Affective computing

Xem 1-20 trên 81 kết quả Affective computing
  • Face plays an important role in human communication. Facial expressions and gestures incorporate nonverbal information which contributes to human communication. By recognizing the facial expressions from facial images, a number of applications in the field of human computer interaction can be facilitated. Last two decades, the developments, as well as the prospects in the field of multimedia signal processing have attracted the attention of many computer vision researchers to concentrate in the problems of the facial expression recognition....

    pdf452p bi_bi1 11-07-2012 54 16   Download

  • Information communications technology (ICT) has been found to be one of the most potent tools for promot- ing equity and access to education, and a great resource in bridging the gap of the digital divide. ICT affects almost all of our everyday activities, be it business, defense, or space exploration. Being informed of the latest information has become essential for survival. Educational enterprises also beneft from the advantages and technological learning tools offered by ICT. ICT is indispensable for creating effective distance education learn- ing environments.

    pdf291p trannhu 05-08-2009 194 97   Download

  • Rapidly changing field: –vacuum tube - transistor - IC - VLSI (see section 1.4) –doubling every 1.5 years: memory capacity processor speed (Due to advances in technology and organization) •Things you‘ll be learning: –how computers work, a basic foundation –how to analyze their performance (or how not to!) –issues affecting modern processors (caches, pipelines) •Why learn this stuff? –you want to call yourself a ―computer scientist‖ –you want to build software people use (need performance) –you need to make a purchasing decision or offer ―expert‖ advice...

    pdf118p cuncon159x 25-05-2012 97 20   Download

  • We live in an era of change; not only is change happening all the time, but the rate of change is accelerating and customers’ requirements and the environments that provide them are not the only factors affected. While we were writing this book there were a number of large IT industry mergers, not least when the company we both work for, VERITAS Software, merged with Symantec Corporation in July 2005.

    pdf372p greengrass304 15-09-2012 16 2   Download

  • Experimental studies of interactive language use have shed light on the cognitive and interpersonal processes that shape conversation; corpora are the emergent products of these processes. I will survey studies that focus on under-modelled aspects of interactive language use, including the processing of spontaneous speech and disfluencies; metalinguistic displays such as hedges; interactive processes that affect choices of referring expressions; and how communication media shape conversations. The findings suggest some agendas for computational linguistics. ...

    pdf8p bunrieu_1 18-04-2013 19 2   Download

  • The probabilistic relation between verbs and their arguments plays an important role in modern statistical parsers and supertaggers, and in psychological theories of language processing. But these probabilities are computed in very different ways by the two sets of researchers.

    pdf7p bunrieu_1 18-04-2013 16 2   Download

  • Most linguistic studies of human-computer communication have focused on the issues of syntax and discourse structure. However, another interesting and important area is the lexical semantics of c o m m a n d languages. The names that users and system designers give the objects and actions of a computer system can greatly affect its usability, a n d the lexical issues involved are as complicated as those in natural languages.

    pdf4p bungio_1 03-05-2013 22 1   Download

  • Systems Analysis and Design: Chapter 14 - Human Computer Interface's Objectives is Understand human-computer interaction; Know how fit affects performance and well-being; Understand the technology acceptance model (TAM) and usability.

    ppt64p cocacola_17 11-12-2015 5 1   Download

  • Chapter 5A - Transforming data into information. This chapter explain why computers use the binary number system, list the two main parts of the CPU and explain how they work together, list the steps that make up a machine cycle, explain the difference between RAM and ROM, list three hardware factors that affect processing speed.

    ppt24p tangtuy02 12-03-2016 2 1   Download

  • The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system.

    ppt23p tangtuy02 12-03-2016 4 1   Download

  • After studying this lecture you will be able to understand: What computers consist of? How computers work? How they are organized internally? What are the design tradeoffs? How design affects programming and applications?

    ppt16p tangtuy10 04-05-2016 4 1   Download

  • After reading this chapter, you should be able to answer the following questions: How technology affects your everyday life? How technology is used at home, school, and work? How you can use technology ethically and safely?

    ppt42p tangtuy18 12-07-2016 2 1   Download

  • After reading this chapter, you should be able to answer the following questions: Why copyrights are necessary? How to use technology ethically and legally? How to cite online sources? How will this affect others? What would happen if everyone did this?...

    ppt77p tangtuy18 12-07-2016 3 1   Download

  • Abstract. In this study, we assessed the impact of sea level rise, one of the most ascertained consequences of global climate change, for water levels in the Vietnamese Mekong Delta (VMD). We used a hydraulic model to compute water levels from August to November – when flooding is presently critical – under sea level rise scenarios of 20 cm (= 20) and 45

    pdf19p nguyenngocsonctu 05-12-2010 100 23   Download

  • This module presents the design points to consider when planning a multipledomain structure. Included are strategies for assessing the need for multiple domains, and reasons for maintaining a single-domain structure. The module briefly examines the Kerberos V5 protocol security process and how it affects trust relationships within a multiple-domain structure. The module also examines how those trust relationships affect design.

    pdf30p thuyvan 12-08-2009 82 20   Download

  • Picture this - the trade press is all abuzz with warnings of a new killer virus, Child of Chernobyl. Recall that Chernobyl struck on April 26, 1999. In Korea alone, it affected as many as a million computers, causing more than $250 million in damages. The boss has just come down with a magazine article in hand and has told you to drop everything.

    pdf27p huyhoang 07-08-2009 55 10   Download

  • The purpose of this project is to examines the affects of Microsoft Access on organisations and schools such as Hanoi School of Business and the significant growth of Information and communication technologies (ICT) on Business Management as a whole. Many schools are adopting the Microsoft Access to retain excellent relationship with employees, customers, students and the significant growth of ICT application is discussed and noted in this paper. This...

    pdf23p saobangftu 14-09-2009 79 6   Download

  • Sorption is a process by which chemicals or organisms become attached to soils and/or the geologic rock material (aquifer solids) and removed from the water. Often the sorption process is reversible and solutes desorb and hence dissolved-solute plumes are retarded, rather than solutes being permanently retained by the solids. Cation exchange is the interchange between cations in solution and cations on the surfaces of clay particles or organic colloids. Filtration is a process that affects particulate contaminants (e.g.

    pdf93p cao_can 29-12-2012 16 6   Download

  • Three physical measures of the 160 films are used in the analyses below, and one interaction between them. First, the average shot lengths (ASLs) of each filmwere determined. Segmenting films into shots has been a tedious and ongoing process, starting with the measurements by Cutting et al (2010). Subsequently, each filmhas been gone over several times by several individuals both with computer assistance and by hand. Although we occasionally find additional transitions previously missed, we are confident that we have found greater than 99% of themin each film....

    pdf12p hongphuocidol 03-04-2013 28 6   Download

  • In the backbone or to the desk, optical networks achieve peak performance with ADC's fiber connectors, patch cords, raceways, and panels featuring integrated cable management and bend radius protection. Proper cable management practices make fiber networks less susceptible to accidental damage, quicker to install, less expensive to own and operate over the long haul and easier to expand as needs grow.

    pdf63p halanh 14-08-2009 45 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản