829 resultados para COMPUTER
Resumo:
This paper describes an innovative approach to establish a CS curriculum, aiming flexibility and minimization of the time spent in the classrooms. This approach has been developed at the Paulista State University - Unesp - at São José do Rio Preto, and is producing very interesting results. The load reduction is achieved through a series of fundamental core and breadth courses that precede depth courses in specific areas. The flexibility comes as a side effect of the depth courses, which can be adapted without any changes in the core courses. In the following pages we fully describe our motivations, actions and results.
Resumo:
This paper describes a new computer approach for chemotaxonomic studies. The methodology employed enables the search for chemical substructures as taxonomic descriptors using all expert system built with plant natural products. The operation of the system was tested with diterpenes as taxonomic markers in Lamiaceae. © 2001 Elsevier Science Ltd.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
OBJECTIVE: To carry out a retrospective study to determine whether human papillomavirus (HPV) infection and immunohistochemical expression of p53 and proliferating cell nuclear antigen (PCNA) are related to the risk of oral cancer. STUDY DESIGN: Fifty-seven oral biopsies, consisting of 30 oral squamous papillomas (OSPs) and 27 oral squamous cell carcinomas (OSCCs) were tested for the presence of HPV 6/11 and 16/18 by in situ hybridization using catalyzed signal amplification and in situ hybridization. p53 And PCNA expression was analyzed by immunohistochemistry and evaluated quantitatively by image analysis. RESULTS: Nineteen of the 57 oral lesions (33.3%) were positive for HPV. HPV 6/11 was found in 6 of 30 (20%) OSPs and 1 of 27 (3.7%) OSCCs. HPV 16/18 was found in 10 of 27 (37%) OSCCs and 2 of 30 (6.7%) OSPs. Sixteen of the 19 HPV-positive cases (84.2%) were p53 negative; 5 (9%) were HPV 6/11 and 11 (19%) HPV 16/18, with an inverse correlation between the presence of HPV DNA and p53 expression (P=.017, P < .05). PCNA expression appeared in 18 (94.7%) of HPV positive cases, showing that HPV 16/18 was associated with intensity of PCNA expression and with OSCCs (P=.037, P < .05). CONCLUSION: Quantitative evaluation of p53 by image analysis showed an inverse correlation between p53 expression and HPV presence, suggesting protein degradation. Image analysis also demonstrated that PCNA expression was more intense in HPV DNA 16/18 OSCCs. These findings suggest involvement of high-risk HPV types in oral carcinogenesis.
Resumo:
The biggest advantage of plasma immersion ion implantation (PIII) is the capability of treating objects with irregular geometry without complex manipulation of the target holder. The effectiveness of this approach relies on the uniformity of the incident ion dose. Unfortunately, perfect dose uniformity is usually difficult to achieve when treating samples of complex shape. The problems arise from the non-uniform plasma density and expansion of plasma sheath. A particle-in-cell computer simulation is used to study the time-dependent evolution of the plasma sheath surrounding two-dimensional objects during process of plasma immersion ion implantation. Before starting the implantation phase, steady-state nitrogen plasma is established inside the simulation volume by using ionization of gas precursor with primary electrons. The plasma self-consistently evolves to a non-uniform density distribution, which is used as initial density distribution for the implantation phase. As a result, we can obtain a more realistic description of the plasma sheath expansion and dynamics. Ion current density on the target, average impact energy, and trajectories of the implanted ions were calculated for three geometrical shapes. Large deviations from the uniform dose distribution have been observed for targets with irregular shapes. In addition, effect of secondary electron emission has been included in our simulation and no qualitative modifications to the sheath dynamics have been noticed. However, the energetic secondary electrons change drastically the plasma net balance and also pose significant X-ray hazard. Finally, an axial magnetic field has been added to the calculations and the possibility for magnetic insulation of secondary electrons has been proven.
Resumo:
The knowledge of cell-cycle control has shown that the capacity of malignant growth is acquired by the stepwise accumulation of defects in specific genes regulating cell growth. Histologic diagnosis might be improved by a quantitative evaluation of more specific diagnosis biomarkers, which could help to precisely identify pre-malignant and malignant oral lesions. The aim of the present study is to evaluate whether computer-based quantitative assessment of p53, PCNA and Ki-67 immunohistochemical expression, could be used clinically to foresee the risk of oral malignant transformation. This retrospective study was carried out in ninety-five oral biopsies, 27 were classified as fibrous inflammatory hyperplasia, 40 as leukoplakia and 28 as oral squamous cell carcinoma. Sixteen out of the 40 leukoplakia were diagnosed as non-dysplastic leukoplakia, the other 24 being dysplastic leukoplakia, of which 50.0% were classified as moderate to severe dysplasia. Comparison of the four groups of oral tissues showed significant rises in p53 and Ki-67 positivity index, which increased steadily in the order benign, pre-malignant, and malignant. In contrast, it was not possible to relate higher PCNA levels with pre-malignant and malignant oral lesions. We therefore conclude that PCNA immunohistochemistry expression is probably an inappropriate marker to identify oral carcinogenesis, whereas joint quantitative evaluation of p53 and Ki-67, appears to be useful as a tumor marker, providing a pre-diagnostic estimate of the potential for cell-cycle deregulation of the oral proliferate status.
Resumo:
In order to simplify computer management, several system administrators are adopting advanced techniques to manage software configuration of enterprise computer networks, but the tight coupling between hardware and software makes every PC an individual managed entity, lowering the scalability and increasing the costs to manage hundreds or thousands of PCs. Virtualization is an established technology, however its use is been more focused on server consolidation and virtual desktop infrastructure, not for managing distributed computers over a network. This paper discusses the feasibility of the Distributed Virtual Machine Environment, a new approach for enterprise computer management that combines virtualization and distributed system architecture as the basis of the management architecture. © 2008 IEEE.
Resumo:
This project aims to apply image processing techniques in computer vision featuring an omnidirectional vision system to agricultural mobile robots (AMR) used for trajectory navigation problems, as well as localization matters. To carry through this task, computational methods based on the JSEG algorithm were used to provide the classification and the characterization of such problems, together with Artificial Neural Networks (ANN) for pattern recognition. Therefore, it was possible to run simulations and carry out analyses of the performance of JSEG image segmentation technique through Matlab/Octave platforms, along with the application of customized Back-propagation algorithm and statistical methods in a Simulink environment. Having the aforementioned procedures been done, it was practicable to classify and also characterize the HSV space color segments, not to mention allow the recognition of patterns in which reasonably accurate results were obtained.
ANN statistical image recognition method for computer vision in agricultural mobile robot navigation
Resumo:
The main application area in this project, is to deploy image processing and segmentation techniques in computer vision through an omnidirectional vision system to agricultural mobile robots (AMR) used for trajectory navigation problems, as well as localization matters. Thereby, computational methods based on the JSEG algorithm were used to provide the classification and the characterization of such problems, together with Artificial Neural Networks (ANN) for image recognition. Hence, it was possible to run simulations and carry out analyses of the performance of JSEG image segmentation technique through Matlab/Octave computational platforms, along with the application of customized Back-propagation Multilayer Perceptron (MLP) algorithm and statistical methods as structured heuristics methods in a Simulink environment. Having the aforementioned procedures been done, it was practicable to classify and also characterize the HSV space color segments, not to mention allow the recognition of segmented images in which reasonably accurate results were obtained. © 2010 IEEE.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The term human factor is used by professionals of various fields meant for understanding the behavior of human beings at work. The human being, while developing a cooperative activity with a computer system, is subject to cause an undesirable situation in his/her task. This paper starts from the principle that human errors may be considered as a cause or factor contributing to a series of accidents and incidents in many diversified fields in which human beings interact with automated systems. We propose a simulator of performance in error with potentiality to assist the Human Computer Interaction (HCI) project manager in the construction of the critical systems. © 2011 Springer-Verlag.
Resumo:
This paper presents novel simulation tools to assist the lecturers about learning processes on renewable energy sources, considering photovoltaic (PV) systems. The PV behavior, functionality and its interaction with power electronic converters are investigated in the simulation tools. The main PV output characteristics, I (current) versus V (voltage) and P (power) versus V (voltage), were implemented in the tools, in order to aid the users for the design steps. In order to verify the effectiveness of the developed tools the simulation results were compared with Matlab. Finally, a prototype was implemented with the purpose to compare the experimental results with the results from the proposed tools, validating its operational feasibility. © 2011 IEEE.
Resumo:
Increased accessibility to high-performance computing resources has created a demand for user support through performance evaluation tools like the iSPD (iconic Simulator for Parallel and Distributed systems), a simulator based on iconic modelling for distributed environments such as computer grids. It was developed to make it easier for general users to create their grid models, including allocation and scheduling algorithms. This paper describes how schedulers are managed by iSPD and how users can easily adopt the scheduling policy that improves the system being simulated. A thorough description of iSPD is given, detailing its scheduler manager. Some comparisons between iSPD and Simgrid simulations, including runs of the simulated environment in a real cluster, are also presented. © 2012 IEEE.
Resumo:
In this paper we propose a nature-inspired approach that can boost the Optimum-Path Forest (OPF) clustering algorithm by optimizing its parameters in a discrete lattice. The experiments in two public datasets have shown that the proposed algorithm can achieve similar parameters' values compared to the exhaustive search. Although, the proposed technique is faster than the traditional one, being interesting for intrusion detection in large scale traffic networks. © 2012 IEEE.
Resumo:
Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling is very expensive, several works attempt to handle intrusion detection with traditional clustering algorithms. In this paper, we introduce a new pattern recognition technique called Optimum-Path Forest (OPF) clustering to this task. Experiments on three public datasets have showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, since it outperformed some state-of-the-art unsupervised techniques. © 2012 IEEE.