857 resultados para Constructivism paradigms
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs
Resumo:
In order to sustain their competitive advantage in the current increasingly globalized and turbulent context, more and more firms are competing globally in alliances and networks that oblige them to adopt new managerial paradigms and tools. However, their strategic analyses rarely take into account the strategic implications of these alliances and networks, considering their global relational characteristics, admittedly because of a lack of adequate tools to do so. This paper contributes to research that seeks to fill this gap by proposing the Global Strategic Network Analysis - SNA - framework. Its purpose is to help firms that compete globally in alliances and networks to carry out their strategic assessments and decision-making with a view to ensuring dynamic strategic fit from both a global and relational perspective.
Resumo:
RESUMO: Neste estudo investigou-se a influência dos meios audiovisuais na tomada de decisão pelos utentes em cirurgias oftalmológicas, especialmente nas cirurgias refractivas. A metodologia escolhida integrou métodos quantitativos e qualitativos, com o objectivo de abranger a máxima amplitude da descrição, explicação e compreensão do objecto a ser investigado. Procura-se evidenciar e analisar sentimentos, motivações e atitudes individuais, como escolhas e tomada de decisão, bem como, perceber a relação entre o processo de comunicação médico / paciente e a tomada de decisão. Foram usados: um questionário, material digital e vídeos com as principais cirurgias refractivas apresentadas aos utentes, com uma amostra de n= 150 participantes do Serviço de Oftalmologia da HOSPOR e SAMS Centro de 01 de Julho 2008 a 28 de Fevereiro de 2009, com a faixa etária de 20 a 80 anos, com diagnóstico escolhido. Os dados recolhidos foram analisados pelo SPSS 18. A fundamentação teórica está baseada no estudo da captação e disfunções no trajecto da imagem, observando-se os componentes da aquisição do conhecimento: sensação, percepção, pensamento, consciência, memória, imaginação, linguagem, informação, bem como bioética, comunicação médica e a tomada de decisão, na qual se valoriza a educação do Utente para decidir. O resultado desta investigação aponta para novos paradigmas nos processos de informação / decisão consciente, indicando a necessidade de se investir na educação e na informação médica humanizada aos utentes para haver maior conhecimento, participação, satisfação e eficácia na terapêutica a ser escolhida. ABSTRACT: This paper analyzes how information and communication technologies, in particular the media of some ophthalmologic surgery, can help better decisions meaning new ways of information and new relationship between doctor and patient. This study investigates how doctors take hold of technological resources and discuss the client`s decision. We used the quantitative and qualitative structured interview of client who are visually impaired, especially myopia / hyperopia / astigmatism, presbyopia and cataract. We used a questionnaire, material and digital videos with the leading refractive surgery presented to the clients, with a sample of n = 150 participants of the Department of Ophthalmology, and SAMS HOSPOR Center from 01 July 2008 to 28 February 2009, with range 20 to 80 years, diagnosed chosen. The data collected were analyzed by SPSS. The theoretical study is based on the capture and routing of image and perception, observing neuro-psycho-social components: sensation, perception, visual perception, consciousness, knowledge, memory, imagination, language, information, bioethics and decision-making, in which values education of user to decide. The result of this research points to new paradigms in information processing / conscious decision, indicating the necessity of investing in education and humane medical information to the Users in order to archive a greater awareness,participation, satisfaction and effectiveness in the treatment to choose.
Resumo:
Concepts such as righteousness, equality, tolerance and freedom are nowadays considered fundamental issues that should prevail in any society. Balance and righteousness thrive however on a very thin layer. We are, in fact, living in an era of duality and antithetical paradigms. This essay approaches two Renaissance authors who dealt with the same matters in their works, at a very different time and through different ways of reflection: Thomas More and Sir Walter Raleigh.
Resumo:
AGM and Conference in Mechelen 27 – 30 April 2010
Resumo:
Many of the most common human functions such as temporal and non-monotonic reasoning have not yet been fully mapped in developed systems, even though some theoretical breakthroughs have already been accomplished. This is mainly due to the inherent computational complexity of the theoretical approaches. In the particular area of fault diagnosis in power systems however, some systems which tried to solve the problem, have been deployed using methodologies such as production rule based expert systems, neural networks, recognition of chronicles, fuzzy expert systems, etc. SPARSE (from the Portuguese acronym, which means expert system for incident analysis and restoration support) was one of the developed systems and, in the sequence of its development, came the need to cope with incomplete and/or incorrect information as well as the traditional problems for power systems fault diagnosis based on SCADA (supervisory control and data acquisition) information retrieval, namely real-time operation, huge amounts of information, etc. This paper presents an architecture for a decision support system, which can solve the presented problems, using a symbiosis of the event calculus and the default reasoning rule based system paradigms, insuring soft real-time operation with incomplete, incorrect or domain incoherent information handling ability. A prototype implementation of this system is already at work in the control centre of the Portuguese Transmission Network.
Resumo:
Cyber-Physical Systems and Ambient Intelligence are two of the most important and emerging paradigms of our days. The introduction of renewable sources gave origin to a completely different dimension of the distribution generation problem. On the other hand, Electricity Markets introduced a different dimension in the complexity, the economic dimension. Our goal is to study how to proceed with the Intelligent Training of Operators in Power Systems Control Centres, considering the new reality of Renewable Sources, Distributed Generation, and Electricity Markets, under the emerging paradigms of Cyber-Physical Systems and Ambient Intelligence. We propose Intelligent Tutoring Systems as the approach to deal with the intelligent training of operators in these new circumstances.
Resumo:
This article describes a new approach in the Intelligent Training of Operators in Power Systems Control Centres, considering the new reality of Renewable Sources, Distributed Generation, and Electricity Markets, under the emerging paradigms of Cyber-Physical Systems and Ambient Intelligence. We propose Intelligent Tutoring Systems as the approach to deal with the intelligent training of operators in these new circumstances.
Resumo:
Recommendation systems have been growing in number for the last fifteen years. To evolve and adapt to the demands of the actual society, many paradigms emerged giving birth to even more paradigms and hybrid approaches. Mobile devices have also been under an incredible growth rate in every business area, and there are already lots of mobile based systems to assist tourists. This explosive growth gave birth to different mobile applications, each having their own advantages and disadvantages. Since recommendation and mobile systems might as well be integrated, this work intends to present the current state of the art in tourism mobile and recommendation systems, as well as to state their advantages and disadvantages.
Resumo:
Recommendation systems have been growing in number over the last fifteen years. To evolve and adapt to the demands of the actual society, many paradigms emerged giving birth to even more paradigms and hybrid approaches. These approaches contain strengths and weaknesses that need to be evaluated according to the knowledge area in which the system is going to be implemented. Mobile devices have also been under an incredible growth rate in every business area, and there are already lots of mobile based systems to assist tourists. This explosive growth gave birth to different mobile applications, each having their own advantages and disadvantages. Since recommendation and mobile systems might as well be integrated, this work intends to present the current state of the art in tourism mobile and recommendation systems, as well as to state their advantages and disadvantages.
Resumo:
Mestrado em Engenharia Electrotécnica e de Computadores
Resumo:
Copyright: © 2014 Rodrigues et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Resumo:
Mestrado em Engenharia Electrotécnica e de Computadores. Área de Especialização em Sistemas Autónomos
Resumo:
Dissertação de 2º Ciclo conducente ao grau de Mestre em Ciências da Educação - especialização em Educação Social e Intervenção Comunitária
Resumo:
Perante a evolução constante da Internet, a sua utilização é quase obrigatória. Através da web, é possível conferir extractos bancários, fazer compras em países longínquos, pagar serviços sem sair de casa, entre muitos outros. Há inúmeras alternativas de utilização desta rede. Ao se tornar tão útil e próxima das pessoas, estas começaram também a ganhar mais conhecimentos informáticos. Na Internet, estão também publicados vários guias para intrusão ilícita em sistemas, assim como manuais para outras práticas criminosas. Este tipo de informação, aliado à crescente capacidade informática do utilizador, teve como resultado uma alteração nos paradigmas de segurança informática actual. Actualmente, em segurança informática a preocupação com o hardware é menor, sendo o principal objectivo a salvaguarda dos dados e continuidade dos serviços. Isto deve-se fundamentalmente à dependência das organizações nos seus dados digitais e, cada vez mais, dos serviços que disponibilizam online. Dada a mudança dos perigos e do que se pretende proteger, também os mecanismos de segurança devem ser alterados. Torna-se necessário conhecer o atacante, podendo prever o que o motiva e o que pretende atacar. Neste contexto, propôs-se a implementação de sistemas de registo de tentativas de acesso ilícitas em cinco instituições de ensino superior e posterior análise da informação recolhida com auxílio de técnicas de data mining (mineração de dados). Esta solução é pouco utilizada com este intuito em investigação, pelo que foi necessário procurar analogias com outras áreas de aplicação para recolher documentação relevante para a sua implementação. A solução resultante revelou-se eficaz, tendo levado ao desenvolvimento de uma aplicação de fusão de logs das aplicações Honeyd e Snort (responsável também pelo seu tratamento, preparação e disponibilização num ficheiro Comma Separated Values (CSV), acrescentando conhecimento sobre o que se pode obter estatisticamente e revelando características úteis e previamente desconhecidas dos atacantes. Este conhecimento pode ser utilizado por um administrador de sistemas para melhorar o desempenho dos seus mecanismos de segurança, tais como firewalls e Intrusion Detection Systems (IDS).