1000 resultados para Programação orientada a objetos (computação)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work was developed a program capable of performing automatic counting of vehicles on roads. The problem of counting vehicles is using expensive techniques for its realization, techniques which often involve manual counting or degradation of the pavement. The main motivation for this work was the importance that the vehicle counting represents to the Traffic Engineer, being essential to analyze the performance of the roads, allowing to measure the need for installation of traffic lights, roundabouts, access ways, among other means capable of ensuring a continuous flow and safe for vehicles. The main objective of this work was to apply a statistical segmentation technique recently developed, based on a nonparametric linear regression model, to solve the segmentation problem of the program counter. The development program was based on the creation of three major modules, one for the segmentation, another for the tracking and another for the recognition. For the development of the segmentation module, it was applied a statistical technique combined with the segmentation by background difference, in order to optimize the process. The tracking module was developed based on the use of Kalman filters and application of simple concepts of analytical geometry. To develop the recognition module, it was used Fourier descriptors and a neural network multilayer perceptron, trained by backpropagation. Besides the development of the modules, it was also developed a control logic capable of performing the interconnection among the modules, mainly based on a data structure called state. The analysis of the results was applied to the program counter and its component modules, and the individual analysis served as a means to establish the par ameter values of techniques used. The find result was positive, since the statistical segmentation technique proved to be very useful and the developed program was able to count the vehicles belonging to the three goal..

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project aims to explore the many methods used for the development of recommendation systems to user ’ s items and apply the content - based recommendation method on a prototype system whose purpose is to recommend books to users. This paper exposes the most popular methods for creating systems capable of providing items (products) according to user preferences, such as collaborat ive filtering and content - based. It also point different techniques that can be applied to calculate the similarity between two entities, for items or users, as the Pearson ’s method, calculating the cosine of vectors and more recently, a proposal to use a Bayesian system under a Dirichlet distribution. In addition, this work has the purpose to go through various points on the design of an online application, or a website, dealing not only oriented algorithms issues, but also the definition of development to ols and techniques to improve the user’s experience. The tools used for the development of the page are listed, and a topic about web design is also discussed in order to emphasize the importance of the layout of the application. At the end, some examples of recommender systems are presented for curiosity , learning and research purposes

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Não disponível

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Medical Physics has been reaching an important role among several lines in Science, providing means for the improvement of several theories and procedures. Currently, its main application is related with the use of ionizing radiations, specially, in treatment procedures such as Radiotherapy. Radiosurgery is a Radiotherapy technique which consists in administering a single tumoricidal dose of radiation exclusively to the tumorous lesion. It becomes then an interesting alternative to surgical treatment, mainly in cerebral metastases, which are the most frequent cerebral tumors in the central nervous system. The radio neurosurgical team works out a planning for the Radiosurgery treatment, aiming for obtaining an appropriate ideal treatment for each case. For the working out of this treatment planning, Computed Tomography images of the region to be treated are obtained, digitalized and later, fused with nuclear magnetic resonance images. Through these images, critical structures, organs at risk and lesions are localized. After this, calculations are made to determine three-dimensional positions of isocenters, isodose curves, prescribed dose, collimators sizes, position, numbers and respective weight of isocentric conformal fields, and others. The treatment planning is commonly based in desired levels of dose for specific types of tumors and organs at risk concerning the irradiated region. Theses levels of dose are chosen in a way that a high probability of cure may be achieved and meanwhile, that the probability of complications, in whichever organ at risk, may be minimal. Thus, many researches have been carried out, showing that mathematical techniques may help to obtain an optimal planning for the treatment of cerebral metastases. Among the methods of optimization in the study...(Complete abstract click electronic access below)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this project the Pattern Recognition Problem is approached with the Support Vector Machines (SVM) technique, a binary method of classification that provides the best solution separating the data in the better way with a hiperplan and an extension of the input space dimension, as a Machine Learning solution. The system aims to classify two classes of pixels chosen by the user in the interface in the interest selection phase and in the background selection phase, generating all the data to be used in the LibSVM library, a library that implements the SVM, illustrating the library operation in a casual way. The data provided by the interface is organized in three types, RGB (Red, Green and Blue color system), texture (calculated) or RGB + texture. At last the project showed successful results, where the classification of the image pixels was showed as been from one of the two classes, from the interest selection area or from the background selection area. The simplest user view of results classification is the RGB type of data arrange, because it’s the most concrete way of data acquisition

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pós-graduação em Educação Escolar - FCLAR

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Provides elements for a reflection on methodological strategies in the face of objects of study that prove difficult to approach. Through a case study in education, seeks to show that difficulties in obtaining information and data have been overcome by using an analytical model developed. It is shown that its use allowed inferences broader and reveal hidden inconsistencies in discussions on public and private education. Intended to assist reflection on qualitative research methods for those who deal with such studies. Concludes that the current expectations of management efficiency and transfer of resources sufficient quantity and quality have not materialized with a private enterprise under public education, even if we have succeeded in building a positive image by the promoters of this action with the sectors of public opinion. Prevailing trade policy interests at the expense of the motivations declared the initiative of aid to education, and even can not be said that the initiative has resulted in a private redefined the public character of the systems affected, there is evidence that its implementation represents a unique chapter focused "education", compared to a scenario in which stand out historically mutual aid agreements of a politicaleconomic development between state and private enterprise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims at offering an overview of the different functionalist approaches in all their programmes, by verifying which functionalist premises would be relevant in each case. This may be a way to elucidate the differentiated approach of certain themes and of certain objects of analysis, and especially, to contribute to a better account of certain relations between each proposal and others realms of knowledge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS