171 resultados para BEHAVIORAL STATES


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The state of the practice in safety has advanced rapidly in recent years with the emergence of new tools and processes for improving selection of the most cost-effective safety countermeasures. However, many challenges prevent fair and objective comparisons of countermeasures applied across safety disciplines (e.g. engineering, emergency services, and behavioral measures). These countermeasures operate at different spatial scales, are funded often by different financial sources and agencies, and have associated costs and benefits that are difficult to estimate. This research proposes a methodology by which both behavioral and engineering safety investments are considered and compared in a specific local context. The methodology involves a multi-stage process that enables the analyst to select countermeasures that yield high benefits to costs, are targeted for a particular project, and that may involve costs and benefits that accrue over varying spatial and temporal scales. The methodology is illustrated using a case study from the Geary Boulevard Corridor in San Francisco, California. The case study illustrates that: 1) The methodology enables the identification and assessment of a wide range of safety investment types at the project level; 2) The nature of crash histories lend themselves to the selection of both behavioral and engineering investments, requiring cooperation across agencies; and 3) The results of the cost-benefit analysis are highly sensitive to cost and benefit assumptions, and thus listing and justification of all assumptions is required. It is recommended that a sensitivity analyses be conducted when there is large uncertainty surrounding cost and benefit assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not be found yet. In this paper we present a conception of a generic framework and runtime environment which will enable researchers to develop, evaluate and compare their behavioral biometrics solutions with repeatable experiments under the same conditions with the same data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Individual exposure to ultraviolet radiation (UVR) is challenging to measure, particularly for diseases with substantial latency periods between first exposure and diagnosis of outcome, such as cancer. To guide the choice of surrogates for long-term UVR exposure in epidemiologic studies, we assessed how well stable sun-related individual characteristics and environmental/meteorological factors predicted daily personal UVR exposure measurements. Methods We evaluated 123 United States Radiologic Technologists subjects who wore personal UVR dosimeters for 8 hours daily for up to 7 days (N = 837 days). Potential predictors of personal UVR derived from a self-administered questionnaire, and public databases that provided daily estimates of ambient UVR and weather conditions. Factors potentially related to personal UVR exposure were tested individually and in a model including all significant variables. Results The strongest predictors of daily personal UVR exposure in the full model were ambient UVR, latitude, daily rainfall, and skin reaction to prolonged sunlight (R2 = 0.30). In a model containing only environmental and meteorological variables, ambient UVR, latitude, and daily rainfall were the strongest predictors of daily personal UVR exposure (R2 = 0.25). Conclusions In the absence of feasible measures of individual longitudinal sun exposure history, stable personal characteristics, ambient UVR, and weather parameters may help estimate long-term personal UVR exposure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New venture growth is a central topic in entrepreneurship research. Although sales growth is emerging as the most commonly used measure of growth for emerging ventures, employment growth has also been used frequently. However, empirical research demonstrates that there are only very low to moderately sized correlations between the two (Delmar et aL, 2003; Weinzimmer, et al., 1998). In addition) sales growth and employment growth respond differently to a wide variety of criteria (Baum et al., 2001; Delmar et al., 2003). In this study we use transaction cost economics (Williamson, 1996) as a theoretical base to examine transaction cost influences on the addition of new employees as emerging ventures experience sales growth. \\le theorize that transaction cost economics variables will moderate the relationship between sales growth and employment growth. W'e develop and test hypotheses related to asset specificity, behavioral uncertainty, and the influence of resource munificence on the strength of the sales growth/ employment growth relationship. Asset specificity is theorized to be a positive moderator of the relationship between sales growth and employment growth. When the behavioral uncertainty associated with adding new employees is greater than that of outsourcing or subcontracting, it is hypothesized to be a negative moderator of the sales growth/employment growth relationship. We also hypothesize that resource scarcity will strengthen those relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Density functional theory (DFT) calculations have been carried out to explore the catalytic activation of C–H bonds in methane by the iron atom, Fe, and the iron dimer, Fe2. For methane activation on an Fe atom, the calculations suggest that the activation of the first C–H bond is mediated via the triplet excited-state potential energy surface (PES), with initial excitation of Fe to the triplet state being necessary for the reaction to be energetically feasible. Compared with the breaking of the first C–H bond, the cleavage of the second C–H bond is predicted to involve a significantly higher barrier, which could explain experimental observations of the HFeCH3 complex rather than CH2FeH2 in the activation of methane by an Fe atom. For methane activation on an iron dimer, the cleavage of the first C–H bond is quite facile with a barrier only 11.2, 15.8 and 8.4 kcal/mol on the septet state energy surface at the B3LYP/6-311+G(2df,2dp), BPW91/6-311+G(2df,2dp) and M06/B3LYP level, respectively. Cleavage of the second C–H bond from HFe2CH3 involves a barrier calculated respectively as 18.0, 10.7 and 12.4 kcal/mol at the three levels. The results suggest that the elimination of hydrogen from the dihydrogen complex is a rate-determining step. Overall, our results indicate that the iron dimer Fe2 has a stronger catalytic effect on the activation of methane than the iron atom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability of adult cotton bollworm, Helicoverpa armigera (Hübner), to distinguish and respond to enantiomers of α-pinene was investigated with electrophysiological and behavioral methods. Electroantennogram recordings using mixtures of the enantiomers at saturating dose levels, and single unit electrophysiology, indicated that the two forms were detected by the same receptor neurons. The relative size of the electroantennogram response was higher for the (−) compared to the (+) form, indicating greater affinity for the (−) form at the level of the dendrites. Behavioral assays investigated the ability of moths to discriminate between, and respond to the (+) and (−) forms of α-pinene. Moths with no odor conditioning showed an innate preference for (+)-α-pinene. This preference displayed by naïve moths was not significantly different from the preferences of moths conditioned on (+)-α-pinene. However, we found a significant difference in preference between moths conditioned on the (−) enantiomer compared to naïve moths and moths conditioned on (+)-α-pinene, showing that learning plays an important role in the behavioral response. Moths are less able to distinguish between enantiomers of α-pinene than different odors (e.g., phenylacetaldehyde versus (−)-α-pinene) in learning experiments. The relevance of receptor discrimination of enantiomers and learning ability of the moths in host plant choice is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this letter the core-core-valence Auger transitions of an atomic impurity, both in bulk or adsorbed on a jellium-like surface, are computed within a DFT framework. The Auger rates calculated by the Fermi golden rule are compared with those determined by an approximate and simpler expression. This is based on the local density of states (LDOS) with a core hole present, in a region around the impurity nucleus. Different atoms, Na and Mg, solids, Al and Ag, and several impurity locations are considered. We obtain an excellent agreement between KL1V and KL23V rates worked out with the two approaches. The radius of the sphere in which we calculate the LDOS is the relevant parameter of the simpler approach. Its value only depends on the atomic species regardless of the location of the impurity and the type of substrate. (C) 2003 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an approach for identifying the limit states of resilience in a water supply system when influenced by different types of pressure (disturbing) forces. Understanding of systemic resilience facilitates identification of the trigger points for early managerial action to avoid further loss of ability to provide satisfactory service availability when the ability to supply water is under pressure. The approach proposed here is to illustrate the usefulness of a surrogate measure of resilience depicted in a three dimensional space encompassing independent pressure factors. That enables visualisation of the transition of the system-state (resilience) between high to low resilience regions and acts as an early warning trigger for decision-making. The necessity of a surrogate measure arises as a means of linking resilience to the identified pressures as resilience cannot be measured directly. The basis for identifying the resilience surrogate and exploring the interconnected relationships within the complete system, is derived from a meta-system model consisting of three nested sub-systems representing the water catchment and reservoir; treatment plant; and the distribution system and end-users. This approach can be used as a framework for assessing levels of resilience in different infrastructure systems by identifying a surrogate measure and its relationship to relevant pressures acting on the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of concurrent software systems, in particular process-aware information systems, involves behavioral modeling at various stages. Recently, approaches to behavioral analysis of such systems have been based on declarative abstractions defined as sets of behavioral relations. However, these relations are typically defined in an ad-hoc manner. In this paper, we address the lack of a systematic exploration of the fundamental relations that can be used to capture the behavior of concurrent systems, i.e., co-occurrence, conflict, causality, and concurrency. Besides the definition of the spectrum of behavioral relations, which we refer to as the 4C spectrum, we also show that our relations give rise to implication lattices. We further provide operationalizations of the proposed relations, starting by proposing techniques for computing relations in unlabeled systems, which are then lifted to become applicable in the context of labeled systems, i.e., systems in which state transitions have semantic annotations. Finally, we report on experimental results on efficiency of the proposed computations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Railway is one of the most important, reliable and widely used means of transportation, carrying freight, passengers, minerals, grains, etc. Thus, research on railway tracks is extremely important for the development of railway engineering and technologies. The safe operation of a railway track is based on the railway track structure that includes rails, fasteners, pads, sleepers, ballast, subballast and formation. Sleepers are very important components of the entire structure and may be made of timber, concrete, steel or synthetic materials. Concrete sleepers were first installed around the middle of last century and currently are installed in great numbers around the world. Consequently, the design of concrete sleepers has a direct impact on the safe operation of railways. The "permissible stress" method is currently most commonly used to design sleepers. However, the permissible stress principle does not consider the ultimate strength of materials, probabilities of actual loads, and the risks associated with failure, all of which could lead to the conclusion of cost-ineffectiveness and over design of current prestressed concrete sleepers. Recently the limit states design method, which appeared in the last century and has been already applied in the design of buildings, bridges, etc, is proposed as a better method for the design of prestressed concrete sleepers. The limit states design has significant advantages compared to the permissible stress design, such as the utilisation of the full strength of the member, and a rational analysis of the probabilities related to sleeper strength and applied loads. This research aims to apply the ultimate limit states design to the prestressed concrete sleeper, namely to obtain the load factors of both static and dynamic loads for the ultimate limit states design equations. However, the sleepers in rail tracks require different safety levels for different types of tracks, which mean the different types of tracks have different load factors of limit states design equations. Therefore, the core tasks of this research are to find the load factors of the static component and dynamic component of loads on track and the strength reduction factor of the sleeper bending strength for the ultimate limit states design equations for four main types of tracks, i.e., heavy haul, freight, medium speed passenger and high speed passenger tracks. To find those factors, the multiple samples of static loads, dynamic loads and their distributions are needed. In the four types of tracks, the heavy haul track has the measured data from Braeside Line (A heavy haul line in Central Queensland), and the distributions of both static and dynamic loads can be found from these data. The other three types of tracks have no measured data from sites and the experimental data are hardly available. In order to generate the data samples and obtain their distributions, the computer based simulations were employed and assumed the wheel-track impacts as induced by different sizes of wheel flats. A valid simulation package named DTrack was firstly employed to generate the dynamic loads for the freight and medium speed passenger tracks. However, DTrack is only valid for the tracks which carry low or medium speed vehicles. Therefore, a 3-D finite element (FE) model was then established for the wheel-track impact analysis of the high speed track. This FE model has been validated by comparing its simulation results with the DTrack simulation results, and with the results from traditional theoretical calculations based on the case of heavy haul track. Furthermore, the dynamic load data of the high speed track were obtained from the FE model and the distributions of both static and dynamic loads were extracted accordingly. All derived distributions of loads were fitted by appropriate functions. Through extrapolating those distributions, the important parameters of distributions for the static load induced sleeper bending moment and the extreme wheel-rail impact force induced sleeper dynamic bending moments and finally, the load factors, were obtained. Eventually, the load factors were obtained by the limit states design calibration based on reliability analyses with the derived distributions. After that, a sensitivity analysis was performed and the reliability of the achieved limit states design equations was confirmed. It has been found that the limit states design can be effectively applied to railway concrete sleepers. This research significantly contributes to railway engineering and the track safety area. It helps to decrease the failure and risks of track structure and accidents; better determines the load range for existing sleepers in track; better rates the strength of concrete sleepers to support bigger impact and loads on railway track; increases the reliability of the concrete sleepers and hugely saves investments on railway industries. Based on this research, many other bodies of research can be promoted in the future. Firstly, it has been found that the 3-D FE model is suitable for the study of track loadings and track structure vibrations. Secondly, the equations for serviceability and damageability limit states can be developed based on the concepts of limit states design equations of concrete sleepers obtained in this research, which are for the ultimate limit states.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The role of government in developing policies and guidelines for asset management is becoming increasingly important especially in view of ageing infrastructure and increasing financial risks for building infrastructure. This paper reviews policies and guidelines developed by Australian state authorities against industry developed principles. It utilizes the software program Leximancer to; a) produce conceptual visualisations of the key themes and concepts embedded within state-wide policies and guidelines, and b) systematically compare the differing asset management foci between states. The analyses reveal mixed results in terms of policy priorities and guidelines for managing assets at a strategic level across states. This paper outlines a rigorous analytical methodology to inform specific policy changes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anxiety traits can be stable and permanent characteristics of an individual across time that is less susceptible of influences by a particular situation. One way to study trait anxiety in an experimental context is through the use of rat lines, selected according to contrasting phenotypes of fear and anxiety. It is not clear whether the behavioral differences between two contrasting rat lines in one given anxiety test are also present in others paradigms of state anxiety. Here, we examine the extent to which multiple anxiety traits generalize across selected animal lines originally selected for a single anxiety trait. We review the behavioral results available in the literature of eight rat genetic models of trait anxiety - namely Maudsley Reactive and Non-reactive rats, Floripa H and L rats, Tsukuba High and Low Emotional rats, High and Low Anxiety-related rats, High and Low Ultrasonic Vocalization rats, Roman High and Low Avoidance rats, Syracuse High and Low Avoidance rats, and Carioca High and Low Conditioned Freezing rats - across 11 behavioral paradigms of innate anxiety or aversive learning frequently used in the experimental setting. We observed both convergence and divergence of behavioral responses in these selected lines across the 11 paradigms. We find that predisposition for specific anxiety traits will usually be generalized to other anxiety provoking stimuli. However this generalization is not observed across all genetic models indicating some unique trait and state interactions. Genetic models of enhanced-anxiety related responses are beginning to help define how anxiety can manifest differently depending on the underlying traits and the current environmentally induced state.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pavlovian fear conditioning is a robust technique for examining behavioral and cellular components of fear learning and memory. In fear conditioning, the subject learns to associate a previously neutral stimulus with an inherently noxious co-stimulus. The learned association is reflected in the subjects' behavior upon subsequent re-exposure to the previously neutral stimulus or the training environment. Using fear conditioning, investigators can obtain a large amount of data that describe multiple aspects of learning and memory. In a single test, researchers can evaluate functional integrity in fear circuitry, which is both well characterized and highly conserved across species. Additionally, the availability of sensitive and reliable automated scoring software makes fear conditioning amenable to high-throughput experimentation in the rodent model; thus, this model of learning and memory is particularly useful for pharmacological and toxicological screening. Due to the conserved nature of fear circuitry across species, data from Pavlovian fear conditioning are highly translatable to human models. We describe equipment and techniques needed to perform and analyze conditioned fear data. We provide two examples of fear conditioning experiments, one in rats and one in mice, and the types of data that can be collected in a single experiment. © 2012 Springer Science+Business Media, LLC.