988 resultados para Fisk-taking Behavior


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, we explain the behavior of multijunction solar cells under non-uniform (spatially and in spectral content) light profiles in general and in particular when Gaussian light profiles cause a photo-generated current density, which exceeds locally the peak current density of the tunnel junction. We have analyzed the implications on the tunnel junction's limitation, that is, in the loss of efficiency due to the appearance of a dip in the I–V curve. For that, we have carried out simulations with our three-dimensional distributed model for multijunction solar cells, which contemplates a full description of the tunnel junction and also takes into account the lateral resistances in the tunnel junction. The main findings are that the current density photo-generated spreads out through the lateral resistances of the device, mainly through the tunnel junction layers and the back contact. Therefore, under non-uniform light profiles these resistances are determinant not only to avoid the tunnel junction's limitation but also for mitigating losses in the fill factor. Therefore, taking into account these lateral resistances could be the key for jointly optimizing the concentrator photovoltaic system (concentrator optics, front grid layout and semiconductor structure)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this paper is to analyze the quasi-elastic deformational behavior that has been induced by groundwater withdrawal of the Tertiary detrital aquifer of Madrid (Spain). The spatial and temporal evolution of ground surface displacement was estimated by processing two datasets of radar satellite images (SAR) using Persistent Scatterer Interferometry (PSI). The first SAR dataset was acquired between April 1992 and November 2000 by ERS-1 and ERS-2 satellites, and the second one by the ENVISAT satellite between August 2002 and September 2010. The spatial distribution of PSI measurements reveals that the magnitude of the displacement increases gradually towards the center of the well field area, where approximately 80 mm of maximum cumulated displacement is registered. The correlation analysis made between displacement and piezometric time series provides a correlation coefficient greater than 85% for all the wells. The elastic and inelastic components of measured displacements were separated, observing that the elastic component is, on average, more than 4 times the inelastic component for the studied period. Moreover, the hysteresis loops on the stress–strain plots indicate that the response is in the elastic range. These results demonstrate the quasi-elastic behavior of the aquifer. During the aquifer recovery phase ground surface uplift almost recovers from the subsidence experienced during the preceding extraction phase. Taking into account this unique aquifer system, a one dimensional elastic model was calibrated in the period 1997–2000. Subsequently, the model was used to predict the ground surface movements during the period 1992–2010. Modeled displacements were validated with PSI displacement measurements, exhibiting an error of 13% on average, related with the inelastic component of deformation occurring as a long-term trend in low permeability fine-grained units. This result further demonstrates the quasi-elastic deformational behavior of this unique aquifer system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We assess, through VAR evidence, the effects of monetary policy on banks’ risk exposure and find the presence of a risk-taking channel. A model combining fragile banks prone to risk mis-incentives and credit constrained firms, whose collateral fluctuations generate a balance sheet channel, is used to rationalize the evidence. A monetary expansion increases bank leverage. With two consequences: on the one side this exacerbates risk exposure; on the other, the risk spiral depresses output, therefore dampening the conventional amplification effect of the financial accelerator. Keywords: monetary policy, bank behavior, leverage, financial accelerator.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The human turn-taking system regulates the smooth and precise exchange of speaking turns during face-to-face interaction. Recent studies investigated the processing of ongoing turns during conversation by measuring the eye movements of noninvolved observers. The findings suggest that humans shift their gaze in anticipation to the next speaker before the start of the next turn. Moreover, there is evidence that the ability to timely detect turn transitions mainly relies on the lexico-syntactic content provided by the conversation. Consequently, patients with aphasia, who often experience deficits in both semantic and syntactic processing, might encounter difficulties to detect and timely shift their gaze at turn transitions. To test this assumption, we presented video vignettes of natural conversations to aphasic patients and healthy controls, while their eye movements were measured. The frequency and latency of event-related gaze shifts, with respect to the end of the current turn in the videos, were compared between the two groups. Our results suggest that, compared with healthy controls, aphasic patients have a reduced probability to shift their gaze at turn transitions but do not show significantly increased gaze shift latencies. In healthy controls, but not in aphasic patients, the probability to shift the gaze at turn transition was increased when the video content of the current turn had a higher lexico-syntactic complexity. Furthermore, the results from voxel-based lesion symptom mapping indicate that the association between lexico-syntactic complexity and gaze shift latency in aphasic patients is predicted by brain lesions located in the posterior branch of the left arcuate fasciculus. Higher lexico-syntactic processing demands seem to lead to a reduced gaze shift probability in aphasic patients. This finding may represent missed opportunities for patients to place their contributions during everyday conversation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-06

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As alcohol molecules such as methanol and ethanol have both polar and non-polar groups, their adsorption behavior is governed by the contributions of dispersion interaction (alkyl group) and hydrogen bonding (OH group). In this paper, the adsorption behavior of alcohol molecules and its effect on transport processes are elucidated. From the total permeability (B-T) of alcohol molecules in activated carbon, an adsorption mechanism is proposed, describing well the experimental data, by taking combination effects of clustering, entering micropores, layering and pore filling processes. Unlike the case of non-polar compounds, it was found that at low pressures there are two rises in the BT of alcohol molecules in activated carbon. The first rise is due to the major contribution of surface diffusion to the transport (which is the case of non-polar molecules) and the second one may be associated with cluster formation at the edge of micropores and entering micropores when the clusters are sufficiently large enough to induce a dispersive energy. In addition the clusters formed may enhance surface diffusion at low pressures and hinder gas phase diffusion and flow in meso/macropores. (c) 2006 Elsevier Ltd. All fights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examined the association of theoretically guided and empirically identified psychosocial variables on the co-occurrence of risky sexual behavior with alcohol consumption among university students. The study utilized event analysis to determine whether risky sex occurred during the same event in which alcohol was consumed. Relevant conceptualizations included alcohol disinhibition, self-efficacy, and social network theories. Predictor variables included negative condom attitudes, general risk taking, drinking motives, mistrust, social group membership, and gender. Factor analysis was employed to identify dimensions of drinking motives. Measured risky sex behaviors were (a) sex without a condom, (b) sex with people not known very well, (c) sex with injecting drug users (IDUs), (d) sex with people without knowing whether they had a STD, and (e) sex with using drugs. A purposive sample was used and included 222 male and female students recruited from a major urban university. Chi-square analysis was used to determine whether participants were more likely to engage in risky sex behavior in different alcohol use contexts. These contexts were only when drinking, only when not drinking, and when drinking or not. The chi-square findings did not support the hypothesis that university students who use alcohol with sex will engage in riskier sex. These results added to the literature by extending other similar findings to a university student sample. For each of the observed risky sex behaviors, discriminant analysis methodology was used to determine whether the predictor variables would differentiate the drinking contexts, or whether the behavior occurred. Results from discriminant analyses indicated that sex with people not known very well was the only behavior for which there were significant discriminant functions. Gender and enhancement drinking motives were important constructs in the classification model. Limitations of the study and implications for future research, social work practice and policy are discussed. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examined the association of theoretically guided and empirically identified psychosocial variables on the co-occurrence of risky sexual behavior with alcohol consumption among university students. The study utilized event analysis to determine whether risky sex occurred during the same event in which alcohol was consumed. Relevant conceptualizations included alcohol disinhibition, self-efficacy, and social network theories. Predictor variables included negative condom attitudes, general risk taking, drinking motives, mistrust, social group membership, and gender. Factor analysis was employed to identify dimensions of drinking motives. Measured risky sex behaviors were (a) sex without a condom, (b) sex with people not known very well, (c) sex with injecting drug users (IDUs), (d) sex with people without knowing whether they had a STD, and (e) sex with using drugs. A purposive sample was used and included 222 male and female students recruited from a major urban university. Chi-square analysis was used to determine whether participants were more likely to engage in risky sex behavior in different alcohol use contexts. These contexts were only when drinking, only when not drinking, and when drinking or not. The chi-square findings did not support the hypothesis that university students who use alcohol with sex will engage in riskier sex. These results added to the literature by extending other similar findings to a university student sample. For each of the observed risky sex behaviors, discriminant analysis methodology was used to determine whether the predictor variables would differentiate the drinking contexts, or whether the behavior occurred. Results from discriminant analyses indicated that sex with people not known very well was the only behavior for which there were significant discriminant functions. Gender and enhancement drinking motives were important constructs in the classification model. Limitations of the study and implications for future research, social work practice and policy are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increase in the demand for the freight shipping in the United States has been predicted for the near future and Longer Combination Vehicles (LCVs), which can carry more loads in each trip, seem like a good solution for the problem. Currently, utilizing LCVs is not permitted in most states of the US and little research has been conducted on the effects of these heavy vehicles on the roads and bridges. In this research, efforts are made to study these effects by comparing the dynamic and fatigue effects of LCVs with more common trucks. Ten Steel and prestressed concrete bridges with span lengths ranging from 30’ to 140’ are designed and modeled using the grid system in MATLAB. Additionally, three more real bridges including two single span simply supported steel bridges and a three span continuous steel bridge are modeled using the same MATLAB code. The equations of motion of three LCVs as well as eight other trucks are derived and these vehicles are subjected to different road surface conditions and bumps on the roads and the designed and real bridges. By forming the bridge equations of motion using the mass, stiffness and damping matrices and considering the interaction between the truck and the bridge, the differential equations are solved using the ODE solver in MATLAB and the results of the forces in tires as well as the deflections and moments in the bridge members are obtained. The results of this study show that for most of the bridges, LCVs result in the smallest values of Dynamic Amplification Factor (DAF) whereas the Single Unit Trucks cause the highest values of DAF when traveling on the bridges. Also in most cases, the values of DAF are observed to be smaller than the 33% threshold suggested by the design code. Additionally, fatigue analysis of the bridges in this study confirms that by replacing the current truck traffic with higher capacity LCVs, in most cases, the remaining fatigue life of the bridge is only slightly decreased which means that taking advantage of these larger vehicles can be a viable option for decision makers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent research has found that even preschoolers give more resources to others who have previously given resources to them, but the psychological bases of this reciprocity are unknown. In our study, a puppet distributed resources between herself and a child by taking some from a pile in front of the child or else by giving some from a pile in front of herself. Although the resulting distributions were identical, three- and five-year-olds reciprocated less generously when the puppet had taken rather than given resources. This suggests that children’s judgments about resource distribution are more about the social intentions of the distributor and the social framing of the distributional act than about the amount of resources obtained. In order to rule out that the differences in the children’s reciprocal behavior were merely due to experiencing gains and losses, we conducted a follow-up study. Here, three- and-five year olds won or lost resources in a lottery draw and could then freely give or take resources to/from a puppet, respectively. In this study, they did not respond differently after winning vs. losing resources.