948 resultados para IP-code
Resumo:
Foi desenvolvida neste trabalho uma nova técnica de modelagem analógica para IP-resistividade em laboratório. Para tanto, foram utilizados modelos geométricos cilíndricos e tabulares. Para a construção destes modelos usou-se cimento, areia quartzítica e grafita. Como a grafita apresenta um intenso fenômeno IP, variou-se o teor de grafita contido nos modelos. Assim, para diferentes formas e medidas dos modelos, experimentaram-se diferentes conteúdos de partículas polarizáveis. As medidas foram feitas no sentido de verificar o comportamento da resposta IP e resistividade dos modelos quanto à forma, conteúdo de grafita, profundidade e orientação do modelo estudado.
Resumo:
O ipê roxo é uma árvore de grande importância comercial e farmacológica, além de possuir grande beleza e, por esse motivo, ser muito utilizado em paisagismo. Apesar da existência de diferentes fungicidas no mercado, o uso das estrobilurinas, como a piraclostrobina, tem aumentado significativamente pelo seu efeito fisiológico, que altera o metabolismo da planta, acelerando o desenvolvimento da planta. Assim, neste trabalho analisou-se o crescimento de plantas jovens de Tabebuia avellanedae Lorentz ex Griseb em função da aplicação de piraclostrobina em diferentes concentrações. Os tratamentos foram realizados em intervalos de 30 dias com as seguintes concentrações do fungicida: piraclostrobina 0,375g L-1, piraclostronina 0,750g L-1 e piraclostrobina 1,125g L-1 e a testemunha. Foram avaliadas a altura das plantas, diâmetro do caule, número de folhas, massa seca das folhas, caule e raízes, bem como a avaliação de trocas gasosas e atividade enzimática. As plantas tratadas com piraclostrobina apresentaram incremento na massa seca, massa fresca e na taxa fotossintética na maioria dos tratamentos avaliados
Resumo:
O ipê-branco é uma espécie de difícil propagação por sementes devido à sua curta longevidade. A cultura de tecidos tem possibilitado a melhor propagação de diversas espécies, tendo como base o crescimento de células, tecidos e órgãos em condições assépticas, possibilitando a rápida multiplicação da planta selecionada, obtendo mudas livres de patógenos. A primeira etapa da cultura de tecidos está baseada na desinfestação das sementes para obter as mudas in vitro, possibilitando as posteriores etapas do processo. Foram testadas diversas concentrações de álcool etílico e hipoclorito de sódio em busca da desinfestação mais efetiva. O melhor processo para a desinfestação das sementes do ipê branco está nos tratamentos de germinação em apenas ágar com a retirada das alas da semente após a sua lavagem, com passagem por 30 segundos em álcool etílico e 5 minutos em hipoclorito de sódio, com posterior transferência da plântula para meio MS suplementado com 0,7% de ágar e 3% de sacarose. Sobre as plantas germinadas in vitro foram aplicados tratamentos com hormônios vegetais em busca das melhores concentrações para a obtenção de novas mudas. Os explantes caulinares tratados com BAP a 4,0 mg L-1 apresentaram 93,3% de brotações bem desenvolvidas, enquanto em meio WPM a melhor concentração para brotação com BAP é a de 4,0 mg L-1, não promovendo no entanto um tratamento tão efetivo como em meio MS. Para cinetina, todos os tratamentos exibiram formação de calo e/ou ausência de brotações em meio MS, e baixa porcentagem de brotação em meio WPM. Os tratamentos realizados com AIB e ANA não tiveram rizogênese efetiva em meio MS, apresentando formação de raízes pouco desenvolvidas em apenas poucos explantes no tratamento de 4,0 mg L-1 de ANA em meio WPM
Resumo:
The internet as well as all technologies arising from it are transforming and changing socially and economically, the forms of relationships between people and organizations. The environment of digital mobile communication is on the rise, allowing more communication strategies in public relations to be enhanced, in order to allow effective dialogue, relationship and interaction between organizations and their stakeholders. Accordingly, the purpose of this paper is to analyze digital communications, especially a locative media tool that has been gaining ground in communication activities: Quick Response Code. So in addition to conceptualize and contextualize it, one tried to map out various campaigns, both national and international, who made use of the QR Code, highlighting the strategic role that this tool can have in Integrated PR planning, in order to create visibility and to establish effective and lasting relationships with the brand / organization
Resumo:
This study establishes that for a given binary BCH code C0 n of length n generated by a polynomial g(x) ∈ F2[x] of degree r there exists a family of binary cyclic codes {Cm 2m−1(n+1)n}m≥1 such that for each m ≥ 1, the binary cyclic code Cm 2m−1(n+1)n has length 2m−1(n + 1)n and is generated by a generalized polynomial g(x 1 2m ) ∈ F2[x, 1 2m Z≥0] of degree 2mr. Furthermore, C0 n is embedded in Cm 2m−1(n+1)n and Cm 2m−1(n+1)n is embedded in Cm+1 2m(n+1)n for each m ≥ 1. By a newly proposed algorithm, codewords of the binary BCH code C0 n can be transmitted with high code rate and decoded by the decoder of any member of the family {Cm 2m−1(n+1)n}m≥1 of binary cyclic codes, having the same code rate.
Resumo:
Corresponding to $C_{0}[n,n-r]$, a binary cyclic code generated by a primitive irreducible polynomial $p(X)\in \mathbb{F}_{2}[X]$ of degree $r=2b$, where $b\in \mathbb{Z}^{+}$, we can constitute a binary cyclic code $C[(n+1)^{3^{k}}-1,(n+1)^{3^{k}}-1-3^{k}r]$, which is generated by primitive irreducible generalized polynomial $p(X^{\frac{1}{3^{k}}})\in \mathbb{F}_{2}[X;\frac{1}{3^{k}}\mathbb{Z}_{0}]$ with degree $3^{k}r$, where $k\in \mathbb{Z}^{+}$. This new code $C$ improves the code rate and has error corrections capability higher than $C_{0}$. The purpose of this study is to establish a decoding procedure for $C_{0}$ by using $C$ in such a way that one can obtain an improved code rate and error-correcting capabilities for $C_{0}$.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Many tools and techniques for addressing software maintenance problems rely on code coverage information. Often, this coverage information is gathered for a specific version of a software system, and then used to perform analyses on subsequent versions of that system without being recalculated. As a software system evolves, however, modifications to the software alter the software’s behavior on particular inputs, and code coverage information gathered on earlier versions of a program may not accurately reflect the coverage that would be obtained on later versions. This discrepancy may affect the success of analyses dependent on code coverage information. Despite the importance of coverage information in various analyses, in our search of the literature we find no studies specifically examining the impact of software evolution on code coverage information. Therefore, we conducted empirical studies to examine this impact. The results of our studies suggest that even relatively small modifications can greatly affect code coverage information, and that the degree of impact of change on coverage may be difficult to predict.
Resumo:
Not long ago, most software was written by professional programmers, who could be presumed to have an interest in software engineering methodologies and in tools and techniques for improving software dependability. Today, however, a great deal of software is written not by professionals but by end-users, who create applications such as multimedia simulations, dynamic web pages, and spreadsheets. Applications such as these are often used to guide important decisions or aid in important tasks, and it is important that they be sufficiently dependable, but evidence shows that they frequently are not. For example, studies have shown that a large percentage of the spreadsheets created by end-users contain faults. Despite such evidence, until recently, relatively little research had been done to help end-users create more dependable software. We have been working to address this problem by finding ways to provide at least some of the benefits of formal software engineering techniques to end-user programmers. In this talk, focusing on the spreadsheet application paradigm, I present several of our approaches, focusing on methodologies that utilize source-code-analysis techniques to help end-users build more dependable spreadsheets. Behind the scenes, our methodologies use static analyses such as dataflow analysis and slicing, together with dynamic analyses such as execution monitoring, to support user tasks such as validation and fault localization. I show how, to accommodate the user base of spreadsheet languages, an interface to these methodologies can be provided in a manner that does not require an understanding of the theory behind the analyses, yet supports the interactive, incremental process by which spreadsheets are created. Finally, I present empirical results gathered in the use of our methodologies that highlight several costs and benefits trade-offs, and many opportunities for future work.
Resumo:
In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.
Resumo:
Since a genome is a discrete sequence, the elements of which belong to a set of four letters, the question as to whether or not there is an error-correcting code underlying DNA sequences is unavoidable. The most common approach to answering this question is to propose a methodology to verify the existence of such a code. However, none of the methodologies proposed so far, although quite clever, has achieved that goal. In a recent work, we showed that DNA sequences can be identified as codewords in a class of cyclic error-correcting codes known as Hamming codes. In this paper, we show that a complete intron-exon gene, and even a plasmid genome, can be identified as a Hamming code codeword as well. Although this does not constitute a definitive proof that there is an error-correcting code underlying DNA sequences, it is the first evidence in this direction.
Resumo:
Breakthrough advances in microprocessor technology and efficient power management have altered the course of development of processors with the emergence of multi-core processor technology, in order to bring higher level of processing. The utilization of many-core technology has boosted computing power provided by cluster of workstations or SMPs, providing large computational power at an affordable cost using solely commodity components. Different implementations of message-passing libraries and system softwares (including Operating Systems) are installed in such cluster and multi-cluster computing systems. In order to guarantee correct execution of message-passing parallel applications in a computing environment other than that originally the parallel application was developed, review of the application code is needed. In this paper, a hybrid communication interfacing strategy is proposed, to execute a parallel application in a group of computing nodes belonging to different clusters or multi-clusters (computing systems may be running different operating systems and MPI implementations), interconnected with public or private IP addresses, and responding interchangeably to user execution requests. Experimental results demonstrate the feasibility of this proposed strategy and its effectiveness, through the execution of benchmarking parallel applications.
Resumo:
The hierarchy of the segmentation cascade responsible for establishing the Drosophila body plan is composed by gap, pair-rule and segment polarity genes. However, no pair-rule stripes are formed in the anterior regions of the embryo. This lack of stripe formation, as well as other evidence from the literature that is further investigated here, led us to the hypothesis that anterior gap genes might be involved in a combinatorial mechanism responsible for repressing the cis-regulatory modules (CRMs) of hairy (h), even-skipped (eve), runt (run), and fushi-tarazu (ftz) anterior-most stripes. In this study, we investigated huckebein (hkb), which has a gap expression domain at the anterior tip of the embryo. Using genetic methods we were able to detect deviations from the wild-type patterns of the anterior-most pair-rule stripes in different genetic backgrounds, which were consistent with Hkb-mediated repression. Moreover, we developed an image processing tool that, for the most part, confirmed our assumptions. Using an hkb misexpression system, we further detected specific repression on anterior stripes. Furthermore, bioinformatics analysis predicted an increased significance of binding site clusters in the CRMs of h 1, eve 1, run 1 and ftz 1 when Hkb was incorporated in the analysis, indicating that Hkb plays a direct role in these CRMs. We further discuss that Hkb and Slp1, which is the other previously identified common repressor of anterior stripes, might participate in a combinatorial repression mechanism controlling stripe CRMs in the anterior parts of the embryo and define the borders of these anterior stripes. (C) 2011 Elsevier Inc. All rights reserved.
Resumo:
O objetivo desta pesquisa foi estudar o comportamento fisiológico de sementes de ipê-roxo (Tabebuia heptaphylla (Vell.) Toledo) durante o amazenamento. Frutos colhidos manualmente de 15 plantas-matrizes foram colocados em ambiente sombreado para secagem complementar e posterior extração manual das sementes; primeiro, determinou-se o grau de umidade inicial das sementes (15,6%) e, em seguida, as sementes remanescentes foram submetidas a secagem para obtenção dos demais graus de umidade desejados (11,5, 8,0 e 4,3%). As amostras correspondentes aos diferentes graus de umidade foram armazenadas em câmaras, na temperaturas de 10, 20 e -196 °C. No início e após 120, 240 e 360 dias de armazenamento, as sementes foram submetidas a diversas avaliações fisiológicas. O delineamento experimental foi o inteiramente casualizado, em esquema fatorial, com 4 tratamentos (grau de umidade) no início do armazenamento e 12 tratamentos (4 grau de umidade x 3 condições térmicas), em cada época de avaliação, durante o armazenamento. A comparação das médias foi realizada pelo Teste de Tukey a 5%. A conservação das sementes de ipê-roxo com teores de água de 15,6, 11,5, 8,1 e 4,3% é favorecida no armazenamento a 10 e -196 °C.