877 resultados para 190202 Computer Gaming and Animation
Resumo:
A 3D binary image is considered well-composed if, and only if, the union of the faces shared by the foreground and background voxels of the image is a surface in R3. Wellcomposed images have some desirable topological properties, which allow us to simplify and optimize algorithms that are widely used in computer graphics, computer vision and image processing. These advantages have fostered the development of algorithms to repair bi-dimensional (2D) and three-dimensional (3D) images that are not well-composed. These algorithms are known as repairing algorithms. In this dissertation, we propose two repairing algorithms, one randomized and one deterministic. Both algorithms are capable of making topological repairs in 3D binary images, producing well-composed images similar to the original images. The key idea behind both algorithms is to iteratively change the assigned color of some points in the input image from 0 (background)to 1 (foreground) until the image becomes well-composed. The points whose colors are changed by the algorithms are chosen according to their values in the fuzzy connectivity map resulting from the image segmentation process. The use of the fuzzy connectivity map ensures that a subset of points chosen by the algorithm at any given iteration is the one with the least affinity with the background among all possible choices
Resumo:
There is a growing interest of the Computer Science education community for including testing concepts on introductory programming courses. Aiming at contributing to this issue, we introduce POPT, a Problem-Oriented Programming and Testing approach for Introductory Programming Courses. POPT main goal is to improve the traditional method of teaching introductory programming that concentrates mainly on implementation and neglects testing. POPT extends POP (Problem Oriented Programing) methodology proposed on the PhD Thesis of Andrea Mendonça (UFCG). In both methodologies POPT and POP, students skills in dealing with ill-defined problems must be developed since the first programming courses. In POPT however, students are stimulated to clarify ill-defined problem specifications, guided by de definition of test cases (in a table-like manner). This paper presents POPT, and TestBoot a tool developed to support the methodology. In order to evaluate the approach a case study and a controlled experiment (which adopted the Latin Square design) were performed. In an Introductory Programming course of Computer Science and Software Engineering Graduation Programs at the Federal University of Rio Grande do Norte, Brazil. The study results have shown that, when compared to a Blind Testing approach, POPT stimulates the implementation of programs of better external quality the first program version submitted by POPT students passed in twice the number of test cases (professor-defined ones) when compared to non-POPT students. Moreover, POPT students submitted fewer program versions and spent more time to submit the first version to the automatic evaluation system, which lead us to think that POPT students are stimulated to think better about the solution they are implementing. The controlled experiment confirmed the influence of the proposed methodology on the quality of the code developed by POPT students
Resumo:
Objetivo: Avaliar as mudanças de curvatura corneana ocorridas após a exérese do pterígio (Pt). Métodos: Foi realizado estudo prospectivo em 49 olhos com Pt primário avaliando-se idade, sexo, tamanho [grau (G) I, GII, GIII e GIV] e a morfologia da lesão (atrófica ou carnosa) à biomicroscopia. Todos os pacientes foram submetidos ao exame de videoceratoscopia computadorizada e ceratometria no pré-operatório (pré-op), e no 30º e 60º dias após a cirurgia. Os dados foram submetidos à análise estatística. Resultados: 63% dos indivíduos avaliados eram do sexo masculino e 80% tinham mais de 41 anos. Houve predomínio dos Pt atróficos (77%), GII e GIII (39% e 28%, respectivamente). Observou-se manutenção do astigmatismo (Astg) presente no pré-operatório no 2º mês pós-operatório (PO), principalmente nos portadores de Pt GI e GII. A variação no valor de K do 1º mês para o 2º mês de PO foi pequena. As variações observadas estiveram mais relacionadas com o tamanho do pterígio, do que com a idade do paciente, ou com as suas características morfológicas. Conclusões: A avaliação ceratométrica e topográfica da córnea em portadores de pterígio no pré e no pós-operatório mostrou que os Pt menores (GI e GII) estão associados com graus menores de astigmatismo e no pós-operatório a córnea sofre menos mudanças que nos GIII e GIV. Após 2 meses da cirurgia, o padrão da curvatura corneana é semelhante ao do pré-operatório, na maioria dos pacientes.
Resumo:
Descreve-se um surto de abscesso mandibular em ovelhas da raça Bergamácia no município de Botucatu, estado de São Paulo. do rebanho de 120 animais, 35 apresentaram aumento de volume mandibular com a presença de nódulos únicos, de consistência pétrea, de diferentes tamanhos, fistulados ou não e sem indicativos de inflamação dos tecidos moles adjacentes. Os animais eram criados em pasto de Panicum maximum cv. Tanzânia com água e sal mineral ad libitum e everminados, via oral, com pistolas dosificadoras. O material para diagnóstico microbiológico e antibiograma foi coletado de cinco animais acometidos, por punção e aspiração dos nódulos. Dos 35 animais acometidos, 19 foram submetidos ao exame radiográfico, um ao exame tomográfico e outro à biópsia óssea da região submandibular. O único ovino que morreu, encontrava-se em estado de caquexia provavelmente devido à localização do aumento de volume que afetou a implantação dos dentes molares daquela região impedindo a apreensão e mastigação adequadas levando a perda da condição corporal e morte. Ao exame necroscópico, observaram-se áreas de necrose caseosa na mandíbula direita de onde isolou-se Pseudomonas aeruginosa. O tratamento utilizado foi baseado na aplicação de iodeto de sódio a 10% por via intramuscular e antibioticoterapia segundo antibiograma com enrofloxacina por via intramuscular, porém com pouca eficácia. Diante do quadro clínico, dos dados de anamnese, da localização das lesões no tecido ósseo mandibular, do resultado do cultivo microbiológico, das alterações radiográficas e tomográficas foi feito o diagnóstico de abscesso mandibular causado por Pseudomonas aeruginosa.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
This paper presents some findings regarding the interaction between different computer interfaces and different types of collective work. We want to claim that design in online learning environments has a paramount role in the type of collaboration that happens among participants. In this paper, we report on data that illustrate how teachers can collaborate online in order to learn how to use geometry software in teaching activities. A virtual environment which allows that construction to be carried out collectively, even if the participants are not sharing a classroom, is the setting for the research presented in this paper.
Resumo:
This work describes a ludic proposal for programming learning of industrial robots to be developed by groups of engineering students. Two projects are presented: Tic-tac-toe Opponent Robot and Environmentalist Robot. The first project use competitive search techniques of the Artificial Intelligence, computational vision, electronic and pneumatic concepts for ability decision making for a robotic agent on the tic-tae-toe game. The second project consists of a game that contains a questions and answers database about environmental themes. An algorithm selects the group of questions to be answered by the player, analyses the answers and sends the result to a industrial robot through serial port. According with the player performance, the robot makes congratulation movements and giving a gift to the winner player. Otherwise, the robot makes movements, disapproving the player performance.
Resumo:
This article has the purpose to review the main codes used to detect and correct errors in data communication specifically in the computer's network. The Hamming's code and the Ciclic Redundancy Code (CRC) are presented as the focus of this article as well as CRC hardware implementation. Each code is reviewed in details in order to fill the gaps in the literature and to make it accessible to the computer science and engineering students as well as to anyone who may be interested in learning the technique to treat error in data communication.
Resumo:
One of the main problems in Computer Vision and Close Range Digital Photogrammetry is 3D reconstruction. 3D reconstruction with structured light is one of the existing techniques and which still has several problems, one of them the identification or classification of the projected targets. Approaching this problem is the goal of this paper. An area based method called template matching was used for target classification. This method performs detection of area similarity by correlation, which measures the similarity between the reference and search windows, using a suitable correlation function. In this paper the modified cross covariance function was used, which presented the best results. A strategy was developed for adaptative resampling of the patterns, which solved the problem of deformation of the targets due to object surface inclination. Experiments with simulated and real data were performed in order to assess the efficiency of the proposed methodology for target detection. The results showed that the proposed classification strategy works properly, identifying 98% of targets in plane surfaces and 93% in oblique surfaces.
Resumo:
In this paper a new partial differential equation based method is presented with a view to denoising images having textures. The proposed model combines a nonlinear anisotropic diffusion filter with recent harmonic analysis techniques. A wave atom shrinkage allied to detection by gradient technique is used to guide the diffusion process so as to smooth and maintain essential image characteristics. Two forcing terms are used to maintain and improve edges, boundaries and oscillatory features of an image having irregular details and texture. Experimental results show the performance of our model for texture preserving denoising when compared to recent methods in literature. © 2009 IEEE.
Resumo:
The Interactive Learning Environment (ILE) is an educational model that integrates features of 3D computer graphics and contextualization, in order to transmit a quantum of knowledge (islands of knowledge), in a precise and agile way, to people who do not know the subject. It is a model that uses multimedia resources supported by a contextualized environment to motivate the participants in the retention of knowledge. In this first release, eight relevant subjects in dermatology were addressed and implemented in the 62nd Brazilian Congress of Dermatology. The model was called Dermatúnel. In a period of four days, 3295 people visited it. The results showed that the participants were highly satisfied. The model has a great potential as an educational tool for medical training and guidance to the general public with the purpose of disease prevention.
Resumo:
This work describes a hardware/software co-design system development, named IEEE 1451 platform, to be used in process automation. This platform intends to make easier the implementation of IEEE standards 1451.0, 1451.1, 1451.2 and 1451.5. The hardware was built using NIOS II processor resources on Alteras Cyclone II FPGA. The software was done using Java technology and C/C++ for the processors programming. This HW/SW system implements the IEEE 1451 based on a control module and supervisory software for industrial automation. © 2011 Elsevier B.V.
Resumo:
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.
Resumo:
Transactional memory (TM) is a new synchronization mechanism devised to simplify parallel programming, thereby helping programmers to unleash the power of current multicore processors. Although software implementations of TM (STM) have been extensively analyzed in terms of runtime performance, little attention has been paid to an equally important constraint faced by nearly all computer systems: energy consumption. In this work we conduct a comprehensive study of energy and runtime tradeoff sin software transactional memory systems. We characterize the behavior of three state-of-the-art lock-based STM algorithms, along with three different conflict resolution schemes. As a result of this characterization, we propose a DVFS-based technique that can be integrated into the resolution policies so as to improve the energy-delay product (EDP). Experimental results show that our DVFS-enhanced policies are indeed beneficial for applications with high contention levels. Improvements of up to 59% in EDP can be observed in this scenario, with an average EDP reduction of 16% across the STAMP workloads. © 2012 IEEE.