Feasibility of using the profile analysis technique in a state rehabilitation agency

1982 ◽  
Vol 5 (3) ◽  
pp. 369
Author(s):  
William E. Martin
2005 ◽  
Vol 48 (1) ◽  
pp. 86-93 ◽  
Author(s):  
M. Mendes ◽  
A. Karaabayir ◽  
I. E. Ersoy ◽  
C. Atasoglu

Abstract. A study was conducted to evaluate the influence of three lighting programs (23L: 1D), (18L: 6D), and (12L: 12D) on live weight changes of American Bronze turkeys by Profile analysis technique. The F-statistics and Wilk’s Lamba statistics for testing group-response interaction or similar profiles suggested that there was a significant interaction effect (p<0.01). The effects of the three lighting programs on live weight gain appeared to be different throughout the study except for the last 6 weeks. On the other hand, the results of the present study suggested that the effect of the three lighting programs on live weight gain followed a similar trend or three lighting programs had similar physiological effect on live weight gain from 10th week on wards.


The trend of network attacks through end-users are widely used by attackers today. One of them is the attack by distributing malware into users' computers to steal data or escalate to higher privileges. The technique of attack by distributing malware is a dangerous attack method that is difficult to detect and prevent. Therefore, the task of detecting the sign of malware and alerting it for the user or the system is very necessary today. Current studies and recommendations for detecting malware are often based on two main methods that are using a set of signs and analyzing abnormal behavior based on machine learning or deep learning. In this paper, we will propose a method to detect malware on users' computers using an Event ID profile analysis technique. Event IDs are signs and behaviors of malware that are tracked and collected on the operating system kernel of the workstation. The difference between our research and other published methods is the way to collect behaviors of the malware. We don't collect them through virtualization systems, but through direct processes in the operating system kernel. Therefore, even though malware uses hidden techniques, its actions are recorded by the operating system kernel and based on those processes, we use the Event ID analysis technique to conclude about the existence of malware in the system


FLORESTA ◽  
2020 ◽  
Vol 50 (3) ◽  
pp. 1547
Author(s):  
Carlos Cezar Cavassin Diniz ◽  
Felipe Martins de Oliveira ◽  
Romano Timofeiczyk Junior ◽  
Renato Cesar Gonçalves Robert ◽  
Miguel Pesch Tramontini ◽  
...  

The objective of this study was to evaluate the damage caused to the remaining trees of a pinus stand submitted to mechanized thinning by a wheeled harvester. The data were obtained in the operational areas of timber harvesting in a forest company located in the city of Inácio Martins, in the state of Paraná, Brazil. The Pinus stand of the study was 11 years old, and was submitted to the first commercial thinning. The operation was performed by a harvester, characterized by the systematic removal of the 5th planting line to give access to the interior of the stand, followed by selective thinning in the individuals demarcated in the two lines adjacent to the traffic trails. The damage caused to the remaining trees of the stand regarding their numbers, dimensions and location in relation to the harvester’s operation track was evaluated, and the data were analyzed using the Profile Analysis multivariate analysis technique. It was observed that 25% of the remaining trees suffered some kind of damage, being considered a high value, but current to the literature. It was evidenced that the section of the tree in need of greater alert was the base because damages in greater intensity and dimensions were observed to it, which can bring future losses to the stand. Thus, a need for improvements in operational procedures was demonstrated.


2020 ◽  
Vol 12 (15) ◽  
pp. 6199
Author(s):  
Aitana Fernández-Sogorb ◽  
Ricardo Sanmartín ◽  
María Vicent ◽  
José Manuel García-Fernández

Children tend to develop forms of anxiety that can be associated with school violence. However, the previous scientific literature on anxiety and aggression is scarce. In addition, it has only focused on examining differential relationships between both variables. This study aimed to analyze the relationships between three forms of anxiety (anticipatory anxiety, school-based performance anxiety, and generalized anxiety) and the components of aggression (physical and verbal aggression, anger, and hostility) by adopting a person-centered approach. The sample consisted of 1161 Spanish students from 8 to 11 years old (M = 9.72, SD = 1.14); 46.2% were boys. Informed written consent from the parents or legal guardians was obtained. The Visual Analogue Scale for Anxiety—Revised and the Aggression Questionnaire were used. The latent profile analysis technique identified three profiles of anxious children: Low Anxiety, High School-based Performance Anxiety, and High Anxiety. The High Anxiety group scored significantly higher than the Low Anxiety group in all components of aggression, with effect sizes ranging from moderate to large (d = 0.59 to 0.99). The High Anxiety profile showed significantly higher scores than the high school-based performance anxiety profile only in anger (d = 0.56) and hostility (d = 0.44). The results have relevant implications for practice, since there is evidence that different intervention strategies should be applied according to the risk profile.


Author(s):  
S.F. Corcoran

Over the past decade secondary ion mass spectrometry (SIMS) has played an increasingly important role in the characterization of electronic materials and devices. The ability of SIMS to provide part per million detection sensitivity for most elements while maintaining excellent depth resolution has made this technique indispensable in the semiconductor industry. Today SIMS is used extensively in the characterization of dopant profiles, thin film analysis, and trace analysis in bulk materials. The SIMS technique also lends itself to 2-D and 3-D imaging via either the use of stigmatic ion optics or small diameter primary beams.By far the most common application of SIMS is the determination of the depth distribution of dopants (B, As, P) intentionally introduced into semiconductor materials via ion implantation or epitaxial growth. Such measurements are critical since the dopant concentration and depth distribution can seriously affect the performance of a semiconductor device. In a typical depth profile analysis, keV ion sputtering is used to remove successive layers the sample.


Author(s):  
W. M. Kriven

Significant progress towards a fundamental understanding of transformation toughening in composite zirconia ceramics was made possible by the application of a TEM contrast analysis technique for imaging elastic strains. Spherical zirconia particles dispersed in a large-grained alumina matrix were examined by 1 MeV HVEM to simulate bulk conditions. A thermal contraction mismatch arose on cooling from the processing temperature of 1500°C to RT. Tetragonal ZrO2 contracted amisotropically with α(ct) = 16 X 10-6/°C and α(at) = 11 X 10-6/°C and faster than Al2O3 which contracted relatively isotropically at α = 8 X 10-6/°C. A volume increase of +4.9% accompanied the transformation to monoclinic symmetry at room temperature. The elastic strain field surrounding a particle before transformation was 3-dimensionally correlated with the internal crystallographic orientation of the particle and with the strain field after transformation. The aim of this paper is to theoretically and experimentally describe this technique using the ZrO2 as an example and thereby to illustrate the experimental requirements Tor such an analysis in other systems.


Crisis ◽  
2020 ◽  
Vol 41 (4) ◽  
pp. 288-295 ◽  
Author(s):  
Nadia Bounoua ◽  
Jasmeet P. Hayes ◽  
Naomi Sadeh

Abstract. Background: Suicide among veterans has increased in recent years, making the identification of those at greatest risk for self-injurious behavior a high research priority. Aims: We investigated whether affective impulsivity and risky behaviors distinguished typologies of self-injurious thoughts and behaviors in a sample of trauma-exposed veterans. Method: A total of 95 trauma-exposed veterans (ages 21–55; 87% men) completed self-report measures of self-injurious thoughts and behaviors, impulsivity, and clinical symptoms. Results: A latent profile analysis produced three classes that differed in suicidal ideation, suicide attempts and nonsuicidal self-injury (NSSI): A low class that reported little to no self-injurious thoughts or behaviors; a self-injurious thoughts (ST) class that endorsed high levels of ideation but no self-harm behaviors; and a self-injurious thoughts and behaviors (STaB) class that reported ideation, suicide attempts and NSSI. Membership in the STaB class was associated with greater affective impulsivity, disinhibition, and distress/arousal than the other two classes. Limitations: Limitations include an overrepresentation of males in our sample, the cross-sectional nature of the data, and reliance on self-report measures. Conclusion: Findings point to affective impulsivity and risky behaviors as important characteristics of veterans who engage in self-injurious behaviors.


Sign in / Sign up

Export Citation Format

Share Document