849 resultados para Desirable events


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wishful thinking (WT) implies the overestimation of the likelihood of desirable events. It occurs for outcomes of personal interest, but also for events of interest to others we like. We investigated whether WT is grounded on low-level selective attention or on higher level cognitive processes including differential weighting of evidence or response formation. Participants in our MRI study predicted the likelihood that their favorite or least favorite team would win a football game. Consistent with expectations, favorite team trials were characterized by higher winning odds. Our data demonstrated activity in a cluster comprising parts of the left inferior occipital and fusiform gyri to distinguish between favorite and least favorite team trials. More importantly, functional connectivities of this cluster with the human reward system were specifically involved in the type of WT investigated in our study, thus supporting the idea of an attention bias generating WT. Prefrontal cortex activity also distinguished between the two teams. However, activity in this region and its functional connectivities with the human reward system were altogether unrelated to the degree of WT reflected in the participants' behavior and may rather be related to social identification, ensuring the affective context necessary for WT to arise.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Video surveillance infrastructure has been widely installed in public places for security purposes. However, live video feeds are typically monitored by human staff, making the detection of important events as they occur difficult. As such, an expert system that can automatically detect events of interest in surveillance footage is highly desirable. Although a number of approaches have been proposed, they have significant limitations: supervised approaches, which can detect a specific event, ideally require a large number of samples with the event spatially and temporally localised; while unsupervised approaches, which do not require this demanding annotation, can only detect whether an event is abnormal and not specific event types. To overcome these problems, we formulate a weakly-supervised approach using Kullback-Leibler (KL) divergence to detect rare events. The proposed approach leverages the sparse nature of the target events to its advantage, and we show that this data imbalance guarantees the existence of a decision boundary to separate samples that contain the target event from those that do not. This trait, combined with the coarse annotation used by weakly supervised learning (that only indicates approximately when an event occurs), greatly reduces the annotation burden while retaining the ability to detect specific events. Furthermore, the proposed classifier requires only a decision threshold, simplifying its use compared to other weakly supervised approaches. We show that the proposed approach outperforms state-of-the-art methods on a popular real-world traffic surveillance dataset, while preserving real time performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The object of this study is a tailless internal membrane-containing bacteriophage PRD1. It has a dsDNA genome with covalently bound terminal proteins required for replication. The uniqueness of the structure makes this phage a desirable object of research. PRD1 has been studied for some 30 years during which time a lot of information has accumulated on its structure and life-cycle. The two least characterised steps of the PRD1 life-cycle, the genome packaging and virus release are investigated here. PRD1 shares the main principles of virion assembly (DNA packaging in particular) and host cell lysis with other dsDNA bacteriophages. However, this phage has some fascinating individual peculiarities, such as DNA packaging into a membrane vesicle inside the capsid, absence of apparent portal protein, holin inhibitor and procapsid expansion. In the course of this study we have identified the components of the DNA packaging vertex of the capsid, and determined the function of protein P6 in packaging. We managed to purify the procapsids for an in vitro packaging system, optimise the reaction and significantly increase its efficiency. We developed a new method to determine DNA translocation and were able to quantify the efficiency and the rate of packaging. A model for PRD1 DNA packaging was also proposed. Another part of this study covers the lysis of the host cell. As other dsDNA bacteriophages PRD1 has been proposed to utilise a two-component lysis system. The existence of this lysis system in PRD1 has been proven by experiments using recombinant proteins and the multi-step nature of the lysis process has been established.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is a tremendous desire to attribute causes to weather and climate events that is often challenging from a physical standpoint. Headlines attributing an event solely to either human-induced climate change or natural variability can be misleading when both are invariably in play. The conventional attribution framework struggles with dynamically driven extremes because of the small signal-to-noise ratios and often uncertain nature of the forced changes. Here, we suggest that a different framing is desirable, which asks why such extremes unfold the way they do. Specifically, we suggest that it is more useful to regard the extreme circulation regime or weather event as being largely unaffected by climate change, and question whether known changes in the climate system's thermodynamic state affected the impact of the particular event. Some examples briefly illustrated include 'snowmaggedon' in February 2010, superstorm Sandy in October 2012 and supertyphoon Haiyan in November 2013, and, in more detail, the Boulder floods of September 2013, all of which were influenced by high sea surface temperatures that had a discernible human component.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The occurrence of and conditions favourable to nucleation were investigated at an industrial and commercial coastal location in Brisbane, Australia during five different campaigns covering a total period of 13 months. To identify potential nucleation events, the difference in number concentration in the size range 14-30 nm (N14-30) between consecutive observations was calculated using first-order differencing. The data showed that nucleation events were a rare occurrence, and that in the absence of nucleation the particle number was dominated by particles in the range 30-300 nm. In many instances, total particle concentration declined during nucleation. There was no clear pattern in change in NO and NO2 concentrations during the events. SO2 concentration, in the majority of cases, declined during nucleation but there were exceptions. Most events took place in summer, followed by winter and then spring, and no events were observed for the autumn campaigns. The events were associated with sea breeze and long-range transport. Roadside emissions, in contrast, did not contribute to nucleation, probably due to the predominance of particles in the range 50-100 nm associated with these emissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research project set out to explore Unitary Authority (UA) involvement in festivals and special events across Wales. It considers the level and nature of UA involvement and investigates activity by event purpose; reasons for, and characteristics of, UA engagement; and, crucially, the extent and nature of event evaluation. The study’s aim was to begin the development of a baseline of information for further research into the growing use of festivals and special events as a strategy for local economic development in Wales. A quantitative survey approach facilitated a comprehensive snapshot of UA responses whilst also incorporating discursive elements. A telephone survey was designed and undertaken with representatives of all 22 UA departments responsible for festivals and events in Wales. The research reveals a significant level of festival and special event activity across Wales, supported primarily for its perceived socio-cultural value. However, evaluation would appear to be focused on improving processes and measuring economic outputs rather than assessing whether socio-cultural objectives are being achieved. Whilst overwhelmingly positive about efforts to improve approaches to evaluation, respondents held clear views about the complications most likely to hamper any such efforts. These responses focused upon the need for flexibility, cost effectiveness and comparability across festival and special event typologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Entrepreneurial marketing has gained popularity in both the entrepreneurship and marketing disciplines in recent times. The success of ventures that have pursued what are considered non-traditional marketing approaches has been attributed to entrepreneurial marketing practices. Despite the multitude of marketing concepts and models, there are prominent venture successes that do not conform to these and have thus been put in the ''entrepreneurial'' box. One only has to look to the ''Virgin'' model to put this in context. Branson has proven for example that not ''sticking to the knitting'' can work with the ways the Virgin portfolio has been diversified. Consequently, an entrepreneurial orientation is considered a desirable philosophy and has become prominent in such industries as airlines and information technology. Miles and Arnold (1991) found that entrepreneurial orientation is positively correlated to marketing orientation. They propose that entrepreneurial orientation is a strategic response by firms to turbulence in the environment. While many marketing successes are analysed in hindsight using traditional marketing concepts and strategies, there are those that challenge standard marketing textbook recommendations. Marketing strategy is often viewed as a process of targeting, segmenting and positioning (STP). Academics and consultants advocate this approach along with the marketing and business plans. The reality however is that a number of businesses do not practice these and pursue alternative approaches. Other schools of thought and business models have been developing to explain differences in orientation such as branding (Keller 2001), the service-dominant logic (Vargo and Lusch 2004) and effectuation logic (Sarasvathy 2001). This indicates that scholars are now looking to cognate fields to explain a given phenomenon beyond their own disciplines. Bucking this trend is a growing number of researchers working at the interface between entrepreneurship and marketing. There is now an emerging body of work dedicated to this interface, hence the development of entrepreneurial marketing as an alternative to the traditional approaches. Hills and Hultman (2008:3) define entrepreneurial marketing as ''a spirit, an orientation as well as a process of passionately pursuing opportunities and launching and growing ventures that create perceived customer value through relationships by employing innovativeness, creativity, selling, market immersion, networking and flexibility.'' Although it started as a special interest group, entrepreneurial marketing is now gaining recognition in mainstream entrepreneurship and marketing literature. For example new marketing textbooks now incorporate an entrepreneurial marketing focus (Grewal and Levy 2008). The purpose of this paper is to explore what entrepreneurial approaches are used by entrepreneurs and their impact on the success of marketing activities. Methodology/Key Propositions In order to investigate this, we employ two cases: 42Below, vodka producers from New Zealand and Penderyn Distillery, whisky distillers from Wales. The cases were chosen based on the following criteria. Firstly, both companies originate from small economies. Secondly, both make products (spirits) from locations that are not traditionally regarded as producers of their flagship products and thirdly, the two companies are different from each other in terms of their age. Penderyn is an old company established in 1882, whereas 42Below was founded only in 1999. Vodka has never been associated with New Zealand. By the same token, whisky has always been associated with Scotland and Ireland but never been with Wales. Both companies defied traditional stereotypes in marketing their flagship products and found international success. Using a comparative a case study approach, we use Covin and Slevin's (1989) set of items that purport to measure entrepreneurial orientation and apply a qualitative lens on the approaches of both companies. These are: 1. cultural emphases on innovation and R&D 2. high rate of new product introduction 3. bold, innovative product development 4. initiator proactive posture 5. first to introduce new technologies and products 6. competitive posture toward competitor 7. strong prolictivity for high risk, high return projects 8. environment requires boldness to achieve objectives 9. when faced with risk, adopts aggressive, bold posture. Results and Implications We find that both companies have employed entrepreneurial marketing approaches but with different intensities. While acknowledging that they are different from the norm, the specifics of their individual approaches are dissimilar. Both companies have positioned their products at the premium end of their product categories and have emphasised quality and awards in their communication strategies. 42Below has carved an image of irreverence and being non-conformist. They have unashamedly utilised viral marketing and entered international markets by training bartenders and hosting unconventional events. They use edgy language such as vodka university, vodka professors and vodka ambassadors. Penderyn Distillery has taken a more traditional approach to marketing its products and portraying romantic images of age-old tradition of distilling as key to their positioning. Both companies enjoy success as evidenced by industry awards and international acclaim.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.