3 resultados para Could computing
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Resumo:
This paper proposes an evolutionary computing strategy to solve the problem of fault indicator (FI) placement in primary distribution feeders. More specifically, a genetic algorithm (GA) is employed to search for an efficient configuration of FIs, located at the best positions on the main feeder of a real-life distribution system. Thus, the problem is modeled as one of optimization, aimed at improving the distribution reliability indices, while, at the same time, finding the least expensive solution. Based on actual data, the results confirm the efficiency of the GA approach to the FI placement problem.
Resumo:
Introduction and Objective: Because of the improvements on detection of early stage prostate cancer over the last decade, focal therapy for localized prostate cancer (PC) has been proposed for patients with low-risk disease. Such treatment would allow the control of cancer, thereby diminishing side effects, such as urinary incontinence and sexual dysfunction, which have an enormous impact on quality of life. The critical issue is whether it is possible to preoperatively predict clinically significant unifocal or unilateral prostate cancer with sufficient accuracy. Our aim is to determine whether there is any preoperative feature that can help select the ideal patient for focal therapy. Material and methods: A total of 599 patients who underwent transrectal ultrasound, (TRUS)-guided prostate biopsy followed by radical prostatectomy to treat PC were examined in our laboratory between 2001 and 2009. We established very restricted criteria to select patients with very-low-risk disease for whom focal therapy would be suitable (only I biopsy core positive, tumor no larger than 80% of a single core, no perineural invasion, PSA serum level < 10 ng/ml, Gleason score < 7 and clinical stage T1c, T2a-b). We defined 2 groups of patients who would be either adequately treated or not treated by focal therapy. The primary endpoint was the evaluation of preoperative features in order to identify which parameters should be considered when choosing good candidates for focal therapy. Results: Fifty-six out of 599 patients met our criteria. The mean age was 59 years, and the mean number of biopsy cores was 14.4. Forty-seven (83.9%) were staged T1c, and 9 (16.1%) were staged T2a-b. Forty-four (78.6%) patients could be considered to have been adequately treated by focal therapy, and 12 (21.4%) could not. There was no statistical difference between the 2 groups considering age, clinical stage, PSA levels, Gleason score, and tumor volume in the biopsy. All 12 patients who could be considered inadequately treated had a bilateral, significant secondary tumor, 58.3% had Gleason >= 7, and 25% were staged pT3. Conclusion: Although focal therapy might be a good option for patients with localized prostate cancer, we are so far unable to select which of them would benefit from it based on preoperative data, even using very restricted criteria, and a considerable proportion of men would still be left undertreated. (c) 2012 Elsevier Inc. All rights reserved.
Resumo:
The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.