842 resultados para Discrete Mathematics in Computer Science
Resumo:
Prolonged high-intensity training seems to result in increased systemic inflammation, which might explain muscle injury, delayed onset muscle soreness, and overtraining syndrome in athletes. Furthermore, an impaired immune function caused by strenuous exercise leads to the development of upper respiratory tract infections in athletes. Nutraceuticals might help counteract these performance-lowering effects. The use of nanotechnology is an interesting alternative to supply athletes with nutraceuticals, as many of these substances are insoluble in water and are poorly absorbed in the digestive tract. The present chapter starts with a brief review of the effects of exercise on immunity, followed by an analysis on how nutraceuticals such as omega-3 fatty acids, glutamine, BCAAs, or phytochemicals can counteract negative effects of strenuous exercise in athletes. Finally, how nanostructured delivery systems can constitute a new trend in enhancing bioavailability and optimizing the action of nutraceuticals will be discussed, using the example of food beverages.
Resumo:
Resuscitation and stabilization are key issues in Intensive Care Burn Units and early survival predictions help to decide the best clinical action during these phases. Current survival scores of burns focus on clinical variables such as age or the body surface area. However, the evolution of other parameters (e.g. diuresis or fluid balance) during the first days is also valuable knowledge. In this work we suggest a methodology and we propose a Temporal Data Mining algorithm to estimate the survival condition from the patient’s evolution. Experiments conducted on 480 patients show the improvement of survival prediction.
Resumo:
Se calculó la obtención de las constantes ópticas usando el método de Wolfe. Dichas contantes: coeficiente de absorción (α), índice de refracción (n) y espesor de una película delgada (d ), son de importancia en el proceso de caracterización óptica del material. Se realizó una comparación del método del Wolfe con el método empleado por R. Swanepoel. Se desarrolló un modelo de programación no lineal con restricciones, de manera que fue posible estimar las constantes ópticas de películas delgadas semiconductoras, a partir únicamente, de datos de transmisión conocidos. Se presentó una solución al modelo de programación no lineal para programación cuadrática. Se demostró la confiabilidad del método propuesto, obteniendo valores de α = 10378.34 cm−1, n = 2.4595, d =989.71 nm y Eg = 1.39 Ev, a través de experimentos numéricos con datos de medidas de transmitancia espectral en películas delgadas de Cu3BiS3.
Resumo:
In an organisation any optimization process of its issues faces increasing challenges and requires new approaches to the organizational phenomenon. Indeed, in this work it is addressed the problematic of efficiency dynamics through intangible variables that may support a different view of the corporations. It focuses on the challenges that information management and the incorporation of context brings to competitiveness. Thus, in this work it is presented the analysis and development of an intelligent decision support system in terms of a formal agenda built on a Logic Programming based methodology to problem solving, complemented with an attitude to computing grounded on Artificial Neural Networks. The proposed model is in itself fairly precise, with an overall accuracy, sensitivity and specificity with values higher than 90 %. The proposed solution is indeed unique, catering for the explicit treatment of incomplete, unknown, or even self-contradictory information, either in a quantitative or qualitative arrangement.
Resumo:
This paper presents a study made in a field poorly explored in the Portuguese language – modality and its automatic tagging. Our main goal was to find a set of attributes for the creation of automatic tag- gers with improved performance over the bag-of-words (bow) approach. The performance was measured using precision, recall and F1. Because it is a relatively unexplored field, the study covers the creation of the corpus (composed by eleven verbs), the use of a parser to extract syntac- tic and semantic information from the sentences and a machine learning approach to identify modality values. Based on three different sets of attributes – from trigger itself and the trigger’s path (from the parse tree) and context – the system creates a tagger for each verb achiev- ing (in almost every verb) an improvement in F1 when compared to the traditional bow approach.
Resumo:
The purpose of this paper is to raise a debate on the urgent need for teachers to generate innovative situations in the teaching-learning process, in the field of Mathematics, as a way for students to develop logical reasoning and research skills applicable to everyday situations. It includes some statistical data and possible reasons for the poor performance and dissatisfaction of students towards Mathematics. Since teachers are called to offer meaningful and functional learning experiences to students, in order to promote the pleasure of learning, teacher training should include experiences that can be put into practice by teachers in the education centers. This paper includes a work proposal for Mathematics Teaching to generate discussion, curiosity and logical reasoning in students, together with the Mathematical problem solving study.
Resumo:
The objective of this research was to determine the student’s attitudes towards Mathematics at the beginning of their graduate studies in Business Administration. The study used an exploratory, non-experimental, cross-sectional design. The instrument used was a questionnaire based on willingness, confidence, utility, motivation and anxiety with Likert questions. The study concluded that students have a negative attitude towards Mathematics; it is considered as a useful but difficult discipline and, for that reason, students show anxiety and lack of confidence when applying mathematical procedures.
Resumo:
This article aims to reflect on language teaching in academic education in the Bachelor's Degree in Computer Science at the University of Mato Grosso (Unemat), Campus Colider held in the Practice of English Language Teaching. Search illustrate the approach of the educational reality with the use of technology through the English language, where their theoretical knowledge underlie actual practices in the construction of knowledge necessary for teacher education. The methodological procedures contemplated primarily a literature search, following the presentation of teaching experience of teaching English Language in Higher Education and its reflections that comprised a search field. The practices were entered into the Continuing Extension Project of Graduates and Graduates of the Computer Science Department of the University Campus Valley of Teles Pires (Colider), located in the northern region of Mato Grosso. The interdisciplinary approach encompassing the Practice Teaching and Extension Project was to develop activities that involve observation and reflection of the school reality, aiming at the performance in context, in this case the integration of educational games in the discipline of English Instrumental. The enrolled data indicated that the theoretical and practical knowledge, in view of literacies, new literacies, multiliteracies and critical literacies, enhances the quality of education. Finally, it is possible to signal that this practice, as a curriculum component of a degree course, offered analytical reflections on the educational space, using games as a tool for meaningful learning. This highlights the importance of the relationship between theory and practice in teacher training. Thus, Teaching Practices were a space of transformative praxis that sought to promote autonomy and preparation of critical-reflective teachers who are committed to their professional development.
Resumo:
Instead of the costly encryption algorithms traditionally employed in auction schemes, efficient Goldwasser-Micali encryption is used to design a new sealed-bid auction. Multiplicative homomorphism instead of the traditional additive homomorphism is exploited to achieve security and high efficiency in the auction. The new scheme is the currently known most efficient non-interactive sealed-bid auction with bid privacy.
Resumo:
A new solution to the millionaire problem is designed on the base of two new techniques: zero test and batch equation. Zero test is a technique used to test whether one or more ciphertext contains a zero without revealing other information. Batch equation is a technique used to test equality of multiple integers. Combination of these two techniques produces the only known solution to the millionaire problem that is correct, private, publicly verifiable and efficient at the same time.
Resumo:
In Service-Oriented Architectures (SOAs), software systems are decomposed into independent units, namely services, that interact with one another through message exchanges. To promote reuse and evolvability, these interactions are explicitly described right from the early phases of the development lifecycle. Up to now, emphasis has been placed on capturing structural aspects of service interactions. Gradually though, the description of behavioral dependencies between service interactions is gaining increasing attention as a means to push forward the SOA vision. This paper deals with the description of these behavioral dependencies during the analysis and design phases. The paper outlines a set of requirements that a language for modeling service interactions at this level should fulfill, and proposes a language whose design is driven by these requirements.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.