Siga este link para ver outros tipos de publicações sobre o tema: Profiling and Behavioral Analysis.

Teses / dissertações sobre o tema "Profiling and Behavioral Analysis"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Profiling and Behavioral Analysis".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Lane, Erin C. "Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors /". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Schmidt, Elisabeth. "Profiling the german Gazela vinho verde consumer: a market segmentation based on product quality". Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.

Texto completo da fonte
Resumo:
Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos de obtenção do grau de Mestre em Ciências da Comunicação, ramo de Marketing e Publicidade
The core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Yan, Dacong. "Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Farahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.

Texto completo da fonte
Resumo:
Les services Internet populaires modèlent et remodèlent fondamentalement les moyens traditionnels de communication des personnes, ayant ainsi un impact majeur sur leur vie sociale. Deux des services Internet très populaires avec cette caractéristique sont les Réseaux sociaux en ligne (OSN) et les systèmes Peer-to-Peer (P2P). Les ONS fournissent un environnement virtuel où les gens peuvent partager leurs informations et leurs intérêts tout en étant en contact avec d'autres personnes. D'autre part, les systèmes P2P, qui sont toujours l'un des services populaires avec une grande proportion de l'ensemble du trafic Internet, offrent une occasion en or pour leurs clients de partager un type de contenu différent, y compris le contenu protégé. En dehors de l'énorme popularité des ONS et des systèmes de P2P parmi les utilisateurs réguliers, ils sont intensivement utilisés par les professionnels (grandes entreprises, politiciens, athlètes, célébrités en cas d'ONS et éditeurs de contenu professionnels en cas de P2P) afin d'interagir avec les gens à des fins différentes (campagnes marketing, les commentaires des clients, amélioration de la réputation publique, etc.) Dans cette thèse, nous caractérisons le comportement des utilisateurs réguliers et professionnels dans les deux services mentionnés populaires (ONS et P2P) en termes de stratégies de publication, de consommation de contenu et d'analyse comportementale. À cette fin, cinq de nos études menées sont présentées dans ce manuscrit comme suit: - "L'évolution des contenus multimédias", qui présente une analyse approfondie sur l'évolution du contenu multimédia disponible en BitTorrent en se concentrant sur quatre mesures pertinentes à travers différentes catégories de contenu : la disponibilité du contenu, la popularité du contenu, la taille de contenu et les commentaires de l'utilisateur - "La réaction des utilisateurs professionnels face aux actions de lutte contre le piratage", en examinant l'impact de deux grandes actions de lutte contre le piratage - la fermeture de Megaupload et la mise en œuvre de la loi anti-piratage française (HADOPI) - sur le comportement des publicateurs professionnels dans le plus grand portail de BitTorrent qui sont les principaux fournisseurs de contenu en ligne protégé. - "La quantité d'informations divulguées sur Facebook", en enquêtant sur l'exposition publique des profils utilisateurs, une grande base de données comprenant un demi-million d'utilisateurs réguliers. - "Les utilisateurs professionnels Cross Posting Activity», en analysant le modèle de publication des utilisateurs professionnels de mêmes informations sur trois grands ONS à savoir Facebook, Google+ et Twitter. - "Les stratégies des utilisateurs professionnels dans les ONS", où nous étudions la stratégie globale d'utilisateurs professionnels par secteur (par exemple, les entreprises de voitures, l'habillement, politiques, etc.) sur Facebook, Google+ et Twitter. Les résultats de cette thèse fournissent une vision d'ensemble pour comprendre certains aspects comportementaux importants de différents types d'utilisateurs des services Internet populaires et ces contributions peuvent être utilisées dans divers domaines (par exemple analyse de campagne marketing et publicité, etc.) et les différentes parties peuvent bénéficier des résultats et des méthodologies mises en œuvre telles que les FAI et les propriétaires des services pour leur planification ou l'expansion des services actuels à venir, ainsi que les professionnels pour accroître leur succès sur les médias sociaux
Popular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Farahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.

Texto completo da fonte
Resumo:
Les services Internet populaires modèlent et remodèlent fondamentalement les moyens traditionnels de communication des personnes, ayant ainsi un impact majeur sur leur vie sociale. Deux des services Internet très populaires avec cette caractéristique sont les Réseaux sociaux en ligne (OSN) et les systèmes Peer-to-Peer (P2P). Les ONS fournissent un environnement virtuel où les gens peuvent partager leurs informations et leurs intérêts tout en étant en contact avec d'autres personnes. D'autre part, les systèmes P2P, qui sont toujours l'un des services populaires avec une grande proportion de l'ensemble du trafic Internet, offrent une occasion en or pour leurs clients de partager un type de contenu différent, y compris le contenu protégé. En dehors de l'énorme popularité des ONS et des systèmes de P2P parmi les utilisateurs réguliers, ils sont intensivement utilisés par les professionnels (grandes entreprises, politiciens, athlètes, célébrités en cas d'ONS et éditeurs de contenu professionnels en cas de P2P) afin d'interagir avec les gens à des fins différentes (campagnes marketing, les commentaires des clients, amélioration de la réputation publique, etc.) Dans cette thèse, nous caractérisons le comportement des utilisateurs réguliers et professionnels dans les deux services mentionnés populaires (ONS et P2P) en termes de stratégies de publication, de consommation de contenu et d'analyse comportementale. À cette fin, cinq de nos études menées sont présentées dans ce manuscrit comme suit: - "L'évolution des contenus multimédias", qui présente une analyse approfondie sur l'évolution du contenu multimédia disponible en BitTorrent en se concentrant sur quatre mesures pertinentes à travers différentes catégories de contenu : la disponibilité du contenu, la popularité du contenu, la taille de contenu et les commentaires de l'utilisateur - "La réaction des utilisateurs professionnels face aux actions de lutte contre le piratage", en examinant l'impact de deux grandes actions de lutte contre le piratage - la fermeture de Megaupload et la mise en œuvre de la loi anti-piratage française (HADOPI) - sur le comportement des publicateurs professionnels dans le plus grand portail de BitTorrent qui sont les principaux fournisseurs de contenu en ligne protégé. - "La quantité d'informations divulguées sur Facebook", en enquêtant sur l'exposition publique des profils utilisateurs, une grande base de données comprenant un demi-million d'utilisateurs réguliers. - "Les utilisateurs professionnels Cross Posting Activity», en analysant le modèle de publication des utilisateurs professionnels de mêmes informations sur trois grands ONS à savoir Facebook, Google+ et Twitter. - "Les stratégies des utilisateurs professionnels dans les ONS", où nous étudions la stratégie globale d'utilisateurs professionnels par secteur (par exemple, les entreprises de voitures, l'habillement, politiques, etc.) sur Facebook, Google+ et Twitter. Les résultats de cette thèse fournissent une vision d'ensemble pour comprendre certains aspects comportementaux importants de différents types d'utilisateurs des services Internet populaires et ces contributions peuvent être utilisées dans divers domaines (par exemple analyse de campagne marketing et publicité, etc.) et les différentes parties peuvent bénéficier des résultats et des méthodologies mises en œuvre telles que les FAI et les propriétaires des services pour leur planification ou l'expansion des services actuels à venir, ainsi que les professionnels pour accroître leur succès sur les médias sociaux
Popular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Casserly, Alison P. "Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence". eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.

Texto completo da fonte
Resumo:
Nicotine dependence is responsible for perpetuating the adverse health effects due to tobacco use, the leading cause of preventable death worldwide. Nicotine is an agonist for nicotinic acetylcholine receptors, which are enriched in the mesocorticolimbic and habenulo-interpeduncular circuitries, underlying nicotine reward and withdrawal, respectively. Drugs of abuse, including nicotine, induce stable neuroadaptations, requiring protein synthesis through regulation of transcription factors, epigenetic mechanisms, and non-coding RNAs. It also been shown that miRNAs in brain are regulated by nicotine and that miRNA dysregulation contributes to brain dysfunction, including drug addiction. While much is known about the neurocircuitry responsible for the behaviors associated with nicotine reward or withdrawal, the underlying molecular mechanisms of how these changes in behavior are induced are less clear. Using miRNA-/mRNA-Seq, we demonstrate that there are widespread changes in both miRNA and mRNA expression in brain regions comprising the mesocorticolimbic circuit after chronic nicotine treatment, and the habenulo-interpeduncular circuit during acute nicotine withdrawal. Conserved, differentially expressed miRNAs were predicted to target inversely regulated mRNAs. We determined that expression of miR-106b-5p is up-regulated and Profilin 2 (Pfn2), an actin-binding protein enriched in the brain, is down-regulated in the interpeduncular nucleus (IPN) during acute nicotine withdrawal. Further we show that miR-106b-5p represses Pfn2 expression. We demonstrate that knockdown of Pfn2 in the IPN is sufficient to induce anxiety, a symptom of withdrawal. This novel role of Pfn2 in nicotine withdrawal-associated anxiety is a prime example of this dataset’s utility, allowing for the identification of a multitude of miRNAs/mRNA which may participate in the molecular mechanisms underlying the neuroadaptations of nicotine dependence.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kumar, Tushar. "Characterizing and controlling program behavior using execution-time variance". Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.

Texto completo da fonte
Resumo:
Immersive applications, such as computer gaming, computer vision and video codecs, are an important emerging class of applications with QoS requirements that are difficult to characterize and control using traditional methods. This thesis proposes new techniques reliant on execution-time variance to both characterize and control program behavior. The proposed techniques are intended to be broadly applicable to a wide variety of immersive applications and are intended to be easy for programmers to apply without needing to gain specialized expertise. First, we create new QoS controllers that programmers can easily apply to their applications to achieve desired application-specific QoS objectives on any platform or application data-set, provided the programmers verify that their applications satisfy some simple domain requirements specific to immersive applications. The controllers adjust programmer-identified knobs every application frame to effect desired values for programmer-identified QoS metrics. The control techniques are novel in that they do not require the user to provide any kind of application behavior models, and are effective for immersive applications that defy the traditional requirements for feedback controller construction. Second, we create new profiling techniques that provide visibility into the behavior of a large complex application, inferring behavior relationships across application components based on the execution-time variance observed at all levels of granularity of the application functionality. Additionally for immersive applications, some of the most important QoS requirements relate to managing the execution-time variance of key application components, for example, the frame-rate. The profiling techniques not only identify and summarize behavior directly relevant to the QoS aspects related to timing, but also indirectly reveal non-timing related properties of behavior, such as the identification of components that are sensitive to data, or those whose behavior changes based on the call-context.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Gao, Wei. "CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH". Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.

Texto completo da fonte
Resumo:
La complexité croissante des cyberattaques, caractérisée par une diversification des techniques d'attaque, une expansion des surfaces d'attaque et une interconnexion croissante d'applications avec Internet, rend impérative la gestion du trafic réseau en milieu professionnel. Les entreprises de tous types collectent et analysent les flux réseau et les journaux de logs pour assurer la sécurité des données échangées et prévenir la compromission des systèmes d'information. Cependant, les techniques de collecte et de traitement des données du trafic réseau varient d'un jeu de données à l'autre, et les approches statiques de détection d'attaque présentent des limites d'efficacité et précision, de temps d'exécution et de scalabilité. Cette thèse propose des approches dynamiques de détection de cyberattaques liées au trafic réseau, en utilisant une ingénierie d'attributs basée sur les différentes phases de communication d'un flux réseau, couplée aux réseaux de neurones à convolution (1D-CNN) et leur feature detector. Cette double extraction permet ainsi une meilleure classification des flux réseau, une réduction du nombre d'attributs et des temps d'exécution des modèles donc une détection efficace des attaques. Les entreprises sont également confrontées à des cybermenaces qui évoluent constamment, et les attaques "zero-day", exploitant des vulnérabilités encore inconnues, deviennent de plus en plus fréquentes. La détection de ces attaques zero-day implique une veille technologique constante et une analyse minutieuse, mais coûteuse en temps, de l'exploitation de ces failles. Les solutions proposées garantissent pour la plupart la détection de certaines techniques d'attaque. Ainsi, nous proposons un framework de détection de ces attaques qui traite toute la chaîne d'attaque, de la phase de collecte des données à l'identification de tout type de zero-day, même dans un environnement en constante évolution. Enfin, face à l'obsolescence des jeux de données et techniques de génération de données existants pour la détection d'intrusion et à la nature figée, non évolutive, et non exhaustive des scénarios d'attaques récents, l'étude d'un générateur de données de synthèse adapté tout en garantissant la confidentialité des données est abordée. Les solutions proposées dans cette thèse optimisent la détection des techniques d'attaque connues et zero-day sur les flux réseau, améliorent la précision des modèles, tout en garantissant la confidentialité et la haute disponibilité des données et modèles avec une attention particulière sur l'applicabilité des solutions dans un réseau d'entreprise
The increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Wu, Burton. "New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.

Texto completo da fonte
Resumo:
This thesis investigates profiling and differentiating customers through the use of statistical data mining techniques. The business application of our work centres on examining individuals’ seldomly studied yet critical consumption behaviour over an extensive time period within the context of the wireless telecommunication industry; consumption behaviour (as oppose to purchasing behaviour) is behaviour that has been performed so frequently that it become habitual and involves minimal intentions or decision making. Key variables investigated are the activity initialised timestamp and cell tower location as well as the activity type and usage quantity (e.g., voice call with duration in seconds); and the research focuses are on customers’ spatial and temporal usage behaviour. The main methodological emphasis is on the development of clustering models based on Gaussian mixture models (GMMs) which are fitted with the use of the recently developed variational Bayesian (VB) method. VB is an efficient deterministic alternative to the popular but computationally demandingMarkov chainMonte Carlo (MCMC) methods. The standard VBGMMalgorithm is extended by allowing component splitting such that it is robust to initial parameter choices and can automatically and efficiently determine the number of components. The new algorithm we propose allows more effective modelling of individuals’ highly heterogeneous and spiky spatial usage behaviour, or more generally human mobility patterns; the term spiky describes data patterns with large areas of low probability mixed with small areas of high probability. Customers are then characterised and segmented based on the fitted GMM which corresponds to how each of them uses the products/services spatially in their daily lives; this is essentially their likely lifestyle and occupational traits. Other significant research contributions include fitting GMMs using VB to circular data i.e., the temporal usage behaviour, and developing clustering algorithms suitable for high dimensional data based on the use of VB-GMM.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Borchert, Thomas. "Code Profiling : Static Code Analysis". Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-1563.

Texto completo da fonte
Resumo:

Capturing the quality of software and detecting sections for further scrutiny within are of high interest for industry as well as for education. Project managers request quality reports in order to evaluate the current status and to initiate appropriate improvement actions and teachers feel the need of detecting students which need extra attention and help in certain programming aspects. By means of software measurement software characteristics can be quantified and the produced measures analyzed to gain an understanding about the underlying software quality.

In this study, the technique of code profiling (being the activity of creating a summary of distinctive characteristics of software code) was inspected, formulized and conducted by means of a sample group of 19 industry and 37 student programs. When software projects are analyzed by means of software measurements, a considerable amount of data is produced. The task is to organize the data and draw meaningful information from the measures produced, quickly and without high expenses.

The results of this study indicated that code profiling can be a useful technique for quick program comparisons and continuous quality observations with several application scenarios in both industry and education.

Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Jayawardena, Kasun P. "A criminological analysis : using real-time monitoring to gather data on online predators". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/40227/1/Kasun_Jayawardena_Thesis.pdf.

Texto completo da fonte
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Al-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis". Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.

Texto completo da fonte
Resumo:
The Internet can be considered a double-edged sword because while offering a range of benefits, it provides criminals with the opportunity to extend their work to areas and places previously unimaginable. Therefore, all countries face the same challenges on how to fight cybercrime and how to effectively promote security to their citizens and organisations. In Jordan, cybercafes have become "culturally acceptable alternatives" and a haven for individuals wanting to engage in some form of deviant behaviour away from the prying eyes of society. The aim of this research is to examine the online behaviours of individuals living in two different cyberspaces (English and Non-English). The literature currently available has no such conducted research. Therefore, this research has attempted to address this significant gap in the research by examining the relationship between online behaviour and computer victimisation in two countries; the UK as an example of an English cyberspace in a developed country, and Jordan as a Non-English cyberspace in a developing country. This thesis, in addition, draws attention to the growIng numbers of cybercrime victims, and the techniques used by cyber criminals to victimise them. Understanding the trends of cybercrime and the strategies employed by cyber criminals in order to commit cybercrime will help us to identify the steps that needs be taken to prevent such criminal activities. This study investigates individuals who do or do not take precautions to guard themselves against cybercrime, and examines how their perception of law influences their actions towards incidents of cybercrime. In this study, 'guardianship' refers to actions or procedures that individuals take to ensure that any given computer is secure before they go online, and is linked to the awareness of risks associated with the use of the Internet that an individual may have. Environmental crime theories are popular because of their success in solving traditional crime; Life-style Routine Activity Theory (LRA T) is a good example of these traditional crime theories. The particular interest of this thesis is how to benefit from these crime theories in the fight against cybercrime victimisation. This study has assessed a new theoretical model derived from LRA T. This new conceptual model expands upon digital capable guardianship elements by adding the element of "Awareness", using statistical evidence to demonstrate its key significance in bringing about online harmony alongside the three pre-existing elements (Formal Social Control, Informal Social Control, and Target Hardening). The conceptual model and theoretical basis of this research suggests that it is not only computer-related Formal Social Control (FSC) aspects which can have an impact upon an individual's perception of online activities, but also posits that an individual's awareness can influence their online behaviours. The results of this research allows us to determine the effectiveness of both FSC and "Awareness" on the behaviours of individuals within the overall efforts of a society to fight cybercrime victimisation. This is an extension to the existing literature which typically focuses on technical perspectives to ensure computer security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Chapman, Demian D. "From Microsatellite DNA Profiling to Satellite Telemetry: Integrating Behavioral Ecology Into Shark Conservation". NSUWorks, 2007. http://nsuworks.nova.edu/occ_stuetd/61.

Texto completo da fonte
Resumo:
Chapter 1 The mating systems of two annually-reproducing hammerhead sharks (scalloped hammerhead Sphyrna lewini, bonnethead Sphyrna tiburo) were investigated by genetically-profiling 82 litters (902 embryos). Unlike three biennially-reproducing shark species previously studied that are polygynandrous, genetic monogamy was common in females of both of these hammerheads (S. lewini [70.6 % of litters], S.tiburo [85.4-62.5%]), suggesting a polygynous mating system overall. These mating system characteristics suggest that hammerheads may have lower ratios of effective to census population sizes than polygynandrous sharks, adding to conservation concerns for these species. Results suggest that female mating behavior may play a more limited role in determining the population-level of multiple paternity than currently envisioned in sharks, with the interplay between male mating tactics and female reproductive periodicity (biennial or annual) perhaps being more influential. Two lines of evidence infer that multiple paternity is associated with larger females in S. tiburo: mothers of multi-sired litters are significantly larger than mothers of single paternity litters in West Florida and the frequency of multiple paternity is significantly higher in South Carolina, where females are larger. Large females may therefore produce larger, more genetically-diverse litters in some shark species and could contribute disproportionately to recruitment and population genetic diversity, increasing their importance from a conservation perspective. Chapter 2 Although most shark species have relatively small body-sizes as adults (<100 cm total length), little is known about the genetic population structure and lineage diversification of small sharks. Mitochondrial control region and nuclear internal transcribed spacer 2 sequences combined with three independent microsatellite loci all concordantly show that the diminutive hammerhead shark Sphyrna tiburo (bonnethead) consists of two highly divergent lineages from South Carolina, U.S.A. to Belize, a coastal distance of less than 6000 km. One lineage was restricted to Belize, while the other was almost completely restricted to five North American sampling sites (pairwise CR ΦST = 0.891-0.915, microsatellite Fst=0.277-0.319). This represents the highest degree of population structure recorded concordantly at both mitochondrial and nuclear loci in a shark along a continuous coastline. Regional measures of population structure and genetic divergence in this diminutive hammerhead shark mirror but exceed values obtained for larger shark species over the same sampling range and are comparable to those observed in a larger congener on a global scale. Direct evidence of interbreeding between these lineages indicates that speciation has not yet occurred. Gene-flow was generally high among North American populations, but there was evidence that female-mediated gene flow is moderately restricted between subtropical Florida Bay and higher latitude populations, suggesting that changes in latitude and climate regime may help drive population genetic differentiation in this species. This study is the second to reveal unexpectedly high lineage diversification within Atlantic hammerhead sharks, which suggests that further genetic surveys are required to fully understand and conserve hammerhead shark biodiversity in this region. Chapter 3 Dried fins from the scalloped hammerhead shark (Sphyrna lewini) are highly-valued for utilization in the Asian delicacy shark-fin soup. While global landings of this species annually measure in the millions to supply this market, Western Atlantic populations have collapsed and are now considered to be endangered. This study reveals that Western Atlantic S. lewini comprise at least three distinct management units that will be reliant on intrinsic reproduction rather than immigration for rebuilding (MU’s: U.S.A., Central American Caribbean and Brazil; overall ΦST=0.64). These MU’s are sufficiently differentiated from each other, eastern Atlantic and Indo-Pacific stocks to use mixed-stock analysis (MSA) to better understand the impact of the fin trade on sharks of this region. Stock of origin was determined for 57 Hong Kong market-derived S. lewini dried fins, revealing that contemporary trade is globally-sourced with a substantial presence of fins from imperiled Western Atlantic stocks. Results are used to formulate regional management recommendations and to develop monitoring strategies for the Asian fin trade that could dramatically improve global conservation of S. lewini and serve as a template for other sharks impacted by this trade. Chapter 4 Longline sampling (83 sets) supplemented with 6 pop-off archival tag (PAT) deployments were used to characterize vertical habitat use by Caribbean reef sharks, Carcharhinus perezi, at Glover’s reef atoll, Belize. Longline CPUE in two shallow reef habitats (lagoon < 18m depth, fore-reef < 40 m depth) underwent significant nocturnal increases for sharks larger than 110 cm total length (TL) but not for smaller sharks. Nocturnal CPUE of small sharks increased in the lagoon and decreased on the fore-reef, suggesting movements to avoid larger conspecifics. PAT deployments (7-20 days) indicate that large C. perezi generally increased the amount of time they spent in the upper 40 m of the water column during the night and have a much wider depth and temperature range than previously thought (0 to 356 m, 31-12.4oC). The wide vertical range of this top-predator reveals ecological coupling of deep and shallow reef habitats and has implications for place-based conservation. Chapter 5 Marine Protected Areas (MPAs) are increasingly advocated for the restoration and conservation of coral reef ecosystems, yet given the typically small size of most no-take MPAs it remains unknown how effective this strategy will be for roving, top-level predators such as sharks. Movement patterns of Caribbean reef sharks, Carcharhinus perezi, tagged with coded acoustic transmitters were monitored with an array of up to 22 underwater receivers from May 2004 to October 2006 at Glover’s Reef Marine Reserve, a zoned MPA in Belize. Thirty one tagged sharks ranged in size from 80-215 cm total length [TL], spanning young-of-the-year to mature specimens of both genders. Twenty five of these sharks provided data for more than one week after tagging. Individual sharks were detected within the array on from 5 to 464 days and all but four were predominantly detected on the receiver(s) nearest their original capture. Although daily movements of up to 20-50 km were documented by large sharks (>110 cm TL), most individuals were detected at Glover’s Reef on an almost daily basis throughout the year and appear to be residents of this reef system. Small sharks were documented to be residents for at least six months. The daily dispersal ranges and distribution of sharks tracked in this study suggest that typically small-sized no-take zones will be of limited value for reef shark conservation. However, the long-term residency and site-fidelity of large and small C. perezi to this reef system in its entirety indicates that nesting this no-take zone within a broader ocean zoning plan tailored to protect large roving predators achieves the scale necessary to provide meaningful protection for these ecologically important, threatened predators.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Masri, Wassim. "DYNAMIC INFORMATION FLOW ANALYSIS, SLICING AND PROFILING". Case Western Reserve University School of Graduate Studies / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=case1092886961.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Johnson, Kevin Russell. "Advancements in Thermal Integrity Profiling Data Analysis". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6520.

Texto completo da fonte
Resumo:
Thermal Integrity Profiling (TIP) is a relatively new non-destructive test method for evaluating the post-construction quality of drilled shafts. Therein anomalies in a shaft are indicated by variations in its thermal profile when measured during the curing stages of the concrete. A considerable benefit with this method is in the ability to detect anomalies both inside and outside the reinforcement cage, as well as provide a measure of lateral cage alignment. Similarly remarkable, early developments showed that the shape of a temperature profile (with depth) matched closely with the shape of the shaft, thus allowing for a straightforward interpretation of data. As with any test method, however, the quality of the results depends largely on the level of analysis and the way in which test data is interpreted, which was the focus of this study. This dissertation presents the findings from both field data and computer models to address and improve TIP analysis methods, specifically focusing on: (1) the analysis of non-uniform temperature distributions caused by external boundary conditions, (2) proper selection of temperature-radius relationships, and (3) understanding the effects of time on analysis. Numerical modeling was performed to identify trends in the temperature distributions in drilled shafts during concrete hydration. Specifically, computer generated model data was used to identify the patterns of the non-linear temperature distributions that occur at the ends of a shaft caused by the added heat loss boundary in the longitudinal direction. Similar patterns are observed at locations in a shaft where drastic changes in external boundary conditions exist (e.g. shafts that transition from soil to water or air). Numerical modeling data was also generated to examine the relationship between measured temperatures and shaft size/shape which is a fundamental concept of traditional TIP analysis. A case study involving a shaft from which 24hrs of internal temperature data was investigated and compared to results from a computer generated model made to mimic the field conditions of the shaft. Analysis of field collected and model predicted data was performed to examine the treatment of non-linear temperature distributions at the ends of the shaft and where a mid-shaft change in boundary was encountered. Additionally, the analysis was repeated for data over a wide range of concrete ages to examine the effects of time on the results of analysis. Finally, data from over 200 field tested shafts was collected and analyzed to perform a statistical evaluation of the parameters used for interpretation of the non-linear distributions at the top and bottom of each shaft. This investigation incorporated an iterative algorithm which determined the parameters required to provide a best-fit solution for the top and bottom of each shaft. A collective statistical evaluation of the resulting parameters was then used to better define the proper methods for analyzing end effects. Findings revealed that the effects of non-uniform temperature distributions in drilled shaft thermal profiles can be offset with a curve-fitting algorithm defined by a hyperbolic tangent function that closely matches the observed thermal distribution. Numerical models and statistical evaluations provided a rationale for proper selection of the function defining parameters. Additionally, numerical modeling showed that the true temperature-to-radius relationship in drilled shafts is non-linear, but in most cases a linear approximation is well suited. Finally, analysis of both model and field data showed that concrete age has virtually no effect on the final results of thermal profile analysis, as long as temperature measurements are taken within the dominate stages of concrete hydration.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Tsai, Shang-Yuan. "Device profiling analysis in Device-Aware Network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FTsai.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2004.
Thesis advisor(s): Singh Gurminder, John Gibson. Includes bibliographical references (p. 65-66). Also available online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Wortmann, Peter Moritz. "Profiling optimised Haskell : causal analysis and implementation". Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/8321/.

Texto completo da fonte
Resumo:
At the present time, performance optimisation of real-life Haskell programs is a bit of a “black art”. Programmers that can do so reliably are highly esteemed, doubly so if they manage to do it without sacrificing the character of the language by falling back to an “imperative style”. The reason is that while programming at a high-level does not need to result in slow performance, it must rely on a delicate mix of optimisations and transformations to work out just right. Predicting how all these cogs will turn is hard enough – but where something goes wrong, the various transformations will have mangled the program to the point where even finding the crucial locations in the code can become a game of cat-and-mouse. In this work we will lift the veil on the performance of heavily transformed Haskell programs: Using a formal causality analysis we will track source code links from square one, and maintain the connection all the way to the final costs generated by the program. This will allow us to implement a profiling solution that can measure performance at high accuracy while explaining in detail how we got to the point in question. Furthermore, we will directly support the performance analysis process by developing an interactive profiling user interface that allows rapid theory forming and evaluation, as well as deep analysis where required.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Nichols, Beth. "Geographic Profiling: Contributions to the Investigation of Serial Murders". Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559164233007786.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Eklöv, David. "Profiling Methods for Memory Centric Software Performance Analysis". Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-182594.

Texto completo da fonte
Resumo:
To reduce latency and increase bandwidth to memory, modern microprocessors are often designed with deep memory hierarchies including several levels of caches. For such microprocessors, both the latency and the bandwidth to off-chip memory are typically about two orders of magnitude worse than the latency and bandwidth to the fastest on-chip cache. Consequently, the performance of many applications is largely determined by how well they utilize the caches and bandwidths in the memory hierarchy. For such applications, there are two principal approaches to improve performance: optimize the memory hierarchy and optimize the software. In both cases, it is important to both qualitatively and quantitatively understand how the software utilizes and interacts with the resources (e.g., cache and bandwidths) in the memory hierarchy. This thesis presents several novel profiling methods for memory-centric software performance analysis. The goal of these profiling methods is to provide general, high-level, quantitative information describing how the profiled applications utilize the resources in the memory hierarchy, and thereby help software and hardware developers identify opportunities for memory related hardware and software optimizations. For such techniques to be broadly applicable the data collection should have minimal impact on the profiled application, while not being dependent on custom hardware and/or operating system extensions. Furthermore, the resulting profiling information should be accurate and easy to interpret. While several use cases are presented, the main focus of this thesis is the design and evaluation of the core profiling methods. These core profiling methods measure and/or estimate how high-level performance metrics, such as miss-and fetch ratio; off-chip bandwidth demand; and execution rate are affected by the amount of resources the profiled applications receive. This thesis shows that such high-level profiling information can be accurately obtained with very little impact on the profiled applications and without requiring costly simulations or custom hardware support.
UPMARC
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Ridley, Andrew James. "Genome wide analysis of dna repair by expression profiling". Thesis, Cardiff University, 2006. http://orca.cf.ac.uk/56167/.

Texto completo da fonte
Resumo:
Xeroderma pigmentosum (XP) and Cockayne syndrome (CS) are syndromes characterised by defects iqf nucleotide excision repair (NER), they can be distinguished by contrasting clinical manifestations. Although the genes responsible for XP and CShave been identified, the precise molecular roles of the normal proteins remains poorly understood. In the present study, primary dermal fibroblasts derived from patients assigned to XP complementation group C (XP-C XP8CA) and CS type A (CS-A CS3BE) were characterised. Patient XP8CA was homozygous for a 2 bp TG deletion in the XPC gene at codon 547 resulting in a premature termination at position 572, while patient CS3BE was a compound heterozygote for a 37G>T (E13X) and a novel 479C>T (A 160V) mutation in CKNl, the jene that encodes the CSA protein. Permanent XP-C and CS-A cell lines were established by transducing primary XP8CA and CS3BE fibroblasts with a retroviral vector, expressing the catalytic subunit of telomerase, hTERT. The reconstitition of telomerase activity resulted in: (1) the preservation of the primary NER capabilities (2) an extension of proliferative lifespan (3) maintenance of the p53/p21WAF/CIPI and pRb/pl6INK4A tumour suppressor pathways. Using microarrays, the UV-induced global transcriptional response of telomerised XP-C ajd CS-A fibroblasts was characterised. The data indicate that UV-irradiation resulted in the differential regulation of a diverse range of cellular responses such as transcription, cell cycle arrest, DNA repair and apoptosis. Additionally, cell type-specific signatures were observed in telomerised XP-C and CS-A fibroblasts. The utility of RNAi was also demonstrated by transiently ablating XPC of CSA function in telomerised repair competent (MRC-5) fibroblasts, and a stable, permanent mutant was constructed by retrovirally transducing the telomerised CS-A cell line with an PC-specific shRNA construct. Thus, permanent and stable telomerase-immortalised XP-C and CS-A cell lines have been established and partially characterised at both the genetic and molecular level, so providing in vitro models for investigating NER.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Dai, Wei. "Biostatistical analysis of DNA methylation profiling in ovarian cancer". Thesis, Imperial College London, 2011. http://hdl.handle.net/10044/1/7065.

Texto completo da fonte
Resumo:
Ovarian cancer is the most lethal gynaecological cancer. Although having good response to chemotherapy, the majority of the patients with advanced disease will eventually relapse. Aberrant DNA methylation in tumours has been proposed as biomarkers to predict patients’ clinical outcome and response to chemotherapy. An algorithm, Methylation Linear Discriminant Analysis (MLDA), was developed for large-scale methylation analysis using differential methylation hybridsation (DMH). MLDA identified loci differentially methylated between cisplatin sensitive and resistant derivatives of an ovarian tumour cell line with 89% accuracy and showed hypermethylation, rather than hypomethylation, predominantly occurred during the acquisition of cisplatin resistance. Customised microarrays targeting promoter CpG islands in 10 key signaling pathways were designed for DMH analysis. Based on the power analysis epithelial ovarian tumours (screening study n=120, validation study n=61) prospectively collected through a cohort study, were firstly analysed by DMH at 302 loci spanning 189 promoter CGIs at 137 genes in the Wnt pathways for the association with progression free survival (PFS). Increased methylation of 6 loci, at FZD4, FZD9, DVL1, NFATC3, ROCK1 and NKD1 genes, were associated with shorter PFS independent from clinical parameters. A multivariate Cox model incorporates only NKD1 and DVL1, identifying two groups differing in PFS (HR=2.72; permutation test p = 4x10-3). Consistent with epigenetic regulation, reduced expression of FZD4 and DVL1 is associated with poor relapse free survival in an independent cohort (p<0.05,n=321). Analysis in further 9 pathways/families found 6 more independent biomarkers relevant to PFS at PIK3R5, AKT1 and VEGFB from AKT/mTOR pathway, PRDX2 and TR2IT2 from Redox pathway and MLH3 from MMR system. The study shows DNA methylation changes are involved in acquired drug resistance, and demonstrates the importance of methylation at multiple promoter CGIs in key signaling pathways, especially in the Wnt pathway, for predicting clinical outcome in ovarian cancer and their potential as stratification biomarkers in future clinical studies for personalised treatment.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Sluss, Randal J. "Racial Profiling and Policing in North Carolina: Reality or Rhetoric?" Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etd/2073.

Texto completo da fonte
Resumo:
This thesis examined police practices of the North Carolina Highway Patrol concerning the occurrence of racial profiling. The sample data consisted of motorists stopped in North Carolina by the Highway Patrol between January 1, 2000 and July 31, 2000 (N = 332, 861). The findings suggested that race was a likely factor in pretextual stops. The results also indicate that racial profiling was occurring more in the western region than the eastern region of North Carolina. Theoretical reasons are offered in support of these findings.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Heller, Mark D. "Behavioral analysis of network flow traffic". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5108.

Texto completo da fonte
Resumo:
Approved for public release, distribution unlimited
Network Behavior Analysis (NBA) is a technique to enhance network security by passively monitoring aggregate traffic patterns and noting unusual action or departures from normal operations. The analysis is typically performed offline, due to the huge volume of input data, in contrast to conventional intrusion prevention solutions based on deep packet inspection, signature detection, and real-time blocking. After establishing a benchmark for normal traffic, an NBA program monitors network activity and flags unknown, new, or unusual patterns that might indicate the presence of a potential threat. NBA also monitors and records trends in bandwidth and protocol use. Computer users in the Department of Defense (DoD) operational networks may use Hypertext Transport Protocol (HTTP) to stream video from multimedia sites like youtube.com, myspace.com, mtv.com, and blackplanet.com. Such streaming may hog bandwidth, a grave concern, given that increasing amounts of operational data are exchanged over the Global Information Grid, and introduce malicious viruses inadvertently. This thesis develops an NBA solution to identify and estimate the bandwidth usage of HTTP streaming video traffic entirely from flow records such as Cisco's NetFlow data.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Emfevid, Lovisa, e Hampus Nyquist. "Financial Risk Profiling using Logistic Regression". Thesis, KTH, Matematisk statistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229821.

Texto completo da fonte
Resumo:
As automation in the financial service industry continues to advance, online investment advice has emerged as an exciting new field. Vital to the accuracy of such service is the determination of the individual investors’ ability to bear financial risk. To do so, the statistical method of logistic regression is used. The aim of this thesis is to identify factors which are significant in determining a financial risk profile of a retail investor. In other words, the study seeks to map out the relationship between several socioeconomic- and psychometric variables to develop a predictive model able to determine the risk profile. The analysis is based on survey data from respondents living in Sweden. The main findings are that variables such as income, consumption rate, experience of a financial bear market, and various psychometric variables are significant in determining a financial risk profile.
I samband med en ökad automatiseringstrend har digital investeringsrådgivning dykt upp som ett nytt fenomen. Av central betydelse är tjänstens förmåga att bedöma en investerares förmåga till att bära finansiell risk. Logistik regression tillämpas för att bedöma en icke- professionell investerares vilja att bära finansiell risk. Målet med uppsatsen är således att identifiera ett antal faktorer med signifikant förmåga till att bedöma en icke-professionell investerares riskprofil. Med andra ord, så syftar denna uppsats till att studera förmågan hos ett antal socioekonomiska- och psykometriska variabler. För att därigenom utveckla en prediktiv modell som kan skatta en individs finansiella riskprofil. Analysen genomförs med hjälp av en enkätstudie hos respondenter bosatta i Sverige. Den huvudsakliga slutsatsen är att en individs inkomst, konsumtionstakt, tidigare erfarenheter av abnorma marknadsförhållanden, och diverse psykometriska komponenter besitter en betydande förmåga till att avgöra en individs finansiella risktolerans
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Charles, Nathan Richard. "Data model refinement, generic profiling, and functional programming". Thesis, University of York, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.341629.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Stokowy, Tomasz, Markus Eszlinger, Michał Świerniak, Krzysztof Fujarewicz, Barbara Jarząb, Ralf Paschke e Kurt Krohn. "Analysis options for high-throughput sequencing in miRNA expression profiling". Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-144393.

Texto completo da fonte
Resumo:
Background: Recently high-throughput sequencing (HTS) using next generation sequencing techniques became useful in digital gene expression profiling. Our study introduces analysis options for HTS data based on mapping to miRBase or counting and grouping of identical sequence reads. Those approaches allow a hypothesis free detection of miRNA differential expression. Methods: We compare our results to microarray and qPCR data from one set of RNA samples. We use Illumina platforms for microarray analysis and miRNA sequencing of 20 samples from benign follicular thyroid adenoma and malignant follicular thyroid carcinoma. Furthermore, we use three strategies for HTS data analysis to evaluate miRNA biomarkers for malignant versus benign follicular thyroid tumors. Results: High correlation of qPCR and HTS data was observed for the proposed analysis methods. However, qPCR is limited in the differential detection of miRNA isoforms. Moreover, we illustrate a much broader dynamic range of HTS compared to microarrays for small RNA studies. Finally, our data confirm hsa-miR-197-3p, hsa-miR-221-3p, hsa-miR-222-3p and both hsa-miR-144-3p and hsa-miR-144-5p as potential follicular thyroid cancer biomarkers. Conclusions: Compared to microarrays HTS provides a global profile of miRNA expression with higher specificity and in more detail. Summarizing of HTS reads as isoform groups (analysis pipeline B) or according to functional criteria (seed analysis pipeline C), which better correlates to results of qPCR are promising new options for HTS analysis. Finally, data opens future miRNA research perspectives for HTS and indicates that qPCR might be limited in validating HTS data in detail.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Beech, Adam. "Metabolic profiling analysis of pharmacodynamic responses to chemotherapy in cancer". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/51548.

Texto completo da fonte
Resumo:
Cancer is one of the leading causes of death worldwide, and various chemotherapeutic agents are in use for its treatment. However, response to these therapies is generally low and resistance to these drugs is a daunting problem for cancer intervention. Prediction of response to drug treatment and the pharmacodynamics of response following treatment are important avenues for research into the clinical efficacy of chemical interventions in cancer, and in the goal of personalisation of medicine through patient stratification. This research project investigated potential pharmacodynamic biomarkers of response to anticancer drugs through metabonomics, assessing molecular changes in metabolic profile following specific drug treatments. Ultra-performance liquid chromatography-mass spectrometry was used in an untargeted approach on in vitro and in vivo sample sets. Multivariate modelling and statistics were employed alongside database interrogation to identify potential metabonomic biomarkers of response to treatment in three studies: in vitro treatment of breast cancer cells with histone methyltransferase inhibitors; in vitro and in vivo investigation of epidermal growth factor receptor inhibition in colorectal cancer; and in vivo assessment of platinum resensitisation using AKT inhibition in ovarian cancer. Across the three studies compositional changes in the abundance of several lipids based on treatment was seen, with several phosphatidylcholines, sphingomyelins and ceramides consistently found to increase in concentration in cells or patients that responded to therapy. Polar metabolites that were found to change in level as a result of treatment were more specific to each study. Each tentative identification represents a potential biomarker of treatment response, and requires ID confirmation with chemical standards and fragmentation before further investigating further. The trajectory of the results points to the feasibility of metabonomic biomarkers in early clinical trials as pharmacodynamic and response biomarkers that have the potential to optimise therapy for each cancer patient.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Anderson, Travis J. (Travis John). "Operational profiling and statistical analysis of Arleigh Burke-class destroyers". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/81582.

Texto completo da fonte
Resumo:
Thesis (Nav. E. and S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2013.
"June 2013." Cataloged from PDF version of thesis.
Includes bibliographical references (p. 60-62).
Ship operational profiles are a valuable tool for ship designers and engineers when analyzing potential designs and ship system selections. The most common is the speed-time profile, normally depicted as a histogram showing the percent of time spent at each speed. Many shortcomings exist in the current Arleigh Burke (DDG 51)-class operational profiles. The current speed-time profile is out of date, based on another ship class, and does not depict the profile in one-knot increments. Additional profile data, such as how the engineering plant is operated and a mission profile, do not exist. A thorough analysis of recent DDG 51 operations was conducted and new and improved profiles were developed. These profiles indicate the ships tend to operate at slower speeds than was previously predicted with 46% of the time spent at 8 knots and below as compared to the previous profile with 28% for the same speeds. Additionally, profiles were developed to show the amount of time spent in each engineering plant line-up (69% trail shaft, 24% split plant, 7% full power) and the time spent in different mission types (69% operations, 27% transit, 4% restricted maneuvering doctrine). A detailed statistical analysis was then conducted to better understand the data used in profile development and to create a region of likely speed-time profiles rather than just a point solution that is presented in the composite speed-time profile. This was accomplished through studying the underlying distributions of the data as well as the variance.
by Travis J. Anderson.
Nav.E.and S.M.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Louw, Leanie. "Sensory analysis of brandy: the application of rapid profiling methodologies". Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86483.

Texto completo da fonte
Resumo:
Thesis (PhD)--Stellenbosch University, 2014.
ENGLISH ABSTRACT: Brandy has a high alcohol content of at least 36% alcohol by volume and a complex volatile chemical structure. Due to this, the sensory evaluation of brandy is challenging to execute and must be carefully managed to avoid panellists’ sensory and mental fatigue. Although rapid sensory profiling methods, such as projective mapping (PM), are commonly used for fast moving consumer goods, it was unclear whether these methods could accommodate the difficulties associated with brandy evaluation. The primary objective of this study was to validate PM, also called Napping®, as a reliable tool for brandy evaluation. Two variations of PM were tested: global napping (GN) where products are evaluated based on overall sensory perception, and partial napping (PN) where the product perception is broken down in to separate sensory modalities, in this case appearance, aroma and in-mouth sensations. Several practical aspects of PM were investigated in order to optimise the method for brandy evaluation and to gain understanding into practical methodological aspects that have not been fully understood at the onset of this study. The results showed that both GN and PN delivered reliable results, but that PN was more reproducible and better suited to larger sample sets (10 products). The concept of in-mouth sensations was found to be ineffective in extracting useful information on mouthfeel differences in the product set and that retronasal flavour should be separated from basic tastes and mouthfeel. A verbal instruction to the panellists was sufficient to obtain reliable information on mouthfeel differences; it was not necessary to use black glasses or nose-clips to eliminate the influence of appearance and flavour perception. In response to the insufficient reproducibility of GN, the sorting method was tested and validated as a suitable screening method that delivered reliable product maps of larger sample sets (10 products) in one replication, compared to GN which has to be replicated several times. A recent hypothesis states that the elongated horizontal dimension of a rectangular PM tasting sheet could be used to elicit more prominent product differences, while tasting sheets without an elongated axis, such as circles or squares, could be used to bring forth more subtle differences. This hypothesis was challenged by testing rectangular, square and round tasting sheet shapes. Although differences were observed between the shapes in terms of product configuration and panellist performance, the practical value of using different tasting sheet shapes to obtain specific information could not be established. The impact of high alcohol content and product complexity on panellist performance in PM was tested and it was concluded that product complexity did influence the panellists’ performance, particularly for high alcohol products. It was also found that prior knowledge of a products’ high alcohol content influenced the panellists’ descriptive language to include more alcohol-related terms. A new panellist performance measure was developed, namely the Relative Performance Index (RPI). This measure can be used to monitor trained panellists’ performance in the PM task more effectively to thereby ensure reliable results. The outcomes of this study extended the brandy sensory evaluation toolbox. Practical measures were identified that can be used to overcome the challenges associated with the sensory evaluation of complex high alcohol products.
AFRIKAANSE OPSOMMING: Met ‘n alkohol inhoud van mintens 36% alkohol per volume en ‘n komplekse vlugtige chemise samestelling is brandewyn ‘n uitdagende produk om sensories te evalueer. Maatreëls moet in plek gestel word om te verhoed dat sensoriese paneellede nie uitgeput raak nie om sodoende betroubare resultate te verseker. Hoewel vinnige sensoriese toetsmetodes, soos projeksiekartering (PM) en sortering, gereeld gebruik word vir die evaluasie van vining bewegende verbruikersgoedere was dit weens die voorafgenoemde redes onduidelik of die metodes geskik sou wees vir brandewynevaluasie. Die oorhoofse doelwit van hierdie projek was om PM, ook genoem Napping®, te valideer as ‘n geskikte metode vir die sensoriese evaluering van brandewyn. Twee variasies van PM is ondersoek: oorhoofse kartering (GN) waar die produkte op grond van ‘n algehele sensoriese waarneming evalueer word, en gedeeltelike kartering (PN), waar die verskillende sensoriese waarnemingsmodaliteite afsonderlik gemeet word. In hierdie geval is voorkoms, aroma en algehele binne-mondse ervaring gemeet. Verskeie aspekte van GN en PN is ondersoek ten einde die metodes vir brandewynevaluasie te optimiseer asook lig te werp op praktiese metodologiese aspekte waaroor daar nog onsekerheid was by die aanvang van hierdie studie. Die resultate het getoon dat beide GN en PN betroubare inligting oor brandewyn kan oplewer, maar dat PN meer herhaalbaar en beter geskik is vir groter produkstelle (10 produkte). Dit is egter bevind dat die konsep van algehele binne-mondse waarneming nie doeltreffend was om mondgevoelverskille tussen produkte uit te lig nie. Smaak- en mondgevoelwaarnemings moet liefs onderskei word van binne-mondse geurwaarneming. Dis bevind dat dit voldoende is om hierdie onderskeid deur skriftelike instruksies tot die paneel te bewerkstelling en dat die gebruik van swart glase en neusknippies nie nodig was om betekenisvolle inligting oor mondgevoel te bekom nie. Na aanleiding van die swak herhaalbaarheid van GN, is sortering getoets en gevalideer as ‘n geskikte siftingsmetode wat betroubare produkkaarte van groot produkstelle (10 produkte) kan oplewer met slegs een evaluasie, teenoor GN waarvoor meer as een sessie benodig word. ‘n Onlangse hipotese stel dat die langer horisontale dimensie van reghoekige PM proekaarte gebruik kan word om meer prominente verskille tussen produkte uit te wys, terwyl proekaarte sonder verlengde asse, soos sirkels en vierkante, gebruik kan word om meer subtiele verskille uit te wys. Hierdie hipotese is bevraagteken deur reghoekige, vierkantige en ronde PM proekaarte teenoor mekaar te toets. Hoewel die resultate vanaf die verskillende proekaarte effens verskil het in terme van produk konfigurasie en die paneel se taakverrigting, kon die praktiese waarde van die gebruik van produkkaarte met verskillende vorms om spesifieke inligting te bekom nie bevestig word nie. Die impak van hoë alkohol en produkkompleksiteit op paneellede se PM taakverrigting is ondersoek. Dit is bevind dat produkkompleksiteit wel hul taakuitvoering beinvloed, en dat hierdie invloed groter is vir hoë alkohol produkte. Dit is ook gevind dat paneellede se beskrywende taalgebruik beïnvloed om meer alkoholverwante woorde in te sluit word indien hul kennis dra van ‘n produk se hoë alkohol inhoud. ‘n Nuwe vaardigheidsberaming vir die meet van paneellede se taakverrigting is ontwikkel, naamlik die Relatiewe Taakverrigtingsindeks (RTW). Dit kan gebruik word om paneellede se vaardigheid in PM meer doeltreffend te monitor en sodoende betroubare resultate te verseker. Die uitkomste van die studie het die poel beskikbare metodes vir die sensoriese evaluering van brandewyn suksesvol verbreed en praktiese maatreëls is geidentifiseer om die uitdagings van ‘n komplekse hoë alkohol produkte te oorkom.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Jacobsen, Mette Dorph. "Analysis of Candida albicans gene expression using single cell profiling". Thesis, University of Aberdeen, 2005. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU193586.

Texto completo da fonte
Resumo:
Candida albicans is an important fungal pathogen of humans and shows great flexibility in adapting to diverse host niches, which present different ambient pH values, changes in O2 concentrations, various different substrates for metabolism and host defence mechanisms. Knowledge on how these environmental stimuli are sensed by the fungal cells is limited. Here, a bioinformatics approach was employed to search for putative receptors in the C. albicans genome. However, no obvious novel receptor candidates were identified that might function in environmental sensing in C. albicans. Using a GFP-based reporter system gene expression in C. albicans on the single cell level was monitored. To examine responses to ambient pH, the PHR1 and PHR2 promoters, which are regulated in an inverse pH-dependent manner, were used to construct C. albicans strains that could function as pH biosensors in vitro and in vivo. The two strains were used as indicators of ambient pH under various in vitro conditions as well as in ex vivo and in vivo models of infections. In the mouse model of systemic candidiasis the ambient pH in infected kidney tissue appeared to show local variation. The fatty acid beta-oxidation in C. albicans was also examined. Three strains were constructed containing GFP fusions with the promoters of beta-oxidation genes FAA21, POX4 and POT11. The regulation of the three promoters was first studied in vitro and later in different infection models. When introduced into the mouse model of systemic candidiasis differential expression of POX4 and POT11 was observed despite being co-regulated in vitro under the range of conditions examined. Hence, POX4 and POT11 may respond to additional as yet undefined stimuli that are relevant in vivo. Nevertheless, the data indicate that the lipid beta-oxidation is active in some fungal cells growing in the mouse kidney.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Vieira, Thiago Pereira de Brito. "An approach for profiling distributed applications through network traffic analysis". Universidade Federal de Pernambuco, 2013. https://repositorio.ufpe.br/handle/123456789/12454.

Texto completo da fonte
Resumo:
Submitted by João Arthur Martins (joao.arthur@ufpe.br) on 2015-03-12T17:32:13Z No. of bitstreams: 2 Dissertação Thiago Vieira.pdf: 1199574 bytes, checksum: 81f443f0b4fbf4d223cda440cc56d722 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Approved for entry into archive by Daniella Sodre (daniella.sodre@ufpe.br) on 2015-03-13T14:22:30Z (GMT) No. of bitstreams: 2 Dissertação Thiago Vieira.pdf: 1199574 bytes, checksum: 81f443f0b4fbf4d223cda440cc56d722 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Made available in DSpace on 2015-03-13T14:22:30Z (GMT). No. of bitstreams: 2 Dissertação Thiago Vieira.pdf: 1199574 bytes, checksum: 81f443f0b4fbf4d223cda440cc56d722 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2013-03-05
Distributed systems has been adopted for building modern Internet services and cloud computing infrastructures, in order to obtain services with high performance, scalability, and reliability. Cloud computing SLAs require low time to identify, diagnose and solve problems in a cloud computing production infrastructure, in order to avoid negative impacts into the quality of service provided for its clients. Thus, the detection of error causes, diagnose and reproduction of errors are challenges that motivate efforts to the development of less intrusive mechanisms for monitoring and debugging distributed applications at runtime. Network traffic analysis is one option to the distributed systems measurement, although there are limitations on capacity to process large amounts of network traffic in short time, and on scalability to process network traffic where there is variation of resource demand. The goal of this dissertation is to analyse the processing capacity problem for measuring distributed systems through network traffic analysis, in order to evaluate the performance of distributed systems at a data center, using commodity hardware and cloud computing services, in a minimally intrusive way. We propose a new approach based on MapReduce, for deep inspection of distributed application traffic, in order to evaluate the performance of distributed systems at runtime, using commodity hardware. In this dissertation we evaluated the effectiveness of MapReduce for a deep packet inspection algorithm, its processing capacity, completion time speedup, processing capacity scalability, and the behavior followed by MapReduce phases, when applied to deep packet inspection for extracting indicators of distributed applications.
Sistemas distribuídos têm sido utilizados na construção de modernos serviços da Internet e infraestrutura de computação em núvem, com o intuito de obter serviços com alto desempenho, escalabilidade e confiabilidade. Os acordos de níves de serviço adotados pela computação na núvem requerem um reduzido tempo para identificar, diagnosticar e solucionar problemas em sua infraestrutura, de modo a evitar que problemas gerem impactos negativos na qualidade dos serviços prestados aos seus clientes. Então, a detecção de causas de erros, diagnóstico e reprodução de erros provenientes de sistemas distribuídos são desafios que motivam esforços para o desenvolvimento de mecanismos menos intrusivos e mais eficientes, para o monitoramento e depuração de aplicações distribuídas em tempo de execução. A análise de tráfego de rede é uma opção para a medição de sistemas distribuídos, embora haja limitações na capacidade de processar grande quantidade de tráfego de rede em curto tempo, e na escalabilidade para processar tráfego de rede sob variação de demanda de recursos. O objetivo desta dissertação é analisar o problema da capacidade de processamento para mensurar sistemas distribuídos através da análise de tráfego de rede, com o intuito de avaliar o desempenho de sistemas distribuídos de um data center, usando hardware não especializado e serviços de computação em núvem, de uma forma minimamente intrusiva. Nós propusemos uma nova abordagem baseada em MapReduce para profundamente inspecionar tráfego de rede de aplicações distribuídas, com o objetivo de avaliar o desempenho de sistemas distribuídos em tempo de execução, usando hardware não especializado. Nesta dissertação nós avaliamos a eficácia do MapReduce para um algoritimo de avaliação profunda de pacotes, sua capacidade de processamento, o ganho no tempo de conclusão de tarefas, a escalabilidade na capacidade de processamento, e o comportamento seguido pelas fases do MapReduce, quando aplicado à inspeção profunda de pacotes, para extrair indicadores de aplicações distribuídas.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Goudsmits, E. "Chemical profiling of ballistic materials : analysis of organic gunshot residue". Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8454/.

Texto completo da fonte
Resumo:
Gunshot residue (GSR) is a complex chemical mixture that is created during the discharge of a firearm. Its detection and interpretation play a crucial role in the investigation of firearm incidents. Current GSR analysis is limited to inorganic GSR (IGSR), however, the evidential value could be strengthened by inclusion of organic GSR (OGSR). The present study aims to address this potential by proposing a categorisation system for relevant OGSR compounds and developing a methodology for the collection, extraction and analysis of both organic and inorganic GSR from a single sample. The organic composition of more than 50 propellant powders has been determined and compared against more than 200 propellant compositions reported in the literature. This work has resulted in a three-tier categorisation system for OGSR compounds, which together with the current IGSR classification will provide unequivocal identification of GSR materials with the possibility of discriminating between GSR from different ammunition types. Evaluation of MonoTrap extraction showed that this is an effective pre-concentration technique for the characterisation of propellants. Solid-phase microextraction (SPME), however, was the superior method for the extraction of OGSR compounds from various sampling media, including swabs and stubs. The optimised methodology involves GSR collection using carbon adhesive stubs followed by SPME gas chromatography – mass spectrometry (GC-MS) analysis of OGSR and subsequent scanning electron microscopy – energy-dispersive X-ray spectrometry (SEM-EDX) analysis for IGSR. This protocol has resulted in the detection of both characteristic IGSR and categorised organic compounds, demonstrating the ability to obtain a full chemical profile from a single sample. Detection of both first and second tier organic compounds provides complementary compositional information that could be used to discriminate between samples. Furthermore, this methodology requires no changes to the current sampling and IGSR analysis protocols and addresses the limited storage time of OGSR. Since GC-MS instruments are readily available in most analytical laboratories, implementation of the proposed protocol is feasible.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Luo, Yawen. "Cognitive deficits, behavioral changes and gene expression profiling in a mouse model of repeated mild traumatic brain injury". Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/32853.

Texto completo da fonte
Resumo:
Repeated mild traumatic brain injury (rmTBI) has been thought to result in cumulative damage to cells of the brain, but the molecular mechanisms are not known. We investigated the effect of rmTBI on cognition, behavior and hippocampal gene expression using microarray analysis. Mice applied with rmTBI for 25 successive days and tested at 1 week and 4 weeks after the injury respectively, showed transient neurological deficit, impaired weekly body weight growth rate (BWGR), changed behaviors in elevated plus maze and deficit in spatial memory in the Morris water maze compared with sham injury mice. Microarray analysis suggested several rmTBI-induced expression differences in intracellular signaling, apoptosis and cell cycle, angiogenesis, cellular architecture, inflammation, oxidative stress, metabolism and transcriptional regulation, and neuronal plasticity-related genes. This study highlights some of the potential mechanisms that may play an important role in the development of rmTBI-induced functional deficits. Further studies at different time points and in additional subregions of the brain are of interest in the search for molecular mechanisms behind rmTBI-induced neuronal pathogenesis after the injury.
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Wilson, Alyssa N. "Behavioral and neurological investigations into pathological gambling as a behavioral addiction". OpenSIUC, 2012. https://opensiuc.lib.siu.edu/dissertations/524.

Texto completo da fonte
Resumo:
The current set of three proposed experiments focused on integrating neurological and behavioral levels of analysis in the context of pathological gambling. A thoroughgoing analysis on previous gambling research was explored and discussed in the first four chapters. Specifically, this analysis outlines: similarities between pathological gambling and other substance addictions, new technological advances (i.e. functional magnetic resonance imaging), verbal behavior in general and its role in pathological gambling specifically, and treatment assessments and interventions. Three experiments were then developed and designed based on the outcomes suggested by the literature review. Experiment I determined the effectiveness of the Gambling Functional Assessment (GFA; Dixon & Johnson, 2007) as a clinically relevant gambling assessment tool. Experiment II also investigated neurological differences between pathological gamblers. Similar to other behavioral and substance addictions, limbic and cortical brain systems are activated during gambling related tasks and activities. However, as gambling pathology increases, brain activation in these regions have been reported to decrease, and it is unclear how pathological gamblers brain activation patterns differ across function maintaining gambling (i.e. attention, escape, sensory, and tangible maintaining functions). Therefore, Experiment II built upon the findings of Experiment I by contrasting brain activation images from the two highest maintaining functions of play, as indicated by the GFA. Concomitantly, Experiment III assessed function based assessment and treatment of pathological gamblers, by comparing brief 30 min exposure to function based or non- function based Acceptance and Commitment Therapy for gamblers. Results from both studies suggested differences in brain activation patterns, yet similarities across subjective closeness to win ratings of the slot machine. Furthermore, brain activation patterns did not change following function based therapy, while subjective ratings in the function based treatment group decreased. Implications for brain-behavior relationships both in a gambling context and in relation to behavior therapy will be discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Hahn, Fox Bryanna. "Developing and testing a profile of American burglars using statistical analyses and scientific methods : a new approach to offender profiling". Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648401.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Yiu, Tak Wing. "A behavioral analysis of construction dispute negotiation /". access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?phd-bc-b19887577a.pdf.

Texto completo da fonte
Resumo:
Thesis (Ph.D.)--City University of Hong Kong, 2005.
"Submitted to Department of Building and Construction in partial fulfillment of the requirements for the degree of Doctor of Philosophy" Includes bibliographical references (leaves 179-201)
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

REIS, ROBSON COSTA. "ANALYSIS OF THE PERFORMANCE OF BEHAVIORAL FUNDS". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2015. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=25836@1.

Texto completo da fonte
Resumo:
Este trabalho analisou o desempenho de 31 fundos mútuos comportamentais atuantes nos EUA, Europa e Japão descritos em Santoni e Kelshiker (2010). Foram observados os desempenhos dos fundos e seus respectivos Benchmarks em quatro indicadores: Índice de Sharpe, Índice de Sortino, Medida Ômega e Medida de Desempenho Comportamental. O horizonte da análise foi de 10 anos (jan/04 a dez/14) dividido em intervalos de 6, 12, 36, 60 e 120 meses. A partir da consolidação dos indicadores os fundos foram ranqueados e classificados em três faixas de desempenho: superior, intermediário e inferior. No intervalo de 120 meses não houve, na média geral, diferença de desempenho significativa (a 5 por cento) entre os fundos e os Benchmarks. A análise por intervalos indicou que o desempenho dos fundos em relação aos Benchmarks piora conforme aumenta o prazo de aplicação. Nos intervalos mais curtos (6 e 12 meses) não houve, na média, diferença de desempenho significativa enquanto nos prazos mais longos (36 e 60 meses) o desempenho médio dos fundos foi significativamente inferior aos Benchmarks. Na média de todos os intervalos o desempenho médio dos fundos foi significativamente inferior aos Benchmarks. Dentre os indicadores utilizados, o índice de Sortino foi o que apresentou maior correlação com o desempenho geral dos fundos.
This work has analyzed the performance of 31 behavioral mutual funds operating in USA, Europe and Japan, as described in Santoni and Kelshiker (2010). It has been observed the performance of the funds and their respective Benchmarks according to four measures: Sharpe Index, Sortino Index, Omega Measure and Behavioral Performance Measure. The analysis covered a 10-year period (jan-04 to dec-14) split into intervals of 6, 12, 36, 60 and 120 months. Based on the consolidation of the performance measures, the funds have been ranked and classified into three performance categories: upper, intermediate and lower. In the 120-month interval there has not been, on average, a significant difference (at 5 per cent) in performance between funds and Benchmarks. The analysis by intervals showed that the funds performance worsens in relation to the Benchmarks as the investment period increases. In shorter intervals (6 and 12 months) there has not been, on average, a significant difference in performance while in the longer intervals (36 and 60 months) the funds average performance was significantly lower than the Benchmarks. Computing the mean of all intervals, the funds average performance was significantly lower than the Benchmarks. Among the performance measures used, the Sortino Index presented the highest correlation with the general performance of the funds.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Belfodil, Adnene. "Exceptional model mining for behavioral data analysis". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI086.

Texto completo da fonte
Resumo:
Avec la prolifération rapide des plateformes de données qui récoltent des données relatives à plusieurs domaines tels que les données de gouvernements, d’éducation, d’environnement ou les données de notations de produits, plus de données sont disponibles en ligne. Ceci représente une opportunité sans égal pour étudier le comportement des individus et les interactions entre eux. Sur le plan politique, le fait de pouvoir interroger des ensembles de données de votes peut fournir des informations intéressantes pour les journalistes et les analystes politiques. En particulier, ce type de données peut être exploité pour l’investigation des sujet exceptionnellement conflictuels ou consensuels. Considérons des données décrivant les sessions de votes dans le parlement Européen (PE). Un tel ensemble de données enregistre les votes de chaque député (MPE) dans l’hémicycle en plus des informations relatives aux parlementaires (e.g., genre, parti national, parti européen) et des sessions (e.g., sujet, date). Ces données offrent la possibilité d’étudier les accords et désaccords de sous-groupes cohérents, en particulier pour mettre en évidence des comportements inattendus. Par exemple, il est attendu que sur la majorité des sessions, les députés votent selon la ligne politique de leurs partis politiques respectifs. Cependant, lorsque les sujets sont plutôt d’intérêt d’un pays particulier dans l’Europe, des coalitions peuvent se former ou se dissoudre. À titre d’exemple, quand une procédure législative concernant la pêche est proposée devant les MPE dans l’hémicycle, les MPE des nations insulaires du Royaume-Uni peuvent voter en accord sans être influencés par la différence entre les lignes politiques de leurs alliances respectives, cela peut suggérer un accord exceptionnel comparé à la polarisation observée habituellement. Dans cette thèse, nous nous intéressons à ce type de motifs décrivant des (dés)accords exceptionnels, pas uniquement sur les données de votes mais également sur des données similaires appelées données comportementales. Nous élaborons deux méthodes complémentaires appelées Debunk et Deviant. La première permet la découverte de (dés)accords exceptionnels entre groupes tandis que la seconde permet de mettre en évidence les comportements exceptionnels qui peuvent au sein d’un même groupe. Idéalement, ces deux méthodes ont pour objective de donner un aperçu complet et concis des comportements exceptionnels dans les données comportementales. Dans l’esprit d’évaluer la capacité des deux méthodes à réaliser cet objectif, nous évaluons les performances quantitatives et qualitatives sur plusieurs jeux de données réelles. De plus, nous motivons l’utilisation des méthodes proposées dans le contexte du journalisme computationnel
With the rapid proliferation of data platforms collecting and curating data related to various domains such as governments data, education data, environment data or product ratings, more and more data are available online. This offers an unparalleled opportunity to study the behavior of individuals and the interactions between them. In the political sphere, being able to query datasets of voting records provides interesting insights for data journalists and political analysts. In particular, such data can be leveraged for the investigation of exceptionally consensual/controversial topics. Consider data describing the voting behavior in the European Parliament (EP). Such a dataset records the votes of each member (MEP) in voting sessions held in the parliament, as well as information on the parliamentarians (e.g., gender, national party, European party alliance) and the sessions (e.g., topic, date). This dataset offers opportunities to study the agreement or disagreement of coherent subgroups, especially to highlight unexpected behavior. It is to be expected that on the majority of voting sessions, MEPs will vote along the lines of their European party alliance. However, when matters are of interest to a specific nation within Europe, alignments may change and agreements can be formed or dissolved. For instance, when a legislative procedure on fishing rights is put before the MEPs, the island nation of the UK can be expected to agree on a specific course of action regardless of their party alliance, fostering an exceptional agreement where strong polarization exists otherwise. In this thesis, we aim to discover such exceptional (dis)agreement patterns not only in voting data but also in more generic data, called behavioral data, which involves individuals performing observable actions on entities. We devise two novel methods which offer complementary angles of exceptional (dis)agreement in behavioral data: within and between groups. These two approaches called Debunk and Deviant, ideally, enables the implementation of a sufficiently comprehensive tool to highlight, summarize and analyze exceptional comportments in behavioral data. We thoroughly investigate the qualitative and quantitative performances of the devised methods. Furthermore, we motivate their usage in the context of computational journalism
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Subramaniyam, Yamuna. "Behavioral analysis of comminution using complex networks". Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13355.

Texto completo da fonte
Resumo:
The objective of this research is to model a complex system to analyze the behavior of granular material under stress. The scope of this study includes finding the most appropriate theoretical model for the representation of the granular materials, developing a computer simulation of the selected model, incorporating the complex network property measurement criteria within the model, and review of the results in terms of the complex network properties. Most important parameters for studying the behavior of granular material under stress are the orientation of the grains to each other and the sizes of the grains. When granular materials undergo stress, one of the deformation takes place in the structure is the grain crushing. One of the key parameters that decides the properties of the crushed material is the sizes of the grains at the end of the crushing process. Study of the converging patterns of the grainsize distribution and the behavioral analysis using the complex network properties is possible through the computer simulation. Accordingly, Cellular Automata (CA) is selected as the model as this can fulfill the requirements of this study and the model is available in two forms, two-dimensional (2D) and three-dimensional (3D), and developed considering the influence from adjacent neighbors. This thesis concludes with three findings of this research using both the models: grain size distribution of the communication process is power-law distribution, degree distribution of resultant granular materials is obeying power-law distribution and the degree distribution of the granular material is scale-free and the resultant sample of crushing process exhibits small-world property.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Luc, Oanh. "A Behavioral Analysis of the Stroop Effect". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538655/.

Texto completo da fonte
Resumo:
Participants demonstrate the Stroop effect when, in naming the color in which a word appears, reaction times are longer when the color and word are incongruent (e.g., "yellow" printed in blue) compared to when they are congruent (e.g., "yellow" printed in yellow). The literature commonly refers to the difference in reaction times as a measure of the interference of word stimuli upon color stimuli, and is taken as support for the theory of automaticity. This study asks whether the Stroop effect can be analyzed as interactions within and across stimulus classes. Adult participants learned three 3-member classes (color, word, and pattern) in a serialized order of training. In the testing phase, participants were presented with compound stimuli formed from combinations of members within and across classes (e.g., word and color), and reaction times were recorded in similar fashion to the Stroop task. Results show that averaged participants' reaction times are faster to compound stimuli comprised of members within the same class, compared to compound stimuli formed with members from different classes. These group-level data are consistent with the Stroop literature in that congruent compounds produce faster reaction times relative to incongruent compounds. However, individual participant data do not consistently reflect the Stroop effect. Further considerations for future research in this area are discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Arole, Alukayode. "Power profiling an incremental power analysis technique for FPGA-based designs /". Cincinnati, Ohio : University of Cincinnati, 2006. http://www.ohiolink.edu/etd/view.cgi?acc%5Fnum=ucin1155577393.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Forshed, Jenny. "Processing and analysis of NMR data : Impurity determination and metabolic profiling". Doctoral thesis, Stockholm : Dept. of analytical chemistry, Stockholm university, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-712.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Hu, C. T. "Gene expression profiling in rat tissues by cDNA representational difference analysis". Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604690.

Texto completo da fonte
Resumo:
Gene profiling was performed using a PCR-based subtractive hybridisation method, called Representation Difference Analysis (RDA), and kidney tissue from congenic versus hypertensive controls for the SHRSPGla. The RDA method itself I have also refined using glycerol-enhanced mini-polyacrylamide gel electrophoresis to optimize the separation of differentially expressed RDA fragments. I have isolated 20 such fragments that are differentially expressed and have been able to positively identify them by BLASTA search against known sequences on Genbank. These include the cytochrome P450 4A3 gene, which has been well documented as differentially expressed between SHR and WKY kidneys, and the low affinity Na-dependent glucose transporter (SGLT2). The expression of SGLT2 mRNA has been shown to be kidney specific and I have shown that it is differentially expressed in the congenic strain of SP.WKYGla2a versus the parental SHRSPGla. Two novel genes have also been mapped onto our target chromosome 2 within the congenic interval by radiation hybrid (RH) mapping. Others have also been mapped onto chromosome 2 but they are also linked to other chromosomes, suggesting either a technical problem with PCR typing of the radiation hybrids, homologous gene products or most likely epistatic gene-gene effects. The CN3.1 fragment shows almost 100% homology to 4 EST rat clones (AA924217, BF282696, AI547398 and AA893369). Importantly, the first of these has been positionally cloned in silico to chromosome 2 on the Rat Genome Database. It has also been possible to align one important clone I pulled out to a supercontig on chromosome 2. Above all, it is intriguing that the original cDNA-RDA fragment has now been identified as the novel hypothetical protein LOC310133 in chromosome 2. Furthermore work is needed to further characterize the novel cDNA fragments I have identified as mapping to the region of the chromosome 2 QTL. I hypothesise that one of them may be the pressor gene for this rat QTL.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Hardwicke, Alexander. "Performance impacts of profiling multi-threaded applications with flexible analysis tools". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20723.

Texto completo da fonte
Resumo:
Syftet med denna studie var att undersöka hur användningen av profilers påverkade prestandan hos flertrådade applikationer. Studien genomfördes inom ramen för ett projekt med Edument AB som skapat en av de profilers som undersökts i studien. Mer specifikt så syftade studien till att ta reda på vilken ytterligare CPU-tid och RAM som användes och hur mycket längre tid det tog att exekvera en flertrådad applikation vid användningen av profilers. Uppsatsens hypotes var att valet av data som varje profiler registrerade skulle påverka prestanda, och att de som registrerade fler detaljer om applikationen skulle ha störst påverkan.Fem profilers valdes ut med olika egenskaper och funktioner och en testapplikation skrevs för att simulera en flertrådad applikation. En minimalistisk applikation skrevs också och användes för att registrera varje profilers påverkan på RAM och CPU, samt hur testapplikationen påverkades av profilern. Alltså, varje profiler har var för sig blivit profilerad för att försäkra att samma data konsekvent samlats in.Resultaten visade att valet av profiler kan ha stor påverkan på den profilerade applikationens prestanda. Användningen av en av profilerna ledde till att testapplikationen tog 513% så lång tid att exekvera och lade också till 1400% ytterligare RAM-användning. Efter en analys av insamlade data verkade det finnas ett samband mellan de funktioner som varje profiler erbjöd och påverkan på applikationens prestanda vilket stämmer överens med uppsatsens hypotes.
The aim of this study was to investigate how the use of profilers impacted the performance of multi-threaded applications. This study was undertaken in the framework of a project for Edument AB, creators of one of the profilers investigated in this study. Specifically, the study aimed to find out what additional overhead can result in profiling multi-threaded applications, with regards to CPU use, memory use, and additional time taken to complete execution. The paper hypothesised that the selection of data that each profiler recorded would impact the performance, with those that recorded a very large amount of detail about the application being profiled would introduce a higher overhead.A selection of five profilers was made, each profiler offering a range of features and functionality, and a test application was written to simulate a multi-threaded application. A very lightweight application, referred to as the monitoring application, was also written which recorded the overhead each profiler used, along with the overhead of the test application and the time taken to run. Essentially, each profiler was itself profiled by the monitoring application, ensuring consistent overhead data was gathered for each profiler.The results of the study showed that the choice of profiler can have a substantial impact on the performance of the application being profiled. One profiler resulted in execution of the test application taking 513% as much time to run, and adding an overhead of 1400% memory use. After analysing this data, there appeared to be a correlation between what features the profilers recorded and the overhead, consistent with the hypothesis put forward at the beginning of the study.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

AROLE, ALUKAYODE. "POWER PROFILING: AN INCREMENTAL POWER ANALYSIS TECHNIQUE FOR FPGA-BASED DESIGNS". University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1155577393.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Heimiller, Joseph Karl. "Genome-wide analysis of splicing requirements and function through mRNA profiling". Thesis, University of Colorado at Boulder, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607314.

Texto completo da fonte
Resumo:

The RNA-binding proteins U2AF and PTB play important roles in gene expression in many eukaryotic species. Although U2AF and PTB have been well-studied, their functional requirements have not been investigated on a genome-wide scale. In this thesis, I analyze RNA expression data to determine the requirement of the general splicing factor U2AF in S. pombe and to identify genes misregulated in Drosophila PTB mutants. I find that many introns are insensitive to U2AF inactivation in a Schizosaccharomyces pombe U2AF59 mutant, prp2.1. Bioinformatics analysis indicates that U2AF-insensitive introns have stronger 5' splice sites and higher A/U composition. The importance of intronic nucleotide composition was further investigated using wild type RNA expression data sets. I show that nucleotide composition is a relatively important factor for regulated intron retention in a variety of species. I also analyzed the RNA-binding protein PTB using RNA Seq data to reveal genes misregulated in PTB mutants in D. melanogaster. I identify misregulation of alternative splicing in PTB mutants and putative PTB binding sites. In the PTB embryonic lethal mutant, which shows dorsoventral patterning defects, I show that dorsal fate genes are significantly up-regulated. I present a model to link PTB to dorsal closure defects. This thesis provides the first genome-wide analysis of U2AF in S. pombe and PTB in Drosophila melanogaster.

Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Deshpande, A. B. "Mango ( magnifera indica L.) flavor biogenesis: metabolic profiling and molecular analysis". Thesis(Ph.D.), CSIR-National Chemical Laboratory, Pune, 2017. http://dspace.ncl.res.in:8080/xmlui/handle/20.500.12252/4512.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Sievertzon, Maria. "Transcript profiling of small tissue samples using microarray technology". Doctoral thesis, Stockholm Department of Biotechnology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-158.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Yezbick, Gabrielle. "Physicochemical Characterization and Isoflavone Profiling of Sourdough Soy Bread". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345313529.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia