772 resultados para Computer based training


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Currently, at the SC Commission for the Blind, there is no opportunity for computer training for adults in the Older Blind Program. The Older Blind Program has to look for outside partners to make this service viable again. This project proposes that the OB Program partner with regional senior and recreation centers to establish a community-based training program that is both effective and is of minimal cost to the agency and to the partnering centers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: The aim of this study was to identify the transitional employment aspirations and training and development needs of older and younger workers at risk of early retirement due to limited education and/or employment in blue collar occupations. Design/ Methodology/ Approach: A computer based methodology was used to evaluate the demographic effects of gender, education level and occupation group on aspirations pertaining to transitional employment and training and development in a sample of over 1000 Local Government employees. Findings: Older blue collar, secondary school educated and younger workers were less interested in transitional employment than older workers with higher levels of education or from white collar backgrounds. The early retirement risk factors of blue collar work and secondary school education had a more limited effect on perceived training and development needs for older workers. However for younger workers, these risk factors provided the impetus to undertake training to move into less physically demanding or more challenging roles as their careers progressed. Practical Implications: Via the identification of education level and occupation types groups’ transitional employment aspirations and perceptions of preparatory training and development within younger and older cohorts, long term strategies to develop and retain staff may be formulated. Originality/ Value: Past studies of transitional employment have rarely included younger workers or older workers at risk of early retirement. Preparatory training and development for transitional employment roles has not been considered in the literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study used a video-based hazard perception dual task to compare the hazard perception skills of young drivers with middle aged, more experienced drivers and to determine if these skills can be improved with video-based road commentary training. The primary task required the participants to detect and verbally identify immediate hazard on video-based traffic scenarios while concurrently performing a secondary tracking task, simulating the steering of real driving. The results showed that the young drivers perceived fewer immediate hazards (mean = 75.2%, n = 24, 19 females) than the more experienced drivers (mean = 87.5%, n = 8, all females), and had longer hazard perception times, but performed better in the secondary tracking task. After the road commentary training, the mean percentage of hazards detected and identified by the young drivers improved to the level of the experienced drivers and was significantly higher than that of an age and driving experience matched control group. The results will be discussed in the context of psychological theories of hazard perception and in relation to road commentary as an evidence-based training intervention that seems to improve many aspects of unsafe driving behaviour in young drivers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract PURPOSE: Compensatory responses may attenuate the effectiveness of exercise training in weight management. The aim of this study was to compare the effect of moderate- and high-intensity interval training on eating behavior compensation. METHODS: Using a crossover design, 10 overweight and obese men participated in 4-week moderate (MIIT) and high (HIIT) intensity interval training. MIIT consisted of 5-min cycling stages at ± 20% of mechanical work at 45%VO(2)peak, and HIIT consisted of alternate 30-s work at 90%VO(2)peak and 30-s rests, for 30 to 45 min. Assessments included a constant-load exercise test at 45%VO(2)peak for 45 min followed by 60-min recovery. Appetite sensations were measured during the exercise test using a Visual Analog Scale. Food preferences (liking and wanting) were assessed using a computer-based paradigm, and this paradigm uses 20 photographic food stimuli varying along two dimensions, fat (high or low) and taste (sweet or nonsweet). An ad libitum test meal was provided after the constant-load exercise test. RESULTS: Exercise-induced hunger and desire to eat decreased after HIIT, and the difference between MIIT and HIIT in desire to eat approached significance (p = .07). Exercise-induced liking for high-fat nonsweet food tended to increase after MIIT and decreased after HIIT (p = .09). Fat intake decreased by 16% after HIIT, and increased by 38% after MIIT, with the difference between MIIT and HIIT approaching significance (p = .07). CONCLUSIONS: This study provides evidence that energy intake compensation differs between MIIT and HIIT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Core Vector Machine(CVM) is suitable for efficient large-scale pattern classification. In this paper, a method for improving the performance of CVM with Gaussian kernel function irrespective of the orderings of patterns belonging to different classes within the data set is proposed. This method employs a selective sampling based training of CVM using a novel kernel based scalable hierarchical clustering algorithm. Empirical studies made on synthetic and real world data sets show that the proposed strategy performs well on large data sets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using Passive Infra-Red (PIR) sensors in a Wireless Sensor Network (WSN). The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training and was field tested in a network setting comprising of 15-20 sensing nodes. Also contained in this paper is a closed-form expression for the signal generated by an intruder moving at a constant velocity. It is shown how this expression can be exploited to determine the direction of motion information and the velocity of the intruder from the signals of three well-positioned sensors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Computer based mathematical models describing the aircraft evacuation process have a vital role to play in the design and development of safer aircraft, in the implementation of safer and more rigorous certification criteria, cabin crew training and in post mortuum accident investigation. As the risk of personal injury and costs involved in performing large-scale evacuation experiments for the next generation 'Ultra High Capacity Aircraft' (UHCA) are expected to be high, the development and use of these evacuation modelling tools may become essential if these aircraft are to prove a viable reality. In this paper the capabilities and limitations of the airEXODUS evacuation model are described. Its successful application to the prediction of a recent certification trial, prior to the actual trial taking place, is described. Also described is a newly defined parameter known as OPS which can be used as a measure of evacuation trial optimality. In addition, sample evacuation simulations in the presence of fire atmospheres are described. Finally, the data requiremnets of the airEXODUS evacuation model is discussed along with several projects currently underway at the the Univesity of Greenwich designed to obtain this data. Included in this discussion is a description of the AASK - Aircraft Accident Statistics and Knowledge - data base which contains detailed information from aircraft accident survivors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract Google and YouTube are quickly becoming the training resource of choice for the IT literate, especially in relation to computer based applications. Many businesses are addressing this training issue in a number of ways, some more successful than others. Find out what the IT services at the university are doing to adapt to this change and contribute to the discussion on how the approach could be improved. Before the talk you could have a look at the following; * One service that has been licenced is Lynda http://go.soton.ac.uk/lynda or lynda.com (note you have to enter www.southampton.ac.uk as the organisation if you don’t log in through the go.soton link) * The IT training team publish a portfolio of systems and courses at http://www.southampton.ac.uk/isolutions/computing/training/portfolio/index.php. * More and more internal systems are being supported through online guides such as http://go.soton.ac.uk/bgsg

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Because of ethical and medico-legal aspects involved in the training of cutaneous surgical skills on living patients, human cadavers and living animals, it is necessary the search for alternative and effective forms of training simulation. Aims: To propose and describe an alternative methodology for teaching and learning the principles of cutaneous surgery in a medical undergraduate program by using a chicken-skin bench model. Materials and Methods: One instructor for every four students, teaching materials on cutaneous surgical skills, chicken trunks, wings, or thighs, a rigid platform support, needled threads, needle holders, surgical blades with scalpel handles, rat-tooth tweezers, scissors, and marking pens were necessary for training simulation. Results: A proposal for simulation-based training on incision, suture, biopsy, and on reconstruction techniques using a chicken-skin bench model distributed in several sessions and with increasing levels of difficultywas structured. Both feedback and objective evaluations always directed to individual students were also outlined. Conclusion: The teaching of a methodology for the principles of cutaneous surgery using a chicken-skin bench model versatile, portable, easy to assemble, and inexpensive is an alternative and complementary option to the armamentarium of methods based on other bench models described. © Indian Journal of Dermatology 2013.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the most consistent findings in the neuroscience of autism is hypoactivation of the fusiform gyrus (FG) during face processing. In this study the authors examined whether successful facial affect recognition training is associated with an increased activation of the FG in autism. The effect of a computer-based program to teach facial affect identification was examined in 10 individuals with high-functioning autism. Blood oxygenation level-dependent (BOLD) functional magnetic resonance imaging (fMRI) changes in the FG and other regions of interest, as well as behavioral facial affect recognition measures, were assessed pre- and posttraining. No significant activation changes in the FG were observed. Trained participants showed behavioral improvements, which were accompanied by higher BOLD fMRI signals in the superior parietal lobule and maintained activation in the right medial occipital gyrus.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individuals with intellectual disabilities (ID) often struggle with learning how to read. Reading difficulties seem to be the most common secondary condition of ID. Only one in five children with mild or moderate ID achieves even minimal literacy skills. However, literacy education for children and adolescents with ID has been largely overlooked by researchers and educators. While there is little research on reading of children with ID, many training studies have been conducted with other populations with reading difficulties. The most common approach of acquiring literacy skills consists of sophisticated programs that train phonological skills and auditory perception. Only few studies investigated the influence of implicit learning on literacy skills. Implicit learning processes seem to be largely independent of age and IQ. Children are sensitive to the statistics of their learning environment. By frequent word reading they acquire implicit knowledge about the frequency of single letters and letter patterns in written words. Additionally, semantic connections not only improve the word understanding, but also facilitate storage of words in memory. Advances in communication technology have introduced new possibilities for remediating literacy skills. Computers can provide training material in attractive ways, for example through animations and immediate feedback .These opportunities can scaffold and support attention processes central to learning. Thus, the aim of this intervention study was to develop and implement a computer based word-picture training, which is based on statistical and semantic learning, and to examine the training effects on reading, spelling and attention in children and adolescents (9-16 years) diagnosed with mental retardation (general IQ  74). Fifty children participated in four to five weekly training sessions of 15-20 minutes over 4 weeks, and completed assessments of attention, reading, spelling, short-term memory and fluid intelligence before and after training. After a first assessment (T1), the entire sample was divided in a training group (group A) and a waiting control group (group B). After 4 weeks of training with group A, a second assessment (T2) was administered with both training groups. Afterwards, group B was trained for 4 weeks, before a last assessment (T3) was carried out in both groups. Overall, the results showed that the word-picture training led to substantial gains on word decoding and attention for both training groups. These effects were preserved six weeks later (group A). There was also a clear tendency of improvement in spelling after training for both groups, although the effect did not reach significance. These findings highlight the fact that an implicit statistical learning training in a playful way by motivating computer programs can not only promote reading development, but also attention in children with intellectual disabilities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Studies revealing transfer effects of working memory (WM) training on non-trained cognitive performance of children hold promising implications for scholastic learning. However, the results of existing training studies are not consistent and provoke debates about the potential and limitations of cognitive enhancement. To examine the influence of individual differences on training outcomes is a promising approach for finding causes for such inconsistencies. In this study, we implemented WM training in an elementary school setting. The aim was to investigate near and far transfer effects on cognitive abilities and academic achievement and to examine the moderating effects of a dispositional and a regulative temperament factor, neuroticism and effortful control. Ninetynine second-graders were randomly assigned to 20 sessions of computer-based adaptiveWMtraining, computer-based reading training, or a no-contact control group. For the WM training group, our analyses reveal near transfer on a visual WM task, far transfer on a vocabulary task as a proxy for crystallized intelligence, and increased academic achievement in reading and math by trend. Considering individual differences in temperament, we found that effortful control predicts larger training mean and gain scores and that there is a moderation effect of both temperament factors on post-training improvement: WM training condition predicted higher post-training gains compared to both control conditions only in children with high effortful control or low neuroticism. Our results suggest that a short but intensive WM training program can enhance cognitive abilities in children, but that sufficient selfregulative abilities and emotional stability are necessary for WM training to be effective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hormonal variations during the menstrual cycle (MC) may influence trainability of strength. We investigated the effects of a follicular phase-based strength training (FT) on muscle strength, muscle volume and microscopic parameters, comparing it to a luteal phase-based training (LT). Eumenorrheic women without oral contraception (OC) (N = 20, age: 25.9 ± 4.5 yr, height: 164.2 ± 5.5 cm, weight: 60.6 ± 7.8 kg) completed strength training on a leg press for three MC, and 9 of them participated in muscle biopsies. One leg had eight training sessions in the follicular phases (FP) and only two sessions in the luteal phases (LP) for follicular phase-based training (FT), while the other leg had eight training sessions in LP and only two sessions in FP for luteal phase-based training (LT). Estradiol (E2), progesterone (P4), total testosterone (T), free testosterone (free T) and DHEA-s were analysed once during FP (around day 11) and once during LP (around day 25). Maximum isometric force (Fmax), muscle diameter (Mdm), muscle fibre composition (No), fibre diameter (Fdm) and cell nuclei-to-fibre ratio (N/F) were analysed before and after the training intervention. T and free T were higher in FP compared to LP prior to the training intervention (P < 0.05). The increase in Fmax after FT was higher compared to LT (P <0.05). FT also showed a higher increase in Mdm than LT (P < 0.05). Moreover, we found significant increases in Fdm of fibre type ΙΙ and in N/F only after FT; however, there was no significant difference from LT. With regard to change in fibre composition, no differences were observed between FT and LT. FT showed a higher gain in muscle strength and muscle diameter than LT. As a result, we recommend that eumenorrheic females without OC should base the periodization of their strength training on their individual MC.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.