968 resultados para Object Model
Resumo:
Este trabalho tem por objetivo apresentar a fundamentação teórica e efetuar uma aplicação prática de uma das mais importantes descobertas no campo das finanças: o modelo de precificação de ativos de capital padrão, denominado de Capital Asset Price Model (CAPM). Na realização da aplicação prática, comparou-se a performance entre os retornos dos investimentos exigidos pelo referido modelo e os realmente obtidos. Foram analisadas cinco ações com a maior participação relativa na carteira teórica do Ibovespa e com retornos publicados de junho de 1998 a maio de 2001. Os dados foram obtidos da Economática da UFRGS e testados utilizando-se o Teste-t (duas amostras em par para médias) na ferramenta MS Excel. Os resultados foram tabelados e analisados, de onde se concluiu que, estatisticamente, com índice de confiança de 95%, não houve diferença de performance entre os retornos esperados e os realmente obtidos dos ativos objeto desta dissertação, no período estudado.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
This work reports a conception phase of a piston engine global model. The model objective is forecast the motor performance (power, torque and specific consumption as a function of rotation and environmental conditions). Global model or Zero-dimensional is based on flux balance through each engine component. The resulting differential equations represents a compressive unsteady flow, in which, all dimensional variables are areas or volumes. A review is presented first. The ordinary differential equation system is presented and a Runge-Kutta method is proposed to solve it numerically. The model includes the momentum conservation equation to link the gas dynamics with the engine moving parts rigid body mechanics. As an oriented to objects model the documentation follows the UML standard. A discussion about the class diagrams is presented, relating the classes with physical model related. The OOP approach allows evolution from simple models to most complex ones without total code rewrite. Copyright © 2001 Society of Automotive Engineers, Inc.
Resumo:
Models of different degrees of complexity are found in the literature for the estimation of lightning striking distances and attractive radius of objects and structures. However, besides the oversimplifications of the physical nature of the lightning discharge on which most of them are based, till recently the tridimensional structure configuration could not be considered. This is an important limitation, as edges and other details of the object affect the electric field and, consequently, the upward leader initiation. Within this context, the Self-consistent leader initiation and propagation model (SLIM) proposed by Becerra and Cooray is state-of-the-art leader inception and propagation leader model based on the physics of leader discharges which enables the tridimensional geometry of the structure to be taken into account. In this paper, the model is used for estimating the striking distance and attractive radius of power transmission lines. The results are compared with those obtained from the electrogeometric and Eriksson's models. © 2003-2012 IEEE.
Resumo:
In this letter, a semiautomatic method for road extraction in object space is proposed that combines a stereoscopic pair of low-resolution aerial images with a digital terrain model (DTM) structured as a triangulated irregular network (TIN). First, we formulate an objective function in the object space to allow the modeling of roads in 3-D. In this model, the TIN-based DTM allows the search for the optimal polyline to be restricted along a narrow band that is overlaid upon it. Finally, the optimal polyline for each road is obtained by optimizing the objective function using the dynamic programming optimization algorithm. A few seed points need to be supplied by an operator. To evaluate the performance of the proposed method, a set of experiments was designed using two stereoscopic pairs of low-resolution aerial images and a TIN-based DTM with an average resolution of 1 m. The experimental results showed that the proposed method worked properly, even when faced with anomalies along roads, such as obstructions caused by shadows and trees.
Resumo:
The concept of epidemiological intelligence, as a construction of information societies, goes beyond monitoring a list of diseases and the ability to elicit rapid responses. The concept should consider the complexity of the definition of epidemiology in the identification of this object of study without being limited to a set of actions in a single government sector. The activities of epidemiological intelligence include risk assessment, strategies for prevention and protection, subsystems of information, crisis management rooms, geographical analysis, etc. This concept contributes to the understanding of policies in health, in multisectorial and geopolitical dimensions, as regards the organization of services around public health emergencies, primary healthcare, as well as disasters. The activities of epidemiological intelligence should not be restricted to scientific research, but the researchers must beware of threats to public health. Lalonde's model enabled consideration of epidemiological intelligence as a way to restructure policies and share resources by creating communities of intelligence, whose purpose is primarily to deal with public health emergencies and disasters.
Resumo:
Rationale Cannabidiol, the main nonpsychotropic constituent of Cannabis sativa, possesses a large number of pharmacological effects including anticonvulsive, sedative, hypnotic, anxiolytic, antipsychotic, anti-inflammatory, and neuroprotective, as demonstrated in clinical and preclinical studies. Many neurodegenerative disorders involve cognitive deficits, and this has led to interest in whether cannabidiol could be useful in the treatment of memory impairment associated to these diseases. Objectives We used an animal model of cognitive impairment induced by iron overload in order to test the effects of cannabidiol in memory-impaired rats. Methods Rats received vehicle or iron at postnatal days 12-14. At the age of 2 months, they received an acute intraperitoneal injection of vehicle or cannabidiol (5.0 or 10.0 mg/kg) immediately after the training session of the novel object recognition task. In order to investigate the effects of chronic cannabidiol, iron-treated rats received daily intraperitoneal injections of cannabidiol for 14 days. Twenty-four hours after the last injection, they were submitted to object recognition training. Retention tests were performed 24 h after training. Results A single acute injection of cannabidiol at the highest dose was able to recover memory in iron-treated rats. Chronic cannabidiol improved recognition memory in iron-treated rats. Acute or chronic cannabidiol does not affect memory in control rats. Conclusions The present findings provide evidence suggesting the potential use of cannabidiol for the treatment of cognitive decline associated with neurodegenerative disorders. Further studies, including clinical trials, are warranted to determine the usefulness of cannabidiol in humans suffering from neurodegenerative disorders.
Resumo:
Cognitive dysfunction is found in patients with brain tumors and there is a need to determine whether it can be replicated in an experimental model. In the present study, the object recognition (OR) paradigm was used to investigate cognitive performance in nude mice, which represent one of the most important animal models available to study human tumors in vivo. Mice with orthotopic xenografts of the human U87MG glioblastoma cell line were trained at 9, 14, and 18days (D9, D14, and D18, respectively) after implantation of 5×10(5) cells. At D9, the mice showed normal behavior when tested 90min or 24h after training and compared to control nude mice. Animals at D14 were still able to discriminate between familiar and novel objects, but exhibited a lower performance than animals at D9. Total impairment in the OR memory was observed when animals were evaluated on D18. These alterations were detected earlier than any other clinical symptoms, which were observed only 22-24days after tumor implantation. There was a significant correlation between the discrimination index (d2) and time after tumor implantation as well as between d2 and tumor volume. These data indicate that the OR task is a robust test to identify early behavior alterations caused by glioblastoma in nude mice. In addition, these results suggest that OR task can be a reliable tool to test the efficacy of new therapies against these tumors.
Resumo:
[EN] In this paper, we present a vascular tree model made with synthetic materials and which allows us to obtain images to make a 3D reconstruction.We have used PVC tubes of several diameters and lengths that will let us evaluate the accuracy of our 3D reconstruction. In order to calibrate the camera we have used a corner detector. Also we have used Optical Flow techniques to follow the points through the images going and going back. We describe two general techniques to extract a sequence of corresponding points from multiple views of an object. The resulting sequence of points will be used later to reconstruct a set of 3D points representing the object surfaces on the scene. We have made the 3D reconstruction choosing by chance a couple of images and we have calculated the projection error. After several repetitions, we have found the best 3D location for the point.
Resumo:
Primate multisensory object perception involves distributed brain regions. To investigate the network character of these regions of the human brain, we applied data-driven group spatial independent component analysis (ICA) to a functional magnetic resonance imaging (fMRI) data set acquired during a passive audio-visual (AV) experiment with common object stimuli. We labeled three group-level independent component (IC) maps as auditory (A), visual (V), and AV, based on their spatial layouts and activation time courses. The overlap between these IC maps served as definition of a distributed network of multisensory candidate regions including superior temporal, ventral occipito-temporal, posterior parietal and prefrontal regions. During an independent second fMRI experiment, we explicitly tested their involvement in AV integration. Activations in nine out of these twelve regions met the max-criterion (A < AV > V) for multisensory integration. Comparison of this approach with a general linear model-based region-of-interest definition revealed its complementary value for multisensory neuroimaging. In conclusion, we estimated functional networks of uni- and multisensory functional connectivity from one dataset and validated their functional roles in an independent dataset. These findings demonstrate the particular value of ICA for multisensory neuroimaging research and using independent datasets to test hypotheses generated from a data-driven analysis.
Resumo:
OBJECT: The aim of this study was to develop and characterize a new orthotopic, syngeneic, transplantable mouse brain tumor model by using the cell lines Tu-9648 and Tu-2449, which were previously isolated from tumors that arose spontaneously in glial fibrillary acidic protein (GFAP)-v-src transgenic mice. METHODS: Striatal implantation of a 1-microl suspension of 5000 to 10,000 cells from either clone into syngeneic B6C3F1 mice resulted in tumors that were histologically identified as malignant gliomas. Prior subcutaneous inoculations with irradiated autologous cells inhibited the otherwise robust development of a microscopically infiltrating malignant glioma. Untreated mice with implanted tumor cells were killed 12 days later, when the resultant gliomas were several millimeters in diameter. Immunohistochemically, the gliomas displayed both the astroglial marker GFAP and the oncogenic form of signal transducer and activator of transcription-3 (Stat3). This form is called tyrosine-705 phosphorylated Stat3, and is found in many malignant entities, including human gliomas. Phosphorylated Stat3 was particularly prominent, not only in the nucleus but also in the plasma membrane of peripherally infiltrating glioma cells, reflecting persistent overactivation of the Janus kinase/Stat3 signal transduction pathway. The Tu-2449 cells exhibited three non-random structural chromosomal aberrations, including a deletion of the long arm of chromosome 2 and an apparently balanced translocation between chromosomes 1 and 3. The GFAP-v-src transgene was mapped to the pericentromeric region of chromosome 18. CONCLUSIONS: The high rate of engraftment, the similarity to the high-grade malignant glioma of origin, and the rapid, locally invasive growth of these tumors should make this murine model useful in testing novel therapies for human malignant gliomas.
Resumo:
We developed an object-oriented cross-platform program to perform three-dimensional (3D) analysis of hip joint morphology using two-dimensional (2D) anteroposterior (AP) pelvic radiographs. Landmarks extracted from 2D AP pelvic radiographs and optionally an additional lateral pelvic X-ray were combined with a cone beam projection model to reconstruct 3D hip joints. Since individual pelvic orientation can vary considerably, a method for standardizing pelvic orientation was implemented to determine the absolute tilt/rotation. The evaluation of anatomically morphologic differences was achieved by reconstructing the projected acetabular rim and the measured hip parameters as if obtained in a standardized neutral orientation. The program had been successfully used to interactively objectify acetabular version in hips with femoro-acetabular impingement or developmental dysplasia. Hip(2)Norm is written in object-oriented programming language C++ using cross-platform software Qt (TrollTech, Oslo, Norway) for graphical user interface (GUI) and is transportable to any platform.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
As object-oriented languages are extended with novel modularization mechanisms, better underlying models are required to implement these high-level features. This paper describes CELL, a language model that builds on delegation-based chains of object fragments. Composition of groups of cells is used: 1) to represent objects, 2) to realize various forms of method lookup, and 3) to keep track of method references. A running prototype of CELL is provided and used to realize the basic kernel of a Smalltalk system. The paper shows, using several examples, how higher-level features such as traits can be supported by the lower-level model.