4 resultados para affective computing

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two babies were observed from their third week to their sixth month of life. Our goals in the study were: to investigate developmental changes in smiling patterns; to analyze the smiling patterns observed in the presence of mother`s affective behaviors, and to verify whether the babies can answer contingently, with smiles, to mothers` affective behaviors. The babies and their mothers were videotaped at home. It was verified a positive linear trajectory tendency for the babies` smiles. The babies revealed a particular tendency to display one or two kinds of smiles. Babies answered contingently with smiles to their mothers` affective behaviors. Correlations between the most frequent types of babies` smiles and his/her mothers` smiles were verified (r = 37, p < .0017 - baby1, and r = .62, p < .0017 - baby2). Different types of smiles were exhibited by the babies as contingent answers to mothers` behaviors. The results show an association between babies` smiles and their mothers` affective behaviors. (C) 2009 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes an evolutionary computing strategy to solve the problem of fault indicator (FI) placement in primary distribution feeders. More specifically, a genetic algorithm (GA) is employed to search for an efficient configuration of FIs, located at the best positions on the main feeder of a real-life distribution system. Thus, the problem is modeled as one of optimization, aimed at improving the distribution reliability indices, while, at the same time, finding the least expensive solution. Based on actual data, the results confirm the efficiency of the GA approach to the FI placement problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is growing evidence that the course of Bipolar Affective Disorder (BAD) can be altered by psychotherapeutic approaches, such as Psychoeducation. Therefore, this study was performed with the objective of identifying the implications of a Psychoeducation group on the everyday lives of individuals with BAD. To do this, the authors chose to perform a qualitative case study. Participants included twelve individuals with BAD who had attended at least six meetings of the Psychoeducation Group held at the Sao Jose do Rio Preto Faculty of Medicine (FAMERP). Semi-structured interviews were performed, which were recorded and then transcribed and subjected to Thematic Analysis. The present study showed that the referred group experience promoted the individuals' knowledge acquisition; their awareness regarding the disease and adherence to treatment; their making positive changes in life; the possibility of helping other patients to benefit from the knowledge learned in the group; and their awareness regarding other realities and coping strategies, obtained by exchanging experiences with other participants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.