948 resultados para Framework (Computer file)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Functional knowledge of the physiological basis of crop adaptation to stress is a prerequisite for exploiting specific adaptation to stress environments in breeding programs. This paper presents an analysis of yield components for pearl millet, to explain the specific adaptation of local landraces to stress environments in Rajasthan, India. Six genotypes, ranging from high-tillering traditional landraces to low-tillering open-pollinated modern cultivars, were grown in 20 experiments, covering a range of nonstress and drought stress patterns. In each experiment, yield components (particle number, grain number, 100 grain mass) were measured separately for main shoots, basal tillers, and nodal tillers. Under optimum conditions, landraces had a significantly lower grain yield than the cultivars, but no significant differences were observed at yield levels around 1 ton ha(-1). This genotype x environment interaction for grain yield was due to a difference in yield strategy, where landraces aimed at minimising the risk of a crop failure under stress conditions, and modem cultivars aimed at maximising yield potential under optimum conditions. A key aspect of the adaptation of landraces was the small size of the main shoot panicle, as it minimised (1) the loss of productive tillers during stem elongation; (2) the delay in anthesis if mid-season drought occurs; and (3) the reduction in panicle productivity of the basal tillers under stress. In addition, a low investment in structural panicle weight, relative to vegetative crop growth rate, promoted the production of nodal tillers, providing a mechanism to compensate for reduced basal tiller productivity if stress occurred around anthesis. A low maximum 100 grain mass also ensured individual grain mass was little affected by environmental conditions. The strategy of the high-tillering landraces carries a yield penalty under optimum conditions, but is expected to minimise the risk of a crop failure, particularly if mid-season drought stress occurs. The yield architecture of low-tillering varieties, by contrast, will be suited to end-of-season drought stress, provided anthesis is early. Application of the above adaptation mechanisms into a breeding program could enable the identification of plant types that match the prevalent stress patterns in the target environments. (C) 2003 E.J. van Oosterom. Published by Elsevier Science B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Experimental scratch resistance testing provides two numbers: the penetration depth Rp and the healing depth Rh. In molecular dynamics computer simulations, we create a material consisting of N statistical chain segments by polymerization; a reinforcing phase can be included. Then we simulate the movement of an indenter and response of the segments during X time steps. Each segment at each time step has three Cartesian coordinates of position and three of momentum. We describe methods of visualization of results based on a record of 6NX coordinates. We obtain a continuous dependence on time t of positions of each of the segments on the path of the indenter. Scratch resistance at a given location can be connected to spatial structures of individual polymeric chains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper proposes a methodology especially focused on the generation of strategic plans of action, emphasizing the relevance of having a structured timeframe classification for the actions. The methodology explicitly recognizes the relevance of long-term goals as strategic drivers, which must insure that the complex system is capable to effectively respond to changes in the environment. In addition, the methodology employs engineering systems techniques in order to understand the inner working of the system and to build up alternative plans of action. Due to these different aspects, the proposed approach features higher flexibility compared to traditional methods. The validity and effectiveness of the methodology has been demonstrated by analyzing an airline company composed by 5 subsystems with the aim of defining a plan of action for the next 5 years, which can either: improve efficiency, redefine mission or increase revenues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Within the development of motor vehicles, crash safety (e.g. occupant protection, pedestrian protection, low speed damageability), is one of the most important attributes. In order to be able to fulfill the increased requirements in the framework of shorter cycle times and rising pressure to reduce costs, car manufacturers keep intensifying the use of virtual development tools such as those in the domain of Computer Aided Engineering (CAE). For crash simulations, the explicit finite element method (FEM) is applied. The accuracy of the simulation process is highly dependent on the accuracy of the simulation model, including the midplane mesh. One of the roughest approximations typically made is the actual part thickness which, in reality, can vary locally. However, almost always a constant thickness value is defined throughout the entire part due to complexity reasons. On the other hand, for precise fracture analysis within FEM, the correct thickness consideration is one key enabler. Thus, availability of per element thickness information, which does not exist explicitly in the FEM model, can significantly contribute to an improved crash simulation quality, especially regarding fracture prediction. Even though the thickness is not explicitly available from the FEM model, it can be inferred from the original CAD geometric model through geometric calculations. This paper proposes and compares two thickness estimation algorithms based on ray tracing and nearest neighbour 3D range searches. A systematic quantitative analysis of the accuracy of both algorithms is presented, as well as a thorough identification of particular geometric arrangements under which their accuracy can be compared. These results enable the identification of each technique’s weaknesses and hint towards a new, integrated, approach to the problem that linearly combines the estimates produced by each algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

GUIsurfer: A Reverse Engineering Framework for User Interface Software

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last decade, software architecture emerged as a critical issue in Software Engineering. This encompassed a shift from traditional programming towards software development based on the deployment and assembly of independent components. The specification of both the overall systems structure and the interaction patterns between their components became a major concern for the working developer. Although a number of formalisms to express behaviour and to supply the indispensable calculational power to reason about designs, are available, the task of deriving architectural designs on top of popular component platforms has remained largely informal. This paper introduces a systematic approach to derive, from CCS behavioural specifications the corresponding architectural skeletons in the Microsoft .Net framework, in the form of executable C and Cω code. The prototyping process is fully supported by a specific tool developed in Haskell

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by different organizations. Often, however, coordination data is deeply entangled in the code and, therefore, difficult to isolate and analyse separately. COORDINSPECTOR is a software tool which combines slicing and program analysis techniques to isolate all coordination elements from the source code of an existing application. Such a reverse engineering process provides a clear view of the actually invoked services as well as of the orchestration patterns which bind them together. The tool analyses Common Intermediate Language (CIL) code, the native language of Microsoft .Net Framework. Therefore, the scope of application of COORDINSPECTOR is quite large: potentially any piece of code developed in any of the programming languages which compiles to the .Net Framework. The tool generates graphical representations of the coordination layer together and identifies the underlying business process orchestrations, rendering them as Orc specifications

Relevância:

20.00% 20.00%

Publicador:

Resumo:

COORDINSPECTOR is a Software Tool aiming at extracting the coordination layer of a software system. Such a reverse engineering process provides a clear view of the actually invoked services as well as the logic behind such invocations. The analysis process is based on program slicing techniques and the generation of, System Dependence Graphs and Coordination Dependence Graphs. The tool analyzes Common Intermediate Language (CIL), the native language of the Microsoft .Net Framework, thus making suitable for processing systems developed in any .Net Framework compilable language. COORDINSPECTOR generates graphical representations of the coordination layer together with business process orchestrations specified in WSBPEL 2.0

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last decade, software architecture emerged as a critical design step in Software Engineering. This encompassed a shift from traditional programming towards the deployment and assembly of independent components. The specification of the overall system structure, on the one hand, and of the interactions patterns between its components, on the other, became a major concern for the working developer. Although a number of formalisms to express behaviour and supply the indispensable calculational power to reason about designs, are available, the task of deriving architectural designs on top of popular component platforms has remained largely informal. This paper introduces a systematic approach to derive, from behavioural specifications written in Ccs, the corresponding architectural skeletons in the Microsoft .Net framework in the form of executable C] code. Such prototyping process is automated by means of a specific tool developed in Haskell

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays despite improvements in usability and intuitiveness users have to adapt to the proposed systems to satisfy their needs. For instance, they must learn how to achieve tasks, how to interact with the system, and fulfill system's specifications. This paper proposes an approach to improve this situation enabling graphical user interface redefinition through virtualization and computer vision with the aim of increasing the system's usability. To achieve this goal the approach is based on enriched task models, virtualization and picture-driven computing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Colapso do sistema informático da Justiça, Citius?! É que, a ser verdade, então seria o kaos da justiça e teria que haver consequências imediatas na tutela, pois poderia estar em causa a aplicação prática dos Direitos Fundamentais dos cidadãos e das organizações legais, tendo que ser declarado, ouvido o Conselho de Estado, o “estado de emergência”, de acordo com o art. 19º da Constituição. § Mas mais incrível ainda é o facto de estar por cumprir desde 2011 (dois mil e onze!), a Lei-Quadro de Política Criminal! Abstract: Collapse of the computer system of justice, Citius ?! Is that to be true, then it would be the kaos justice and would have to be immediate consequences in the protection, it could be because the practical application of fundamental rights of citizens and legal organizations, having to be declared, after hearing the Council of State the "state of emergency", according to art. 19 of the Constitution. § But more amazing is the fact of being unfulfilled since 2011 (two thousand and eleven!), The Framework Law for Criminal Policy!

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose/objectives: This paper seeks to investigate whether performance management (PM) framework adopted in Portuguese local government (PLG) fit the Otley’s PM framework (1999). In particularly, the research questions are (1) whether PM framework adopted in PLG (SIADAP) fit the Otley´s framework, and (2) how local politicians (aldermen) see the operation of performance management systems (PMS) in PLG (focusing on the goal-setting process and incentive and reward structures). Theoretical positioning/contributions: With this paper we intend to contribute to literature on how the Otley’s PM framework can guide empirical research about the operation of PMS. In particular, the paper contributes to understand the fit between PMS implemented in PLG and the Otley´s PM framework. The analysis of this fit can be a good contribution to understand if PMS are used in PLG as a management tool or as a strategic response to external pressures (based on interviews conducted to aldermen). We believe that the Otley’s PM framework, as well as the extended PM framework presented by Ferreira and Otley (2009), can provide a useful research tool to understand the operation of PMS in PLG. Research method: The first research question is the central issue in this paper and is analyzed based on the main reforms introduced by Portuguese government on PM of public organizations (like municipalities). On the other hand, interviews conducted on three larger Portuguese municipalities (Oporto, Braga, and Matosinhos) show how aldermen see the operation of PMS in PLG, highlighting the goals setting process with targets associated and the existing of incentive and reward structures linked with performance. Findings: Generally we find that formal and regulated PM frameworks in PLG fit the main issues of the Otley’s PM framework. However, regarding the aldermen perceptions about PMS in practice we find a gap between theory and practice, especially regarding difficulties associated with the lack of a culture of goals and targets setting and the lack of incentive and reward structures linked with performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The success of dental implant-supported prosthesis is directly linked to the accuracy obtained during implant’s pose estimation (position and orientation). Although traditional impression techniques and recent digital acquisition methods are acceptably accurate, a simultaneously fast, accurate and operator-independent methodology is still lacking. Hereto, an image-based framework is proposed to estimate the patient-specific implant’s pose using cone-beam computed tomography (CBCT) and prior knowledge of implanted model. The pose estimation is accomplished in a threestep approach: (1) a region-of-interest is extracted from the CBCT data using 2 operator-defined points at the implant’s main axis; (2) a simulated CBCT volume of the known implanted model is generated through Feldkamp-Davis-Kress reconstruction and coarsely aligned to the defined axis; and (3) a voxel-based rigid registration is performed to optimally align both patient and simulated CBCT data, extracting the implant’s pose from the optimal transformation. Three experiments were performed to evaluate the framework: (1) an in silico study using 48 implants distributed through 12 tridimensional synthetic mandibular models; (2) an in vitro study using an artificial mandible with 2 dental implants acquired with an i-CAT system; and (3) two clinical case studies. The results shown positional errors of 67±34μm and 108μm, and angular misfits of 0.15±0.08º and 1.4º, for experiment 1 and 2, respectively. Moreover, in experiment 3, visual assessment of clinical data results shown a coherent alignment of the reference implant. Overall, a novel image-based framework for implants’ pose estimation from CBCT data was proposed, showing accurate results in agreement with dental prosthesis modelling requirements.