7 resultados para Behavior modification techniques

em Digital Commons at Florida International University


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Introduction: ADHD is a chronic medical condition that affects 3-7% of school-aged children. Over the last few years, there has been increased attention with children in the preschool age range. The American Academy of Pediatrics (AAP) recommends that treatment for ADHD in the preschool age range should take the form of behavior modification first, with medication only considered after behavior modification is not effective alone in treating the symptoms (AAP, 2011). However, little research has been done to examine parent perceptions of evidence-based treatment approaches for children in the preschool age range. Objective: This study sought to examine parent perceptions of psychotropic medication use for preschool age (4-6 years) children with or at-risk of ADHD. Method: Data was collected from 176 families who presented for treatment at a clinic in southeast Florida. Parents completed questionnaires about their family background, their child’s behavior, behavioral functioning, and their perceptions of medication treatment. Results: Preliminary results indicate that 50% of parents were not open to the possibility of medication, 44.6% of parents were open to the possibility of medication, and 5.4% of parents chose against medication when a physician recommended it. Results examining the extent to which severity of child behavior problems impacts parent perceptions of medication will also be presented. Conclusion: These findings demonstrate that parents of preschool children are hesitant to consider medication as a treatment option for their young children. The findings of this study are important as more and more young children are being diagnosed with ADHD each year

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) limits access to the resources of a system only to authorized entities. Given that information systems today are increasingly interconnected, AC is extremely important. The implementation of an AC service is a complicated task. Yet the requirements to an AC service vary a lot. Accordingly, the design of an AC service should be flexible and extensible in order to save development effort and time. Unfortunately, with conventional object-oriented techniques, when an extension has not been anticipated at the design time, the modification incurred by the extension is often invasive. Invasive changes destroy design modularity, further deteriorate design extensibility, and even worse, they reduce product reliability. ^ A concern is crosscutting if it spans multiple object-oriented classes. It was identified that invasive changes were due to the crosscutting nature of most unplanned extensions. To overcome this problem, an aspect-oriented design approach for AC services was proposed, as aspect-oriented techniques could effectively encapsulate crosscutting concerns. The proposed approach was applied to develop an AC framework that supported role-based access control model. In the framework, the core role-based access control mechanism is given in an object-oriented design, while each extension is captured as an aspect. The resulting framework is well-modularized, flexible, and most importantly, supports noninvasive adaptation. ^ In addition, a process to formalize the aspect-oriented design was described. The purpose is to provide high assurance for AC services. Object-Z was used to specify the static structure and Predicate/Transition net was used to model the dynamic behavior. Object-Z was extended to facilitate specification in an aspect-oriented style. The process of formal modeling helps designers to enhance their understanding of the design, hence to detect problems. Furthermore, the specification can be mathematically verified. This provides confidence that the design is correct. It was illustrated through an example that the model was ready for formal analysis. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed applications are exposed as reusable components that are dynamically discovered and integrated to create new applications. These new applications, in the form of aggregate services, are vulnerable to failure due to the autonomous and distributed nature of their integrated components. This vulnerability creates the need for adaptability in aggregate services. The need for adaptation is accentuated for complex long-running applications as is found in scientific Grid computing, where distributed computing nodes may participate to solve computation and data-intensive problems. Such applications integrate services for coordinated problem solving in areas such as Bioinformatics. For such applications, when a constituent service fails, the application fails, even though there are other nodes that can substitute for the failed service. This concern is not addressed in the specification of high-level composition languages such as that of the Business Process Execution Language (BPEL). We propose an approach to transparently autonomizing existing BPEL processes in order to make them modifiable at runtime and more resilient to the failures in their execution environment. By transparent introduction of adaptive behavior, adaptation preserves the original business logic of the aggregate service and does not tangle the code for adaptive behavior with that of the aggregate service. The major contributions of this dissertation are: first, we assessed the effectiveness of BPEL language support in developing adaptive mechanisms. As a result, we identified the strengths and limitations of BPEL and came up with strategies to address those limitations. Second, we developed a technique to enhance existing BPEL processes transparently in order to support dynamic adaptation. We proposed a framework which uses transparent shaping and generative programming to make BPEL processes adaptive. Third, we developed a technique to dynamically discover and bind to substitute services. Our technique was evaluated and the result showed that dynamic utilization of components improves the flexibility of adaptive BPEL processes. Fourth, we developed an extensible policy-based technique to specify how to handle exceptional behavior. We developed a generic component that introduces adaptive behavior for multiple BPEL processes. Fifth, we identify ways to apply our work to facilitate adaptability in composite Grid services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Petri Nets are a formal, graphical and executable modeling technique for the specification and analysis of concurrent and distributed systems and have been widely applied in computer science and many other engineering disciplines. Low level Petri nets are simple and useful for modeling control flows but not powerful enough to define data and system functionality. High level Petri nets (HLPNs) have been developed to support data and functionality definitions, such as using complex structured data as tokens and algebraic expressions as transition formulas. Compared to low level Petri nets, HLPNs result in compact system models that are easier to be understood. Therefore, HLPNs are more useful in modeling complex systems. ^ There are two issues in using HLPNs—modeling and analysis. Modeling concerns the abstracting and representing the systems under consideration using HLPNs, and analysis deals with effective ways study the behaviors and properties of the resulting HLPN models. In this dissertation, several modeling and analysis techniques for HLPNs are studied, which are integrated into a framework that is supported by a tool. ^ For modeling, this framework integrates two formal languages: a type of HLPNs called Predicate Transition Net (PrT Net) is used to model a system's behavior and a first-order linear time temporal logic (FOLTL) to specify the system's properties. The main contribution of this dissertation with regard to modeling is to develop a software tool to support the formal modeling capabilities in this framework. ^ For analysis, this framework combines three complementary techniques, simulation, explicit state model checking and bounded model checking (BMC). Simulation is a straightforward and speedy method, but only covers some execution paths in a HLPN model. Explicit state model checking covers all the execution paths but suffers from the state explosion problem. BMC is a tradeoff as it provides a certain level of coverage while more efficient than explicit state model checking. The main contribution of this dissertation with regard to analysis is adapting BMC to analyze HLPN models and integrating the three complementary analysis techniques in a software tool to support the formal analysis capabilities in this framework. ^ The SAMTools developed for this framework in this dissertation integrates three tools: PIPE+ for HLPNs behavioral modeling and simulation, SAMAT for hierarchical structural modeling and property specification, and PIPE+Verifier for behavioral verification.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current study examines the effects of an online workshop pertaining to classroom behavior management on teacher self-efficacy, attitudes, motivation, knowledge, and practices. In addition, information about teacher utilization of the Internet, their opinions about professional development, and experiences with classroom management were collected. Participants included 57 1st through 5th grade special and regular education teachers. Eligible teachers were those who teach an academic subject and had at least one child in the classroom they considered as disruptive. Teachers were randomized to either a training or waitlist group. Classroom observations of teacher practices and questionnaires were utilized. Teachers in the training group participated in two assessment points, baseline and post-workshop, and received access to the online course immediately following the baseline assessment. Teachers in the waitlist group participated in three assessment points, baseline, post-workshop, and follow-up, and received access to the online course immediately following the post-workshop assessment. Findings show that all teachers had access to the Internet at home and at school and used it on a daily basis. The majority of teachers indicated having some past training on all the techniques that were presented in the online workshop. All teachers expressed satisfaction with the workshop, indicating that it should be offered again. Post-workshop, findings showed significant group differences in knowledge with a large effect for the training group scoring higher than the waitlist group on a quiz. Secondly, group differences in self-efficacy, knowledge, and attitudes with teachers’ past-training as a moderator, was examined. Past-training was not found to be a significant moderator of self-efficacy, knowledge, or attitudes. However, the main effect for training group was significant for attitudes. In addition, teacher attitudes, but not knowledge and self-efficacy, significantly predicted motivation to implement. Next, the moderating effect of barriers on motivation and classroom management skill implementation was examined. Barriers were not found to be a significant moderator. Lastly, the training group was observed to be significantly more effective at giving commands compared to the waitlist group. The current study demonstrates the potential of a low-intensity online workshop on classroom management to enhance the accessibility of teacher professional development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Petri Nets are a formal, graphical and executable modeling technique for the specification and analysis of concurrent and distributed systems and have been widely applied in computer science and many other engineering disciplines. Low level Petri nets are simple and useful for modeling control flows but not powerful enough to define data and system functionality. High level Petri nets (HLPNs) have been developed to support data and functionality definitions, such as using complex structured data as tokens and algebraic expressions as transition formulas. Compared to low level Petri nets, HLPNs result in compact system models that are easier to be understood. Therefore, HLPNs are more useful in modeling complex systems. There are two issues in using HLPNs - modeling and analysis. Modeling concerns the abstracting and representing the systems under consideration using HLPNs, and analysis deals with effective ways study the behaviors and properties of the resulting HLPN models. In this dissertation, several modeling and analysis techniques for HLPNs are studied, which are integrated into a framework that is supported by a tool. For modeling, this framework integrates two formal languages: a type of HLPNs called Predicate Transition Net (PrT Net) is used to model a system's behavior and a first-order linear time temporal logic (FOLTL) to specify the system's properties. The main contribution of this dissertation with regard to modeling is to develop a software tool to support the formal modeling capabilities in this framework. For analysis, this framework combines three complementary techniques, simulation, explicit state model checking and bounded model checking (BMC). Simulation is a straightforward and speedy method, but only covers some execution paths in a HLPN model. Explicit state model checking covers all the execution paths but suffers from the state explosion problem. BMC is a tradeoff as it provides a certain level of coverage while more efficient than explicit state model checking. The main contribution of this dissertation with regard to analysis is adapting BMC to analyze HLPN models and integrating the three complementary analysis techniques in a software tool to support the formal analysis capabilities in this framework. The SAMTools developed for this framework in this dissertation integrates three tools: PIPE+ for HLPNs behavioral modeling and simulation, SAMAT for hierarchical structural modeling and property specification, and PIPE+Verifier for behavioral verification.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current study examines the effects of an online workshop pertaining to classroom behavior management on teacher self-efficacy, attitudes, motivation, knowledge, and practices. In addition, information about teacher utilization of the Internet, their opinions about professional development, and experiences with classroom management were collected. Participants included 57 1 st through 5th grade special and regular education teachers. Eligible teachers were those who teach an academic subject and had at least one child in the classroom they considered as disruptive. Teachers were randomized to either a training or waitlist group. Classroom observations of teacher practices and questionnaires were utilized. Teachers in the training group participated in two assessment points, baseline and post-workshop, and received access to the online course immediately following the baseline assessment. Teachers in the waitlist group participated in three assessment points, baseline, post-workshop, and follow-up, and received access to the online course immediately following the post-workshop assessment. Findings show that all teachers had access to the Internet at home and at school and used it on a daily basis. The majority of teachers indicated having some past training on all the techniques that were presented in the online workshop. All teachers expressed satisfaction with the workshop, indicating that it should be offered again. Post-workshop, findings showed significant group differences in knowledge with a large effect for the training group scoring higher than the waitlist group on a quiz. Secondly, group differences in self-efficacy, knowledge, and attitudes with teachers’ past-training as a moderator, was examined. Past-training was not found to be a significant moderator of self-efficacy, knowledge, or attitudes. However, the main effect for training group was significant for attitudes. In addition, teacher attitudes, but not knowledge and self-efficacy, significantly predicted motivation to implement. Next, the moderating effect of barriers on motivation and classroom management skill implementation was examined. Barriers were not found to be a significant moderator. Lastly, the training group was observed to be significantly more effective at giving commands compared to the waitlist group. The current study demonstrates the potential of a low-intensity online workshop on classroom management to enhance the accessibility of teacher professional development. ^