collect data from people with the help of resources that reduce typing mistakes. The Websislapam maintains a database and provides graphical reporting, which enable the analysis of those tested. Developed using Web technologies such as PHP, Javascript, CSS, and others. Developed with the paradigm of object-oriented programming and the MySQL DBMS. For the theoretical basis, research in the areas of System Database, Web Technologies and Web Engineering were performed. It was determined the evaluation process, systems and Web-based applications, Web and System Engineering Database. Technologies applied in the implementation of Websislapam been described. In a separate chapter presented the main features and artifacts used in the development of Websislapam. A case study demonstrates the practical use of the system
Resumo:
Não disponível
Resumo:
Medical Physics has been reaching an important role among several lines in Science, providing means for the improvement of several theories and procedures. Currently, its main application is related with the use of ionizing radiations, specially, in treatment procedures such as Radiotherapy. Radiosurgery is a Radiotherapy technique which consists in administering a single tumoricidal dose of radiation exclusively to the tumorous lesion. It becomes then an interesting alternative to surgical treatment, mainly in cerebral metastases, which are the most frequent cerebral tumors in the central nervous system. The radio neurosurgical team works out a planning for the Radiosurgery treatment, aiming for obtaining an appropriate ideal treatment for each case. For the working out of this treatment planning, Computed Tomography images of the region to be treated are obtained, digitalized and later, fused with nuclear magnetic resonance images. Through these images, critical structures, organs at risk and lesions are localized. After this, calculations are made to determine three-dimensional positions of isocenters, isodose curves, prescribed dose, collimators sizes, position, numbers and respective weight of isocentric conformal fields, and others. The treatment planning is commonly based in desired levels of dose for specific types of tumors and organs at risk concerning the irradiated region. Theses levels of dose are chosen in a way that a high probability of cure may be achieved and meanwhile, that the probability of complications, in whichever organ at risk, may be minimal. Thus, many researches have been carried out, showing that mathematical techniques may help to obtain an optimal planning for the treatment of cerebral metastases. Among the methods of optimization in the study...(Complete abstract click electronic access below)
Resumo:
Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family
Resumo:
O presente trabalho procura entender como a globalização, através da diversidade cultural, pode interferir na vida profissional das pessoas. Tendo como objeto de estudo as disparidades culturais encontradas na IBM Brasil, o trabalho apresenta conceitos da globalização e indaga suas principais consequências na multinacional em questão. Busca identificar as mudanças necessárias no processo de adequação às diferenças culturais entre países e pessoas, entender como as diferenças interculturais podem afetar a vida dos funcionários e como eles aprenderam a lidar com essas diferenças. De modo geral, procura identificar se a globalização fez com que os profissionais se adequassem às diferenças intercontinentais ou se a própria globalização selecionou os profissionais mais adequados ao mercado global
Resumo:
Pós-graduação em Educação Escolar - FCLAR
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Neste artigo descrevemos o comportamento de orações subjetivas e objetivas diretas nas fases arcaica (séculos XIII a XV) e moderna (séculos XVI e XVII) do português. Adotamos o quadro teórico da gramaticalização e dessentencialização de orações e discutimos resultados para os parâmetros tipo semântico do predicado matriz, unidade semântico funcional representada pela oração encaixada e formato da oração encaixada. Observamos, ao longo das sincronias, correlações sistemáticas entre os parâmetros investigados para os dois tipos oracionais. Orações subjetivas apresentam menor variedade de padrões do que orações completivas objetivas, principal diferença a interferir em suas estabilidades sintático-semânticas nos períodos investigados.
Resumo:
Pós-graduação em Educação - FFC
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)