988 resultados para projective techniques for adolescents
Resumo:
Previous research on homeless adolescents has largely ignored the distinction between those who have left home on their volition (runaways) and those who have been forced to leave (throwaways). Fifty-two homeless adolescents in Brisbane, Australia, were assessed to compare male and female runaways and throwaways for social adjustment and symptomatology. Differences for social adjustment (antisocial tendencies and aggression) and symptomatology (social isolation and depression) were predicted. Results indicated that male runaways were significantly more hostile than male throwaways (p < 0,001), and significantly more socially isolated than female runaways (p < 0,025). Female throwaways, however, were significantly more hostile than male throwaways (p < 0,025) and female runaways (p < 0,025). Yet homeless males overall had a significantly stronger urge to act out hostility than homeless females (p < 0,025). In addition, female throwaways were significantly more antisocial than male throwaways (p < 0,001). There were no significant differences for depression. A theory of inner social control (Hirschi, 1969), postulating absence of bonding in earlier socialization, was supported.
Resumo:
Introduction To date, there has been little systematic, quantitative research on the links between academic pressure and mental health among adolescents in Asia, and none in Vietnam. In part, this is because of a lack of appropriate tools to measure this complex phenomenon. This study was to validate the Educational Stress Scale for Adolescents (ESSA), developed and tested in China, with the aim of fostering further research in Asia. Methods A total of 1283 students were recruited in 3 secondary schools and 3 high schools in Ho Chi Minh City, Vietnam. Anonymous, selfreport questionnaires included the ESSA and previously validated measures of mental health. Results Among the 1226 questionnaires available, 54% of respondents were female. The mean age was 15.3 years. Students reported substantial study burden. The ESSA had good internal consistency, and factorial validity and concurrent validity were established. Conclusion The ESSA is a suitable measure for school-based mental health research in Asia.
Resumo:
This paper examines the role of first aid training in increasing adolescent helping behaviours when taught in a school-based injury prevention program, Skills for Preventing Injury in Youth (SPIY). The research involved the development and application of an extended Theory of Planned Behaviour (TPB), including “behavioural willingness in a fight situation,” “first aid knowledge” and “perceptions of injury seriousness”, to predict the relationship between participation in SPIY and helping behaviours when a friend is injured in a fight. From 35 Queensland high schools, 2500 Year 9 students (mean age = 13.5, 40% male) completed surveys measuring their attitudes, perceived behavioural control, subjective norms and behavioural intention, from the TPB, and added measures of behavioural willingness in a fight situation, perceptions of injury seriousness and first aid knowledge, to predict helping behaviours when a friend is injured in a fight. It is expected that the TPB will significantly contribute to understanding the relationship between participation in SPIY and helping behaviours when a friend is injured in a fight. Further analyses will determine whether the extension of the model significantly increases the variance explained in helping behaviours. The findings of this research will provide insight into the critical factors that may increase adolescent bystanders’ actions in injury situations.
Resumo:
With the explosive growth of resources available through the Internet, information mismatching and overload have become a severe concern to users. Web users are commonly overwhelmed by huge volume of information and are faced with the challenge of finding the most relevant and reliable information in a timely manner. Personalised information gathering and recommender systems represent state-of-the-art tools for efficient selection of the most relevant and reliable information resources, and the interest in such systems has increased dramatically over the last few years. However, web personalization has not yet been well-exploited; difficulties arise while selecting resources through recommender systems from a technological and social perspective. Aiming to promote high quality research in order to overcome these challenges, this paper provides a comprehensive survey on the recent work and achievements in the areas of personalised web information gathering and recommender systems. The report covers concept-based techniques exploited in personalised information gathering and recommender systems.
Resumo:
This paper investigates advanced channel compensation techniques for the purpose of improving i-vector speaker verification performance in the presence of high intersession variability using the NIST 2008 and 2010 SRE corpora. The performance of four channel compensation techniques: (a) weighted maximum margin criterion (WMMC), (b) source-normalized WMMC (SN-WMMC), (c) weighted linear discriminant analysis (WLDA), and; (d) source-normalized WLDA (SN-WLDA) have been investigated. We show that, by extracting the discriminatory information between pairs of speakers as well as capturing the source variation information in the development i-vector space, the SN-WLDA based cosine similarity scoring (CSS) i-vector system is shown to provide over 20% improvement in EER for NIST 2008 interview and microphone verification and over 10% improvement in EER for NIST 2008 telephone verification, when compared to SN-LDA based CSS i-vector system. Further, score-level fusion techniques are analyzed to combine the best channel compensation approaches, to provide over 8% improvement in DCF over the best single approach, (SN-WLDA), for NIST 2008 interview/ telephone enrolment-verification condition. Finally, we demonstrate that the improvements found in the context of CSS also generalize to state-of-the-art GPLDA with up to 14% relative improvement in EER for NIST SRE 2010 interview and microphone verification and over 7% relative improvement in EER for NIST SRE 2010 telephone verification.
Resumo:
A number of mathematical models investigating certain aspects of the complicated process of wound healing are reported in the literature in recent years. However, effective numerical methods and supporting error analysis for the fractional equations which describe the process of wound healing are still limited. In this paper, we consider the numerical simulation of a fractional mathematical model of epidermal wound healing (FMM-EWH), which is based on the coupled advection-diffusion equations for cell and chemical concentration in a polar coordinate system. The space fractional derivatives are defined in the Left and Right Riemann-Liouville sense. Fractional orders in the advection and diffusion terms belong to the intervals (0, 1) or (1, 2], respectively. Some numerical techniques will be used. Firstly, the coupled advection-diffusion equations are decoupled to a single space fractional advection-diffusion equation in a polar coordinate system. Secondly, we propose a new implicit difference method for simulating this equation by using the equivalent of Riemann-Liouville and Grünwald-Letnikov fractional derivative definitions. Thirdly, its stability and convergence are discussed, respectively. Finally, some numerical results are given to demonstrate the theoretical analysis.
Resumo:
This chapter provides researchers with a guide to some of the types of dating techniques that can be used in geomorpological investigations and issues that need to be addressed when using gechronological data, specifically issues relating to accuracy and precision. This chapter also introduces the 'types' of dating methods that are commonly used in geomorphological studies. This includes sidereal, isotopic, radiogenic, and chemical dating methods.
Resumo:
Measuring adolescent wellness can assist researchers and practitioners in determining lifestyle behaviors in which adolescents are deficient. An appropriate objective assessment may assist male adolescents who feel uncomfortable revealing behaviors that may indicate wellness deficits. The authors examined the test-retest reliability of the Five Factor Wellness Inventory (5F-Wel) with a sample of male adolescents. Thirty-five participants self-completed the 5F-Wel on two separate occasions, 7 days apart. Limits of agreement, intraclass correlation coefficients, and paired t tests were calculated to investigate agreement and whether systematic differences existed between administrations. The initial findings indicate the 5F-Wel is reliable for use among male adolescents and support its use in research.
Resumo:
OBJECTIVE: School-aged youth spend a significant amount of time either in transit to and from school, or within school settings performing a range of varying learning-based activities. Adolescent physical activity has also been shown to increase the likelihood of maintaining physical activity throughout adulthood. The purpose of this study is to investigate adolescents’ perceived school-based barriers and facilitators to engagement in physical activity. METHODS: One-hundred and twenty four participants (38 males and 86 females) were recruited from two non-denominational same-sex private schools, in Brisbane, Australia. The mean age and standard deviation (SD) was 13.83 (0.56) and 14.40 (2.33) for males and females respectively. Participants responded to a series questions regarding perceived barriers and facilitators to engagement in physical activity. Quantitative data was analysed using descriptive statistics and frequency distributions, and qualitative data with thematic analysis. RESULTS: A total of 121 (97.6%) participants had complete data sets and were included in the analysis. School timetable (44.6%), homework (81.8%), and assessment (81.0%) were identified as the most prominent perceived factors, increasing the difficulty of physical activity engagement. Physical Education classes (71.9%) and school sport programs (80.2%) were identified as the most prominent perceived factors that facilitate engagement in physical activity. There was no significant gender effect. CONCLUSIONS: Each of the identified factors perceived by adolescent's as either barriers or facilitators to engagement in physical activity may be addressed by administrators at a school and government policy level. These may include strategies such as; increasing the assigned hours to physical education classes, providing additional extra-curricular sporting opportunities, and reviewing the time allocated to homework and assessment items. This may provide a simpler, low-cost solution to increasing youth physical activity, as opposed to contemporary higher-cost strategies utilising increased staff commitment, mass media, provision of equipment and counsellors and other health professionals.
Resumo:
OBJECTIVE: Recent increases in youth mobile phone ownership and usage may provide a unique and innovative opportunity for engagement by health promoters, via a familiar and immediately accessible medium. This study investigated adolescents’ and their parents’ preferences for promoting physical activity via means of SMS messaging. METHODS: Adolescents (36 males and 76 females) and their parents (37 males 75 females) were recruited from two non-denominational same-sex private schools, in Brisbane, Australia. The mean age and standard deviation (SD) for adolescents and parents was 14.03 (0.58) and 47.18 (4.65) respectively. Participants responded to a series of questions regarding mobile phone ownership, and preferences for physical activity, school-based physical activity programs, and programs invovling SMS messaging. Data analysis included descriptive statistics and frequency distributions. T-tests were employed to measure gender effect. RESULTS: Overall, 47 (42%) parents desired their child to be more physically active, and were interested for their child to participate in a school-based physical activity program. Of those parents, 16 (34%) parents were interested in their child participating in an SMS-based physical activity program, with 21 (45%) not interested, and 10 (21%) neutral. One hundred and four (95%) adolescents owned a mobile phone, with 84 (82%) of those adolescents wanting to be more physically active. Of those adolescents, 14 (17%) were interested in participating in an SMS-based physical activity program, with 40 (48%) not interested, and 30 (36%) neutral. There was no significant gender effect. CONCLUSIONS: Although SMS messaging may provide an innovative method for youth physical activity promotion, low levels of interest are concerning. These results differ from other studies utilising SMS messaging for the purpose of health promotion, where more positive feedback from participants were reported. A screening process to gauge interest prior to the implementation of any SMS-based health promotion program may prove invaluable toward the success of the program.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
The feral pig, Sus scrofa, is a widespread and abundant invasive species in Australia. Feral pigs pose a significant threat to the environment, agricultural industry, and human health, and in far north Queensland they endanger World Heritage values of the Wet Tropics. Historical records document the first introduction of domestic pigs into Australia via European settlers in 1788 and subsequent introductions from Asia from 1827 onwards. Since this time, domestic pigs have been accidentally and deliberately released into the wild and significant feral pig populations have become established, resulting in the declaration of this species as a class 2 pest in Queensland. The overall objective of this study was to assess the population genetic structure of feral pigs in far north Queensland, in particular to enable delineation of demographically independent management units. The identification of ecologically meaningful management units using molecular techniques can assist in targeting feral pig control to bring about effective long-term management. Molecular genetic analysis was undertaken on 434 feral pigs from 35 localities between Tully and Innisfail. Seven polymorphic and unlinked microsatellite loci were screened and fixation indices (FST and analogues) and Bayesian clustering methods were used to identify population structure and management units in the study area. Sequencing of the hyper-variable mitochondrial control region (D-loop) of 35 feral pigs was also examined to identify pig ancestry. Three management units were identified in the study at a scale of 25 to 35 km. Even with the strong pattern of genetic structure identified in the study area, some evidence of long distance dispersal and/or translocation was found as a small number of individuals exhibited ancestry from a management unit outside of which they were sampled. Overall, gene flow in the study area was found to be influenced by environmental features such as topography and land use, but no distinct or obvious natural or anthropogenic geographic barriers were identified. Furthermore, strong evidence was found for non-random mating between pigs of European and Asian breeds indicating that feral pig ancestry influences their population genetic structure. Phylogenetic analysis revealed two distinct mitochondrial DNA clades, representing Asian domestic pig breeds and European breeds. A significant finding was that pigs of Asian origin living in Innisfail and south Tully were not mating randomly with European breed pigs populating the nearby Mission Beach area. Feral pig control should be implemented in each of the management units identified in this study. The control should be coordinated across properties within each management unit to prevent re-colonisation from adjacent localities. The adjacent rainforest and National Park Estates, as well as the rainforest-crop boundary should be included in a simultaneous control operation for greater success.
Resumo:
Introduction: Recent advances in the planning and delivery of radiotherapy treatments have resulted in improvements in the accuracy and precision with which therapeutic radiation can be administered. As the complexity of the treatments increases it becomes more difficult to predict the dose distribution in the patient accurately. Monte Carlo (MC) methods have the potential to improve the accuracy of the dose calculations and are increasingly being recognised as the ‘gold standard’ for predicting dose deposition in the patient [1]. This project has three main aims: 1. To develop tools that enable the transfer of treatment plan information from the treatment planning system (TPS) to a MC dose calculation engine. 2. To develop tools for comparing the 3D dose distributions calculated by the TPS and the MC dose engine. 3. To investigate the radiobiological significance of any errors between the TPS patient dose distribution and the MC dose distribution in terms of Tumour Control Probability (TCP) and Normal Tissue Complication Probabilities (NTCP). The work presented here addresses the first two aims. Methods: (1a) Plan Importing: A database of commissioned accelerator models (Elekta Precise and Varian 2100CD) has been developed for treatment simulations in the MC system (EGSnrc/BEAMnrc). Beam descriptions can be exported from the TPS using the widespread DICOM framework, and the resultant files are parsed with the assistance of a software library (PixelMed Java DICOM Toolkit). The information in these files (such as the monitor units, the jaw positions and gantry orientation) is used to construct a plan-specific accelerator model which allows an accurate simulation of the patient treatment field. (1b) Dose Simulation: The calculation of a dose distribution requires patient CT images which are prepared for the MC simulation using a tool (CTCREATE) packaged with the system. Beam simulation results are converted to absolute dose per- MU using calibration factors recorded during the commissioning process and treatment simulation. These distributions are combined according to the MU meter settings stored in the exported plan to produce an accurate description of the prescribed dose to the patient. (2) Dose Comparison: TPS dose calculations can be obtained using either a DICOM export or by direct retrieval of binary dose files from the file system. Dose difference, gamma evaluation and normalised dose difference algorithms [2] were employed for the comparison of the TPS dose distribution and the MC dose distribution. These implementations are spatial resolution independent and able to interpolate for comparisons. Results and Discussion: The tools successfully produced Monte Carlo input files for a variety of plans exported from the Eclipse (Varian Medical Systems) and Pinnacle (Philips Medical Systems) planning systems: ranging in complexity from a single uniform square field to a five-field step and shoot IMRT treatment. The simulation of collimated beams has been verified geometrically, and validation of dose distributions in a simple body phantom (QUASAR) will follow. The developed dose comparison algorithms have also been tested with controlled dose distribution changes. Conclusion: The capability of the developed code to independently process treatment plans has been demonstrated. A number of limitations exist: only static fields are currently supported (dynamic wedges and dynamic IMRT will require further development), and the process has not been tested for planning systems other than Eclipse and Pinnacle. The tools will be used to independently assess the accuracy of the current treatment planning system dose calculation algorithms for complex treatment deliveries such as IMRT in treatment sites where patient inhomogeneities are expected to be significant. Acknowledgements: Computational resources and services used in this work were provided by the HPC and Research Support Group, Queensland University of Technology, Brisbane, Australia. Pinnacle dose parsing made possible with the help of Paul Reich, North Coast Cancer Institute, North Coast, New South Wales.
Resumo:
Physical activity has been identified as a key behaviour in determining an individual’s health and functioning. Adolescent physical inactivity has been shown to track strongly through to adulthood. Interventions in youth to promote and increase physical activity have had mixed results. The significant rise over the past decade in time spent by adolescents performing social networking may provide a unique opportunity for health promoters to interact with adolescents through a familiar medium. The purpose of was study is to investigate the potential utility of social networking and associated technologies for the promotion of physical activity amongst adolescents. Participants were recruited from two nondenominational same-sex private schools, from high socioeconomic backgrounds in Brisbane, Australia. A total of 112 (90.3%) participants had complete data sets and were included in the analysis. Account ownership and rates of access to some social networking sites were high. However, a combination of a lack of interest and additional risks associated with social networking utilities, means that caution should be undertaken prior to the commencement of any intervention seeking to increase engagement in physical activities through these mediums. Student smart phone access and interest in smart phone applications for physical activity promotion purposes were moderate, and may provide opportunities for samples of adolescents from high socioeconomic backgrounds who are more likely to have access to appropriate technologies. As technology advances, the rate of smart phone ownership as opposed to overall phone ownership is likely to steadily increase over time. Access and use of information technology by children likely to continue to become more convenient. This makes smart phone applications as a means for physical activity promotion progressively more practical, and a promising future option.