•Multi-year twin study of adolescent daily GPS-based mobility measures.•Mobility measures increased from 15 to 18 before flattening or declining from 18 to 21.•Big five traits E and C (positively) ...and O (negatively) predicted mobility.•Mobility had large genetic and small-moderate shared environmental influences.•Mobility measures were moderately genetically correlated with E, C, and O.
Youth behavior changes and their relationships to personality have generally been investigated using self-report studies, which are subject to reporting biases and confounding variables. Supplementing these with objective measures, like GPS location data, and twin-based research designs, which help control for confounding genetic and environmental influences, may allow for more rigorous, causally informative research on adolescent behavior patterns. To investigate this possibility, this study aimed to (1) investigate whether behavior changes during the transition from adolescence to emerging adulthood are evident in changing mobility patterns, (2) estimate the influence of adolescent personality on mobility patterns, and (3) estimate genetic and environmental influences on mobility, personality, and the relationship between them. Twins aged Fourteen to twenty-two (N = 709, 55 % female) provided a baseline personality measure, the Big Five Inventory, and multiple years of smartphone GPS data from June 2016 - December 2019. Mobility, as measured by daily locations visited and distance travelled, was found via mixed effects models to increase during adolescence before declining slightly in emerging adulthood. Mobility was positively associated with Extraversion and Conscientiousness (r of 0.17–0.25, r of 0.10–0.16) and negatively with Openness (r of −0.11 - −0.13). ACE models found large genetic (A = 0.56–0.81) and small-moderate environmental (C of 0.12–0.28, E of 0.07–0.15) influences on mobility. A and E influences were highly shared across mobility measures (rg = 0.70, re = 0.58). Associations between mobility and personality were partially explained by mutual genetic influences (rg of −0.27–0.53). Results show that as autonomy increases during adolescence and emerging adulthood, we see corresponding increases in youth mobility. Furthermore, the heritability of mobility patterns and their relationship to personality demonstrate that mobility patterns are informative, psychologically meaningful behaviors worthy of continued interest in psychology.
Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device. In this paper, we collect and analyze ...behavioral biometrics data from 200 subjects, each using their personal Android mobile device for a period of at least 30 days. This data set is novel in the context of active authentication due to its size, duration, number of modalities, and absence of restrictions on tracked activity. The geographical colocation of the subjects in the study is representative of a large closed-world environment such as an organization where the unauthorized user of a device is likely to be an insider threat: coming from within the organization. We consider four biometric modalities: 1) text entered via soft keyboard, 2) applications used, 3) websites visited, and 4) physical location of the device as determined from GPS (when outdoors) or WiFi (when indoors). We implement and test a classifier for each modality and organize the classifiers as a parallel binary decision fusion architecture. We are able to characterize the performance of the system with respect to intruder detection time and to quantify the contribution of each modality to the overall performance.
Kill rates are a central parameter to assess the impact of predation on prey species. An accurate estimation of kill rates requires a correct identification of kill sites, often achieved by ...field‐checking GPS location clusters (GLCs). However, there are potential sources of error included in kill‐site identification, such as failing to detect GLCs that are kill sites, and misclassifying the generated GLCs (e.g., kill for nonkill) that were not field checked. Here, we address these two sources of error using a large GPS dataset of collared Eurasian lynx (Lynx lynx), an apex predator of conservation concern in Europe, in three multiprey systems, with different combinations of wild, semidomestic, and domestic prey. We first used a subsampling approach to investigate how different GPS‐fix schedules affected the detection of GLC‐indicated kill sites. Then, we evaluated the potential of the random forest algorithm to classify GLCs as nonkills, small prey kills, and ungulate kills. We show that the number of fixes can be reduced from seven to three fixes per night without missing more than 5% of the ungulate kills, in a system composed of wild prey. Reducing the number of fixes per 24 h decreased the probability of detecting GLCs connected with kill sites, particularly those of semidomestic or domestic prey, and small prey. Random forest successfully predicted between 73%–90% of ungulate kills, but failed to classify most small prey in all systems, with sensitivity (true positive rate) lower than 65%. Additionally, removing domestic prey improved the algorithm's overall accuracy. We provide a set of recommendations for studies focusing on kill‐site detection that can be considered for other large carnivore species in addition to the Eurasian lynx. We recommend caution when working in systems including domestic prey, as the odds of underestimating kill rates are higher.
Human movement is a significant factor in extensive spatial-transmission models of contagious viruses. The proposed COUNTERACT system recognizes infectious sites by retrieving location data from a ...mobile phone device linked with a particular infected subject. The proposed approach is computing an incubation phase for the subject's infection, backpropagation through the subjects’ location data to investigate a location where the subject has been during the incubation period. Classifying to each such site as a contagious site, informing exposed suspects who have been to the contagious location, and seeking near real-time or real-time feedback from suspects to affirm, discard, or improve the recognition of the infectious site. This technique is based on the contraption to gather confirmed infected subject and possibly carrier suspect area location, correlating location for the incubation days. Security and privacy are a specific thing in the present research, and the system is used only through authentication and authorization. The proposed approach is for healthcare officials primarily. It is different from other existing systems where all the subjects have to install the application. The cell phone associated with the global positioning system (GPS) location data is collected from the COVID-19 subjects.
Marine top predators are expected to adjust their foraging behaviour at multiple time scales concomitantly with changes in forage fish availability. Rhinoceros auklets
Cerorhinca monocerata
rearing ...chicks at Teuri Island, Japan Sea, fed on anchovy
Engraulis japonicus
in 2012 and 2013 (anchovy regime) but switched to sand lance
Ammodytes
spp in 2019 and 2020 (sand lance regime). Here, we studied their at-sea behaviour using the GPS locations of 33 birds and the depth-acceleration records of 26 birds, and compared their foraging behaviour between these prey regimes. At the trip scale, auklets used offshore waters (> 50 m sea depth) and coastal waters in the anchovy regime but used mainland coastal waters (< 50 m sea depth) in the sand lance regime. In the sand lance regime, the birds also conducted more overnight 2- to 4-day trips in 2020 and spent more time flying during 1-day trips as they fed in further areas compared to the anchovy regime. At the dive scale, auklets frequently dove to both < 5 m and 20–30 m depths in the anchovy regime but mainly to < 5 m depth in the sand lance regime. Within each dive, auklets showed a greater number of fast/strong wing stroke events in the anchovy regime than in the sand lance regime. These changes in auklet behaviour reflected the different habitats, depth distribution, and swim speed of the targeted prey species. Our study shows the behavioural flexibility of a wing-propelled flying-diving seabird in response to the inter-annual shifts in the dominant forage fish community. It also indicates the ecological constraints on the mechanisms determining nest productivity in this day-foraging/night-provisioning seabird.
This article describes a framework that capitalizes on the large-scale opportunistic mobile sensing approach for tourist behavior analysis. The article describes the use of massive mobile phone GPS ...location records to study tourist travel behavior, in particular, number of trips made, time spent at destinations, and mode of transportation used. Moreover, this study examined the relationship between personal mobility and tourist travel behavior and offered a number of interesting insights that are useful for tourism, such as tourist flows, top tourist destinations or origins, top destination types, top modes of transportation in terms of time spent and distance traveled, and how personal mobility information can be used to estimate the likelihood in tourist travel behavior, i.e., number of trips, time spent at destinations, and trip distance. Furthermore, the article describes an application developed based on the analysis in this study that allows the user to observe touristic, non-touristic, and commuting trips along with home and workplace locations as well as tourist flows, which can be useful for urban planners, transportation management, and tourism authorities.
Twitter provides various types of location data, including exact Global Positioning System (GPS) coordinates, which could be used for infoveillance and infodemiology (ie, the study and monitoring of ...online health information), health communication, and interventions. Despite its potential, Twitter location information is not well understood or well documented, limiting its public health utility.
The objective of this study was to document and describe the various types of location information available in Twitter. The different types of location data that can be ascertained from Twitter users are described. This information is key to informing future research on the availability, usability, and limitations of such location data.
Location data was gathered directly from Twitter using its application programming interface (API). The maximum tweets allowed by Twitter were gathered (1% of the total tweets) over 2 separate weeks in October and November 2011. The final dataset consisted of 23.8 million tweets from 9.5 million unique users. Frequencies for each of the location options were calculated to determine the prevalence of the various location data options by region of the world, time zone, and state within the United States. Data from the US Census Bureau were also compiled to determine population proportions in each state, and Pearson correlation coefficients were used to compare each state's population with the number of Twitter users who enable the GPS location option.
The GPS location data could be ascertained for 2.02% of tweets and 2.70% of unique users. Using a simple text-matching approach, 17.13% of user profiles in the 4 continental US time zones were able to be used to determine the user's city and state. Agreement between GPS data and data from the text-matching approach was high (87.69%). Furthermore, there was a significant correlation between the number of Twitter users per state and the 2010 US Census state populations (r ≥ 0.97, P < .001).
Health researchers exploring ways to use Twitter data for disease surveillance should be aware that the majority of tweets are not currently associated with an identifiable geographic location. Location can be identified for approximately 4 times the number of tweets using a straightforward text-matching process compared to using the GPS location information available in Twitter. Given the strong correlation between both data gathering methods, future research may consider using more qualitative approaches with higher yields, such as text mining, to acquire information about Twitter users' geographical location.
Virtual fencing systems have emerged as a promising technology for managing the distribution of livestock in extensive grazing environments. This study provides comprehensive documentation of the ...learning process involving two conditional behavioral mechanisms and the documentation of efficient, effective, and safe animal training for virtual fence applications on nursing Brangus cows. Two hypotheses were examined: (1) animals would learn to avoid restricted zones by increasing their use of containment zones within a virtual fence polygon, and (2) animals would progressively receive fewer audio-electric cues over time and increasingly rely on auditory cues for behavioral modification. Data from GPS coordinates, behavioral metrics derived from the collar data, and cueing events were analyzed to evaluate these hypotheses. The results supported hypothesis 1, revealing that virtual fence activation significantly increased the time spent in containment zones and reduced time in restricted zones compared to when the virtual fence was deactivated. Concurrently, behavioral metrics mirrored these findings, with cows adjusting their daily travel distances, exploration area, and cumulative activity counts in response to the allocation of areas with different virtual fence configurations. Hypothesis 2 was also supported by the results, with a decrease in cueing events over time and increased reliance with animals on audio cueing to avert receiving the mild electric pulse. These outcomes underscore the rapid learning capabilities of groups of nursing cows in responding to virtual fence boundaries.