699 research outputs found

    Uma perspectiva naturalista do usuário de design

    Get PDF
    Este estudo reúne uma série de informações sobre design centrado no usuário e naturalismo. Através da compilação e análise de dados bibliográficos, breves conhecimentos sobre cada tema foram relacionados com o intuito de apresentar uma perspectiva naturalista do usuário de produtos de design. O método de pesquisa utilizado foi a investigação bibliográfica, que abrange as áreas de design, design centrado no usuário e naturalismo filosófico. Exemplificando as relações entre essas áreas, alguns conhecimentos obtidos pela neurociência fornecem uma perspectiva naturalista do usuário de design, de modo a mostrar como fatores biológicos podem influenciar sua interação com objetos de design.Abstract: This study collects a range of information about user-centered design and naturalism. Through the compilation and analysis of bibliographic data, brief knowledge of each theme were related to present a naturalistic perspective of the user of design products. The research method employed was a bibliographic search, covering the areas of design, user-centered design and philosophical naturalism. Exemplifying the relations between these areas, some knowledge from neuroscience provide a naturalistic perspective of the user of design products, in order to show how biological factors influence his interaction with design objects

    Editorial: crime patterns in time and space: the dynamics of crime opportunities in urban areas

    Get PDF
    The routine activity approach and associated crime pattern theory emphasise how crime emerges from spatio-temporal routines. In order to understand this crime should be studied in both space and time. However, the bulk of research into crime patterns and related activities has investigated the spatial distributions of crime, neglecting the temporal dimension. Specifically, disaggregation of crime by place and by time, for example hour of day, day of week, month of year, season, or school day versus none school day, is extremely relevant to theory. Modern data make such spatio-temporal disaggregation increasingly feasible, as exemplified in this special issue. First, much larger data files allow disaggregation of crime data into temporal and spatial slices. Second, new forms of data are generated by modern technologies, allowing innovative and new forms of analyses. Crime pattern analyses and routine activity inquiries are now able to explore avenues not previously available. The unique collection of nine papers in this thematic issue specifically examine spatio-temporal patterns of crime to; demonstrate the value of this approach for advancing knowledge in the field; consider how this informs our theoretical understanding of the manifestations of crime in time and space; to consider the prevention implications of this; and to raise awareness of the need for further spatio-temporal research into crime event

    Local critical behaviour at aperiodic surface extended perturbation in the Ising quantum chain

    Full text link
    The surface critical behaviour of the semi--infinite one--dimensional quantum Ising model in a transverse field is studied in the presence of an aperiodic surface extended modulation. The perturbed couplings are distributed according to a generalized Fredholm sequence, leading to a marginal perturbation and varying surface exponents. The surface magnetic exponents are calculated exactly whereas the expression of the surface energy density exponent is conjectured from a finite--size scaling study. The system displays surface order at the bulk critical point, above a critical value of the modulation amplitude. It may be considered as a discrete realization of the Hilhorst--van Leeuwen model.Comment: 13 pages, TeX file + 6 figures, epsf neede

    Automated Refactoring of Object Oriented Code into Aspects

    Get PDF
    This paper presents a human-guided automated approach to refactoring object oriented programs to the aspect oriented paradigm. The approach is based upon the iterative application of four steps: discovery, enabling, selection, and refactoring. After discovering potentially applicable refactorings, the enabling step transforms the code to improve refactorability. During the selection phase the particular refactorings to apply are chosen. Finally, the refactoring phase transforms the code by moving the selected code to a new aspect. This paper presents the results of an evaluation in which one of the crosscutting concerns of a 40,000 LoC program (JHotDraw) is refactore

    Role of Estrogen and Estrogen Receptor in GH-Secreting Adenomas

    Get PDF
    Acromegaly is a rare disease with several systemic complications that may lead to increased overall morbidity and mortality. Despite several available treatments, ranging from transsphenoidal resection of GH-producing adenomas to different medical therapies, complete hormonal control is not achieved in some cases. Some decades ago, estrogens were first used to treat acromegaly, resulting in a significant decrease in IGF1 levels. However, due to the consequent side effects of the high dose utilized, this treatment was later abandoned. The evidence that estrogens are able to blunt GH activity also derives from the evidence that women with GH deficiency taking oral estro-progestins pills need higher doses of GH replacement therapy. In recent years, the role of estrogens and Selective Estrogens Receptor Modulators (SERMs) in acromegaly treatment has been re-evaluated, especially considering poor control of the disease under first- and second-line medical treatment. In this review, we analyze the state of the art concerning the impact of estrogen and SERMs on the GH/IGF1 axis, focusing on molecular pathways and the possible implications for acromegaly treatment
    corecore