100 resultados para Behavioral Biology


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are many use cases in business process management that require the comparison of behavioral models. For instance, verifying equivalence is the basis for assessing whether a technical workflow correctly implements a business process, or whether a process realization conforms to a reference process. This paper proposes an equivalence relation for models that describe behaviors based on the concurrency semantics of net theory and for which an alignment relation has been defined. This equivalence, called isotactics, preserves the level of concurrency of aligned operations. Furthermore, we elaborate on the conditions under which an alignment relation can be classified as an abstraction. Finally, we show that alignment relations induced by structural refinements of behavioral models are indeed behavioral abstractions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper studies traffic hysteresis arising in traffic oscillations from a behavioral perspective. It is found that the occurrence and type of traffic hysteresis is closely correlated with driver behavior when experiencing traffic oscillations and with the time driver reaction begins relative to the starting deceleration wave. Statistical results suggest that driver behavior is different depending on its position along the oscillation. This suggests that different car-following models should be used inside the different stages of an oscillation in order to replicate realistic congestion features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tumour necrosis factor (TNF) is a pleiotropic cytokine with dual roles in cancer biology including prostate cancer (PCa). On the one hand, there is evidence that it stimulates tumour angiogenesis, is involved in the initiation of PCa from an androgen-dependent to a castrate resistant state, plays a role in epithelial to mesenchymal plasiticity, and may contribute to the aberrant regulation of eicosanoid pathways. On the other hand, TNF has also been reported to inhibit neovascularisation, induce apoptosis of PCa cells, and stimulate anti-tumour immunity. Much of the confusion surrounding its seemingly paradoxical roles in cancer biology stems from the dependence of its effects on the biological model within which TNF is investigated. This review will address some of these issues, and also discuss on the therapeutic implications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Combating unhealthy weight gain is a major public health and clinical management issue. The extent of research into the etiology and pathophysiology of obesity has produced a wealth of evidence regarding the contributing factors. While aspects of the environment are ‘obesogenic’, weight gain is not inevitable for every individual. What then explains potentially unhealthy weight gain in individuals living within an environment where others remain lean? In this paper we explore the biological compensation that acts in response to a reduced energy intake by reducing energy needs, in order to defend against weight loss. We then examine the evidence that there is only a weak biological compensation to surplus energy supply, and that this allows behavior to drive weight gain. The extent to which biology impacts behavior is also considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cancer stem-cell (CSC) hypothesis suggests that there is a small subset of cancer cells that are responsible for tumor initiation and growth, possessing properties such as indefinite self-renewal, slow replication, intrinsic resistance to chemotherapy and radiotherapy, and an ability to give rise to differentiated progeny. Through the use of xenotransplantation assays, putative CSCs have been identified in many cancers, often identified by markers usually expressed in normal stem cells. This is also the case in lung cancer, and the accumulated data on side population cells, CD133, CD166, CD44 and ALDH1 are beginning to clarify the true phenotype of the lung cancer stem cell. Furthermore, it is now clear that many of the pathways of normal stem cells, which guide cellular proliferation, differentiation, and apoptosis are also prominent in CSCs; the Hedgehog (Hh), Notch, and Wnt signaling pathways being notable examples. The CSC hypothesis suggests that there is a small reservoir of cells within the tumor, which are resistant to many standard therapies, and can give rise to new tumors in the form of metastases or relapses after apparent tumor regression. Therapeutic interventions that target CSC pathways are still in their infancy and clinical data of their efficacy remain limited. However Smoothened inhibitors, gamma-secretase inhibitors, anti-DLL4 antagonists, Wnt antagonists, and CBP/β-catenin inhibitors have all shown promising anticancer effects in early studies. The evidence to support the emerging picture of a lung cancer CSC phenotype and the development of novel therapeutic strategies to target CSCs are described in this review.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The state of the practice in safety has advanced rapidly in recent years with the emergence of new tools and processes for improving selection of the most cost-effective safety countermeasures. However, many challenges prevent fair and objective comparisons of countermeasures applied across safety disciplines (e.g. engineering, emergency services, and behavioral measures). These countermeasures operate at different spatial scales, are funded often by different financial sources and agencies, and have associated costs and benefits that are difficult to estimate. This research proposes a methodology by which both behavioral and engineering safety investments are considered and compared in a specific local context. The methodology involves a multi-stage process that enables the analyst to select countermeasures that yield high benefits to costs, are targeted for a particular project, and that may involve costs and benefits that accrue over varying spatial and temporal scales. The methodology is illustrated using a case study from the Geary Boulevard Corridor in San Francisco, California. The case study illustrates that: 1) The methodology enables the identification and assessment of a wide range of safety investment types at the project level; 2) The nature of crash histories lend themselves to the selection of both behavioral and engineering investments, requiring cooperation across agencies; and 3) The results of the cost-benefit analysis are highly sensitive to cost and benefit assumptions, and thus listing and justification of all assumptions is required. It is recommended that a sensitivity analyses be conducted when there is large uncertainty surrounding cost and benefit assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The larvae of particular Ogmograptis spp. produce distinctive scribbles on some smooth-barked Eucalyptus spp. which are a common feature on many ornamental and forest trees in Australia. However, although they are conspicuous in the environment the systematics and biology of the genus has been poorly studied. This has been addressed through detailed field and laboratory studies of their biology of three species (O. racemosa Horak sp. nov., O. fraxinoides Horak sp. nov., O. scribula Meyrick), in conjunction with a comprehensive taxonomic revision support by a molecular phylogeny utilising the mitochondrial Cox1 and nuclear 18S genes. In brief, eggs are laid in bark depressions and the first instar larvae bore into the bark to the level where the future cork cambium forms (the phellegen). Early instar larvae bore wide, arcing tracks in this layer before forming a tighter zig-zag shaped pattern. The second last instar turns and bores either closely parallel to the initial mine or doubles its width, along the zig-zag shaped mine. The final instar possesses legs and a spinneret (unlike the earlier instars) and feeds exclusively on callus tissue which forms within the zig-zag shaped mine formed by the previous instar, before emerging from the bark to pupate at the base of the tree. The scars of mines them become visible scribble following the shedding of bark. Sequence data confirm the placement of Ogmograptis within the Bucculatricidae, suggest that the larvae responsible for the ‘ghost scribbles’ (unpigmented, raised scars found on smooth-barked eucalypts) are members of the genus Tritymba, and support the morphology-based species groups proposed for Ogmograptis. The formerly monotypic genus Ogmograptis Meyrick is revised and divided into three species groups. Eleven new species are described: Ogmograptis fraxinoides Horak sp. nov., Ogmograptis racemosa Horak sp. nov. and Ogmograptis pilularis Horak sp. nov. forming the scribula group with Ogmograptis scribula Meyrick; Ogmograptis maxdayi Horak sp. nov., Ogmograptis barloworum Horak sp. nov., Ogmograptis paucidentatus Horak sp. nov., Ogmograptis rodens Horak sp. nov., Ogmograptis bignathifer Horak sp. nov. and Ogmograptis inornatus Horak sp. nov. as the maxdayi group; Ogmograptis bipunctatus Horak sp. nov., Ogmograptis pulcher Horak sp. nov., Ogmograptis triradiata (Turner) comb. nov. and Ogmograptis centrospila (Turner) comb. nov. as the triradiata group. Ogmograptis notosema (Meyrick) cannot be assigned to a species group as the holotype has not been located. Three unique synapomorphies, all derived from immatures, redefine the family Bucculatricidae, uniting Ogmograptis, Tritymba Meyrick (both Australian) and Leucoedemia Scoble & Scholtz (African) with Bucculatrix Zeller, which is the sister group of the southern hemisphere genera. The systematic history of Ogmograptis and the Bucculatricidae is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not be found yet. In this paper we present a conception of a generic framework and runtime environment which will enable researchers to develop, evaluate and compare their behavioral biometrics solutions with repeatable experiments under the same conditions with the same data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New venture growth is a central topic in entrepreneurship research. Although sales growth is emerging as the most commonly used measure of growth for emerging ventures, employment growth has also been used frequently. However, empirical research demonstrates that there are only very low to moderately sized correlations between the two (Delmar et aL, 2003; Weinzimmer, et al., 1998). In addition) sales growth and employment growth respond differently to a wide variety of criteria (Baum et al., 2001; Delmar et al., 2003). In this study we use transaction cost economics (Williamson, 1996) as a theoretical base to examine transaction cost influences on the addition of new employees as emerging ventures experience sales growth. \\le theorize that transaction cost economics variables will moderate the relationship between sales growth and employment growth. W'e develop and test hypotheses related to asset specificity, behavioral uncertainty, and the influence of resource munificence on the strength of the sales growth/ employment growth relationship. Asset specificity is theorized to be a positive moderator of the relationship between sales growth and employment growth. When the behavioral uncertainty associated with adding new employees is greater than that of outsourcing or subcontracting, it is hypothesized to be a negative moderator of the sales growth/employment growth relationship. We also hypothesize that resource scarcity will strengthen those relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability of adult cotton bollworm, Helicoverpa armigera (Hübner), to distinguish and respond to enantiomers of α-pinene was investigated with electrophysiological and behavioral methods. Electroantennogram recordings using mixtures of the enantiomers at saturating dose levels, and single unit electrophysiology, indicated that the two forms were detected by the same receptor neurons. The relative size of the electroantennogram response was higher for the (−) compared to the (+) form, indicating greater affinity for the (−) form at the level of the dendrites. Behavioral assays investigated the ability of moths to discriminate between, and respond to the (+) and (−) forms of α-pinene. Moths with no odor conditioning showed an innate preference for (+)-α-pinene. This preference displayed by naïve moths was not significantly different from the preferences of moths conditioned on (+)-α-pinene. However, we found a significant difference in preference between moths conditioned on the (−) enantiomer compared to naïve moths and moths conditioned on (+)-α-pinene, showing that learning plays an important role in the behavioral response. Moths are less able to distinguish between enantiomers of α-pinene than different odors (e.g., phenylacetaldehyde versus (−)-α-pinene) in learning experiments. The relevance of receptor discrimination of enantiomers and learning ability of the moths in host plant choice is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Migraine is a common genetically linked neurovascular disorder. Approximately ~12% of the Caucasian population are affected including 18% of adult women and 6% of adult men (1, 2). A notable female bias is observed in migraine prevalence studies with females affected ~3 times more than males and is credited to differences in hormone levels arising from reproductive achievements. Migraine is extremely debilitating with wide-ranging socioeconomic impact significantly affecting people's health and quality of life. A number of neurotransmitter systems have been implicated in migraine, the most studied include the serotonergic and dopaminergic systems. Extensive genetic research has been carried out to identify genetic variants that may alter the activity of a number of genes involved in synthesis and transport of neurotransmitters of these systems. The biology of the Glutamatergic system in migraine is the least studied however there is mounting evidence that its constituents could contribute to migraine. The discovery of antagonists that selectively block glutamate receptors has enabled studies on the physiologic role of glutamate, on one hand, and opened new perspectives pertaining to the potential therapeutic applications of glutamate receptor antagonists in diverse neurologic diseases. In this brief review, we discuss the biology of the Glutamatergic system in migraine outlining recent findings that support a role for altered Glutamatergic neurotransmission from biochemical and genetic studies in the manifestation of migraine and the implications of this on migraine treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of concurrent software systems, in particular process-aware information systems, involves behavioral modeling at various stages. Recently, approaches to behavioral analysis of such systems have been based on declarative abstractions defined as sets of behavioral relations. However, these relations are typically defined in an ad-hoc manner. In this paper, we address the lack of a systematic exploration of the fundamental relations that can be used to capture the behavior of concurrent systems, i.e., co-occurrence, conflict, causality, and concurrency. Besides the definition of the spectrum of behavioral relations, which we refer to as the 4C spectrum, we also show that our relations give rise to implication lattices. We further provide operationalizations of the proposed relations, starting by proposing techniques for computing relations in unlabeled systems, which are then lifted to become applicable in the context of labeled systems, i.e., systems in which state transitions have semantic annotations. Finally, we report on experimental results on efficiency of the proposed computations.