Articles tagged University

Radiação de Corpo Negro
Trabalho experimental de determinação da Constante de Planck e do comportamento de Corpo Negro para um filamento de Tungstênio a partir da determinação de temperatura por resistência e por radiação eletromagnética.
Davi

PP-AR-76379
No âmbito da cadeira de Portfólio Pessoal, leccionada pelo professor Rui Santos Cruz, foi nos disponibilizada uma lista de actividades a desempenhar tendo estas como principal objectivo o desenvolvimento das imprescindíveis e cada vez mais necessárias "Soft Skills". A actividade escolhida foi um projecto colaborativo promovido pela associação de caridade "Entrajuda" e pelo Centro Paroquial do Campo Grande, sendo que, a actividade consistia na restauração e reabilitação do espaço exterior desta ultima organização.
Entre as diversas tarefas a desenvolver no espaço exterior do centro paroquial, a escolhida foi o restauro dos bancos de jardim nele existentes, o que incluía todo o trabalho de pintura e tratamento de materiais (madeira, ferro) existentes nestes bancos. O intuito de toda esta restauração centrou-se na perspectiva, de num futuro recente, poder acolher todos os beneficiários do centro num local agradável, e com condições dignas de uma instituição cuja principal preocupação é ajudar quem mais precisa.
ruifurtado

Video Forensics
Ever since the invention of the camera, people started speculating the birth of a video-camera that would take live moving-footage of anything. Videos were to be stored on tapes and reviewed as much as the taker or who owns the footage pleases. Audience depended on the owner of the video. As technology advanced, taking videos became easier and thus its sharing too. Videos can be taken from phones and uploaded right away to social media sites. Tampering with videos and changing their ownership became not only possible but simple. Different methods have been used to determine whether the videos are as they were when taken or not. Some of these methods will be investigated in this report.
Rana & Lydia

Área 2 - Mapa Logístico
Análise de uma função específica caótica (Tenda), do gênero Mapa Logístico. Análise de caracteristicas como validade do coeficiente (m) para o intervalo, pontos fixos estáveis e instáveis (1ª e 2ª ordem) e coeficiente de Lyapunov.
Davi Lazzari

Fixed Point and Steffensen's Acceleration
Math336 Project
zekeriya

Guide on using upnmthesis
upnmthesis is a LaTeX class for authoring theses that fulfill formatting specifications required by Universiti Pertahanan Nasional Malaysia (UPNM). This class and template was commissioned by the university's Centre of Graduate Studies in April, 2016, for both undergraduate and postgraduate theses. A sample file sample-thesis.tex, as well as relevant sample chapters, are included in the package. upnmthesis is available as a template on Overleaf which I recommend you modify for your own thesis write-up. (You can rename it, but I'll stick with the file name sample-thesis.tex throughout this guide.) The latest version of this template can also be downloaded from my website.
LianTze Lim

Trabalho 2 - PAC
Eficiˆencia de sistema de telhado verde extensivo em precipita¸c˜oes extremas: an´alise quantitativa e efeitos na mitiga¸c˜ao de inunda¸c˜oes urbanas.
Template downloaded from: http://www.latextemplates.com
Cristiano Lima

Geothermal Resources in Algeria
The electrical energy from renewables in Algeria contributed about 3.4\% (280 MW) in 2008 of a total power of 8.1 GWe and will reach 5\% by the year 2017 according to the Algerian Electricity and Gas Regulation Commission (CREG). The country’s target is reaching 40\% by 2030. The geothermal resources in Algeria are of low-enthalpy type. Most of these geothermal resources are located in the north of the country and generate a heat discharge of 240 MWt.
Hakim

A Review on Covert Techniques
Due to the widespread adoption of the internet and its services, protocols have been established and new ones arise every year. Either for securing connections, ciphering information or service authentication, protocols place an important part in network communications. The TCP/IP has become one of the ubiquitous protocol suites for secure communication, and therefore, a desirable target for covert information encapsulation. In this article, we will discuss the art of unauthorized data transfer - covert techniques - for data encapsulation in protocol data packets, emphasizing headers fields manipulation.
Marcelo Santos, Luis Barroso