393 resultados para morphologic behaviors
Resumo:
The epidemic of obesity is impacting an increasing proportion of children, adolescents and adults with a common feature being low levels of physical activity (PA). Despite having more knowledge than ever before about the benefits of PA for health and the growth and development of youngsters, we are only paying lip-service to the development of motor skills in children. Fun, enjoyment and basic skills are the essential underpinnings of meaningful participation in PA. A concurrent problem is the reported increase in sitting time with the most common sedentary behaviors being TV viewing and other screen-based games. Limitations of time have contributed to a displacement of active behaviors with inactive pursuits, which has contributed to reductions in activity energy expenditure. To redress the energy imbalance in overweight and obese children, we urgently need out-of-the-box multisectoral solutions. There is little to be gained from a shame and blame mentality where individuals, their parents, teachers and other groups are singled out as causes of the problem. Such an approach does little more than shift attention from the main game of prevention and management of the condition, which requires a concerted, whole-of-government approach (in each country). The failure to support and encourage all young people to participate in regular PA will increase the chance that our children will live shorter and less healthy lives than their parents. In short, we need novel environmental approaches to foster a systematic increase in PA. This paper provides examples of opportunities and challenges for PA strategies to prevent obesity with a particular emphasis on the school and home settings.
Resumo:
The effectiveness of a 10-week group music therapy program for marginalized parents and their children aged 0–5 years was examined. Musical activities were used to promote positive parent–child relationships and children’s behavioral, communicative and social development. Participants were 358 parents and children from families facing social disadvantage, young parents or parents of a child with a disability. Significant improvements were found for therapist-observed parent and child behaviors, and parent-reported irritable parenting, educational activities in the home, parent mental health and child communication and social play skills. This study provides evidence of the potential effectiveness of music therapy for early intervention.
Resumo:
We provide conceptual and empirical insights elucidating how organizational practices influence service staff attitudes and behaviors and how the latter set affects organizational performance drivers. Our analyses suggest that service organizations can enhance their performance by putting in place strategies and practices that strengthen the service-oriented behaviors of their employees and reduce their intentions to leave the organization. Improved performance is accomplished through both the delivery of high quality services (enhancing organizational effectiveness) and the maintenance of frontline staff(increasing organizational efficiency). Specifically, service-oriented business strategies in the form of organizational-level service orientation and practices in the form of training directly influence the manifest service-oriented behaviors of staff. Training also indirectly affects the intention of frontline staff to leave the organization; it increases job satisfaction, which, in turn has an impact on affective commitment. Both affective and instrumental commitment were hypothesized to reduce the intentions of frontline staff to leave the organization, however only affective commitment had a significant effect.
Resumo:
This paper reports on the development of a school-based intervention to reduce risk-taking and associated injuries. There is limited but important evidence that intervention design should ensure participation does not lead to an increase in target risk behaviors with some studies in alcohol and drug prevention finding unexpected negative effects. The short-term evaluation of Skills for Preventing Injury in Youth (SPIY) examined change in interpersonal violence, alcohol and transport-related risks. Intervention (n = 360) and comparison (n = 180) students were surveyed pre/post-intervention. A qualitative analysis based on focus groups (70 students) explored experiences of change. Findings indicate significant positive changes reinforced by students’ reports. A decrease in reported risk-taking for the intervention group and an increase in the comparison group were observed. These findings endorse SPIY as a useful curriculum approach to reducing injuries and lend support to the future conduct of a long-term outcome evaluation.
Resumo:
In a power network, when a propagation energy wave caused by a disturbance hits a weak link, a reflection is appeared and some of energy is transferred across the link. In this work, an analytical descriptive methodology is proposed to study the dynamical stability of a large scale power system. For this purpose, the measured electrical indices (angle, or voltage/frequency) following a fault in different points among the network are used, and the behaviors of the propagated waves through the lines, nodes and buses are studied. This work addresses a new tool for power system stability analysis based on a descriptive study of electrical measurements. The proposed methodology is also useful to detect the contingency condition and synthesis of an effective emergency control scheme.
Resumo:
The following paper presents an evaluation of airborne sensors for use in vegetation management in powerline corridors. Three integral stages in the management process are addressed including, the detection of trees, relative positioning with respect to the nearest powerline and vegetation height estimation. Image data, including multi-spectral and high resolution, are analyzed along with LiDAR data captured from fixed wing aircraft. Ground truth data is then used to establish the accuracy and reliability of each sensor thus providing a quantitative comparison of sensor options. Tree detection was achieved through crown delineation using a Pulse-Coupled Neural Network (PCNN) and morphologic reconstruction applied to multi-spectral imagery. Through testing it was shown to achieve a detection rate of 96%, while the accuracy in segmenting groups of trees and single trees correctly was shown to be 75%. Relative positioning using LiDAR achieved a RMSE of 1.4m and 2.1m for cross track distance and along track position respectively, while Direct Georeferencing achieved RMSE of 3.1m in both instances. The estimation of pole and tree heights measured with LiDAR had a RMSE of 0.4m and 0.9m respectively, while Stereo Matching achieved 1.5m and 2.9m. Overall a small number of poles were missed with detection rates of 98% and 95% for LiDAR and Stereo Matching.
Resumo:
Purpose: To evaluate the psychometric properties of a Chinese version of the Diabetes Coping Measure (DCM-C) scale.----- Methods: A self-administered questionnaire was completed by 205 people with type 2 diabetes from the endocrine outpatient departments of three hospitals in Taiwan. Confirmatory factor analysis, criterion validity, and internal consistency reliability were conducted to evaluate the psychometric properties of the DCM-C.----- Findings: Confirmatory factor analysis confirmed a four-factor structure (χ2 /df ratio=1.351, GFI=.904, CFI=.902, RMSEA=.041). The DCM-C was significantly associated with HbA1c and diabetes self-care behaviors. Internal consistency reliability of the total DCM-C scale was .74. Cronbach’s alpha coefficients for each subscale of the DCM-C ranged from .37 (tackling spirit) to .66 (diabetes integration).----- Conclusions: The DCM-C demonstrated satisfactory reliability and validity to determine the use of diabetes coping strategies. The tackling spirit dimension needs further refinement when applies this scale to Chinese populations with diabetes.----- Clinical Relevance: Healthcare providers who deal with Chinese people with diabetes can use the DCM-C to implement an early determination of diabetes coping strategies.
Resumo:
We evaluated sustainability of an intervention to reduce women’s cardiovascular risk factors, determined the influence of self-efficacy, and described women’s current health. We used a mixed method approach that utilized forced choice and open-ended questionnaire items about health status, habits, and self-efficacy. Sixty women, average age 61, returned questionnaires. Women in the original intervention group continued health behaviors intended to reduce cardiovascular disease (CVD) at a higher rate than the control group, supporting the feasibility of a targeted intervention built around women’s individual goals. The role of self-efficacy in behavior change is unclear. The original intervention group reported higher self-reported health.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
Purpose of the Study: A framework aids choice of interventions to manage wandering and prevent elopement in consideration of associated risks and mobility needs of wanderers. ---------- Design and Methods: A literature review, together with research results, published wandering tools, clinical reports, author clinical experience, and consensus-based judgments was used to build a decision-making framework. Results: Referencing a published definition of wandering and originating a clinical description of problematic wandering, authors introduce a framework comprising (1) wandering and related behaviors; (2) goals of wandering-specific care, (3) interpersonally, technologically, and policy-mediated wandering interventions, and (4) estimates of relative frequencies of wandering behaviors, magnitudes of elopement risk, and restrictiveness of strategies. ---------- Implications: Safeguarding wanderers from elopement risk is rendered person-centered and humane when goals of care guide intervention choice. Despite limitations, a reasoned, systematized approach to wandering management provides a basis for tailoring a specialized program of care. The need for framework refinement and related research is emphasized.
Resumo:
European American (EA) women report greater body dissatisfaction and less dietary control than do African American (AA) women. This study investigated whether ethnic differences in dieting history contributed to differences in body dissatisfaction and dietary control, or to differential changes that may occur during weight loss and regain. Eighty-nine EA and AA women underwent dual-energy X-ray absorptiometry to measure body composition and completed questionnaires to assess body dissatisfaction and dietary control before, after, and one year following, a controlled weight-loss intervention. While EA women reported a more extensive dieting history than AA women, this difference did not contribute to ethnic differences in body dissatisfaction and perceived dietary control. During weight loss, body satisfaction improved more for AA women, and during weight regain, dietary self-efficacy worsened to a greater degree for EA women. Ethnic differences in dieting history did not contribute significantly to these differential changes. Although ethnic differences in body image and dietary control are evident prior to weight loss, and some change differentially by ethnic group during weight loss and regain, differences in dieting history do not contribute significantly to ethnic differences in body image and dietary control.
Resumo:
The OED informs us that “gender” has at its root the Latin genus, meaning “race, kind,” and emerges as early as the fifth century as a term for differentiating between types of (especially) people and words. In the following 1500 years, gender appears in linguistic and biological contexts to distinguish types of words and bodies from one another, as when words in Indo-European languages were identified as masculine, feminine, or neuter, and humans were identified as male or female. It is telling that gender has historically (whether overtly or covertly) been a tool of negotiation between our understandings of bodies, and meanings derived from and attributed to them. Within the field of children’s literature studies, as in other disciplines, gender in and of itself is rarely the object of critique. Rather, specific constructions of gender structure understandings of subjectivity; allow or disallow certain behaviors or experiences on the basis of biological sex; and dictate a specific vision of social relations and organization. Critical approaches to gender in children’s literature have included linguistic analysis (Turner-Bowker; Sunderland); analysis of visual representations (Bradford; Moebius); cultural images of females (Grauerholz and Pescosolido); consideration of gender and genre (Christian-Smith; Stephens); ideological (Nodelman and Reimer); psychoanalytic (Coats); discourse analysis (Stephens); and masculinity studies (Nodelman) among others. In the adjacent fields of education and literacy studies, gender has been a sustained point of investigation, often deriving from perceived gendering of pedagogical practices (Lehr) or of reading preferences and competencies, and in recent years, perceptions of boys as “reluctant readers” (Moss). The ideology of patriarchy has primarily come under critical scrutiny 2 because it has been used to locate characters and readers within the specific binary logic of gender relations that historically subordinated the feminine to the masculine. Just as feminism might be broadly defined as resistance to existing power structures, a gendered reading might be broadly defined as a “resistant reading” in that it most often reveals or contests that which a text assumes to be the norm.
Resumo:
This paper presents the results from a study of information behaviors in the context of people's everyday lives undertaken in order to develop an integrated model of information behavior (IB). 34 participants from across 6 countries maintained a daily information journal or diary – mainly through a secure web log – for two weeks, to an aggregate of 468 participant days over five months. The text-rich diary data was analyzed using a multi-method qualitative-quantitative analysis in the following order: Grounded Theory analysis with manual coding, automated concept analysis using thesaurus-based visualization, and finally a statistical analysis of the coding data. The findings indicate that people engage in several information behaviors simultaneously throughout their everyday lives (including home and work life) and that sense-making is entangled in all aspects of them. Participants engaged in many of the information behaviors in a parallel, distributed, and concurrent fashion: many information behaviors for one information problem, one information behavior across many information problems, and many information behaviors concurrently across many information problems. Findings indicate also that information avoidance – both active and passive avoidance – is a common phenomenon and that information organizing behaviors or the lack thereof caused the most problems for participants. An integrated model of information behaviors is presented based on the findings.
Resumo:
Adolescent drinking is a significant issue yet valid psychometric tools designed for this group are scarce. The Drinking Refusal Self-Efficacy Questionnaire—Revised Adolescent Version (DRSEQ-RA) is designed to assess an individual's belief in their ability to resist drinking alcohol. The original DRSEQ-R consists of three factors reflecting social pressure refusal self-efficacy, opportunistic refusal self-efficacy and emotional relief refusal self-efficacy. A large sample of 2020 adolescents aged between 12 and 19 years completed the DRSEQ and measures of alcohol consumption in small groups. Using confirmatory factor analysis, the three factor structure was confirmed. All three factors were negatively correlated with both frequency and volume of alcohol consumption. Drinkers reported lower drinking refusal self-efficacy than non-drinkers. Taken together, these results suggest that the adolescent version of the Drinking Refusal Self-Efficacy Questionnaire (DRSEQ-RA) is a reliable and valid measure of drinking refusal self-efficacy.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.