871 resultados para Second Life (Jogo)
Resumo:
Adolescents with a course of life based on the lack of ethical and moral values are more vulnerable to the practice of infractions, and in this case the statute of the child and adolescent assumes their insertion on socio educative measures. The objective of this research is to identify the moral development phase in adolescents who are in confl ict with the law. Thirty male adolescents between fi fteen and eighteen years old, who are inserted on the socio educative care Center, were studied. Data were collected through futsal game observation, without the presence of a referee and structured interview, according to the general lines of the Clinical Method of PIAGET (1994). The arrangement of the collected data confi rmed our hypothesis – these adolescents are still with the characteristics of a heteronomical moral, confi rmed by the differences between conscience and the practice of rules in a game situation. Although they know the rules, these are only respected in order to get some benefi ts, like not charging foul, deceive the opponent or simply win the match. It is presumed that the rules would only be respected in the presence of an authority (referee), because he would impose punishments and privations. However, it is believed that the results of this study may become a parameter to educators in order to create favorable situations which can be preventive and interventive to the socio moral development, minimizing suffering and seizing opportunities to the formation of citizens with higher ethical and moral standards, who are able to choose the way to the solidarity, cooperation and justice.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Artes - IA
Resumo:
Pós-graduação em Docência para a Educação Básica - FC
Resumo:
Signalling in malaria parasites is a field of growing interest as its components may prove to be valuable drug targets, especially when one considers the burden of a disease that is responsible for up to 500 million infections annually. The scope of this review is to discuss external stimuli in the parasite life cycle and the upstream machinery responsible for translating them into intracellular responses, focussing particularly on the calcium signalling pathway. (C) 2012 Published by Elsevier Masson SAS on behalf of Institut Pasteur.
Resumo:
Purpose: The aim of this study was to verify possible associations between oral health-related quality of life (QoL) and the position of the lower third molar among patients undergoing lower third molar surgery during the first postoperative week. Materials and Methods: We performed an interventional prospective study of 86 patients for whom the preoperative treatment plan included the removal of 2 third molar teeth from the same side in a 1-time procedure. The patients were divided into 2 groups depending on the position of the lower third molar. QoL was evaluated before and after the surgical procedure (during the first 7 days) with the Oral Health Impact Profile (OHIP) 14 questionnaire. Data were treated according to Stata 10.0 (StataCorp, College Station, TX). Variables were evaluated by use of split-plot analysis of variance for the repeated-measures analysis to identify the association between QoL and the position of the lower third molar. Results: Patients can have deterioration in their QoL immediately after surgery, especially during the first and second postoperative days, and subsequently show rapid improvement. The variation in the total OHIP score during the days after surgery was significant, whereas a decrease in QoL was observed immediately after the procedure (P = .001), which returned to initial value (preoperative) levels after the sixth postoperative day. The OHIP domains with higher scores (ie, those that had an impact) were physical pain, psychological discomfort, and physical disability (domains 2, 3, and 4, respectively). Conclusions: Teeth considered to be associated with technical difficulties for extraction based on their position had a higher score on the OHIP-14 questionnaire and worse health-related QoL score. QoL outcomes may be as important as clinical signs in decisions regarding third molar extractions. (C) 2012 American Association of Oral and Maxillofacial Surgeons J Oral Maxillofac Surg 70:779-786, 2012
Resumo:
OBJECTIVE: The establishment of the intestinal microbiota in newborns is a critical period with possible long-term consequences for human health. In this research, the development of the fecal microbiota of a group of exclusively breastfed neonates living in low socio-economic conditions in the city of Sao Paulo, Brazil, during the first month of life, was studied. METHODS: Fecal samples were collected from ten neonates on the second, seventh, and 30th days after birth. One of the neonates underwent antibiotic therapy. Molecular techniques were used for analysis; DNA was extracted from the samples, and 16S rRNA libraries were sequenced and phylogenetically analyzed after construction. A real-time polymerase chain reaction (PCR) was performed on the samples taken from the 30th day to amplify DNA from Bifidobacterium sp. RESULTS: The primary phylogenetic groups identified in the samples were Escherichia and Clostridium. Staphylococcus was identified at a low rate. Bifidobacterium sp. was detected in all of the samples collected on the 30th day. In the child who received antibiotics, a reduction in anaerobes and Escherichia, which was associated with an overgrowth of Klebsiella, was observed throughout the experimental period. CONCLUSION: The observed pattern of Escherichia predominance and reduced Staphylococcus colonization is in contrast with the patterns observed in neonates living in developed countries.
Resumo:
Background: Lymphangioleiomyomatosis (LAM) is characterised by progressive airway obstruction and hypoxaemia in young women. Although sleep may trigger hypoxaemia in patients with airway obstruction, it has not been previously investigated in patients with LAM. Methods: Consecutive women with lung biopsy proven LAM and absence of hypoxaemia while awake were evaluated with pulmonary function test, echocardiography, 6-min walk test, overnight full polysomnography, and Short Form 36 health-related quality-of-life questionnaire. Results: Twenty-five patients with (mean +/- SD) age 45 +/- 10 years, SpO(2) awake 95% +/- 2, forced expiratory volume in the first second (median-interquartile) FEV1 (% predicted) 77 (47-90) and carbonic monoxide diffusion capacity, DLCO (%) 55 (34-74) were evaluated. Six-minute walk test distance and minimum SpO(2) (median-interquartile) were, respectively, 447 m (411 -503) and 90% (82-94). Median interquartile apnoea-hypopnoea index was in the normal range 2 (1-5). Fourteen patients (56%) had nocturnal hypoxaemia (10% total sleep time with SpO(2) <90%), and the median sleep time spent with SpO(2) <90% was 136 (13-201) min. Sleep time spent with SpO(2) <90% correlated with the residual volume/total lung capacity ratio (r(s) = 0.5, p: 0.02), DLCO (r(s) = -0.7, p: 0.001), FEV1 (r(s) = -0.6, p: 0.002). Multivariate linear regression model showed that RV/TLC ratio was the most important functional variable related to sleep hypoxaemia. Conclusion: Significant hypoxaemia during sleep is common in LAM patients with normal SpO(2) while awake, especially among those with some degree of hyperinflation in lung function tests. (C) 2011 Published by Elsevier Ltd.
Resumo:
Background The evolutionary advantages of selective attention are unclear. Since the study of selective attention began, it has been suggested that the nervous system only processes the most relevant stimuli because of its limited capacity [1]. An alternative proposal is that action planning requires the inhibition of irrelevant stimuli, which forces the nervous system to limit its processing [2]. An evolutionary approach might provide additional clues to clarify the role of selective attention. Methods We developed Artificial Life simulations wherein animals were repeatedly presented two objects, "left" and "right", each of which could be "food" or "non-food." The animals' neural networks (multilayer perceptrons) had two input nodes, one for each object, and two output nodes to determine if the animal ate each of the objects. The neural networks also had a variable number of hidden nodes, which determined whether or not it had enough capacity to process both stimuli (Table 1). The evolutionary relevance of the left and the right food objects could also vary depending on how much the animal's fitness was increased when ingesting them (Table 1). We compared sensory processing in animals with or without limited capacity, which evolved in simulations in which the objects had the same or different relevances. Table 1. Nine sets of simulations were performed, varying the values of food objects and the number of hidden nodes in the neural networks. The values of left and right food were swapped during the second half of the simulations. Non-food objects were always worth -3. The evolution of neural networks was simulated by a simple genetic algorithm. Fitness was a function of the number of food and non-food objects each animal ate and the chromosomes determined the node biases and synaptic weights. During each simulation, 10 populations of 20 individuals each evolved in parallel for 20,000 generations, then the relevance of food objects was swapped and the simulation was run again for another 20,000 generations. The neural networks were evaluated by their ability to identify the two objects correctly. The detectability (d') for the left and the right objects was calculated using Signal Detection Theory [3]. Results and conclusion When both stimuli were equally relevant, networks with two hidden nodes only processed one stimulus and ignored the other. With four or eight hidden nodes, they could correctly identify both stimuli. When the stimuli had different relevances, the d' for the most relevant stimulus was higher than the d' for the least relevant stimulus, even when the networks had four or eight hidden nodes. We conclude that selection mechanisms arose in our simulations depending not only on the size of the neuron networks but also on the stimuli's relevance for action.
Resumo:
"Bioactive compounds" are extranutritional constituents that typically occur in small quantities in food. They are being intensively studied to evaluate their effects on health. Bioactive compounds include both water soluble compounds, such as phenolics, and lipidic substances such as n-3 fatty acids, tocopherols and sterols. Phenolic compounds, tocopherols and sterols are present in all plants and have been studied extensively in cereals, nuts and oil. n-3 fatty acids are present in fish and all around the vegetable kingdom. The aim of the present work was the determination of bioactive and potentially toxic compounds in cereal based foods and nuts. The first section of this study was focused on the determination of bioactive compounds in cereals. Because of that the different forms of phytosterols were investigated in hexaploid and tetraploid wheats. Hexaploid cultivars were the best source of esterified sterols (40.7% and 37.3% of total sterols for Triticum aestivum and Triticum spelta, respectively). Significant amounts of free sterols (65.5% and 60.7% of total sterols for Triticum durum and Triticum dicoccon, respectively) were found in the tetraploid cultivars. Then, free and bound phenolic compounds were identified in barley flours. HPLCESI/ MSD analysis in negative and positive ion mode established that barley free flavan-3- ols and proanthocyanidins were four dimers and four trimers having (epi)catechin and/or (epi)gallocatechin (C and/or GC) subunits. Hydroxycinnamic acids and their derivatives were the main bound phenols in barley flours. The results obtained demonstrated that barley flours were rich in phenolic compounds that showed high antioxidant activity. The study also examined the relationships between phenolic compounds and lipid oxidation of bakery. To this purpose, the investigated barley flours were used in the bakery production. The formulated oven products presented an interesting content of phenolic compounds, but they were not able to contain the lipid oxidation. Furthermore, the influence of conventional packaging on lipid oxidation of pasta was evaluated in n-3 enriched spaghetti and egg spaghetti. The results proved that conventional packaging was not appropriated to preserve pasta from lipid oxidation; in fact, pasta that was exposed to light showed a high content of potentially toxic compounds derived from lipid oxidation (such as peroxide, oxidized fatty acids and COPs). In the second section, the content of sterols, phenolic compounds, n-3 fatty acids and tocopherols in walnuts were reported. Rapid analytical techniques were used to analyze the lipid fraction and to characterize phenolic compounds in walnuts. Total lipid chromatogram was used for the simultaneous determination of the profile of sterols and tocopherols. Linoleic and linolenic acids were the most representative n-6 and n-3 essential dietary fatty acids present in these nuts. Walnuts contained substantial amounts of γ- and δ-tocopherol, which explained their antioxidant properties. Sitosterol, Δ5-avenasterol and campesterol were the major free sterols found. Capillary electrophoresis coupled to DAD and microTOF was utilized to determine phenolic content of walnut. A new compound in walnut ((2E,4E)- 8-hydroxy-2,7-dimethyl-2,4-decadiene-1,10-dioic acid 6-O-β-D-glucopiranosyl ester, [M−H]− 403.161m/z) with a structure similar to glansreginins was also identified. Phenolic compounds corresponded to 14–28% of total polar compounds quantified. Aglycone and glycosylated ellagic acid represented the principal components and account for 64–75% of total phenols in walnuts. However, the sum of glansreginins A, B and ((2E,4E)-8-hydroxy- 2,7-dimethyl-2,4-decadiene-1,10-dioic acid 6-O-β-D-glucopiranosyl ester was in the range of 72–86% of total quantified compounds.
Resumo:
(De)colonization Through Topophilia: Marjorie Kinnan Rawlings’s Life and Work in Florida attempts to reveal the author’s intimate connection to and mental growth through her place, namely the Cross Creek environs, and its subsequent effect on her writing. In 1928, Marjorie Kinnan Rawlings and her first husband Charles Rawlings came to Cross Creek, Florida. They bought the shabby farmhouse on Cross Creek Road, trying to be both, writers and farmers. However, while Charles Rawlings was unable to write in the backwoods of the Florida Interior, Rawlings found her literary voice and entered a symbiotic, reciprocal relationship with the natural world of the Cracker frontier. Her biographical preconditions – a childhood spent in the rural area of Rock Creek, outside of Washington D. C. - and a father who had instilled in her a sense of place or topophilia, enabled her to overcome severe marriage tensions and the hostile climate women writers faced during the Depression era. Nature as a helping ally and as an “undomesticated”(1) space/place is a recurrent motif throughout most of Rawlings’s Florida literature. At a time when writing the American landscape/documentary and the extraction of the self from texts was the prevalent literary genre, Marjorie Kinnan Rawlings inscribed herself into her texts. However, she knew that the American public was not yet ready for a ‘feminist revolt’, but was receptive of the longtime ‘inaudible’ voices from America’s regions, especially with regard to urban poverty and a homeward yearning during the Depression years. Fusing with the dynamic eco-consciousness of her Cracker friends and neighbors, Rawlings wrote in the literary category of regionalism enabling her to pursue three of her major aims: an individuated self, a self that assimilated with the ‘master narratives’ of her time and the recognition of the Florida Cracker and Scrub region. The first part of this dissertation briefly introduces the largely unknown and underestimated writer Marjorie Kinnan Rawlings, providing background information on her younger years, the relationship toward her family and other influential persons in her life. Furthermore, it takes a closer look at the literary category of regionalism and Rawlings’s use of ‘place’ in her writings. The second part is concerned with the ‘region’ itself, the state of Florida. It focuses on the natural peculiarities of the state’s Interior, the scrub and hammock land around her Cracker hamlet as well as the unique culture of the Florida Cracker. Part IV is concerned with the analysis of her four Florida books. The author is still widely related to the ever-popular novel The Yearling (1938). South Moon Under (1933) and Golden Apples (1935), her first two novels, have not been frequently republished and have subsequently fallen into oblivion. Cross Creek (1942), Rawlings’s last Florida book, however, has recently gained renewed popularity through its use in classes on nature writers and the non-fiction essay but it requires and is here re-evaluated as the author’s (relational) autobiography. The analysis through place is brought to completion in this work and seems to intentionally close the circle of Rawlings’s Florida writings. It exemplifies once more that detachment from place is impossible for Rawlings and that the intermingling of life and place in literature, is essential for the (re)creation of her identity. Cross Creek is therefore not only one of Rawlings’s greatest achievements; it is more importantly the key to understanding the author’s self and her fiction. Through the ‘natural’ interrelationship of place and self and by looking “mutually outward and inward,”(2) Marjorie Kinnan Rawlings finds her literary voice, a home and ‘a room of her own’ in which to write and come to consciousness. Her Florida literature is not only product but also medium and process in her assessment of her identity and self. _____________ (1) Alaimo, Stacy. Undomesticated Ground: Recasting Nature as Feminist Space (Ithaca: Cornell UP, 2000) 23. (2) Libby, Brooke. “Nature Writing as Refuge: Autobiography in the Natural World” Reading Under the Sign of Nature. New Essays in Ecocriticism. Ed. John Tallmadge and Henry Harrington. (Salt Lake City: The U of Utah P, 2000) 200.
Resumo:
Tracking activities during daily life and assessing movement parameters is essential for complementing the information gathered in confined environments such as clinical and physical activity laboratories for the assessment of mobility. Inertial measurement units (IMUs) are used as to monitor the motion of human movement for prolonged periods of time and without space limitations. The focus in this study was to provide a robust, low-cost and an unobtrusive solution for evaluating human motion using a single IMU. First part of the study focused on monitoring and classification of the daily life activities. A simple method that analyses the variations in signal was developed to distinguish two types of activity intervals: active and inactive. Neural classifier was used to classify active intervals; the angle with respect to gravity was used to classify inactive intervals. Second part of the study focused on extraction of gait parameters using a single inertial measurement unit (IMU) attached to the pelvis. Two complementary methods were proposed for gait parameters estimation. First method was a wavelet based method developed for the estimation of gait events. Second method was developed for estimating step and stride length during level walking using the estimations of the previous method. A special integration algorithm was extended to operate on each gait cycle using a specially designed Kalman filter. The developed methods were also applied on various scenarios. Activity monitoring method was used in a PRIN’07 project to assess the mobility levels of individuals living in a urban area. The same method was applied on volleyball players to analyze the fitness levels of them by monitoring their daily life activities. The methods proposed in these studies provided a simple, unobtrusive and low-cost solution for monitoring and assessing activities outside of controlled environments.
Resumo:
The scope of this project is to study the effectiveness of building information modelling (BIM) in performing life cycle assessment in a building. For the purposes of the study will be used “Revit” which is a BIM software and Tally which is an LCA tool integrated in Revit. The project is divided in six chapters. The first chapter consists of a theoretical introduction into building information modelling and its connection to life cycle assessment. The second chapter describes the characteristics of building information modelling (BIM). In addition, a comparison has been made with the traditional architectural, engineering and construction business model and the benefits to shift into BIM. In the third chapter it will be a review of the most well-known and available BIM software in the market. In chapter four life cycle assessment (LCA) will be described in general and later on specifically for the purpose of the case study that will be used in the following chapter. Moreover, the tools that are available to perform an LCA will be reviewed. Chapter five will present the case study that consists of a model in a BIM software (Revit) and the LCA performed by Tally, an LCA tool integrated into Revit. In the last chapter will be a discussion of the results that were obtained, the limitation and the possible future improvement in performing life cycle assessment (LCA) in a BIM model.
Resumo:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
Resumo:
Information management is a key aspect of successful construction projects. Having inaccurate measurements and conflicting data can lead to costly mistakes, and vague quantities can ruin estimates and schedules. Building information modeling (BIM) augments a 3D model with a wide variety of information, which reduces many sources of error and can detect conflicts before they occur. Because new technology is often more complex, it can be difficult to effectively integrate it with existing business practices. In this paper, we will answer two questions: How can BIM add value to construction projects? and What lessons can be learned from other companies that use BIM or other similar technology? Previous research focused on the technology as if it were simply a tool, observing problems that occurred while integrating new technology into existing practices. Our research instead looks at the flow of information through a company and its network, seeing all the actors as part of an ecosystem. Building upon this idea, we proposed the metaphor of an information supply chain to illustrate how BIM can add value to a construction project. This paper then concludes with two case studies. The first case study illustrates a failure in the flow of information that could have prevented by using BIM. The second case study profiles a leading design firm that has used BIM products for many years and shows the real benefits of using this program.