997 resultados para Side windows.


Relevância:

70.00% 70.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Misperception of speed under low-contrast conditions has been identified as a possible contributor to motor vehicle crashes in fog. To test this hypothesis, we investigated the effects of reduced contrast on drivers’ perception and control of speed while driving under real-world conditions. Fourteen participants drove around a 2.85 km closed road course under three visual conditions: clear view and with two levels of reduced contrast created by diffusing filters on the windscreen and side windows. Three dependent measures were obtained, without view of the speedometer, on separate laps around the road course: verbal estimates of speed; adjustment of speed to instructed levels (25 to 70 km h-1); and estimation of minimum stopping distance. The results showed that drivers traveled more slowly under low-contrast conditions. Reduced contrast had little or no effect on either verbal judgments of speed or estimates of minimum stopping distance. Speed adjustments were significantly slower under low-contrast than clear conditions, indicating that, contrary to studies of object motion, drivers perceived themselves to be traveling faster under conditions of reduced contrast. Under real-world driving conditions, drivers’ ability to perceive and control their speed was not adversely affected by large variations in the contrast of their surroundings. These findings suggest that perceptions of self-motion and object motion involve neural processes that are differentially affected by variations in stimulus contrast as encountered in fog.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Estimating the abundance of cetaceans from aerial survey data requires careful attention to survey design and analysis. Once an aerial observer perceives a marine mammal or group of marine mammals, he or she has only a few seconds to identify and enumerate the individuals sighted, as well as to determine the distance to the sighting and record this information. In line-transect survey analyses, it is assumed that the observer has correctly identified and enumerated the group or individual. We describe methods used to test this assumption and how survey data should be adjusted to account for observer errors. Harbor porpoises (Phocoena phocoena) were censused during aerial surveys in the summer of 1997 in Southeast Alaska (9844 km survey effort), in the summer of 1998 in the Gulf of Alaska (10,127 km), and in the summer of 1999 in the Bering Sea (7849 km). Sightings of harbor porpoise during a beluga whale (Phocoena phocoena) survey in 1998 (1355 km) provided data on harbor porpoise abundance in Cook Inlet for the Gulf of Alaska stock. Sightings by primary observers at side windows were compared to an independent observer at a belly window to estimate the probability of misidentification, underestimation of group size, and the probability that porpoise on the surface at the trackline were missed (perception bias, g(0)). There were 129, 96, and 201 sightings of harbor porpoises in the three stock areas, respectively. Both g(0) and effective strip width (the realized width of the survey track) depended on survey year, and g(0) also depended on the visibility reported by observers. Harbor porpoise abundance in 1997–99 was estimated at 11,146 animals for the Southeast Alaska stock, 31,046 animals for the Gulf of Alaska stock, and 48,515 animals for the Bering Sea stock.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Estudos anteriores documentaram a formação de relações de equivalência a partir do treino com pareamento consistente de estímulos. Este estudo, com figuras usuais, objetivou verificar os efeitos de um procedimento similar, mas com atraso na apresentação do modelo, em oito universitários de ambos os sexos. Foi usado um microcomputador com tela sensível ao toque. No ensino das discriminações condicionais AB e AC, intercalado aos testes de simetria BA e CA, e de equivalência BC e CB, o modelo era apresentado na "janela" central da tela; após a resposta ao modelo, este ficava ausente, e três estímulos de comparação, um dos quais o consistente (Sc), eram apresentados, simultaneamente, nas "janelas" laterais, sem conseqüências diferenciais para as respostas corretas e incorretas. Sete participantes alcançaram o critério (100% de acerto), cinco demonstraram as relações de simetria e um demonstrou equivalência. Esses resultados replicaram parcialmente os estudos anteriores.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A high contrast ratio between windows and surrounding walls may lead to office workers visual discomfort that could negatively affect their satisfaction and productivity. Consequently, occupants may try to adapt their working environment by closing blinds and/ or turning on the lights to enhance indoor visual comfort, which can reduce predicted energy savings. The hypothesis of this study is that reducing luminance contrast ratio on the window wall will improve window appearance which potentially will reduce visual discomfort and decrease workers interventions. Thus, this PhD research proposes a simple strategy to diminish the luminance contrast on the window wall by increasing the luminance of the areas surrounding the windows using supplementary light emitting diode (LED) systems. To test the hypothesis, this investigation will involve three experiments in different office layouts with various window types and orientations in Brisbane, Australia. It will assess user preferences for different luminance patterns in windowed offices featuring flexible, lowpower LED lighting installations that allows multiple lighting design options on the window wall. Detailed luminance and illuminance measures will be used to match quantitative lighting design assessment to user preferences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: The authors developed and validated a clozapine-specific side-effects scale capable of eliciting the subjectively unpleasant side-effects of clozapine. METHODS: Questions from the original Glasgow Antipsychotic Side-effects Scale (GASS) were compared to a list of the most commonly reported clozapine side-effects and those with a significant subjective burden were included in the GASS for Clozapine (GASS-C). The original authors of the GASS and a group of mental health professionals from the UK and Ireland were enlisted to comment on the questions in the GASS-C based on their clinical experience. 110 clozapine outpatients from two sites completed the GASS-C, the original GASS and a repeat GASS-C. Statistical analyses were performed using SPSS for Windows version 19. RESULTS: The GASS-C was shown to have construct validity, in that Spearman's correlation coefficient was 0.816 (p<0.001) with the original GASS, whilst Cohen's kappa coefficient was >0.77 (p<0.001) for one question and >0.81 (p<0.001) for remaining relevant questions. GASS-C was also shown to have strong test-retest reliability, in that Cronbach's alpha coefficient was >0.907 (p<0.001), whilst Cohen's kappa coefficient was >0.81 (p<0.001) for 12 questions and >0.61 (p<0.001) for the remaining four questions. CONCLUSION: The GASS-C is a valid and reliable clinical tool to enable a systematic assessment of the subjectively unpleasant side-effects of clozapine. Future research should focus on how the scale can be utilised as a clinical tool to improve real-world outcomes such as adherence to clozapine therapy and quality of life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client-side project managers face challenges in motivating project organisations to pursue exceptional design and construction performance. One approach to improving the motivation of project organisations is by offering a financial incentive reward for the achievement of voluntary performance standards above the minimum required standard. However, little investigation has been undertaken into the features of a successful incentive system as a part of an overall procurement strategy. In response to a lack of information available to client-side project managers tasked with the initial design of an incentive system, the paper explores motivation under a successful incentive and identifies key learnings for client-side project managers to consider when designing incentives. Our findings are based on the results of a large Australian case study which is interpreted against a conceptual framework based on both economic and psychological perspectives of motivation. The results suggest that motivation towards incentive goals is influenced by the value the project organisations place on the incentive reward as a commercial opportunity to increase their profit margins. However, perhaps more important are the relationship management processes that promote commitment to the project; and pride in the achievement of project goals. In the case study, these processes intensified the direct motivational effect of the incentive reward on offer. The findings also highlight the importance of ensuring that incentive goals and performance measurement processes remain relevant to the organisations throughout a project to continuously encourage motivation under changing project conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Films found on the windows of residential buildings have been studied. The main aim of the paper was to assess the roles of the films in the accumulation of potentially toxic chemicals in residential buildings. Thus the elemental and polycyclic aromatic hydrocarbon compositions of the surface films from the glass windows of eighteen residential buildings were examined. The presence of sample amounts of inorganic elements (4.0–1.2 × 106 μg m−2) and polycyclic aromatic hydrocarbons in the films (BDL - 620.1 ng m−2) has implications for human exposure and the fate of pollutants in the urban environment. To facilitate the interpretation of the results, data matrices consisting of the chemical composition of the films and the building characteristics were subjected to multivariate data analysis methods, and these revealed that the accumulation of the chemicals was strongly dependent on building characteristics such as the type of glass used for the window, the distance from a major road, age of the building, distance from an industrial activity, number of smokers in the building and frequency of cooking in the buildings. Thus, building characteristics which minimize the accumulation of pollutants on the surface films need to be encouraged.