TCC - Bacharelado em Ciência da Computação (UAG)

URI permanente para esta coleçãohttps://arandu.ufrpe.br/handle/123456789/2952

Navegar

Resultados da Pesquisa

Agora exibindo 1 - 10 de 11
  • Imagem de Miniatura
    Item
    M Harmony BR: o uso de formalismos para a composição algorítmica baseada em conhecimento
    (2018-02-23) Silva, Vinícius Santana; Carvalho, Tiago Buarque Assunção de; Costa Junior, Jerônimo Barbosa da; http://lattes.cnpq.br/6050271311748487; http://lattes.cnpq.br/7150833804013500; http://lattes.cnpq.br/8393251786005816
    Throughout history, several studies have tried to introduce the use of computers in other areas of knowledge, including music, and several researches have been done to show the ability of computers to compose music. The present work had the objective to verify the possibility of the creation of a simple software capable of generating harmonies of a certain musical style, using context-free grammars, based on knowledge. The development of the tool was based on the analysis of the characteristics of two different musical styles: Punk Rock and Sertanejo Universitário, through the collection and analysis of data of 40 songs. Subsequently the database was expanded with the inclusion of 50 Reggae songs and 30 songs to the Sertanejo Universitário style, totaling 120 songs. Based on the information extracted from the music dataset, 3 specific grammars were generated to produce harmonies of each style analyzed by means of a composition algorithm. The study resulted in the production of an application that composes knowledge-based harmonies, which proved useful in aiding musical composition process.
  • Imagem de Miniatura
    Item
    A utilização do DevOps como fonte de vantagem competitiva para uma organização
    (2019-07-11) Frazão, Dário de Araújo; Ximenes, Assuero Fonseca; http://lattes.cnpq.br/0060135791012696; http://lattes.cnpq.br/6101448290120723
    The objective of this work was to analyze how organizations can have a competitive advantage by using DevOps, what are the gains from its use within the context of IT governance and how a company needs to find itself to be able to sucessfully implement a practice through a proposed model. For this, were analyzed the impacts caused in the areas of development and operation, and consequently, the IT governance. To achieve the objectives, an exploratory research was developed to obtain an understanding of what IT governance represents for organizations and, with this, to understand the relevance and advantages caused by the adoption of DevOps. The results show that IT governance is important for the organization to add value to its products and services, and that there are several methodologies that, if applied correctly, bring significant results. However, these methodologies are not managing to align the area of development with the area of operation. Due to this, with the adoption of DevOps it is expected to solve the problems between these two areas. Therefore, it was sought to understand its impacts so that to be able to obtain the competitive advantages provided by IT governance through the use of Devops.
  • Imagem de Miniatura
    Item
    QRQueijo: sistema para validação e emissão de identificadores de queijos utilizando Blockchain
    (2019-07-12) Silva, Ademário José da; Mendonça, Sérgio Francisco Tavares de Oliveira; http://lattes.cnpq.br/6313698968060384; http://lattes.cnpq.br/3733518574144348
    The food chain in the food industry has generated more and more information about its processes. Ensuring the integrity and security of this information has been a challenge. The current work aims to understand and evaluate what kind of information is generated in these processes, as well as from the results obtained, implement a solution that can generate identifiers for cheeses and through a local Blockchain network validate this information, as well as from a mobile application it is possible to view this data. For this, it was necessary to understand the structure of Blockchain and its characteristics in relation to information security through a bibliographic search. Important points of traceability have been identified for food production processes. With the results it was possible to model and implement a web system capable of recording data about a cheese and its manufacturer in a local Blockchain network, validating the information provided and made available to its consumers through the QRQuejio (Android) application, in which the cheese was transported. And, using a multi-level query system, check the authenticity of the records by reading the system database and the local Blockchain to confirm the authenticity of the record.
  • Imagem de Miniatura
    Item
    Um sistema para detecção de violência baseado em métodos de Pose Track
    (2019-07-17) Soares, Pedro Gabriel Santos do Couto; Pereira, Luis Filipe Alves; http://lattes.cnpq.br/7320714889983490; http://lattes.cnpq.br/6629443303355506
  • Imagem de Miniatura
    Item
    Análise e proposta de diretrizes para um sistema de gerenciamento de segurança da informação no Instituto Nacional do Seguro Social de Garanhuns – INSS/GEXGAR
    (2019-07-11) Soares, Samir Josué Laranjeira; Ximenes, Assuero Fonseca; http://lattes.cnpq.br/0060135791012696
  • Imagem de Miniatura
    Item
    Avaliar: sistema para autoria e acompanhamento de recursos avaliativos
    (2019-07-11) Elias, Alana Maria Tenório; Vanderlei, Igor Medeiros; http://lattes.cnpq.br/7448139435512224; http://lattes.cnpq.br/4249467181282314
    The school evaluation is the subject of numerous studies that aim to evolve from its classificatory character only, to a process of complete diagnosis of the evolution and level of knowledge of the student in all the objectives of a subject. This perspective, however, triggers difficulties, making it necessary to establish precise evaluative metrics and a detailed monitoring of the development process of each student in each content. This research aims to present a system for authoring evaluation resources and monitoring of school evaluation, modelled to support teachers and students in the process of learning verification, allowing a more precise mapping of the understanding of each content of a subject. To do so, using the methodology Design Science Research, a bibliographic study was carried out in the context of school evaluation and its main difficulties, as well as the analysis educational systems to support the modelling of the tool. The presented solution was validated through tests with potential users, followed by a survey about the usage experience.
  • Imagem de Miniatura
    Item
    Uma atualização de um mapeamento sistemático sobre desenvolvimento ágil para equipes distribuídas: resultados preliminares e boas práticas em evidência
    (2019-07-11) Miranda, Rafael Marques; Rocha, Rodrigo Gusmão de Carvalho; http://lattes.cnpq.br/4654692334430085; http://lattes.cnpq.br/6488307420823162
    In the rise in the last decade, Global Software Development, which has as its concept the distribution of its development processes, has been investigated by the industry and academia, in order to increase the base of the best experiences and resources used in distributed projects. In another context, Agile Development has become one of the most used software development methodologies in the industry. This method has come up with some new concepts, such as frequent deliveries, better communication, special focus on coding, among others. In the literature new challenges are pointed out in the adoption of agile in GSD projects because the agile practices are based on informal communication and of little documentation, it was defined for a co-located environment whereas the GSD needs a clear way of disseminating knowledge supported by tools and by nature is distributed. However, the evidence that agile development in global development contexts, despite the apparent dichotomy, has been successful with its agile practices supported by synchronous and asynchronous communication tools. This work aimed to identify, analyze and synthesize the studies on agile methods and their practices in the context of GSD, through an update of Systematic Mapping on agile development for distributed teams, in this way, to make a preliminary explanation of the results and to show a good practice. The results were addressed to the research questions raised in the initial phase of the work, it was possible to draw a parallel between the information synthesized in the previous mapping about the challenges, practices, tools and agile methods in the context of GSD with this extension, in continuity. Finally, based on the results, it was possible to verify the most frequently used practices during the period 2008 to 2018, allowing to highlight a set of good practices. This work may benefit future researchers and professionals in this area, with the results of updating the mapping data, can serve as a theoretical basis for processes of an agile global software development model (AGSD) focused on good agile practices in the context of GSD, such as to the exploration of other research questions as well.
  • Imagem de Miniatura
    Item
    Algoritmos Exatos e Heurísticos para os Problemas de Steiner e de Conexão de Terminais com Número Restrito de Roteadores e Elos
    (2019-07-08) Libório, Felipe Tenório de Holanda Rocha; Pinheiro, Rian Gabriel Santos; http://lattes.cnpq.br/1447954471683870; http://lattes.cnpq.br/1881833645223497
    This work presents solutions for the Terminal Connection Problem with Bounded Number of Routers and Links (TCP). The TCP consists in finding a spanning tree to a subset of vertices of a given graph. It differentiates itself from the Steiner’s problem by having additional restrictions to the number of Steiner nodes allowed in a solution. The TCP can be applied in the same types of problems on which you can make use of the Steiner’s problem, which includes: VLSI circuit project; multicast routing; to model and solve telecomunications planning problems; and electricity distribution. As the TCP is a generalization on the Steiner’s problem in graphs, tests in instances of this problem were also made. Moreover, a multitude of instances of different difficulty levels was generated for the TCP, instances which posterior works on the problem will be ablem to use for comparing the performance of future solutions. The results obtained for the Steiner Problem instances were compared to those of another solution found in the literature, and the metaheuristic utilised to solve them, the Large Neighborhood Search (LNS), has shown to be viable as a simple and low cost, both in time and in memory requirements, way of reaching satisfactory results for this problem. Achieving a mean error below 2% for the evaluated instances, depending on the time given for the aolgorithm. Furthermore, this is the first known work to present a solution to the TCP. Besides the LNS metaheurístic, an exact solution was implemented by the means of the IMB ILOG CPLEX solver. For the tested instances whose optimal values were found by the presented exact solution, the LNS implementation managed to get an mean error rate of 0.66% meanwhile having a run time 22 times smaller than that of the exact solution and found the optimal value in 14 out of the 18 tried instances. The results obtained on the solving of the TCP instances, alongside the generated instances themselves, have formed a base for the comparison of future solutions that may come to be Proposed for this problem.
  • Imagem de Miniatura
    Item
    Análise das técnicas de segurança do framework laravel contra ataques as aplicações web
    (2019-07-11) Pacheco, Felipe Guimarães; Vanderlei, Igor Medeiros; http://lattes.cnpq.br/7448139435512224
    Web applications are increasingly present in our daily lives, helping us in various tasks, such as banking transactions, shopping sites, business systems, social networks, among others. A good part of these applications store and process data provided by the customer, where they are often confidential and need protection. To streamline the application development delivery process, many developers choose to make use of frameworks in designing the features of their projects. As a result, information security is not prioritized, and may cause future problems, such as attacks on web applications. Attacks on web applications are commonplace among crackers, given that these applications are not limited to an organization’s internal attacks alone, but to any user who access the internet. In the light of this, this work was developed that addresses an exploratory research aiming to present the integrated security techniques to the Laravel framework, analyzing each vulnerability by performing con-tra tests each using penetration tools and checking the resources present in the framework. The ten vulnerabilities listed by OWASP Top Ten, one of the data security projects developed by OWASP (Open Web Application Security Project) and aims to present the ten vulnerabilities of Internet applications that can cause more damage to systems on the Internet. Throughout the experiments, it is possible to illustrate to which vulnerabilities Laravel has defense mechanisms and how developers can use them to protect user data and against which vulnerabilities the organization does not have resources against external attacks.
  • Imagem de Miniatura
    Item
    Controle de emissão e validação de diplomas digitais utilizando Blockchain
    (2019-01-25) Morais, Anderson Melo de; Mendonça, Sérgio Francisco Tavares de Oliveira; http://lattes.cnpq.br/6313698968060384; http://lattes.cnpq.br/4825772150496499
    With the development of new technologies, new challenges also arise regarding the security of the many information that is constantly generated. This paper aims to evaluate the feasibility of using Blockchain to guarantee security in the issuance of digital diplomas by Higher Education Institutions and to develop an application to exemplify the process of issuing and validating a digital document. For this, a bibliographical research was carried out to understand the operation of a Blockchain network and the level of security presented by it, also sought to understand how the process of issuing a diploma is given and what security mechanisms traditionally used for data protection. Next, a web system was implemented, using modern development tools, in order to demonstrate the issuance of a digital diploma and the use of a local Blockchain network to register this document. The application also allows the validation of documents issued using a multi-level query system, which verifies that the document is registered in the application database and the local Blockchain, only to confirm its authenticity.