998 resultados para Repo, Jemima


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Clone detection is well established for imperative programs. It works mostly on the statement level and therefore is ill-suited for func- tional programs, whose main constituents are expressions and types. In this paper we introduce clone detection for functional programs using a new intermediate program representation, dubbed Functional Control Tree. We extend clone detection to the identi cation of non-trivial func- tional program clones based on the recursion patterns from the so-called Bird-Meertens formalism

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pectus excavatum is the most common congenital deformity of the anterior chest wall, in which several ribs and the sternum grow abnormally. Nowadays, the surgical correction is carried out in children and adults through Nuss technic. This technic has been shown to be safe with major drivers as cosmesis and the prevention of psychological problems and social stress. Nowadays, no application is known to predict the cosmetic outcome of the pectus excavatum surgical correction. Such tool could be used to help the surgeon and the patient in the moment of deciding the need for surgery correction. This work is a first step to predict postsurgical outcome in pectus excavatum surgery correction. Facing this goal, it was firstly determined a point cloud of the skin surface along the thoracic wall using Computed Tomography (before surgical correction) and the Polhemus FastSCAN (after the surgical correction). Then, a surface mesh was reconstructed from the two point clouds using a Radial Basis Function algorithm for further affine registration between the meshes. After registration, one studied the surgical correction influence area (SCIA) of the thoracic wall. This SCIA was used to train, test and validate artificial neural networks in order to predict the surgical outcome of pectus excavatum correction and to determine the degree of convergence of SCIA in different patients. Often, ANN did not converge to a satisfactory solution (each patient had its own deformity characteristics), thus invalidating the creation of a mathematical model capable of estimating, with satisfactory results, the postsurgical outcome

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic software development is a challenging eld: high performance must be achieved, while ensuring correctness and com- pliance with low-level security policies. CAO is a domain speci c language designed to assist development of cryptographic software. An important feature of this language is the design of a novel type system introducing native types such as prede ned sized vectors, matrices and bit strings, residue classes modulo an integer, nite elds and nite eld extensions, allowing for extensive static validation of source code. We present the formalisation, validation and implementation of this type system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a method for real-time detection and tracking of people in video captured by a depth camera. For each object to be assessed, an ordered sequence of values that represents the distances between its center of mass to the boundary points is calculated. The recognition is based on the analysis of the total distance value between the above sequence and some pre-defined human poses, after apply the Dynamic Time Warping. This similarity approach showed robust results in people detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pectus excavatum is the most common congenital deformity of the anterior thoracic wall. The surgical correction of such deformity, using Nuss procedure, consists in the placement of a personalized convex prosthesis into sub-sternal position to correct the deformity. The aim of this work is the CT-scan substitution by ultrasound imaging for the pre-operative diagnosis and pre-modeling of the prosthesis, in order to avoid patient radiation exposure. To accomplish this, ultrasound images are acquired along an axial plane, followed by a rigid registration method to obtain the spatial transformation between subsequent images. These images are overlapped to reconstruct an axial plane equivalent to a CT-slice. A phantom was used to conduct preliminary experiments and the achieved results were compared with the corresponding CT-data, showing that the proposed methodology can be capable to create a valid approximation of the anterior thoracic wall, which can be used to model/bend the prosthesis

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pectus excavatum is the most common congenital deformity of the anterior chest wall, in which an abnormal formation of the rib cage gives the chest a caved-in or sunken appearance. Today, the surgical correction of this deformity is carried out in children and adults through Nuss technic, which consists in the placement of a prosthetic bar under the sternum and over the ribs. Although this technique has been shown to be safe and reliable, not all patients have achieved adequate cosmetic outcome. This often leads to psychological problems and social stress, before and after the surgical correction. This paper targets this particular problem by presenting a method to predict the patient surgical outcome based on pre-surgical imagiologic information and chest skin dynamic modulation. The proposed approach uses the patient pre-surgical thoracic CT scan and anatomical-surgical references to perform a 3D segmentation of the left ribs, right ribs, sternum and skin. The technique encompasses three steps: a) approximation of the cartilages, between the ribs and the sternum, trough b-spline interpolation; b) a volumetric mass spring model that connects two layers - inner skin layer based on the outer pleura contour and the outer surface skin; and c) displacement of the sternum according to the prosthetic bar position. A dynamic model of the skin around the chest wall region was generated, capable of simulating the effect of the movement of the prosthetic bar along the sternum. The results were compared and validated with patient postsurgical skin surface acquired with Polhemus FastSCAN system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumo: 1 – Introdução; 2 – Breve nota de Criminologia e Política Criminal no que diz respeito ao papel das polícias perante a teoria da discricionariedade no contexto do problema da corrupção, igualmente económica e social; 3 - O problema da «corrupção», sobretudo no seio do Direito penal económico e social: o caso da importância da empresa; 4 – Algumas pré-conclusões sobre a dificuldade de imputar crimes, nomeadamente crimes de corrupção, às «empresas»; 5 – Conclusão. § Abstract: 1 - Introduction 2 - a brief note of Criminology and Criminal Policy in relation to the role of the police before the theory of discretion in the context of the problem of corruption, also economic and social development; 3 - the problem of the «corruption», especially within the social and economic criminal law: the case of the importance of the company; 4 - Some pre-conclusions about the difficulty of attributing crimes, including crimes of corruption, the «companies», 5 - Conclusion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last years, it has become increasingly clear that neurodegenerative diseases involve protein aggregation, a process often used as disease progression readout and to develop therapeutic strategies. This work presents an image processing tool to automatic segment, classify and quantify these aggregates and the whole 3D body of the nematode Caenorhabditis Elegans. A total of 150 data set images, containing different slices, were captured with a confocal microscope from animals of distinct genetic conditions. Because of the animals’ transparency, most of the slices pixels appeared dark, hampering their body volume direct reconstruction. Therefore, for each data set, all slices were stacked in one single 2D image in order to determine a volume approximation. The gradient of this image was input to an anisotropic diffusion algorithm that uses the Tukey’s biweight as edge-stopping function. The image histogram median of this outcome was used to dynamically determine a thresholding level, which allows the determination of a smoothed exterior contour of the worm and the medial axis of the worm body from thinning its skeleton. Based on this exterior contour diameter and the medial animal axis, random 3D points were then calculated to produce a volume mesh approximation. The protein aggregations were subsequently segmented based on an iso-value and blended with the resulting volume mesh. The results obtained were consistent with qualitative observations in literature, allowing non-biased, reliable and high throughput protein aggregates quantification. This may lead to a significant improvement on neurodegenerative diseases treatment planning and interventions prevention

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pectus Carinatum (PC) is a chest deformity consisting on the anterior protrusion of the sternum and adjacent costal cartilages. Non-operative corrections, such as the orthotic compression brace, require previous information of the patient chest surface, to improve the overall brace fit. This paper focuses on the validation of the Kinect scanner for the modelling of an orthotic compression brace for the correction of Pectus Carinatum. To this extent, a phantom chest wall surface was acquired using two scanner systems – Kinect and Polhemus FastSCAN – and compared through CT. The results show a RMS error of 3.25mm between the CT data and the surface mesh from the Kinect sensor and 1.5mm from the FastSCAN sensor

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interoperability of IP video equipment is a critical problem for surveillance systems and other video application developers. ONVIF is one of the two specifications addressing the standardization of networked devices interface, and it is based on SOAP. This paper addresses the development of an ONVIF library to develop clients of video cameras. We address the choice of a web services toolkit, and how to use the selected toolkit to develop a basic library. From that, we discuss the implementation of features that ...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Surgical repair of pectus excavatum (PE) has become more popular due to improvements in the minimally invasive Nuss procedure. The pre-surgical assessment of PE patients requires Computerized Tomography (CT), as the malformation characteristics vary from patient to patient. Objective: This work aims to characterize soft tissue thickness (STT) external to the ribs among PE patients. It also presents a comparative analysis between the anterior chest wall surface before and after surgical correction. Methods: Through surrounding tissue segmentation in CT data, STT values were calculated at different lines along the thoracic wall, with a reference point in the intersection of coronal and median planes. The comparative analysis between the two 3D anterior chest surfaces sets a surgical correction influence area (SCIA) and a volume of interest (VOI) based on image processing algorithms, 3D surface algorithms, and registration methods. Results: There are always variations between left and right side STTs (2.54±2.05 mm and 2.95±2.97 mm for female and male patients, respectively). STTs are dependent on age, sex, and body mass index of each patient. On female patients, breast tissue induces additional errors in bar manual

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Color model representation allows characterizing in a quantitative manner, any defined color spectrum of visible light, i.e. with a wavelength between 400nm and 700nm. To accomplish that, each model, or color space, is associated with a function that allows mapping the spectral power distribution of the visible electromagnetic radiation, in a space defined by a set of discrete values that quantify the color components composing the model. Some color spaces are sensitive to changes in lighting conditions. Others assure the preservation of certain chromatic features, remaining immune to these changes. Therefore, it becomes necessary to identify the strengths and weaknesses of each model in order to justify the adoption of color spaces in image processing and analysis techniques. This chapter will address the topic of digital imaging, main standards and formats. Next we will set the mathematical model of the image acquisition sensor response, which enables assessment of the various color spaces, with the aim of determining their invariance to illumination changes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumo: 1- Introdução: algumas notícias da comunicação social; 2 – O designado «Conselho de Prevenção de Corrupção»; 3 – Procuradoria-Geral da República (P.G.R.) e o Departamento Central de Investigação e Acção Penal (D.I.A.P.); 4 – Alguns sítios com relevo; 5 – Alguns dos problemas que podem ser colocados em relação à Responsabilidade das Empresas pelo Crime de Corrupção; 5.1 – Âmbito dos problemas a serem falados; 6 – Qual a noção de «empresas que vamos utilizar»?; 6.1 – A noção de «empresa» em sentido geral objectivo e penal; 7 – Mas que tipo de crimes de corrupção vamos falar?; 8 – O art. 11º do Código Penal e os crimes de corrupção no contexto do ordenamento jurídico português; 8.1 – No contexto do art. 11º do Código Penal, o que significa «em nome da pessoa colectiva»?; 8.2 – No contexto do art. 11º do Código Penal, o que significa «no interesse da pessoa colectiva»?; 8.2.1 – No contexto do art. 11º do Código Penal, o que significa «quando não há interesse colectivo»?; 9 – E haverá diferenças, por exemplo, entre o modo de funcionamento técnico-jurídico do art. 11º do Código Penal e o art. 3º do Regime das Infracções Anti-Económicas e Contra a Saúde Pública (R.I.A.E.C.S.P.)?; 10 – E como é que a Jurisprudência portuguesa, a que tivemos acesso - dado não haver ainda fartura de decisões neste campo -, estabelece o nexo de imputação de responsabilidade penal a uma pessoa colectiva e/ou organização?; 10.1 – Uma primeira pré-conclusão dentro do objectivo que pretendemos demonstrar na totalidade deste trabalho; 11 – Uma segunda pré-conclusão: será que as diferenças acima assinaladas, por exemplo, entre o modo de funcionamento técnico-jurídico do art. 11º do Código Penal e o art. 3º do Regime das Infracções Anti-Económicas e Contra a Saúde Pública (R.I.A.E.C.S.P.), são as únicas? Veja-se o caso, v.g., do art. 7º do Regime Geral das Infracções Tributárias (R.G.I.T.); 12 – Em face das duas pré-conclusões anteriores, faça-se aqui, neste breve ensaio, uma primeira grande conclusão; 13 – Uma (primeira) hipótese de solução; 14 – Que tipo de «empresa» podemos enquadrar no art. 11º do Código Penal?; 14.1 – De acordo com o referido anteriormente, podemos dizer que todas as «empresas» podem praticar os crimes previstos e punidos no Código Penal português?; 14.2 – De acordo com o referido antes, quais são as «empresas» que não podem praticar os crimes de corrupção que estão previstos e punidos no Código Penal português?; 14.3 – Uma outra pré-conclusão: 14.4 – Um esboço de um dos possíveis problemas; 14.4.1 – Mas, afinal, o que são Entidades Públicas Empresariais (E.P.E.)?; 14.5 – Outra hipótese de esboço de um outro dos possíveis problemas que aqui podemos encontrar; 14.6 – Nova pré-conclusão; 14.7 – Uma outra importante pergunta a fazer e a responder desde já; 14.7.1 - Alarguemos, pois, um pouco a nossa investigação para além do Código Penal português; 14.7.2 – O problema da responsabilidade penal das organizações e/ou «pessoas colectivas», rectius, neste breve ensaio, empresas, pela prática de crimes de corrupção previstos e punidos na mencionada Lei n.º 20/2008, de 21 de Abril («Responsabilidade penal por crimes de corrupção no comércio internacional e na actividade privada»); 14.7.3 – Mais algumas pré-conclusões; 15 - Em face das duas pré-conclusões anteriores, faça-se aqui, neste breve ensaio, uma segunda grande conclusão; 16 - O que também apresenta outras implicações como por exemplo na aplicação do crime de «branqueamento» quando nos fala em «corrupção» como «crime primário»; 17 – Outras interrogações; 18 – Conclusão final, mas não última, como nenhuma o pode ser em ciência; 19 – Hipótese de solução. § Abstract: 1 - Introduction: some news media; 2 - The so-called "Council for the Prevention of Corruption”, 3 – “Attorney General's Office” (PGR) and the Central Bureau of Investigation and Penal Action (DIAP) 4 - Some sites with relief , 5 - Some of the problems that can be placed in relation to the Corporate Responsibility of the Crime of Corruption; 5.1 - Scope of issues to be spoken, 6 - What is the concept of "companies that we will use"?; 6.1 - The term “business” in a general purpose and criminal matters; 7 - What kind of crimes of corruption we talking about?; 8 - Art. 11 of the Penal Code and the crimes of corruption in the context of the Portuguese legal system; 8.1 - In the context of art. 11 of the Penal Code, which means "in the name of the legal person"?; 8.2 - In the context of art. 11 of the Penal Code, which means “in the interests of the legal person"?; 8.2.1 - In the context of art. 11 of the Penal Code, which means "where there is no collective interest"?; 9 - There will be differences, for example, between the operating mode of the Art. 11 of the Criminal Code and Art. 3 of the Legal Infractions Anti-Economic and Against Public Health (RIAECSP)?; 10 - And how does the case law of Portugal, we had access - as there still plenty of decisions in this field - makes a connection of allocating criminal liability to a legal person and / or organization?; 10.1 - A first pre-completion within the objective that we intend to demonstrate in all of this work; 11 - A second pre-conclusion: that the differences will be noted above, for example, between operating mode of the Art. 11 of the Criminal Code and Art. 3 of the Rules of the Offences Against Anti-Economics and Public Health (RIAECSP) are the only ones? Take the case v.g. of art. 7 of the Legal Framework of Tax Offences (RGIT) 12 - In view of the two pre-earlier conclusions, do it here, in this brief essay, a first major conclusion; 13 - A (first) chance for a solution, 14 - What kind “undertaking” we can frame the art. 11 of the Penal Code?; 14.1 - According to the above, we can say that all "companies" can practice the crimes defined and punished in the Portuguese Penal Code?; 14.2 - According to the mentioned before, what are the "business" who cannot practice corruption crimes that are planned and punished the Portuguese Penal Code?; 14.3 - Another pre-completion: 14.4 - A sketch of one of the possible problems; 14.4.1 - But after all the entities that are Public Enterprise (EPE)?; 14.5 - Another chance to draft another one of the possible problems that can be found here; 14.6 - New pre-completion; 14.7 - Another important question to ask and answer now; 14.7.1 - Let us expand, then, a little beyond our investigation of the Portuguese Penal Code; 14.7.2 - The problem of criminal liability of organizations and / or "legal persons", rectius, this brief essay, companies, for crimes of corruption provided for and punished mentioned in Law No. 20/2008 of 21 April ("Criminal liability for crimes of corruption in international trade and private activities"); 14.7.3 - Some more pre-conclusions; 15 - In view of the two pre-earlier conclusions, let it be here in this brief essay, a second major conclusion, 16 - Who also has other implications such as the application of the crime of "money laundering" when we talk about “corruption” as “primary crime”, 17 - Other questions; 18 - Bottom line, but not last, as the can be no science; 19 - Hypothesis solution. Abstract como no livro.