Browsing by Issue Date, starting with "2020-11-06"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- Motivar para a leituraPublication . Gonçalves, Diogo Carlos Cardoso; Sardinha, Maria da Graça Guilherme de AlmeidaO estudo trata os temas da leitura e da literacia, bem como algumas estratégias necessárias para fomentar o desenvolvimento da motivação e da competência leitora dos alunos. Partindo das investigações de autores consagrados, aplicou-se um inquérito por questionário composto por 10 questões, no sentido de apurarmos o papel de algumas estratégias aplicadas em sala de aula. Sinalizámos algumas estratégias nos planos de aula relacionados com o tema do trabalho e refletimos, no final, no âmbito das considerações finais, sobre a importância das mesmas.
- Formação de escreventesPublication . Raposo, Lumena Carolina Madeira; Sardinha, Maria da Graça Guilherme de AlmeidaO modelo que motivou o estudo refere-se a Hayes e Flower (1980), que autores consagrados como Luís Barbeiro (2007), Duarte (2008), Luísa Álvares Pereira (2003), entre outros, defendem. Dele extraímos o ciclo de escrita traduzindo-se no exercício da planificação, da redação e da revisão, que implicam estratégias específicas. Após a revisão da literatura sobre o tema supracitado, estabelecemos uma ligação entre o referido tema e os planos de aula selecionados para o efeito. No final procede-se ao estudo prático onde tratamos as atividades relativas aos subprocessos da planificação, da redação e da revisão. De todas as atividades relativas ao ato de escrita, selecionámos o resumo também este inserido no subprocesso da escrita.
- Jornalismo de InvestigaçãoPublication . Ribeiro, Ana Sofia Lopes Marques Fernandes; Serra, Joaquim Mateus PauloPartindo da postura académica que já concluiu amplamente pelo fator “investigação” como elemento da prática jornalística generalista, a convicção que impulsionou esta investigação apontou para a necessidade de admitir a existência de elementos acrescidos capazes de particularizar o foco da reportagem televisiva deste género especializado. Estes elementos distintivos parecem afastar-se na escala de tolerância ao cumprimento do dever ético-deontológico de imparcialidade, e aproximar-se da “parcialidade implicada”. Apesar disso, não se assume que se consubstancia uma fusão com a opinião, quer por não serem tais elementos de natureza totalmente subjetivista,por haver um escrúpulo evidente e um cuidado redobrado nos casos em que o jornalista é, simultaneamente, denunciante. Esses elementos são interpretativos — daí que equacionemos a pesquisa do jornalismo de investigação como jornalismo “com interpretação” —, e estão presos à fórmula do juízo de valor. Desse modo, chegámos ao forte indício de que esses elementos que faltam à prática investigativa jornalística genérica e estão presentes na reportagem televisiva de jornalismo de investigação se relacionam intimamente com a moral.
- Modeling Attacks in IoT to Assist the Engineering ProcessPublication . Rodrigues, Luís Carlos Mendes; Inácio, Pedro Ricardo Morais; Simões, Tiago Miguel CarrolaThe Internet of Things is the broad name given to technologies that allow for any devices (known in this context as things) to communicate with each other as well as machines, applications, databases, among others in a seamless manner. This allows for devices in an environment such as in a home, a factory or a hospital, to interact with each other and even to autonomously perform actions based on the information they receive. This integration of technology in regular, everyday devices allows for the people that interact or otherwise are affected by them to have a finer degree of control over what is happening around them, allowing for this technology to improve other existing ones by improving their usefulness and efficiency. As a simple example, in the context of a smart home, a user can be able to manually command actions or to set conditions that trigger said actions according to his preferences. This means that things such as controlling room temperature and lighting, opening doors, ordering something when it runs out or turning appliances on, can be automatically performed when the conditions approved by the user are met. In medicine for example, Internet of Things (IoT) systems allow for the creation of more effective patient monitoring and diagnostic systems as well as resource management in general, as patients could potentially carry sensors that allow for constant monitoring thus assisting in diagnostics and in emergency situations. This last example raises an obvious and very important issue with this type of technologies, which is security. If IoT systems are not properly secured, a malicious actor could potentially access or modify private patient or hospital data as well as disable or tamper with the sensors, among other malicious scenarios that could potentially result in harm to equipment or even human lives. Given the speed at which this technology is evolving and new systems are being created and implemented, security is often seen as an afterthought, which results in insufficient or poorly implemented security measures allowing for attackers to easily disrupt the functioning or even to steal sensitive data from the system. Therefore, it is critical to perform an adequate security analysis right from the start of the system design process. By understanding the security requirements relevant to a system, it is possible to implement adequate security measures that prevent attacks or other malicious actions from occurring, thus safeguarding data and allowing for the system to perform as originally intended. The goal of this dissertation is to explore the principles behind system and threat modeling to be able to develop a prototype tool to assist users - even those with limited security knowledge - in the identification of security requirements, threats and good practices. Hopefully, this prototype should prove to be able to assist developers better define security requirements early in the system design stage, as well as including the correct defensive measures in the development stages. This prototype was developed in the context of the S E C U R I o T E S I G N project, as it integrates two other tools created in its context to assist in the identification of the requirements from information provided by the user. This dissertation produced a web application capable of handling the user inputs containing relevant system requirement and recommendations information, and then processing them in order to extrapolate the relevant system and threat modeling information. The validation process for this prototype consisted of comparing a manual system and threat analysis created by an expert, with the results obtained by volunteers using the prototype application, and verifying how correct is the analysis by the tool. The results were satisfying and the proposed objectives were successfully achieved.
- Surface Reconstruction From 3D Point CloudsPublication . Leitão, Gonçalo Nuno Paula de Campos Vinhas; Gomes, Abel João PadrãoThe triangulation of a point cloud of a 3D object is a complex problem, since it depends on the complexity of the shape of such object, as well as on the density of points generated by a specific scanner. In the literature, there are essentially two approaches to the reconstruction of surfaces from point clouds: interpolation and approximation. In general, interpolation approaches are associated with simplicial methods; that is, methods that directly generate a triangle mesh from a point cloud. On the other hand, approximation approaches generate a global implicit function — that represents an implicit surface — from local shape functions, then generating a triangulation of such implicit surface. The simplicial methods are divided into two families: Delaunay and mesh growing. Bearing in mind that the first of the methods presented in this dissertation falls under the category of mesh growing methods, let us focus our attention for now on these methods. One of the biggest problems with these methods is that, in general, they are based on the establishment of dihedral angle bounds between adjacent triangles, as needed to make the decision on which triangle to add to the expansion mesh front. Typically, other bounds are also used for the internal angles of each triangle. In the course of this dissertation, we will see how this problem was solved. The second algorithm introduced in this dissertation is also a simplicial method but does not fit into any of the two families mentioned above, which makes us think that we are in the presence of a new family: triangulation based on the atlas of charts or triangle stars. This algorithm generates an atlas of the surface that consists of overlapping stars of triangles, that is, one produces a total surface coverage, thus solving one of the common problems of this family of direct triangulation methods, which is the appearance of holes or incomplete triangulation of the surface. The third algorithm refers to an implicit method, but, unlike other implicit methods, it uses an interpolation approach. That is, the local shape functions interpolate the points of the cloud. It is, perhaps, one of a few implicit methods that we can find in the literature that interpolates all points of the cloud. Therefore, one of the biggest problems of the implicit methods is solved, which has to do with the smoothing of the surface sharp features resulting from the blending of the local functions into the global function. What is common to the three methods is the interpolation approach, either in simple or implicit methods, that is, the linearization of the surface subject to reconstruction. As will be seen, the linearization of the neighborhood of each point allows us to solve several problems posed to the surface reconstruction algorithms, namely: point sub‐sampling, non‐uniform sampling, as well as sharp features.