935 resultados para Programação orientada a objetos (computação)
Resumo:
Over the years, the concern with the detection of the levels of radionuclides in the environment has increased, given that they are carcinogenic to the human respiratory system. Present in the air, waters, soil and building materials, among other substances, radionuclides are unknown by most of the population. In this paper, we present the radioactive gas 222Rn, predominant element among all others and one way of detecting it in an example study of the waters of the Presidente Prudente - SP, through the plastic detector called CR-39. Likewise, we realized the need to approach this issue more broadly in schools and even in higher education, since this field of modern physics and environmental physics usually appears only in master's and doctorate. Thus, we attempted to perform the didactic transposition schooluniversity, through the construction of an object Educational, OE, to be placed on the Bank for International Educational Objects - bioethanol and by developing this contribute to the knowledge and understanding of the importance of monitoring of radioactivity in a way accessible to the population as a whole
Resumo:
The goal of this research is to identify and describe the recreational objects, or toys, children’s play and games offered by teachers from a public municipal school of early childhood education in Pederneiras, a city located inland São Paulo State. The research has started with a retrospective look of the childhood concept and of the recreational objects with in the classical era till the modernity, what has allowed to identify how to play was in history and what is its relation with education. In order to understand how the recreational objects have been seen at school we have made a survey of the oficial Brazilian documents related to the childhood education. The benchmark survey has allowed the organization of a half structured questionnaire and the Kobayashi studies (2009, 2011), was the mean used to identify and classify the recreational objects found at school. The data collected in the benchmark survey in the field remark and by the questionnaire have permitted to identify here recreational objects available by teachers in early childhood education of 3 to 5 years old children at the school mentioned and what they think about the theme, on the other hand the studies performed have allowed us to analyse the adaptation and validity of the recreational objects already found
Resumo:
Distributed Virtual Environments (DVE) allow multiple users interact with a virtual world by sharing, manipulating objects. Each user has his/her own vision of this world and every changes of state of the environment are distributed among other users. Due to technological constraints, most systems for distributed virtual environments support a limited number of users. The major limitation for development of DVE scale are imposed by the communication system. As the number of users grows, the amount of bandwidth required to exchange information in real time among stations to upgrade the environment and keep it in a consistent state for all connected users. Based on this situation is proposed a framework that uses the protocol anycast in the application layer that provides a load balancing among servers in the region and aims at reducing the latency of message delivery between participants selecting the DVE server best suited for the region participant to connect to the environment
Resumo:
This work presents a study about the use of standards and directions on parallel programming in distributed systems, using the MPI standard and PETSc toolkit, performing an analysis of their performances over certain mathematic operations involving matrices. The concepts are used to develop applications to solve problems involving Principal Components Analysis (PCA), which are executed in a Beowulf cluster. The results are compared to the ones of an analogous application with sequencial execution, and then it is analized if there was any performance boost on the parallel application
Resumo:
The representation of real objects in virtual environments has applications in many areas, such as cartography, mixed reality and reverse engineering. The generation of these objects can be performed in two ways: manually, with CAD (Computer Aided Design) tools, or automatically, by means of surface reconstruction techniques. The simpler the 3D model, the easier it is to process and store it. Multiresolution reconstruction methods can generate polygonal meshes in different levels of detail and, to improve the response time of a computer program, distant objects can be represented with few details, while more detailed models are used in closer objects. This work presents a new approach to multiresolution surface reconstruction, particularly interesting to noisy and low definition data, for example, point clouds captured with Kinect sensor
Resumo:
This project is comprised by an interactive mobile robotics’ environment, focused in human-robot interaction. The system was developed to work in a smartphone, with Android operating system, embedded in a small size mobile robot. Information provided by the smartphone’s camera and microp hone, as well as by proximity sensors embedded in the robot, is used as inputs of a control architecture, implemented in software. It is a behavior-based and receptive to human commands control architecture, to assist the robot’s navigation. The robot is controlled by its own behaviors or by commands em it ted by humans
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
In this work was developed a program capable of performing automatic counting of vehicles on roads. The problem of counting vehicles is using expensive techniques for its realization, techniques which often involve manual counting or degradation of the pavement. The main motivation for this work was the importance that the vehicle counting represents to the Traffic Engineer, being essential to analyze the performance of the roads, allowing to measure the need for installation of traffic lights, roundabouts, access ways, among other means capable of ensuring a continuous flow and safe for vehicles. The main objective of this work was to apply a statistical segmentation technique recently developed, based on a nonparametric linear regression model, to solve the segmentation problem of the program counter. The development program was based on the creation of three major modules, one for the segmentation, another for the tracking and another for the recognition. For the development of the segmentation module, it was applied a statistical technique combined with the segmentation by background difference, in order to optimize the process. The tracking module was developed based on the use of Kalman filters and application of simple concepts of analytical geometry. To develop the recognition module, it was used Fourier descriptors and a neural network multilayer perceptron, trained by backpropagation. Besides the development of the modules, it was also developed a control logic capable of performing the interconnection among the modules, mainly based on a data structure called state. The analysis of the results was applied to the program counter and its component modules, and the individual analysis served as a means to establish the par ameter values of techniques used. The find result was positive, since the statistical segmentation technique proved to be very useful and the developed program was able to count the vehicles belonging to the three goal..
Resumo:
This project aims to explore the many methods used for the development of recommendation systems to user ’ s items and apply the content - based recommendation method on a prototype system whose purpose is to recommend books to users. This paper exposes the most popular methods for creating systems capable of providing items (products) according to user preferences, such as collaborat ive filtering and content - based. It also point different techniques that can be applied to calculate the similarity between two entities, for items or users, as the Pearson ’s method, calculating the cosine of vectors and more recently, a proposal to use a Bayesian system under a Dirichlet distribution. In addition, this work has the purpose to go through various points on the design of an online application, or a website, dealing not only oriented algorithms issues, but also the definition of development to ols and techniques to improve the user’s experience. The tools used for the development of the page are listed, and a topic about web design is also discussed in order to emphasize the importance of the layout of the application. At the end, some examples of recommender systems are presented for curiosity , learning and research purposes
Resumo:
Não disponível
Resumo:
Medical Physics has been reaching an important role among several lines in Science, providing means for the improvement of several theories and procedures. Currently, its main application is related with the use of ionizing radiations, specially, in treatment procedures such as Radiotherapy. Radiosurgery is a Radiotherapy technique which consists in administering a single tumoricidal dose of radiation exclusively to the tumorous lesion. It becomes then an interesting alternative to surgical treatment, mainly in cerebral metastases, which are the most frequent cerebral tumors in the central nervous system. The radio neurosurgical team works out a planning for the Radiosurgery treatment, aiming for obtaining an appropriate ideal treatment for each case. For the working out of this treatment planning, Computed Tomography images of the region to be treated are obtained, digitalized and later, fused with nuclear magnetic resonance images. Through these images, critical structures, organs at risk and lesions are localized. After this, calculations are made to determine three-dimensional positions of isocenters, isodose curves, prescribed dose, collimators sizes, position, numbers and respective weight of isocentric conformal fields, and others. The treatment planning is commonly based in desired levels of dose for specific types of tumors and organs at risk concerning the irradiated region. Theses levels of dose are chosen in a way that a high probability of cure may be achieved and meanwhile, that the probability of complications, in whichever organ at risk, may be minimal. Thus, many researches have been carried out, showing that mathematical techniques may help to obtain an optimal planning for the treatment of cerebral metastases. Among the methods of optimization in the study...(Complete abstract click electronic access below)
Resumo:
In this project the Pattern Recognition Problem is approached with the Support Vector Machines (SVM) technique, a binary method of classification that provides the best solution separating the data in the better way with a hiperplan and an extension of the input space dimension, as a Machine Learning solution. The system aims to classify two classes of pixels chosen by the user in the interface in the interest selection phase and in the background selection phase, generating all the data to be used in the LibSVM library, a library that implements the SVM, illustrating the library operation in a casual way. The data provided by the interface is organized in three types, RGB (Red, Green and Blue color system), texture (calculated) or RGB + texture. At last the project showed successful results, where the classification of the image pixels was showed as been from one of the two classes, from the interest selection area or from the background selection area. The simplest user view of results classification is the RGB type of data arrange, because it’s the most concrete way of data acquisition
Resumo:
Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family
Resumo:
Pós-graduação em Educação Escolar - FCLAR
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)