878 resultados para BEHAVIORAL SENSITIZATION
Resumo:
Objectives. To study the relationship between nocturnal periodic breathing episodes and behavioral awakenings at high altitude. Methods. Observational study. It is 6-day ascent of 4 healthy subjects from Besisahar (760 meters) to Manang (3540 meters) in Nepal in March 2012. A recording pulse oximeter was worn by each subject to measure their oxygen saturation and the presence of periodic breathing continuously through the night. An actigraph was simultaneously worn in order to determine nocturnal behavioral awakenings. There were no interventions. Results. 187-hour sleep at high altitude was analyzed, and of this, 145 hours (78%) had at least one PB event. At high altitude, 10.5% (95% CI 6.5-14.6%) of total sleep time was spent in PB while 15 out of 50 awakenings (30%, 95% CI: 18-45%) occurring at high altitudes were associated with PB (P < 0.001). Conclusions. Our data reveals a higher than expected number of behavioral awakenings associated with PB compared to what would be expected by chance. This suggests that PB likely plays a role in behavioral awakenings at high altitude.
Resumo:
The past decade has seen a dramatic increase in interest in the use of gold nanoparticles (GNPs) as radiation sensitizers for radiation therapy. This interest was initially driven by their strong absorption of ionizing radiation and the resulting ability to increase dose deposited within target volumes even at relatively low concentrations. These early observations are supported by extensive experimental validation, showing GNPs' efficacy at sensitizing tumors in both in vitro and in vivo systems to a range of types of ionizing radiation, including kilovoltage and megavoltage X rays as well as charged particles. Despite this experimental validation, there has been limited translation of GNP-mediated radiation sensitization to a clinical setting. One of the key challenges in this area is the wide range of experimental systems that have been investigated, spanning a range of particle sizes, shapes, and preparations. As a result, mechanisms of uptake and radiation sensitization have remained difficult to clearly identify. This has proven a significant impediment to the identification of optimal GNP formulations which strike a balance among their radiation sensitizing properties, their specificity to the tumors, their biocompatibility, and their imageability in vivo. This white paper reviews the current state of knowledge in each of the areas concerning the use of GNPs as radiosensitizers, and outlines the steps which will be required to advance GNP-enhanced radiation therapy from their current pre-clinical setting to clinical trials and eventual routine usage.
Resumo:
Otto-von Guericke-Universität Magdeburg, Fakultät für Naturwissenschaften, Dissertation, 2016
Resumo:
This article introduces the concept of error recovery performance, followed by the development and validation of an instrument to measure it. The first objective of this article is to broaden the current concept of service recovery to be relevant to the back-of-house operations. The second objective is to examine the influence of leader behavioral integrity (BI) on error recovery performance. Moreover, the study examines the mediating effect of job satisfaction between BI and error recovery performance. Finally, the study links error management performance with work-unit effectiveness. Data for Study 1 were collected from 369 hotel employees in Turkey. The same relationships were tested again in Study 2 to validate the findings of Study 1 with a different sample. Data for Study 2 were collected from 33 departmental managers from the same hotels. Linear regression analysis was used to test the direct effects. The mediating effects were tested using the mediation test suggested by Preacher and Hayes. In addition, in Study 2, general managers of the hotels were asked to rate the effectiveness of each manager and their respective department. Results from Study 1 indicate that BI drives error recovery performance, and this impact is mediated by employee job satisfaction. Results of Study 2 confirm this model and finds further that managers’ self-rated error recovery performance was associated with their general managers’ assessment of their deliverables and of their department’s overall performance.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
Behavioral integrity (BI) is the perception that another person, group, or entity lives by his word—delivers on promises and enacts the same values he espouses. This construct is more basic than trust or justice, and is typically measured as the perceived pattern of alignment between words and deeds. Empirical studies have shown it to have powerful positive consequences for the attitudes and performance of followers, managers, and organizations, and also that BI moderates the impact of other leader behaviors on these outcomes. Only a few studies have examined antecedents, and fewer still have examined moderated antecedents. Although initial terrain has been sketched out by early studies, there is much yet to learn about the workings of this high-potential construct.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
This work advances a research agenda which has as its main aim the application of Abstract Algebraic Logic (AAL) methods and tools to the specification and verification of software systems. It uses a generalization of the notion of an abstract deductive system to handle multi-sorted deductive systems which differentiate visible and hidden sorts. Two main results of the paper are obtained by generalizing properties of the Leibniz congruence — the central notion in AAL. In this paper we discuss a question we posed in [1] about the relationship between the behavioral equivalences of equivalent hidden logics. We also present a necessary and sufficient intrinsic condition for two hidden logics to be equivalent.
Resumo:
There is a limited amount of research in the area of missing persons, especially adults. The aim of this research is to expand on the understanding of missing people, by examining adults' behaviours while missing and determining if distinct behavioural themes exist. Based on previous literature it was hypothesised that three behavioural themes will be present; dysfunctional, escape, and unintentional. Thirty-six behaviours were coded from 362 missing person police reports and analysed using smallest space analysis (SSA). This produced a spatial representation of the behaviours, showing three distinct behavioural themes. Seventy percent of the adult missing person reports were classified under one dominant theme, 41% were ‘unintentional’, 18% were ‘dysfunctional’, and 11% were ‘escape’. The relationship between a missing person's dominant behavioural theme and their assigned risk level and demographic characteristics were also analysed. A significant association was found between the age, occupational status, whether they had any mental health issues, and the risk level assigned to the missing person; and their dominant behavioural theme. The findings are the first step in the development of a standardised checklist for a missing person investigation. This has implications on how practitioners prioritise missing adults, and interventions to prevent individuals from going missing. Copyright © 2016 John Wiley & Sons, Ltd.
Resumo:
Resumo:
Attention Deficit Hyperactivity Disorder is a neurodevelopmental disorder correlated with a decrease in brain dopamine and an increase in behavioral symptoms of hyperactivity and impulsivity. This experiment explored how tartrazine (Yellow #5) impacts these symptoms. After tartrazine administration to Spontaneously Hypertensive Rats (SHR), dopamine concentrations in regions of brain tissue were measured using Enzyme-Linked Immunosorbent Assay analysis. Behavioral testing with a T-maze and open field test measured impulsivity and hyperactivity, respectively. Results indicate that dietary tartrazine increases hyperactive behaviors in the SHR. However, results do not indicate a relationship between dietary tartrazine and brain dopamine. No conclusions regarding the relationship between dietary tartrazine and impulsivity were drawn.
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.