863 resultados para morphologic behaviors
Resumo:
We evaluated sustainability of an intervention to reduce women’s cardiovascular risk factors, determined the influence of self-efficacy, and described women’s current health. We used a mixed method approach that utilized forced choice and open-ended questionnaire items about health status, habits, and self-efficacy. Sixty women, average age 61, returned questionnaires. Women in the original intervention group continued health behaviors intended to reduce cardiovascular disease (CVD) at a higher rate than the control group, supporting the feasibility of a targeted intervention built around women’s individual goals. The role of self-efficacy in behavior change is unclear. The original intervention group reported higher self-reported health.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
Purpose of the Study: A framework aids choice of interventions to manage wandering and prevent elopement in consideration of associated risks and mobility needs of wanderers. ---------- Design and Methods: A literature review, together with research results, published wandering tools, clinical reports, author clinical experience, and consensus-based judgments was used to build a decision-making framework. Results: Referencing a published definition of wandering and originating a clinical description of problematic wandering, authors introduce a framework comprising (1) wandering and related behaviors; (2) goals of wandering-specific care, (3) interpersonally, technologically, and policy-mediated wandering interventions, and (4) estimates of relative frequencies of wandering behaviors, magnitudes of elopement risk, and restrictiveness of strategies. ---------- Implications: Safeguarding wanderers from elopement risk is rendered person-centered and humane when goals of care guide intervention choice. Despite limitations, a reasoned, systematized approach to wandering management provides a basis for tailoring a specialized program of care. The need for framework refinement and related research is emphasized.
Resumo:
European American (EA) women report greater body dissatisfaction and less dietary control than do African American (AA) women. This study investigated whether ethnic differences in dieting history contributed to differences in body dissatisfaction and dietary control, or to differential changes that may occur during weight loss and regain. Eighty-nine EA and AA women underwent dual-energy X-ray absorptiometry to measure body composition and completed questionnaires to assess body dissatisfaction and dietary control before, after, and one year following, a controlled weight-loss intervention. While EA women reported a more extensive dieting history than AA women, this difference did not contribute to ethnic differences in body dissatisfaction and perceived dietary control. During weight loss, body satisfaction improved more for AA women, and during weight regain, dietary self-efficacy worsened to a greater degree for EA women. Ethnic differences in dieting history did not contribute significantly to these differential changes. Although ethnic differences in body image and dietary control are evident prior to weight loss, and some change differentially by ethnic group during weight loss and regain, differences in dieting history do not contribute significantly to ethnic differences in body image and dietary control.
Resumo:
The OED informs us that “gender” has at its root the Latin genus, meaning “race, kind,” and emerges as early as the fifth century as a term for differentiating between types of (especially) people and words. In the following 1500 years, gender appears in linguistic and biological contexts to distinguish types of words and bodies from one another, as when words in Indo-European languages were identified as masculine, feminine, or neuter, and humans were identified as male or female. It is telling that gender has historically (whether overtly or covertly) been a tool of negotiation between our understandings of bodies, and meanings derived from and attributed to them. Within the field of children’s literature studies, as in other disciplines, gender in and of itself is rarely the object of critique. Rather, specific constructions of gender structure understandings of subjectivity; allow or disallow certain behaviors or experiences on the basis of biological sex; and dictate a specific vision of social relations and organization. Critical approaches to gender in children’s literature have included linguistic analysis (Turner-Bowker; Sunderland); analysis of visual representations (Bradford; Moebius); cultural images of females (Grauerholz and Pescosolido); consideration of gender and genre (Christian-Smith; Stephens); ideological (Nodelman and Reimer); psychoanalytic (Coats); discourse analysis (Stephens); and masculinity studies (Nodelman) among others. In the adjacent fields of education and literacy studies, gender has been a sustained point of investigation, often deriving from perceived gendering of pedagogical practices (Lehr) or of reading preferences and competencies, and in recent years, perceptions of boys as “reluctant readers” (Moss). The ideology of patriarchy has primarily come under critical scrutiny 2 because it has been used to locate characters and readers within the specific binary logic of gender relations that historically subordinated the feminine to the masculine. Just as feminism might be broadly defined as resistance to existing power structures, a gendered reading might be broadly defined as a “resistant reading” in that it most often reveals or contests that which a text assumes to be the norm.
Resumo:
This paper presents the results from a study of information behaviors in the context of people's everyday lives undertaken in order to develop an integrated model of information behavior (IB). 34 participants from across 6 countries maintained a daily information journal or diary – mainly through a secure web log – for two weeks, to an aggregate of 468 participant days over five months. The text-rich diary data was analyzed using a multi-method qualitative-quantitative analysis in the following order: Grounded Theory analysis with manual coding, automated concept analysis using thesaurus-based visualization, and finally a statistical analysis of the coding data. The findings indicate that people engage in several information behaviors simultaneously throughout their everyday lives (including home and work life) and that sense-making is entangled in all aspects of them. Participants engaged in many of the information behaviors in a parallel, distributed, and concurrent fashion: many information behaviors for one information problem, one information behavior across many information problems, and many information behaviors concurrently across many information problems. Findings indicate also that information avoidance – both active and passive avoidance – is a common phenomenon and that information organizing behaviors or the lack thereof caused the most problems for participants. An integrated model of information behaviors is presented based on the findings.
Resumo:
Adolescent drinking is a significant issue yet valid psychometric tools designed for this group are scarce. The Drinking Refusal Self-Efficacy Questionnaire—Revised Adolescent Version (DRSEQ-RA) is designed to assess an individual's belief in their ability to resist drinking alcohol. The original DRSEQ-R consists of three factors reflecting social pressure refusal self-efficacy, opportunistic refusal self-efficacy and emotional relief refusal self-efficacy. A large sample of 2020 adolescents aged between 12 and 19 years completed the DRSEQ and measures of alcohol consumption in small groups. Using confirmatory factor analysis, the three factor structure was confirmed. All three factors were negatively correlated with both frequency and volume of alcohol consumption. Drinkers reported lower drinking refusal self-efficacy than non-drinkers. Taken together, these results suggest that the adolescent version of the Drinking Refusal Self-Efficacy Questionnaire (DRSEQ-RA) is a reliable and valid measure of drinking refusal self-efficacy.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
Ghrelin and obestatin are two peptides associated with appetite control and the regulation of energy balance in adults. It is intuitive that they have an important role in growth and development during puberty. Therefore, it is acknowledged that these peptides, in addition to others, form part of the substrate underlying energy homeostasis which in turn will contribute to body weight regulation and could explain changes in energy balance during puberty. Both peptides originate from the stomach; hence, it is intuitive that they are involved in generating signals from tissue stores which influence food intake. This could be manifested via alterations in the drive to eat (i.e. hunger), eating behaviors and appetite regulation. Furthermore, there is some evidence that these peptides might also be associated with physical activity behaviors and metabolism. Anecdotally, children and adolescents experience behavioral and metabolic changes during growth and development which will be associated with physiological changes.
Resumo:
Objective. To provide a preliminary test of a Theory of Planned Behavior (TPB) belief-based intervention to increase adolescents’ sun protective behaviors in a high risk area, Queensland, Australia. Methods. In the period of October-November, 2007 and May-June, 2008, 80 adolescents (14.53 ± 0.69 years) were recruited from two secondary schools (one government and one private) in Queensland after obtaining student, parental, and school informed consent. Adolescents were allocated to either a control or intervention condition based on the class they attended. The intervention comprised three, one hour in-school sessions facilitated by Cancer Council Queensland employees with sessions covering the belief basis of the TPB (i.e., behavioral, normative, and control [barrier and motivator] sun-safe beliefs). Participants completed questionnaires assessing sun-safety beliefs, intentions, and behavior pre- and post-intervention. Repeated Measures Multivariate Analysis of Variance was used to test the effect of the intervention across time on these constructs. Results. Students completing the intervention reported stronger sun-safe normative and motivator beliefs and intentions and the performance of more sun-safe behaviors across time than those in the control condition. Conclusion. Strengthening beliefs about the approval of others and motivators for sun protection may encourage sun-safe cognitions and actions among adolescents.
Resumo:
Leading scholars on nonprofit governance have urged that future research be more informed by theory in order to promote more rigorous analysis. The aim of this paper is to survey the major theories on board governance, including those based in the disciplines of economics, management, sociology, psychology, politics, history and theology, in order to respond to this challenge. In addition, the relevance of these theories to a critical set of board behaviors - that is, how boards monitor, judge and influence organizational performance - is examined. Gaps in the theoretical literature are identified, and implications for public policy are explored. We conclude that a multi-theory and multi-disciplinary perspective is needed if research on governance of nonprofit organizations is to be complete in scope, rich in content, and relevant.
Resumo:
This thesis deals with the problem of the instantaneous frequency (IF) estimation of sinusoidal signals. This topic plays significant role in signal processing and communications. Depending on the type of the signal, two major approaches are considered. For IF estimation of single-tone or digitally-modulated sinusoidal signals (like frequency shift keying signals) the approach of digital phase-locked loops (DPLLs) is considered, and this is Part-I of this thesis. For FM signals the approach of time-frequency analysis is considered, and this is Part-II of the thesis. In part-I we have utilized sinusoidal DPLLs with non-uniform sampling scheme as this type is widely used in communication systems. The digital tanlock loop (DTL) has introduced significant advantages over other existing DPLLs. In the last 10 years many efforts have been made to improve DTL performance. However, this loop and all of its modifications utilizes Hilbert transformer (HT) to produce a signal-independent 90-degree phase-shifted version of the input signal. Hilbert transformer can be realized approximately using a finite impulse response (FIR) digital filter. This realization introduces further complexity in the loop in addition to approximations and frequency limitations on the input signal. We have tried to avoid practical difficulties associated with the conventional tanlock scheme while keeping its advantages. A time-delay is utilized in the tanlock scheme of DTL to produce a signal-dependent phase shift. This gave rise to the time-delay digital tanlock loop (TDTL). Fixed point theorems are used to analyze the behavior of the new loop. As such TDTL combines the two major approaches in DPLLs: the non-linear approach of sinusoidal DPLL based on fixed point analysis, and the linear tanlock approach based on the arctan phase detection. TDTL preserves the main advantages of the DTL despite its reduced structure. An application of TDTL in FSK demodulation is also considered. This idea of replacing HT by a time-delay may be of interest in other signal processing systems. Hence we have analyzed and compared the behaviors of the HT and the time-delay in the presence of additive Gaussian noise. Based on the above analysis, the behavior of the first and second-order TDTLs has been analyzed in additive Gaussian noise. Since DPLLs need time for locking, they are normally not efficient in tracking the continuously changing frequencies of non-stationary signals, i.e. signals with time-varying spectra. Nonstationary signals are of importance in synthetic and real life applications. An example is the frequency-modulated (FM) signals widely used in communication systems. Part-II of this thesis is dedicated for the IF estimation of non-stationary signals. For such signals the classical spectral techniques break down, due to the time-varying nature of their spectra, and more advanced techniques should be utilized. For the purpose of instantaneous frequency estimation of non-stationary signals there are two major approaches: parametric and non-parametric. We chose the non-parametric approach which is based on time-frequency analysis. This approach is computationally less expensive and more effective in dealing with multicomponent signals, which are the main aim of this part of the thesis. A time-frequency distribution (TFD) of a signal is a two-dimensional transformation of the signal to the time-frequency domain. Multicomponent signals can be identified by multiple energy peaks in the time-frequency domain. Many real life and synthetic signals are of multicomponent nature and there is little in the literature concerning IF estimation of such signals. This is why we have concentrated on multicomponent signals in Part-H. An adaptive algorithm for IF estimation using the quadratic time-frequency distributions has been analyzed. A class of time-frequency distributions that are more suitable for this purpose has been proposed. The kernels of this class are time-only or one-dimensional, rather than the time-lag (two-dimensional) kernels. Hence this class has been named as the T -class. If the parameters of these TFDs are properly chosen, they are more efficient than the existing fixed-kernel TFDs in terms of resolution (energy concentration around the IF) and artifacts reduction. The T-distributions has been used in the IF adaptive algorithm and proved to be efficient in tracking rapidly changing frequencies. They also enables direct amplitude estimation for the components of a multicomponent
Resumo:
This paper describes Electronic Blocks, a new robot construction element designed to allow children as young as age three to build and program robotic structures. The Electronic Blocks encapsulate input, output and logic concepts in tangible elements that young children can use to create a wide variety of physical agents. The children are able to determine the behavior of these agents by the choice of blocks and the manner in which they are connected. The Electronic Blocks allow children without any knowledge of mechanical design or computer programming to create and control physically embodied robots. They facilitate the development of technological capability by enabling children to design, construct, explore and evaluate dynamic robotics systems. A study of four and five year-old children using the Electronic Blocks has demonstrated that the interface is well suited to young children. The complexity of the implementation is hidden from the children, leaving the children free to autonomously explore the functionality of the blocks. As a consequence, children are free to move their focus beyond the technology. Instead they are free to focus on the construction process, and to work on goals related to the creation of robotic behaviors and interactions. As a resource for robot building, the blocks have proved to be effective in encouraging children to create robot structures, allowing children to design and program robot behaviors.
Resumo:
Background Wandering represents a major problem in the management of patients with Alzheimer’s disease (AD). In this study we examined the utility of the Algase Wandering Scale (AWS), a newly developed psychometric instrument that asks caregivers to assess the likelihood of wandering behavior. Methods The AWS was administered to the caregivers of 40 AD patients and total and subscale scores were examined in relation to measures of mental and functional status, depressive symptoms and medication usage. Results AWS scores were comparable, though slightly lower, than those normative values previously published. Higher scores were associated with more severe dementia. The Negative Outcome subscale showed a significant increase in reported falls or injuries in association with anti-depressant use. Conclusions These data provide some construct validation for the AWS as a potentially useful scale to assess wandering behaviors in AD.