748 resultados para Concurrent programs


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Exercise training has been shown to improve exercise capacity in patients with heart failure. We sought to examine the optimal strategy of exercise training for patients with heart failure. Methods: Review of the published data on the characteristics of the training program, with comparison of physiologic markers of exercise capacity in heart failure patients and healthy individuals and comparison of the change in these characteristics after all exercise training program. Results: Many factors, including the duration, supervision, and venue of exercise training; the volume of working muscle; the delivery mode (eg, continuous vs. intermittent exercise), training intensity; and the concurrent effects of medical treatments may influence the results of exercise training in heart failure. Starting in an individually prescribed and safely monitored hospital-based program, followed by progression to an ongoing and progressive home program of exercise appears to be the best solution to the barriers of anxiety, adherence, and ease of access encountered by the heart failure patient. Conclusions: Various exercise training programs have been shown to improve exercise capacity and symptom status in heart failure, but these improvements may only be preserved with an ongoing maintenance program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bone weakening can occur due to the absence of load on the skeleton or even short periods of decreased physical activity. Therefore, musculoskeletal diseases that involve temporary immobilization by casts, inactivity or tension increases the risk of fractures. Physical activity is the most studied procedure both to prevent damage and to restore bone structure. The present study aimed at evaluating, by bone densitometry on rat femurs, the influence of hindlimb unloading and later running activity on treadmill or free movement. Sixty-four Wistar rats were used, aged 65 days with a mean corporal mass of 316.11g, randomly divided into eight experimental groups: group 1, the suspended control with seven animals under hindlimb unloading regimen for 28 days, then euthanized; groups 2 and 3, the trained suspended comprising of 7 and five animals, respectively, subjected to hindlimb unloading for 28 days, followed by treadmill exercise for 28 days (group 2) or 56 days (group 3), then euthanized; groups 4 and 5, designated free suspended, comprised of 7 animals each under hindlimb unloading regimen for 28 days followed by free activity in cages for 28 days (group 4) or 56 days (group 5), then euthanized; groups 6, 7 and 8, negative controls, each with 8 animals allowed to free activity in cages and euthanized at the ages of 93, 121 and 149 days, respectively. Bone mineral density (BMD) of the left femur was analyzed by bone densitometry. Unloading by tail-suspension decreased BMD while treadmill training and free activity in cages promoted its recovery in a similar way and over time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Clone detection is well established for imperative programs. It works mostly on the statement level and therefore is ill-suited for func- tional programs, whose main constituents are expressions and types. In this paper we introduce clone detection for functional programs using a new intermediate program representation, dubbed Functional Control Tree. We extend clone detection to the identi cation of non-trivial func- tional program clones based on the recursion patterns from the so-called Bird-Meertens formalism

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software architecture is currently recognized as one of the most critical design steps in Software Engineering. The specification of the overall system structure, on the one hand, and of the interactions patterns between its components, on the other, became a major concern for the working developer. Although a number of formalisms to express behaviour and supply the indispensable calculational power to reason about designs, are available, the task of deriving architectural designs on top of popular component platforms has remained largely informal. This paper introduces a systematic approach to derive, from behavioural specifications written in Cw, the corresponding architectural skeletons in the Microsoft .NET framework in the form of executable code

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past 25 years, expatriate managers have voiced increased disenchantment with their compensation packages whíle abroad. This paper takes a prescriptive approach, outlíning severa I elements of a successful human resources strategy and stressing key ingredients of effective international compensation programs. Particular ettention is given to the adherence of cultural values and distrlbutive justice when working across nations and cultures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

LUDA is a research project of Key Action 4 "City of Tomorrow & Cultural Heritage" of the programme "Energy, Environment and Sustainable Development" within the Fifth Framework Programme of the European Commission

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O Planeamento Concomitante teve a sua origem no Reino Unido. É um método radical de intervenção social, baseado na Teoria de Afecto (Attachment Theory). O Planeamento Concomitante procura garantir que as crianças vulneráveis nas casas de acolhimento do Estado sejam adoptadas mais rapidamente possível. As crianças são acolhidas no âmbito deste Planeamento durante o período em que está em curso a avaliação da capacidade acolhedora dos pais adoptivos. As crianças sem condições de retorno para as suas famílias são desta forma legalmente adoptadas pelos pais adoptivos com quem as crianças já conseguiram desenvolver laços afectivos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A critical analysis of the Supplementary Feeding Programs which have been undertaken around the world is presented. Although only a few programs have been rigorously evaluated it seems that in relation to their main objectives, most of them have not proved to be successful. Some suggestions for improvement are put forward and the particular case of the Brazilian programs is assessed in detail.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power systems have been suffering huge changes mainly due to the substantial increase of distributed generation and to the operation in competitive environments. Virtual power players can aggregate a diversity of players, namely generators and consumers, and a diversity of energy resources, including electricity generation based on several technologies, storage and demand response. Resource management gains an increasing relevance in this competitive context, while demand side active role provides managers with increased demand elasticity. This makes demand response use more interesting and flexible, giving rise to a wide range of new opportunities.This paper proposes a methodology for managing demand response programs in the scope of virtual power players. The proposed method is based on the calculation of locational marginal prices (LMP). The evaluation of the impact of using demand response specific programs on the LMP value supports the manager decision concerning demand response use. The proposed method has been computationally implemented and its application is illustrated in this paper using a 32 bus network with intensive use of distributed generation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design and development of simulation models and tools for Demand Response (DR) programs are becoming more and more important for adequately taking the maximum advantages of DR programs use. Moreover, a more active consumers’ participation in DR programs can help improving the system reliability and decrease or defer the required investments. DemSi, a DR simulator, designed and implemented by the authors of this paper, allows studying DR actions and schemes in distribution networks. It undertakes the technical validation of the solution using realistic network simulation based on PSCAD. DemSi considers the players involved in DR actions, and the results can be analyzed from each specific player point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, Power Systems (PS) have experimented many changes in their operation. The introduction of new players managing Distributed Generation (DG) units, and the existence of new Demand Response (DR) programs make the control of the system a more complex problem and allow a more flexible management. An intelligent resource management in the context of smart grids is of huge important so that smart grids functions are assured. This paper proposes a new methodology to support system operators and/or Virtual Power Players (VPPs) to determine effective and efficient DR programs that can be put into practice. This method is based on the use of data mining techniques applied to a database which is obtained for a large set of operation scenarios. The paper includes a case study based on 27,000 scenarios considering a diversity of distributed resources in a 32 bus distribution network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing importance and influence of new resources connected to the power systems has caused many changes in their operation. Environmental policies and several well know advantages have been made renewable based energy resources largely disseminated. These resources, including Distributed Generation (DG), are being connected to lower voltage levels where Demand Response (DR) must be considered too. These changes increase the complexity of the system operation due to both new operational constraints and amounts of data to be processed. Virtual Power Players (VPP) are entities able to manage these resources. Addressing these issues, this paper proposes a methodology to support VPP actions when these act as a Curtailment Service Provider (CSP) that provides DR capacity to a DR program declared by the Independent System Operator (ISO) or by the VPP itself. The amount of DR capacity that the CSP can assure is determined using data mining techniques applied to a database which is obtained for a large set of operation scenarios. The paper includes a case study based on 27,000 scenarios considering a diversity of distributed resources in a 33 bus distribution network.