834 resultados para Behavior-based safety


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The double-echo-steady-state (DESS) sequence generates two signal echoes that are characterized by a different contrast behavior. Based on these two contrasts, the underlying T2 can be calculated. For a flip-angle of 90 degrees , the calculated T2 becomes independent of T1, but with very low signal-to-noise ratio. In the present study, the estimation of cartilage T2, based on DESS with a reduced flip-angle, was investigated, with the goal of optimizing SNR, and simultaneously minimizing the error in T2. This approach was validated in phantoms and on volunteers. T2 estimations based on DESS at different flip-angles were compared with standard multiecho, spin-echo T2. Furthermore, DESS-T2 estimations were used in a volunteer and in an initial study on patients after cartilage repair of the knee. A flip-angle of 33 degrees was the best compromise for the combination of DESS-T2 mapping and morphological imaging. For this flip angle, the Pearson correlation was 0.993 in the phantom study (approximately 20% relative difference between SE-T2 and DESS-T2); and varied between 0.429 and 0.514 in the volunteer study. Measurements in patients showed comparable results for both techniques with regard to zonal assessment. This DESS-T2 approach represents an opportunity to combine morphological and quantitative cartilage MRI in a rapid one-step examination.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objective. In 2003, the State of Texas instituted the Driver Responsibility Program (TDRP), a program consisting of a driving infraction point system coupled with a series of graded fines and annual surcharges for specific traffic violations such as driving while intoxicated (DWI). Approximately half of the revenues generated are earmarked to be disbursed to the state's trauma system to cover uncompensated trauma care costs. This study examined initial program implementation, the impact of trauma system funding, and initial impact on impaired driving knowledge, attitudes and behaviors. A model for targeted media campaigns to improve the program's deterrence effects was developed. ^ Methods. Data from two independent driver survey samples (conducted in 1999 and 2005), department of public safety records, state health department data and a state auditor's report were used to evaluate the program's initial implementation, impact and outcome with respect to drivers' impaired driving knowledge, attitudes and behavior (based on constructs of social cognitive theory) and hospital uncompensated trauma care funding. Survey results were used to develop a regression model of high risk drivers who should be targeted to improve program outcome with respect to deterring impaired driving. ^ Results. Low driver compliance with fee payment (28%) and program implementation problems were associated with lower surcharge revenues in the first two years ($59.5 million versus $525 million predicted). Program revenue distribution to trauma hospitals was associated with a 16% increase in designated trauma centers. Survey data demonstrated that only 28% of drivers are aware of the TDRP and that there has been no initial impact on impaired driving behavior. Logistical regression modeling suggested that target media campaigns highlighting the likelihood of DWI detection by law enforcement and the increased surcharges associated with the TDRP are required to deter impaired driving. ^ Conclusions. Although the TDRP raised nearly $60 million in surcharge revenue for the Texas trauma system over the first two years, this study did not find evidence of a change in impaired driving knowledge, attitudes or behaviors from 1999 to 2005. Further research is required to measure whether the program is associated with decreased alcohol-related traffic fatalities. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

For adolescents, unprotected sexual intercourse is the primary cause of sexually transmitted disease (STD), including Human Immunodeficiency Virus (HIV) infection (virus which causes Acquired Immunodeficiency Syndrome (AIDS)), and pregnancy. Although many studies on adolescent sexual behavior have addressed racial/ethnic differences, few studies have examined the relation between race/ethnicity while controlling for other sociocultural and psychosocial variables. The purpose of this study is to examine the relationship between racial/ethnic categories and selected sociocultural and psychosocial variables, with reported adolescent sexual risk-taking and preventive behavior.^ A self-administered questionnaire was used to collect information from 3132 students in a Texas school district (Section 3.5.2). The instrument contained approximately 100 questions on demographic characteristics, sexual behavior, and psychosocial determinants of sexual behavior. Based on the findings of this study, the following major conclusions are made: (1) There are differences in reported sexual risk-taking and preventive behavior among Black, Hispanic and White adolescents in this study. The stratified analysis by gender further suggests significant gender differences in reported sexual behavior among the three racial/ethnic groups. (2) Gender, living arrangement, academic grades, and language spoken at home modified the association between reported sexual risk-taking and preventive behavior and race/ethnicity in this study. This suggests that these sociocultural variables should be considered in future research and practice involving multicultural populations. (3) There are differences in selected psychosocial determinants among the three racial/ethnic groups and between males and females. These differences were consistent with the reported sexual risk-taking and preventive behaviors among race/ethnicity and gender for adolescents in this study. The findings support the consideration of psychosocial determinants in research and interventions addressing adolescent sexual behavior among different racial/ethnic groups.^ Based on the results of this study, two recommendations for practice are made. First, health professionals developing interventions for adolescents from different cultural backgrounds and gender need to be familiar with the specific sociocultural and psychosocial factors which will reduce risky sexual behavior, and promote protective behavior. Second, the need for immediate, realistic, and continuous HIV/STD and pregnancy prevention programs for children and adolescents should be considered. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We investigated the defensive behavior of honeybees under controlled experimental conditions. During an attack on two identical targets, the spatial distribution of stings varied as a function of the total number of stings, evincing the classic “pitchfork bifurcation” phenomenon of nonlinear dynamics. The experimental results support a model of defensive behavior based on a self-organizing mechanism. The model helps to explain several of the characteristic features of the honeybee defensive response: (i) the ability of the colony to localize and focus its attack, (ii) the strong variability between different hives in the intensity of attack, as well as (iii) the variability observed within the same hive, and (iv) the ability of the colony to amplify small differences between the targets.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The safety of workers in nighttime roadway work zones has become a major concern for state transportation agencies due to the increase in the number of work zone fatalities. During the last decade, several studies have focused on the improvement of safety in nighttime roadway work zones; but the element that is still missing is a set of tools for translating the research results into practice. This paper discusses: 1) the importance of translating the research results related to the safety of workers and safety planning of nighttime work zones into practice, and 2) examples of tools that can be used for translating the results of such studies into practice. A tool that can propose safety recommendations in nighttime work zones and a web-based safety training tool for workers are presented in this paper. The tools were created as a component of a five-year research study on the assessment of the safety of nighttime roadway construction. The objectives of both tools are explained as well as their functionalities (i.e., what the tools can do for the users); their components (e.g., knowledge base, database, and interfaces); and their structures (i.e., how the components of the tools are organized to meet the objectives). Evaluations by the proposed users of each tool are also presented.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Our objective is to verify the modulatory effects of bromazepam on EEG theta absolute power when subjects were submitted to a visuomotor task (i.e., car driver task). Sample was composed of 14 students (9 males and 5 females), right handed, with ages varying between 23 and 42 years (mean = 32.5 +/- 9.5), absence of mental or physical impairments, no psychoactive or psychotropic substance use and no neuromuscular disorders (screened by a clinical examination). The results showed an interaction between condition and electrodes (p=0.034) in favor of F8 electrode compared with F7 in both experimental conditions (t-test; p=0.001). Additionally, main effects were observed for condition (p=0.001), period (p=0.001) and electrodes (p=0.031) in favor of F4 electrode compared with F3. In conclusion, Br 6 mg of bromazepam may interfere in sensorimotor processes in the task performance in an unpredictable scenario allowing that certain visuospatial factors were predominant. Therefore, the results may reflect that bromazepam effects influence the performance of the involved areas because of the acquisition and integration of sensory stimuli processes until the development of a motor behavior based on the same stimuli. (C) 2009 Elsevier Ireland Ltd. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação de Mestrado, Ciências Económicas e Empresariais, 16 de Dezembro de 2015, Universidade dos Açores.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A engenharia civil, rege-se pela garantia de segurança e de funcionalidade das obras que projeta e executa. Para cumprir tais requisitos, é necessário durante a sua vida útil, no final da construção, reforço ou reabilitação, proceder à avaliação da conformidade entre o comportamento real da estrutura e os pressupostos subjacentes ao projeto. Esta dissertação tem como objetivo a compreensão e análise do comportamento estrutural da Ponte sobre o Rio Sorraia, através da realização de ensaios de carga apoiados pela conceção de um modelo numérico devidamente calibrado, capaz de simular a resposta da estrutura, o mais próximo possível do observável na realidade. Para alcançar o objetivo pré definido elencam-se as metodologias relevantes, descrevem-se os tipos de ensaios de carga realizados em pontes/viadutos e faz-se referência aos aparelhos de medição que estão na base da instrumentação aplicada em obras. Esta introdução foca-se ainda na modelação numérica, permitindo o conhecimento básico necessário para a criação e atualização de modelos numéricos de pontes. Relativamente ao caso de estudo expõe-se a realização do ensaio de carga, descrevendo todo o processo, bem como os resultados obtidos ao nível das grandezas de medição estudadas. Aqui é concebido um modelo numérico base da ponte, alvo de discussão ao nível do comportamento estrutural, baseada na validação dos resultados obtidos por via experimental, através da comparação com os obtidos por via numérica. Por fim, o estudo e seleção de diversos parâmetros da modelação, facultando a calibração do modelo numérico da ponte. Os resultados obtidos neste modelo comprovam o seu elevado potencial, no apoio à observação e compreensão do comportamento de estruturas através da realização de ensaios de carga. O sucesso da realização de uma análise do comportamento de estruturas, através de ensaios de carga, depende assim fundamentalmente, da correta execução do ensaio, da correta conceção e atualização do modelo numérico e da interligação entre os resultados experimentais e numéricos.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau Mestre em Engenharia Civil – Perfil de Construção

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper empirically studies the effects of service offshoring on white-collar employment, using data for more than one hundred U.S. occupations. A model of firm behavior based on separability allows to derive the labor demand elasticity with respect to service offshoring for each occupation. Estimation is performed with Quasi-Maximum Likelihood, to account for high degrees of censoring in the employment variable. The estimated elasticities are then related to proxies for the skill level and the degree of tradability of the occupations. Results show that service offshoring increases high skilled employment and decreases medium and low skilled employment. Within each skill group, however, service offshoring penalizes tradable occupations and benefits non-tradable occupations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This work proposes an original contribution to the understanding of shermen spatial behavior, based on the behavioral ecology and movement ecology paradigms. Through the analysis of Vessel Monitoring System (VMS) data, we characterized the spatial behavior of Peruvian anchovy shermen at di erent scales: (1) the behavioral modes within shing trips (i.e., searching, shing and cruising); (2) the behavioral patterns among shing trips; (3) the behavioral patterns by shing season conditioned by ecosystem scenarios; and (4) the computation of maps of anchovy presence proxy from the spatial patterns of behavioral mode positions. At the rst scale considered, we compared several Markovian (hidden Markov and semi-Markov models) and discriminative models (random forests, support vector machines and arti cial neural networks) for inferring the behavioral modes associated with VMS tracks. The models were trained under a supervised setting and validated using tracks for which behavioral modes were known (from on-board observers records). Hidden semi-Markov models performed better, and were retained for inferring the behavioral modes on the entire VMS dataset. At the second scale considered, each shing trip was characterized by several features, including the time spent within each behavioral mode. Using a clustering analysis, shing trip patterns were classi ed into groups associated to management zones, eet segments and skippers' personalities. At the third scale considered, we analyzed how ecological conditions shaped shermen behavior. By means of co-inertia analyses, we found signi cant associations between shermen, anchovy and environmental spatial dynamics, and shermen behavioral responses were characterized according to contrasted environmental scenarios. At the fourth scale considered, we investigated whether the spatial behavior of shermen re ected to some extent the spatial distribution of anchovy. Finally, this work provides a wider view of shermen behavior: shermen are not only economic agents, but they are also foragers, constrained by ecosystem variability. To conclude, we discuss how these ndings may be of importance for sheries management, collective behavior analyses and end-to-end models.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Adverse Outcome Pathway (AOP) framework provides a template that facilitates understanding of complex biological systems and the pathways of toxicity that result in adverse outcomes (AOs). The AOP starts with an molecular initiating event (MIE) in which a chemical interacts with a biological target(s), followed by a sequential series of KEs, which are cellular, anatomical, and/or functional changes in biological processes, that ultimately result in an AO manifest in individual organisms and populations. It has been developed as a tool for a knowledge-based safety assessment that relies on understanding mechanisms of toxicity, rather than simply observing its adverse outcome. A large number of cellular and molecular processes are known to be crucial to proper development and function of the central (CNS) and peripheral nervous systems (PNS). However, there are relatively few examples of well-documented pathways that include causally linked MIEs and KEs that result in adverse outcomes in the CNS or PNS. As a first step in applying the AOP framework to adverse health outcomes associated with exposure to exogenous neurotoxic substances, the EU Reference Laboratory for Alternatives to Animal Testing (EURL ECVAM) organized a workshop (March 2013, Ispra, Italy) to identify potential AOPs relevant to neurotoxic and developmental neurotoxic outcomes. Although the AOPs outlined during the workshop are not fully described, they could serve as a basis for further, more detailed AOP development and evaluation that could be useful to support human health risk assessment in a variety of ways.