Presentation EAMC 2018
I, the copyright holder of this work, release this work into the
public domain. This applies worldwide. In some countries this may
not be legally possible; if so: I grant anyone the right to use
this work for any purpose, without any conditions, unless such
conditions are required by law.
The purpose of this study is to perform an analysis on a discussion of REST creator Roy Thomas Fielding, where he exposes a critique of implementations that claim to use the architectural model proposed in his thesis. Implementations of APIs that manifest themselves as RESTFUL are used as object of study. Architectural Constraints are used which refer to important features of the model to verify these implementations, where they must succeed in these comparisons with the constraints, so that they can prove to implement the model. The conclusion is that there are in fact several implementations that are improperly named, where they have several similarities to the model in their implementation, but do not agree with the constraints that must be implemented so that it can be considered an instance of the model.
Este artigo tem como objetivo relatar e detalhar a construção de um conversor buck-boost. Cuja a função deste é converter uma tensão cc (corrente contínua) de entrada, em outra tensão cc em sua saída, de valor mais elevado ou inferior dependendo de sua configuração. Destaca-se aqui o uso de um semi condutor MOSFET que funciona como uma chave controladora. Na elabiração deste está destacada o funcionamento, principais características e toda a parte de simulação e comprovação prática deste conversor.
Optimization is a crucial step in the development context of algorithms, where depending on the purpose, different levels of optimization can be applied. Thus, the Network Dijkstra algorithm has been choosen in order to perform the compilation and execution with some levels of optimization from the GCC, measuring its execution time, number of cycles and instructions. In the present work, it is also discussed how the front-end and middle-end analyzes are performed in GCC.