Engenharia de Computação
URI Permanente desta comunidadehttps://repositorio.cesupa.br/handle/prefix/31
Navegar
Navegando Engenharia de Computação por Orientador "Brito, Itamar Jorge Vilhena de"
Agora exibindo 1 - 2 de 2
- Resultados por página
- Opções de Ordenação
Item MKBlack: mesa aquecida para Impressora 3D(Centro Universitário do Estado do Pará, 2018-06-11) Sousa, Luiz Fellipe dos Santos; Brito, Itamar Jorge Vilhena de; Rocha, Raphael Souza; http://lattes.cnpq.br/6636943649993665; http://lattes.cnpq.br/5143837732124006; Baganha, Alessandra Natasha Alcântara Barreiros; http://lattes.cnpq.br/0672275617505946This monograph deals with MKBlack: a heated bed for a 3D printer, emphasizing by means of comparative tests two models of heated bed, one with the pattern of circuit and heating, of commercial model most used in the market and the model proposed by the present work: to MKBlack. This shows a differentiated circuit pattern and, consequently, unusual heating in relation to the current market, thus emphasizing the decrease in 3D printing failures, usually caused by non-heating or poor heating of the heated bed. In the same tuning fork, it was emphasized that even the most widely used model on the market still needs significant changes and improvements. Since the MK2b model is Open Source, it was possible to use it as a principle for the development of the MKBlack heat bed, tested and approved satisfactorily. Such print tests have shown the possibility of printing parts of greater complexity, size and in different forms, therefore generating a large variety of parts in the production process that did not occur warping, as proven in the heating tests.Item Técnicas anti-forenses em computadores pessoais(Centro Universitário do Estado do Pará, 2017-12-04) Macêdo, Wilson Antonio Cosmo; Brito, Itamar Jorge Vilhena de; http://lattes.cnpq.br/5143837732124006; Araújo, Andrea Cristina Marques de; http://lattes.cnpq.br/7322421741765559; Carmo, Ricardo Melo Casseb do; http://lattes.cnpq.br/4933624262290855The evolution of information technologies and the increase of users in the digital environment also resulted in the increase of the number of crimes in the virtual environment, as well as the complexity of them, thus creating new challenges for the professionals involved in the computer forensics. The purpose of this study is precisely to analyze the forms that malicious users with personal computers can use to try to obstruct the expert analysis in case of suspect of crim, either by hiding or destroying data, so that the information obtained during the analyzes of this work may help in cases where the presence of any of these techniques. The approach used to carry out the study was the use of simulations of some of these techniques in a controlled environment close to the real scenario and the use of tools focused on expertise and digital research in these scenarios to evaluate the efficiency and main characteristics of these techniques, generating in this way technical information that may provide an advantage to the expert or digital investigator in cases with simliar occurrences to those present in this study.