876 resultados para Behavior-Based


Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper draws from an independent RCT evaluation on a behavior based afterschool intervention for called Mate-Tricks for 9-10 year old children and their families (N=592). This paper explores practical and theoretical issues that may have contributed to a range of iatrogenic effects found by the evaluation. To do this the paper focuses on key practical implementation factors such as: program exposure; engagement; and program quality. The paper also relates these results to popular theories of social development, including social interdependence theory. Finally, the paper discusses what the results suggest about the impact of cooperative/competitive goal structures in child and parent interventions of this type.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We introduce basic behaviors as primitives for control and learning in situated, embodied agents interacting in complex domains. We propose methods for selecting, formally specifying, algorithmically implementing, empirically evaluating, and combining behaviors from a basic set. We also introduce a general methodology for automatically constructing higher--level behaviors by learning to select from this set. Based on a formulation of reinforcement learning using conditions, behaviors, and shaped reinforcement, out approach makes behavior selection learnable in noisy, uncertain environments with stochastic dynamics. All described ideas are validated with groups of up to 20 mobile robots performing safe--wandering, following, aggregation, dispersion, homing, flocking, foraging, and learning to forage.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper proposes a hybrid coordination method for behavior-based control architectures. The hybrid method takes advantages of the robustness and modularity in competitive approaches as well as optimized trajectories in cooperative ones. This paper shows the feasibility of applying this hybrid method with a 3D-navigation to an autonomous underwater vehicle (AUV). The behaviors are learnt online by means of reinforcement learning. A continuous Q-learning implemented with a feed-forward neural network is employed. Realistic simulations were carried out. The results obtained show the good performance of the hybrid method on behavior coordination as well as the convergence of the behaviors

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Behavior-based navigation of autonomous vehicles requires the recognition of the navigable areas and the potential obstacles. In this paper we describe a model-based objects recognition system which is part of an image interpretation system intended to assist the navigation of autonomous vehicles that operate in industrial environments. The recognition system integrates color, shape and texture information together with the location of the vanishing point. The recognition process starts from some prior scene knowledge, that is, a generic model of the expected scene and the potential objects. The recognition system constitutes an approach where different low-level vision techniques extract a multitude of image descriptors which are then analyzed using a rule-based reasoning system to interpret the image content. This system has been implemented using a rule-based cooperative expert system

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We describe a model-based objects recognition system which is part of an image interpretation system intended to assist autonomous vehicles navigation. The system is intended to operate in man-made environments. Behavior-based navigation of autonomous vehicles involves the recognition of navigable areas and the potential obstacles. The recognition system integrates color, shape and texture information together with the location of the vanishing point. The recognition process starts from some prior scene knowledge, that is, a generic model of the expected scene and the potential objects. The recognition system constitutes an approach where different low-level vision techniques extract a multitude of image descriptors which are then analyzed using a rule-based reasoning system to interpret the image content. This system has been implemented using CEES, the C++ embedded expert system shell developed in the Systems Engineering and Automatic Control Laboratory (University of Girona) as a specific rule-based problem solving tool. It has been especially conceived for supporting cooperative expert systems, and uses the object oriented programming paradigm

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The double-echo-steady-state (DESS) sequence generates two signal echoes that are characterized by a different contrast behavior. Based on these two contrasts, the underlying T2 can be calculated. For a flip-angle of 90 degrees , the calculated T2 becomes independent of T1, but with very low signal-to-noise ratio. In the present study, the estimation of cartilage T2, based on DESS with a reduced flip-angle, was investigated, with the goal of optimizing SNR, and simultaneously minimizing the error in T2. This approach was validated in phantoms and on volunteers. T2 estimations based on DESS at different flip-angles were compared with standard multiecho, spin-echo T2. Furthermore, DESS-T2 estimations were used in a volunteer and in an initial study on patients after cartilage repair of the knee. A flip-angle of 33 degrees was the best compromise for the combination of DESS-T2 mapping and morphological imaging. For this flip angle, the Pearson correlation was 0.993 in the phantom study (approximately 20% relative difference between SE-T2 and DESS-T2); and varied between 0.429 and 0.514 in the volunteer study. Measurements in patients showed comparable results for both techniques with regard to zonal assessment. This DESS-T2 approach represents an opportunity to combine morphological and quantitative cartilage MRI in a rapid one-step examination.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

For adolescents, unprotected sexual intercourse is the primary cause of sexually transmitted disease (STD), including Human Immunodeficiency Virus (HIV) infection (virus which causes Acquired Immunodeficiency Syndrome (AIDS)), and pregnancy. Although many studies on adolescent sexual behavior have addressed racial/ethnic differences, few studies have examined the relation between race/ethnicity while controlling for other sociocultural and psychosocial variables. The purpose of this study is to examine the relationship between racial/ethnic categories and selected sociocultural and psychosocial variables, with reported adolescent sexual risk-taking and preventive behavior.^ A self-administered questionnaire was used to collect information from 3132 students in a Texas school district (Section 3.5.2). The instrument contained approximately 100 questions on demographic characteristics, sexual behavior, and psychosocial determinants of sexual behavior. Based on the findings of this study, the following major conclusions are made: (1) There are differences in reported sexual risk-taking and preventive behavior among Black, Hispanic and White adolescents in this study. The stratified analysis by gender further suggests significant gender differences in reported sexual behavior among the three racial/ethnic groups. (2) Gender, living arrangement, academic grades, and language spoken at home modified the association between reported sexual risk-taking and preventive behavior and race/ethnicity in this study. This suggests that these sociocultural variables should be considered in future research and practice involving multicultural populations. (3) There are differences in selected psychosocial determinants among the three racial/ethnic groups and between males and females. These differences were consistent with the reported sexual risk-taking and preventive behaviors among race/ethnicity and gender for adolescents in this study. The findings support the consideration of psychosocial determinants in research and interventions addressing adolescent sexual behavior among different racial/ethnic groups.^ Based on the results of this study, two recommendations for practice are made. First, health professionals developing interventions for adolescents from different cultural backgrounds and gender need to be familiar with the specific sociocultural and psychosocial factors which will reduce risky sexual behavior, and promote protective behavior. Second, the need for immediate, realistic, and continuous HIV/STD and pregnancy prevention programs for children and adolescents should be considered. ^

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We investigated the defensive behavior of honeybees under controlled experimental conditions. During an attack on two identical targets, the spatial distribution of stings varied as a function of the total number of stings, evincing the classic “pitchfork bifurcation” phenomenon of nonlinear dynamics. The experimental results support a model of defensive behavior based on a self-organizing mechanism. The model helps to explain several of the characteristic features of the honeybee defensive response: (i) the ability of the colony to localize and focus its attack, (ii) the strong variability between different hives in the intensity of attack, as well as (iii) the variability observed within the same hive, and (iv) the ability of the colony to amplify small differences between the targets.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Which social perceptions and structures shape coworker reliance and contributions to team products? When people form an intercultural team, they launch a set of working relationships that may be affected by social perceptions and social structures. Social perceptions include beliefs about interpersonal similarity and also expectations of behavior based on professional and national memberships. Social structures include dyadic relationships and the patterns they form. In this study, graduate students from three cohorts were consistently more likely to rely on others with whom they had a professional relationship, while structural equivalence in the professional network had no effect. In only one of the cohorts, people were more likely to rely on others who were professionally similar to themselves. Expectations regarding professional or national groups had no effect on willingness to rely on members of those groups, but expectations regarding teammates' nations positively influenced individual contributions. Willingness to rely on one's teammates did not significantly influence individual contributions to the team. Number of professional ties to teammates increased individual contributions, and number of external ties decreased contributions. Finally, people whose professional networks included a mixture of brokerage and closure (higher ego network variance) made greater contributions to their teams.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

ABSTRACT Twelve beam-to-column connections between cold-formed steel sections consisting of three beam depths and four connection types were tested in isolation to investigate their behavior based on strength, stiffness and ductility. Resulting moment-rotation curves indicate that the tested connections are efficient moment connections where moment capacities ranged from about 65% to 100% of the connected beam capac-ity. With a moment capacity of greater than 80% of connected beam member capacity, some of the connec-tions can be regarded as full strength connections. Connections also possessed sufficient ductility with rota-tions of 20 mRad at failure although some connections were too ductile with rotations in excess of 30 mRad. Generally, most of the connections possess the strength and ductility to be considered as partial strength con-nections. The ultimate failures of almost all of the connections were due to local buckling of the compression web and flange elements of the beam closest to the connection.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Intrusion (unauthorized stepping-into/staying-in a hazardous area), as a common type of near-miss, is the prime cause of the majority of incidents on construction sites including fall from heights, and striking against or being struck by moving objects. Accidents often occur because workers take shortcuts moving about the site without fully perceiving the potential dangers. A number of researches have been devoted to developing methods to prevent such behaviors mainly based on the theory of Behavior-Based Safety (BBS), which aims to cultivate safety behaviors among workers in accordance with safety regulations. In current BBS practice, trained observers and safety supervisors are responsible for safety behavior inspections following safety plans and operation regulations. The observation process is time-consuming and its effectiveness depends largely on the observer’s safety knowledge and experience, which often results in omissions or bias. This paper presents a reformed safety behavior modification approach by integrating a location-based technology with BBS. Firstly, a detailed background is provided, covering current intrusion problems on site, existing use of BBS for behavior improvement, difficulties in achieving widespread adoption and potential technologies for location tracking and in-time feedback. Then, a conceptual framework of positioning technology-enhanced BBS is developed, followed by details of the corresponding on-line supporting system, Real Time Location System (RTLS) and Virtual Construction System (VCS). The application of the system is then demonstrated and tested in a construction site in Hong Kong. Final comments are made concerning further research direction and prospects for wider adoption.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Topic detection and tracking (TDT) is an area of information retrieval research the focus of which revolves around news events. The problems TDT deals with relate to segmenting news text into cohesive stories, detecting something new, previously unreported, tracking the development of a previously reported event, and grouping together news that discuss the same event. The performance of the traditional information retrieval techniques based on full-text similarity has remained inadequate for online production systems. It has been difficult to make the distinction between same and similar events. In this work, we explore ways of representing and comparing news documents in order to detect new events and track their development. First, however, we put forward a conceptual analysis of the notions of topic and event. The purpose is to clarify the terminology and align it with the process of news-making and the tradition of story-telling. Second, we present a framework for document similarity that is based on semantic classes, i.e., groups of words with similar meaning. We adopt people, organizations, and locations as semantic classes in addition to general terms. As each semantic class can be assigned its own similarity measure, document similarity can make use of ontologies, e.g., geographical taxonomies. The documents are compared class-wise, and the outcome is a weighted combination of class-wise similarities. Third, we incorporate temporal information into document similarity. We formalize the natural language temporal expressions occurring in the text, and use them to anchor the rest of the terms onto the time-line. Upon comparing documents for event-based similarity, we look not only at matching terms, but also how near their anchors are on the time-line. Fourth, we experiment with an adaptive variant of the semantic class similarity system. The news reflect changes in the real world, and in order to keep up, the system has to change its behavior based on the contents of the news stream. We put forward two strategies for rebuilding the topic representations and report experiment results. We run experiments with three annotated TDT corpora. The use of semantic classes increased the effectiveness of topic tracking by 10-30\% depending on the experimental setup. The gain in spotting new events remained lower, around 3-4\%. The anchoring the text to a time-line based on the temporal expressions gave a further 10\% increase the effectiveness of topic tracking. The gains in detecting new events, again, remained smaller. The adaptive systems did not improve the tracking results.