769 resultados para Could computing
Resumo:
This paper develops a novel full analytic model for vibration analysis of solid-state electronic components. The model is just as accurate as finite element models and numerically light enough to permit for quick design trade-offs and statistical analysis. The paper shows the development of the model, comparison to finite elements and an application to a common engineering problem. A gull-wing flat pack component was selected as the benchmark test case, although the presented methodology is applicable to a wide range of component packages. Results showed very good agreement between the presented method and finite elements and demonstrated the usefulness of the method in how to use standard test data for a general application. © 2013 Elsevier Ltd.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Pós-graduação em Ciência da Informação - FFC
Resumo:
Includes bibliography.
Resumo:
The “Implementation of the National Data Centre” project, Augusto Espín, Deputy Minister of Telecommunications and Information Society, Ecuador .-- Cloud computing and public policy in Brazil, Rafael Henrique Rodrigues Moreira, Ministry of Science, Technology and Innovation, Brazil .-- “The cloud is being taken up more quickly in Latin America than in the rest of the world”, interview to Lalo Steinmann, Microsoft .-- The impact of education and research networks on the development of cloud computing Eduardo Vera, University of Chile .-- “The cloud helps to narrow divides by providing access to technology resources that used to be unaffordable”, interview to Luis Urzúa, Movistar Chile .-- “Cloud computing will be a strategic sector of the economy in the coming years”, interview to Jean-Bernard Gramunt, France’s digital strategy .-- “If take-up in Latin America is as strong as predicted, it will be a good opportunity to create and export technology”, interview to Flavio Junqueira, Yahoo! Labs.
Resumo:
Este trabalho objetiva analisar os possíveis efeitos que o uso da Modelagem Matemática, enquanto estratégia de ensino, provoca no processo de aprendizagem dos alunos da disciplina Cálculo III – EDO (Equações Diferenciais Ordinárias). A pesquisa foi desenvolvida em uma turma de alunos do 2° ano do curso de Engenharia da Computação, na Universidade Federal do Pará. O trabalho é de cunho qualitativo onde foram levados em consideração os aspectos sociais que permeiam uma sala de aula universitária. Importante destacar que houve a participação direta da professora-pesquisadora de Matemática. Para que eu pudesse fazer a coleta dos dados, utilizei alguns instrumentos que considerei essenciais, tais como: observações, gravações em áudio, questionários semiestruturados e registros escritos dos alunos. De posse de alguns resultados preliminares, me foi possível observar o quanto a Modelagem Matemática desempenha um papel relevante na aprendizagem dos conteúdos matemáticos por parte dos alunos, pois foi possível eles interagirem com outras áreas do conhecimento sendo, desta forma, estimulados a realizarem pesquisa e, simultaneamente, serem parte do processo de ensino e aprendizagem que foi gerado no ambiente de sala de aula. Observei, também, que a utilização da Modelagem Matemática, enquanto estratégia de ensino e aprendizagem, conduziu os alunos a despertarem para os aspectos reflexivos e críticos até então adormecidos, uma vez que são necessários para uma aprendizagem com qualidade para, assim, construírem seus conhecimentos acadêmicos e profissionais.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
In this article, the authors investigate, from an interdisciplinary perspective, possible ethical implications of the presence of ubiquitous computing systems in human perception/action. The term ubiquitous computing is used to characterize information-processing capacity from computers that are available everywhere and all the time, integrated into everyday objects and activities. The contrast in approach to aspects of ubiquitous computing between traditional considerations of ethical issues and the Ecological Philosophy view concerning its possible consequences in the context of perception/action are the underlying themes of this paper. The focus is on an analysis of how the generalized dissemination of microprocessors in embedded systems, commanded by a ubiquitous computing system, can affect the behaviour of people considered as embodied embedded agents.
Resumo:
there is evidence that sport can trigger the onset of postural patterns specific to each modality, regardless of the geopolitical aspects, social, cultural habits of everyday life and ethnicity. Since changes in flexibility are cited as possible precursors of decreased range of motion, thereby harming the mechanics of the lower limbs and gait. Objetcive: The objective of this study was to analyze changes in posture and flexibility in young soccer players. Methods: were assessed 51 youngsters, aged between 14 and 18 years, soccer players registered in the Municipal Presidente Prudente SP and categories of the base of Gremio of Presidente Prudente. Data were collected from the assessment by the postural software assessment, and flexibility tests the Bench, to jail and later by tests of muscle length to jail earlier proposed by Kendall et al , was also collected anthropometric data were later confronted with the results statistically. The results were organized into spreadsheets for computing, which later could be performed the statistical analysis. Values are expressed by means of central tendency and variability as well as medians and 95% confidence intervals. The comparison for each profile height and BMI was made by means of analysis of variance complemented by Tukey test. Were considered the statistical differences when P <0.05. Results: In the sample studied 64% of the subjects classified as normal posture, the same happened with 70.59% of the athletes for flexibility in relation to the center of gravity of the sample had 100% anterior displacement of the trunk and 86.28% with a deviation of center of gravity to the left, showing a tendency to some postural deviations for the group assessed. Conclusion: from the results we can conclude that there was significant relationship between the postural angle of the right leg and left angle of the pelvis with BMI and also ankle angle... (Complete abstract click electronic access below)
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
The technologies are rapidly developing, but some of them present in the computers, as for instance their processing capacity, are reaching their physical limits. It is up to quantum computation offer solutions to these limitations and issues that may arise. In the field of information security, encryption is of paramount importance, being then the development of quantum methods instead of the classics, given the computational power offered by quantum computing. In the quantum world, the physical states are interrelated, thus occurring phenomenon called entanglement. This study presents both a theoretical essay on the merits of quantum mechanics, computing, information, cryptography and quantum entropy, and some simulations, implementing in C language the effects of entropy of entanglement of photons in a data transmission, using Von Neumann entropy and Tsallis entropy.