TCC - Bacharelado em Ciência da Computação (Sede)
URI permanente para esta coleçãohttps://arandu.ufrpe.br/handle/123456789/415
Navegar
Item Proposta de um meta-modelo para avaliação de robutez de redes de computadores com base na combinação de métricas topológicas(2017) Barros, Gustavo Henrique Pinto Soares de; Araújo, Danilo Ricardo Barbosa de; http://lattes.cnpq.br/2708354422178489; http://lattes.cnpq.br/1155438495823549A growing demand for resilience and robustness in the field of computer networks rises from the great diversity of its aplications. The modern sistems display an increasing critical nature, and the occurrence of perturbations may cause significant losses either human, monetary or environmental. Optical fiber acts on the current systems as the main mean of transportation. Among its variety of applications, which are heavily dependant on its infrastructure, some of them are the internet, cable television and high transmission rates systems. The non-homogeneous and complex topology nature of these networks determine their increasing avaluation cost. For these reasons, optical networks are the study object of this research. Quantifying the robustness of networks is usually accomplished by nodes and links failure simulations, on which the monetary and temporal cost scales proportionally to the network size. This research analyzes the possibility of obtaining values of robustness metrics in complex networks which would originally be obtained from simulations through an alternative regression method. This method has as inputs the values of simple metrics which are obtained through applications other than simulations and uses artificial neural networks to forecast simulation results in a smaller period. The results are obtained through a comparison between the proposed model output and the node and link failure simulation output. They indicate that the proposed model presents a satisfactory error margin, between 10−³ and 10−9, thus the simulation values were reached successfully through regression on a smaller time period.Item Projeto integrado de redes ópticas de longa distância e Metropolitanas usando algoritmos de inteligência computacional: estudo de caso para o estado de Pernambuco(2017) Nascimento, Jorge Candeias do; Araújo, Danilo Ricardo Barbosa de; http://lattes.cnpq.br/2708354422178489; http://lattes.cnpq.br/8065833426856653Nowadays, several network technologies with different prices and adaptations are appearing in the market. A network topology project involves several metrics; the metrics are used to evaluate a project. In the evaluation we use metrics such as robustness metrics (which help in the network’s ability to recover from a failure), blocking probability and energy consumption. The best way to optimize infrastructure in a network design would be to use the latest technologies, only the most efficient ones, even if such technologies are more expensive. However, of the metrics to be considered in this type of project, one of them is the cost (capital employed). Therefore, it is not always feasible to use the most expensive ones on the market. Many technical issues can help control the metrics of these projects, among which is the network topology (link interconnection). Multiobjective evolutionary algorithms (algorithms inspired by the evolution of the species) have been studied in the state of the art for the conception of network topologies. At the same time, clustering algorithms (algorithms specialized in separating samples into groups) have been used in other types of network studies. This study aimed to make use of computational intelligence algorithms in the construction of a network topology project, using the state of Pernambuco as a case study. In a first stage of the study, a clustering algorithm was used in the division of the state into groups. The intention of this part of the work was to measure the coverage of the network in relation to the entire size of the state, and thus ensure the completeness of the network. In addition, the clustering stage also aimed to propose a cost control model through the merging of different technologies for the network (Passive or active) depending on the function of the network segment. In a second step, an evolutionary multiobjective algorithm was used to compose several network topologies that served the clusters created in the previous step. This algorithm has evolved the various network topologies in order to improve four metrics, Blocking Probability, Cost, Energy Consumption and Algebraic Connectivity. The multiobjective algorithm was designed as a memetic algorithm, and, after a set of executions, the algorithm performances were compared with and without the alteration. The results of the tests, in the first stage, showed that the clustering techniques are quite efficient and adaptable to the proposed goal both in terms of network completeness and cost control. Already in the second stage, or multiobjective search stage, it was verified, through the use of a quality indicator (hypervolume), that there was an improvement of the algorithm in relation to convergence and diversity to the Pareto curve, with the use in its new form as memetic algorithm.Item Detecção de aplicativos maliciosos no sistema operacional android por meio de análise estática automatizada(2017-09-06) Silva, Diógenes José Carvalho da; Lins, Fernando Antonio Aires; http://lattes.cnpq.br/2475965771605110; http://lattes.cnpq.br/0986435158192139The mobile applications platform known as Android provides a wide an open environment of application development to all kinds of software, however this freedom can bring possible software security vulnerabilities that can be used unfortunately to create threats to the operation system. There are vulnerabilities that comes from software and hardware that allows the creation of threats called: spyware, diverse kinds of malware, and with raising popularity, the ransomware. In this case is necessary to build application analysis to find out threats that are increasing in size and complexity. To accomplish this task, this research proposes a technique that combines multiple strategies to orchestrate a new technique that can detect threats and vulnerabilities inside applications developed to the Android mobile operational system. The strategy combines automatic static analysis and threat profile identification by metadata from an external source. Using techniques like web crawling to collect metadata from application stores, we generated a data set with 1000 applications, which 500 are infected and 500 aren't, using balancing technique such as super sampling, extraction and selection of features like: TF-IDF, frequency of terms, feature conversion from nominal to binary and normalization. Using the generated data set to create classification models with the most used machine learning algorithms used by other researchers, we could provide precision metrics, false positives, and false negatives at acceptable rates, comparable to other researches that presents the same performance metrics.Item Uma abordagem para tradução de uma linguagem de programação de robôs para um modelo formal(2018) Pereira, Iverson Luís; Nogueira, Sidney de Carvalho; http://lattes.cnpq.br/9171224058305522; http://lattes.cnpq.br/1186672408246777There is an increasing interest in virtual robot programming environments for educational purposes in recent years. These environments are an alternative to the use of real robots, which have a high acquisition value. Automatic verification of robot programs is a demand of students and teachers that expect to have fast and automatic feed back about the correctness of robot programs.However,no free software provides an automatic verification of virtual robot programs. This work proposes an approach for the automatic verification of virtual robot programs authored in the educational language called ROBO. We propose a compiler that reads programs written in ROBO and translates its source code into a formal notation called CSP (Communicating Sequential Processes), which is the input to a model checking tool called FDR (FailuresDivergences Refinement). The compiler was implemented using the facilities of the Spoofax framework, which is used to define a parser for the ROBO language and a set of translation rules from ROBO to CSP. This work removes a limitation of our previous verification approach that does not perform the verification of ROBO programs containing variables and procedures. A significant contribution is the extension of the verification approach to allow the automatic analysis of ROBO programs with variables and procedures.The extension consists of the modification of the compiler Grammar by the inclusion of variables and procedures and the inclusion of translation rules that define the formal semantics for the elements added into the grammar.Moreover, the work proposes a tool that makes transparent the translation process from ROBO to CSP and the automatic verification using FDR.We validate the approach using the proposed tool to verify the behavior of a ROBO program with variables and procedures.Item Desenvolvimento de um algoritmo baseado em lógica fuzzy para segmentação de lesões em imagens de mamografia digital(2018) Bezerra, Kallebe Felipe Pereira; Cordeiro, Filipe Rolim; http://lattes.cnpq.br/4807739914511076; http://lattes.cnpq.br/3067789764865525Breast cancer has been a growing problem for women around the world. According to the World Health Organization (WHO), it is the most common type of cancer among women, with increasing participation, making it one of the most fatal types of cancer worldwide. In Brazil, it is the leading cause of cancer death among women, with 59.000 new cases of cancer in 2018, with an incidence of about 59,70 cases per 100,000 women. Several methods of prevention have been developed, but one of the most effective methods for the detection of lesions is the diagnosis through digital mammography. However, the interpretation of mammography can be a difficult task even for a specialist, since the analysis is affected by several factors, such as image quality, radiologist experience and type of lesion. 12% to 30% of breast cancer cases are not detected because of bad mammography interpretation. The main objective of this work is the study and development of a tumor segmentation technique in mammography images using Fuzzy logic. It aims to insert the Fuzzy approach in the algorithm Random Walker, in order to propose a new solution for lesion segmentation. It aims to insert the Fuzzy approach in the algorithm Random Walker, in order to propose a new solution for segmentation of tumors. Finally, this work compare the results with state of the art techniques. The database has 322 mammography images obtained from 161 patients. However, only 57 of the images contain masses. Results showed that the proposed approach of the Random Walker with Fuzzy logic, used for mass segmentation, obtained better results when compared with the classic Walker Random algorithm, besides decreasing the user effort in the algorithm initialization step.Item Aplicação do processo de design no desenvolvimento de um produto de software para suporte à inovação social(2018) Santos, Juliana Ferreira dos; Souza, Ricardo André Cavalcante de; http://lattes.cnpq.br/7101881357139219; http://lattes.cnpq.br/8780029383567585Innovation can be described as a good Idea of solving a relevant problem implemented. Social Innovation is na innovation that at the same time meets a social need and creates new relationships or social collaborations. Social innovations of high impact and high scalability are generally aided by ICT(InformationandCommunicationTechnology).In thiscontext,this work presents the application of the Design Process for the inception, design and implementation of a software product to support Social Innovation. To do so, it was necessary to align the Design Process with a Social Innovation Model. The social innovation treated in this work consists in fomenting a social network of rainfall (Rainwater measurement) to support several áreas (agriculture, livestock, mobility, etc.) that use climatologic information in decision making. The developed software product maintains the Record and visualization of the pluviometric information shared by the people and consists of the first implemented capacity of a Time and Weather Collaboration Network.Item Abordagem híbrida e independente de domínio para extração de aspectos na análise de sentimentos(2018) Lins, André Lucas Machado; Lima, Rinaldo José de; http://lattes.cnpq.br/7645118086647340; http://lattes.cnpq.br/3233947254235611Opinions are central in most of the human activities and are keys of influence to our behaviors. Our beliefs, perception of reality and our choices are in a considerable degree, influenced by how people see and evaluate the world. In view of this statement theSentimentAnalysis(SA)hasbeengrowingconstantly,thepossibilityofunderstand people’sfeelingsandopinionsaboutcertainsubjectsgetseveryoneexcited.Sentiment Analysisisthecomputationalstudyofpeople’sopinions,attitudesandemotionsabout some entity. The literature about Sentiment Analysis is pretty wide, having too many ways of execute such tasks. A variation of SA called Aspect based Sentiment Analysis (ABSA) has been receiving researchers attention. In this approach feelings are identified in relation to sentence aspects, in order to discern those that are treated in eachsentenceordocument.ABSAisdividedinthreemajortaskswhicharetheextraction,classificationandaggregationoftheaspect,havingaspectextractionasthemost complextask.There’sseveralapproachestosolvetheaspectextractiontask,although manyoftheseapproachesaredomaindependent,makingdifficulttoreplicatetheseapproaches to domains that does not have the same features. Therefore, this work aims topurposeadomainindependenthybridmethodtoaspectsextraction,thatconsistsin fourmajorsteps.Thefirstoneidentifyallthepossibleaspectsoutofsemanticrulesfor eachsentence.Afterthisstep,willbegeneratedalexicalofallthesentenceshavingthe aspectsandmostrelevantfeelings.Inthefollowstepismadethepruningofpossibleaspectsusingsemanticrulesthroughthelexicalofaspectsandfeelingsmadepreviously. Lastly,ismadeaselectionamongtheremainingaspectsbyadynamicthreshold.This purpose was evaluated in the Semeval’s dataset, containing opinions about several aspects related to restaurants and laptops, using the most adopted evaluation metrics in literature. The experimental results imply that the proposed method is competitive when it’s compared to many other methods dependents and independents of state of art domain.Item Estudo comparativo de técnicas de seleção de contextos em sistemas de recomendação de domínio cruzado sensivéis ao contexto(2018) Brito, Victor Sales de; Silva, Douglas Véras e; http://lattes.cnpq.br/2969243668455081; http://lattes.cnpq.br/0340874538265508There are several approaches to implement a recommendation system, such as CrossDomain Context-Aware Recommendation Systems (CD-CARS), which was used in this work because it enables quality improvement of recommendations using multiple domains (e.g. books, movies and musics), while taking into account the use of contexts (e.g. season, time, company and location). However, caution is needed in using contexts to make items suggestions, since the contexts may impair the recommendation performance when they are considered “irrelevants”. Therefore, the selection of relevant contexts is a key factor for the development of CD-CARS, and there is a lack of papers for selection techniques in datasets with contextual information and cross-domain. Thus, this work applied the Information Gain (IG), Chi-square test, Minimum Redundancy Maximum Relevance (MRMR) and Monte Carlo Feature Selection (MCFS) techniques in twelve datasets with three different contextual dimensions (time, location and company) and distinct domains (books, television and musics). Finally, from the results obtained, the MCFS technique was able to classify the relevance of the contexts in a more satisfactory way than other techniques.Item Gamificação aplicada na gestão de incertezas em projetos de software(2018) Duarte, Thiago Augusto Costa; Marinho, Marcelo Luiz Monteiro; http://lattes.cnpq.br/3362360567612060; http://lattes.cnpq.br/5077077457690723The software market undergoes constant changes and new technologies are developed frequently, which stimulates competition between software companies. This environment brings a remarkable number of failures and uncertainties that can lead to failure. Based on the above considerations, it is important to highlight the relevance of a management that considers the importance of uncertainty management, which can directly affect the success of the project. The objective of this work is to propose a management approach to gamification uncertainties, in order to motivate the use of uncertainty management on an ongoing basis and thus increase the competitive advantages of organizations. Gamification is the application of game elements to processes in the real world, trying to achieve specific business goals by modifying people's behavior. Therefore, through the literature review, we sought to identify practices, techniques and strategies to support the management of uncertainties. Next, a gamification framework was elaborated, mapping the practices, techniques and uncertainty management strategies that can be explored in each orientation of the framework.Finally, the gamification uncertainty management approach was proposed. In this way, it is hoped to encourage the continuous use of the management of uncertainties in the organizations with the use of gamificationItem O consumo de internet no processo de construção social da identidade de adolescentes integrantes de uma ONG em Jaboatão dos Guararapes(2018) Reis, Juliane de Santana; Albuquerque, Hortência Cruz de; http://lattes.cnpq.br/4316127961561473The digital era, through the internet, had its fruit in the expansion and development of the capitalist system, which provided the possibility of new forms of communication in the globalized technological context. Thus, virtual entertainment gains more and more space for use in the daily lives of families. In this way, with the advancement of information and communication technology, we have the facility to make purchases through the internet, make payments to accounts, talk to friends who are distant, know news from Brazil and the world, all this in real time, which seems to be a facilitator for the interaction of adolescents, since much dominates these tools. Adolescence consists of a phase of changes, both physiological, psychic and social, and considering that in the midst of these transformations, there is the search for identity, which comes to be present in the questions of adolescents and that will lead to countless experiences that will be intensely experienced throughout adolescence. However, how have teens dealt with the internet? Thus, this work is the result of the experience of compulsory supervised internship at an NGO in Jaboatão dos Guararapes, and aimed to analyze the influence of Internet consumption on the process of social construction of adolescents' identity. The methodological procedures used were bibliographic review, participant observation and semi-structured questionnaire application. The research is exploratory, descriptive and qualitative. And the results point out that the internet is configured as a more comprehensive medium for interaction and socialization of adolescents, being essential the consumption of technology / internet since they associate it with the synonym of pleasure and leisure, and hence it is necessary to discuss more on the relation of consumption of technologies and the behavior of the adolescents before the society of consumption.Item Detecção de linhas que separam o mar da areia e o mar do céu em imagens de praia(2018) Silva, Jeremias Leite da; Macário Filho, Valmir; http://lattes.cnpq.br/4346898674852080The border of the metropolitan region of Pernambuco has been presented several incidents from sharks and some of these cases were fatal. In order to reduce the incidents, this work proposes an approach for the segmentation of the sea as part of a monitoring system for bathers through cameras. Once one or more persons are identified within the risk zone, the system will issue an alert to central monitoring, and the nearest lifeguard would be alerted to move to the location. In order for the system to identify the people in the image, the system must be able to identify the beach region in the image in order to segment them and identify the bathers. The strip of water is formed by two borders, one with the sky and the other with sand. The boundary with the sky is a straight horizontal line called the horizon line, and the boundary with the sand is a contour formed by the boundary of the water with the sand that is called the shoreline. This work aims to propose algorithms for the detection of the horizon and coastlines for sea segmentation, which represents one of the main steps for the monitoring system of beach bather images. In this work four horizon-line detection algorithms were analyzed to evaluate which of these obtains the best detection result. Two state-of-the-art algorithms were analyzed: Lie et al. and that of Ahmad et al. Both are works for the detection of the horizon line in mountain images. Two other algorithms were contributions of this work: the Canny Edge Detection and Multi-Stage Graph Detection (DLHCGME) and Detection of Horizon Line with Sobel and Hough Transform (DLHSTH). Two new algorithms were proposed for Coastline Detection: Coastline Detection with Canny Edge Detection and Multi-Stage Graphs (DLCCGME) and Coastline Detection based on Contour of the Hue Channel (DLCCCH). In the detection of the horizon line in images without occlusions the experiments show that the DLHCGME obtained the best result with an error rate of 0.47 and the second was the DLHSTH with 1.11 and for images with occlusions the DLHSTH obtained the best result with an error rate of 1.98 and the DLHCGME was the second best result with 2.62.Item Classificação de banhistas na faixa segura de praia(2018) Silva, Ricardo Luna da; Macário Filho, Valmir; http://lattes.cnpq.br/4346898674852080; http://lattes.cnpq.br/3088880066515750In order to avoid risks in aquatic environments, drownings and shark attack, beach areas should be constantly monitored. When necessary, rescue workers must respond quickly to the case. This work aims to propose a classification algorithm for people as part of a system for automatic monitoring in beach areas.Certain environmental factors are quitech allenging, such as varying brightness on cloudy days,the position of the sun at different times of the day, difficulty in segmenting images, submerged people, and position away from the camera. For this type of problem in the literature is commonly found, for people detection, the use of image descriptors in conjunction with a classifier. This work performs a beach image study using the following image descriptors and their combinations in pairs: Hu Moments, Zernike Moments, Gabor Filter, Guided Gradient Histogram(HOG),Local Binary Patterns(LBP) and Haar.Inaddition,a dimensionality reduction technique (PCA) is applied for feature selection. The detection rate is evaluated with the following classifiers: text it Random Forest, casca de classifier and textit Support Vector Machine (SVM) with linear and radial textit kernel. The experiments demonstrated that the SVM classifier with radial kernel using the HOG and LBP descriptors applying the PCA technique showed promising results, obtaining 90.31% accuracyItem Uma proposta de métricas para avaliar a efetividade da execução de testes de software(2018) Barreto, Pedro Pires; Furtado, Ana Paula Carvalho Cavalcanti; http://lattes.cnpq.br/5862330768739698; http://lattes.cnpq.br/3199247203599540The market demands high-quality software, which is delivered on time at the agreed cost. One of the main software industries’ worries is the assurance of the created product quality that has generated the establishment of the software development associated with the main concepts of software quality. Many companies have been investing in the testing process to prevent and identify defects. Software testing is an important ally in quality assurance, which justifies a portion of the development costs being related to testing activities. During the development lifecycle and the software maintenance, tests are executed with the purpose of ensuring that the number of defects is minimized before the final product delivers to the client. The purpose of this research is to develop an approach to evaluate the execution of software test. To achieve this goal, it was used the Goal-Question-Metric approach, which seeks to generate a set of metrics according to the objectives defined by the need of the situation. After the definition of the objectives to evaluate a software test execution, it was proposed the adoption of a set of metrics to facilitate the monitoring and improvement of the software tests execution. To validate the set of proposed metrics, a focus group was conducted with specialists in the area of software testing. Thus, this research offers contributions to the metrics used to evaluate the execution of software tests that currently means a piece with a high cost for software companies.Item Avaliação da usabilidade de um aplicativo que ajude no aprendizado de crianças autistas nas suas atividades de vida diária(2018-08-14) Castro, Alan Batista de; Falcão, Taciana Pontual da Rocha; http://lattes.cnpq.br/5706959249737319This work presents the development and evaluation of “Rotinando”, a prototype of an educational software to support autistic children in their learning to perform their daily activities of life. Rotinando follows the User-Centered Design methodology and is based on building a simple and efficient interface, adequate for the users, applying techniques of human-computer interaction. The system has two forms of access: one for the user with the profile of guardian of the child with autism, and the other for the child, thus allowing the guardians to follow and configure the activities completed by the child. The field research for ideation and evaluation of the prototype was carried out at CEMPI - Centro Médico Psicopedagógico Infantil do Recife, with interviews and focus groups with the professionals working in the institution and with interviews with the tutors of the children who attend the institution. The results showed that the system is useful for the target users, and presents an easy-to-understand interface, indicating that it is a good system for teaching classic autistic children in their daily life activities.Item Aprendizado profundo com capacidade computacional reduzida: uma aplicação à quebra de CAPTCHAs(2018-08-16) Melo, Diogo Felipe Félix de; Sampaio, Pablo Azevedo; http://lattes.cnpq.br/8865836949700771; http://lattes.cnpq.br/2213650736070295During the last decade, Deep Neural Networks has been shown to be a powerfull machine learn technique. Generally, to obtain relevant results, these techniques require high computacional power and large volumes of data, which can be a limiting factor on some cases. Neverthless, a careful project of trainig and archtecture may help to reduce these requirements. In the this work we present a comparative approach to the application of deep neural networks to text based CAPTCHAs as a way to cope with these limitations. We studied models that are capable of learn to segment and identify the text content of images, only based on examples. By experimentation of different hiper-parameters and architectures, we were capable to obtain a final model with 96.06% of token prediction accuracy in approximately 3 hours of training in a simple personal computer.Item Desenvolvimento de um sistema com dispositivo portátil para auxílio no diagnóstico de coarctação da artéria aorta em neonatos(2018-08-16) Amorim, Jéssyca Karolinny da Silva; Barros, Abner Corrêa; http://lattes.cnpq.br/3825998752196688; http://lattes.cnpq.br/4499057406814333In recent years, advances in technology have brought unquestionable benefits to human life. Especially in the medical field, where some techniques and tests that were considered technically and economically unviable, have become usual. However, in some cases, the actual technology has not been sufficient to provide an early diagnosis of congenital diseases. it happens with Congenital Heart Disease (CC), with the most common CC being the Coarctation of the Aorta (CoA). Currently, available diagnostic methods are ineffective, leading to late diagnosis, which can lead to cardiac collapse, neurological damage, and death. In this way, the present work aims to propose an alternative to the development of a computational system that captures, by a low cost and mobile embedded device, and evaluate the photoplethysmographic (PPG) tags of neonates in order to aid in the identification and in diagnosis of CoA.Item Detecção de mãos através da combinação de técnicas de detecção de tom de pele e movimento para background complexo(2018-08-18) Sá, Vinícius Cavalcanti Nogueira de; Macário Filho, Valmir; http://lattes.cnpq.br/4346898674852080; http://lattes.cnpq.br/1197232523837982Technology has a social function to facilitate the life of its users, with its evolution, and with the emergence of globalization, the access to information and communication in general have become much more accessible for the general population. Nevertheless, groups with special needs still suffer from the lack of products and systems that can meet their needs. This work will make use of pre-existing technologies that can be used to make life easier for these users, especially deaf users. We live in a world where we are faced with an immensity of devices with cameras, or of equipment that can be connected to one, the computer vision becomes very important or otherwise, essential from this reality. Many areas use images to automate or assist their activities within their segments, whether they are for entertainment, industry or others. Thus, it is possible to realize the importance of image processing as a solution of problems in different areas. In this work it was used image processing to elaborate a possible solution in the hand recognition area, the use of the hand as a way of communication is evident. We can see it as a main character not only in everyday communication through gestures, but we can also use it in the control of computational interfaces, in the aid of immersion in virtual reality, in the manipulation of virtual objects in augmented reality or even as facilitator in the accessibility from the communication by signals, being this last example the key point of this work, that aims to facilitate the communication between deaf and possible users interested in the sign language through a new approach. Hand recognition was performed through a hybrid approach involving skin tone segmentation and movement, this approach was chosen to overcome the difficulties that each type of segmentation brings. The best hit rate we had with this approach was 76.4% indoors and 45.15% in outdoor environment.Item Refatoração de arquiteturas monolíticas em microserviços no contexto de desenvolvimento de software global(2019) Gomes, Thiago Henrique Ferreira; Marinho, Marcelo Luiz Monteiro; http://lattes.cnpq.br/3362360567612060; http://lattes.cnpq.br/2527989443347018In the past few years, the Global Software Development has been adopted by many companies, way as they can benefit from the advantages linked to the use of this practice, from the reduction of costs and time to market. However, this technique brings many challenges to the teams who use it. With this work, we aim to map the strategies of refactoring applications aligned with the architectural characteristics demanded bythe distributed software development environment. For this, we used the benefits de-riving from using a modern software architecture, the microservices architecture. We also analyze what kind of practices we could apply to evolve the current applications that use an old architecture, the monolithic architecture, to this architecture based on microservices. We conduct two systematic mappings, to analyze the state-of-art of soft-ware architecture on the Global Software Development environment and refactoring of monolithic to microservices applications, respectively. By the end, we execute an analysis to identify the practices of refactoring, and the benefits of using the microservices architecture can contribute to the success of a project on the GSD environment. Withthis, we were able to conclude that all the practices found during this work have positive impacts inside of the GSD environment, and we relate to the necessities of the GSD environment with the offered benefits by using the microservice architectureItem A Diagnoses Instrument for Software Engineers’ Soft Skills(2019) Bastos, Thiago Alves; Sampaio, Suzana Cândido de Barros; http://lattes.cnpq.br/0066131495297081; http://lattes.cnpq.br/9312633017399857The use of Agile Methodologies among the Software Development Projects have beingin creasing in recent years. These methodologies have a set of values and principles which are people-centered, increasing the importance of the people factors for the success of projects using Agile methodologies. However, these factors are not fully understood by practitioners who work within Agile teams. This reality created a gap between what the companies are expecting from their Software Engineers and whatthey really know, in terms of Soft Skills, especially in their first-time job. Therefore, basedon a Literature Review and on the opinion of the Software Engineers working withinAgile Teams in the Digital Port of Recife, this work developed the MVP of an instrument capable of making a self evaluation of the 8 most important Soft Skills for a Software Engineer working in an Agile environment. Raising awareness about the relevance ofthe Soft Skills for the career of a Software Engineer, highlighting what are the mostrelevant Soft Skills for them and also reducing the existent gap in the IT job market.Moreover, during this study it was created a Soft Skill Catalog, containing the synonyms and the definitions of these Soft Skills found in the Literature. Finally, it was possible to realize the relevance of the Soft Skills for the Software Engineers where Leader ship and Negotiation were the two less important and Communication was the most important and the developed instrument came out as an extremely important instrument, specially for the Software Engineers in the beginning of the career. More over, it was also possible to realize that there aren’t enough activities inside the companies to improve the Soft Skills of their Software Engineers and the existent activities are not aligned with their expectations.Item Verificação de refinamento em diagramas de sequência com estruturas de controle(2019) Araújo, Daniel José Freire de; Lima, Lucas Albertins de; http://lattes.cnpq.br/0465071050875729; http://lattes.cnpq.br/5219541109924367The UML language offers several types of diagrams for system modeling, among themain behavioral diagrams is the sequence diagram. The sequence diagram can beused to model system use cases simply and visually. However, the UML language asa whole presents informal models that can only be verified by human experience. Thispaper refers to the continuation of a research line that aims to formalize UML sequence diagrams and perform refinement checks between diagrams.Here we propose aninitial version of a tool capable of translating UML sequence diagrams into CSP and perform-ing a refinement check using the FDR4 verifier. The differential point of this work isthe process of formalization of combined fragments that represent control structures insequence diagrams, here we will cover fragments such asoption,alternative, paralleland loop.