88 resultados para Reconhecimento de Faces
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
In many movies of scientific fiction, machines were capable of speaking with humans. However mankind is still far away of getting those types of machines, like the famous character C3PO of Star Wars. During the last six decades the automatic speech recognition systems have been the target of many studies. Throughout these years many technics were developed to be used in applications of both software and hardware. There are many types of automatic speech recognition system, among which the one used in this work were the isolated word and independent of the speaker system, using Hidden Markov Models as the recognition system. The goals of this work is to project and synthesize the first two steps of the speech recognition system, the steps are: the speech signal acquisition and the pre-processing of the signal. Both steps were developed in a reprogrammable component named FPGA, using the VHDL hardware description language, owing to the high performance of this component and the flexibility of the language. In this work it is presented all the theory of digital signal processing, as Fast Fourier Transforms and digital filters and also all the theory of speech recognition using Hidden Markov Models and LPC processor. It is also presented all the results obtained for each one of the blocks synthesized e verified in hardware
Resumo:
The cervical enamel projection (CEP) is an anatomic variation that can be found in the cement enamel junction, it´s recognition and early diagnosis improves outcome the tooth involved, allowing greater efficiency in treatment. The knowledge of the location, grade and incidence of CEP is decisive on prevention and treatment of periodontal disease. It were studied 1200 molars (600 mandibular molars and 600 maxillary molars) separated from the collection of teeth on the Discipline of Anatomy in FOSJCampos - UNESP. Each group of 600 teeth was separated from the second side (300 teeth) and the second type (first, second or third molar). Each tooth had thoroughly inspected the cervical region, in all their faces, in order to verify the incidence and the grade of CEP in each surface. It was found that the CEP covered in 278 (23,17%) teeth was 146 (52,52%) mandibular molars and 132 (47,48%) maxillary molars. The CEPs were concentrated on a tooth surface in 222 (79,86%) teeth, in two surfaces 53 (19,06%) teeth, and in three surfaces in three (1,08%) teeth. From the total of 4.800 surfaces examined the CEPs were found in 337 surfaces, and 228 (67,66%) surfaces of the grade I, 60 (17,8%) grade II and 49 (14,54%) grade III. The buccal surface presented 207 (61,42%) CEP, the lingual surface in 57 (16,91%), the mesial surface in 35 (10,39%) and the distal surface in 38 (11,28%) CEP. The results of this study demonstrated that the CEPs have focused more on the mandibular teeth on only one surface of the tooth, the grade I was the most found and the buccal surface the most involved
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Recognition of individuals through the characteristics of the iris has in recent years become a well accepted technique due to both the high reliability of this procedure and the its non invasiveness. The methods used in such procedures seek information all over the iris, which depending on the algorithm used may result in high computational costs. Considering that most characteristics of the iris are in its inner region the goal of this work is to develop an algorithm for the recognition of individuals using only this region. To bring the outcome of our approach to the level of the best techniques described in the literature this technique has to be further elaborated, even so the results show a promising technique.
Resumo:
Pós-graduação em Biociências - FCLAS
Resumo:
Direct descendant of the music of the Black Atlantic, hip hop became the spokesman of excluded minorities, for example setting up of the reunification that is geographically separated through communication. The hip hop appropriated new forms of mass communication, allowing the reworking of the story through a counter-hegemonic discourse that seeks self-knowledge and appreciation of the roots of black people. The street culture is the narrative of disenfranchised youth, generating narrative of inclusion, which gave a space of enunciation periphery enabling them to intersubjective recognition. This project aims to discuss the role of hip hop as an agent conscientizing youth peripherals in order to bring to the debate the form of identity construction around the peripheral street culture since, as an intervention that acts as a symbolic system guiding cultural practices and attitudes of these young people. Methodologically, we analyzed specific bibliographical about hip hop and literature originating from the periphery itself. Selected discography of some rap groups. They are Racionais Mc's, 509-E and DJ Hum and Thaíde that constitute the vanguard of hip hop in Brazil. We use music from rapper Emicida this while some contemporary exponents of rap, with national and international. State of São Paulo in order to demonstrate that there is similarity between the questions proposed by the hip hop and the interior of the capital, the group selected Survey. We have used also press material, raising the issue in research on the internet, periodicals include the Rolling Stones and Caros Amigos
Resumo:
A violência, fenômeno multifacetado e socialmente recorrente, há muito invadiu os muros das escolas. Diversos são os relatos sobre manifestações de violência na escola que vão desde a violência simbólica, verbal até a física. Sendo assim, este trabalho tem como objetivo compreender as atuais concepções sobre a violência e articular estas com as teorias do desenvolvimento da moralidade humana, com o intuito de estudar as formas de como essa violência, segundo a teoria do desenvolvimento moral, aparece nas escolas na contemporaneidade. Concluímos que as teorias do desenvolvimento moral, tanto na sua parte teórica quanto metodológica, andam se tornando fundamentais na busca de diálogos que promovam mais amadurecimento de conceitos como: a dignidade, a justiça, a bondade, a solidariedade e ao respeito a outros seres humanos, com o intuito de promover uma educação pacificadora e, desta forma, anular significativamente a violência e a sua banalização, principalmente nas escolas.
Resumo:
Este artículo se centra en el análisis de la novela Memorial do fim: a morte de Machado de Assis (1991), de Haroldo Maranhão. Basándose en las formulaciones teóricas de Linda Hutcheon en su Poética del postmodernismo (1991), analizamos la reelaboración paródica de la biografía de Machado de Assis presente en la novela. Esta práctica paródica, que se caracteriza por su dualidad contradictoria de la continuidad y la transgresión, es la principal característica de la narrativa posmoderna en esta novela de Haroldo Maranhão.
Resumo:
The aim of this study was to add to the debate about Family Health Support Centers (FHSCs), starting from reflections about the support function. Support is generally presented, in official documents from the Ministry of Health and in academic-scientific publications, accompanied by descriptors that characterize it. Differences in terminology are commonly encountered: “institutional support”, “managerial support”, “matrix support” and so on. With regard to FHSCs, published papers have highlighted the central role played by matrix support. However, we pose the question: what are the faces that the support function has been taking on in implementing such programs? To reflect on this and other issues, we developed a study of qualitative nature within a FHSC team in Paraná, outside of the state capital, using the methodological tools of participant observation, semi-structured interviews and discussion groups. We sought to demonstrate that the dynamics of the support function in FHSCs make it possible for both matrix support and institutional support to emerge.
Resumo:
The aim of this research was to evaluate, by preference tests, the ability of perception of broiler chicks in the recognition of objects and foods of different colors. The survey was conducted in Brazil and consisted in the conditioning of 60 sexed one-day-old chicks using 30 male chicks and 30 female chicks for three days with blue balls and red food colors chosen for having opposed chromaticities. After the conditioning phase, a preference test was performed, in which the animals were placed individually in the center of an arena test with four options: red food, blue food, red balls and blue balls. Each bird was measured for 10 minutes. Latency to the first peck and the number of pecks, the number of sequential pecks at each object type or food, the total time the bird in each occupied compartment and the first occupied slot were recorded. According to the results, female chicks are less inhibited when in contact with a new situation when compared with males. However, males were able to establish a standard environment in the conditioning phase and opted for the compartment which was closer to that situation, associating the blue color to the ball and red color to the food. Overall, among the types of object colors and between types of food colors, the birds took less time for the decision on the choice of blue food and blue ball, showing a greater attraction, at first, to this color. Between the two ball colors, shorter latency period, greater number of interactions as well as more time spent on site were related to the blue sphere, verifying greater preference for this object. When evaluating the types of food colors, it was observed that the highest averages related to the number of pecks, and sequential pecks occurred with red food. Therefore, it is concluded that the birds recognized the red and blue food object, with the blue color having greater attractiveness for broiler chicks when compared to red.
Resumo:
Pós-graduação em Estudos Literários - FCLAR
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)