792 resultados para peers
Resumo:
Few studies exist on the types of characteristics associated with service utilization (e.g., shelters, food programs) among homeless youth in the U.S. Services are important, however, because without food and shelter, numerous homeless youth resort to trading sex in order to meet their daily survival needs. Access to physical and mental health services gives homeless youth more of an opportunity to integrate into mainstream society than they would otherwise have. To address this gap in our understanding, my study examines what traits (e.g. age, race, abuse history) correlate with the use of shelters, food programs, street outreach, counseling, STD/STI testing, and HIV testing among homeless youth. The Theory of Reasoned Action is used as an ideological framework in conjunction with theoretical constructs of risk, need, and prior service exposure. Data were obtained from the Social Network and Homeless Youth Project (SNHYP), a sample of 249 Midwestern homeless youth ages 14 to 21, which used trained interviewers to conduct structured interviews with youth. Respondents were interviewed in both shelters and on the street over a period of approximately one year. My findings revealed that homeless youth’s service usage varied across gender, sexual orientation, age, having recently held a job, and having ever been physically or sexually abused, in addition to other characteristics. Conversely, service use was not associated with social network size or subjective norms (i.e. attitudes of peers, such as acceptance of condom use) of youths’ social networks. By examining these areas, my study builds on previous research on homeless youth and lays the framework for future research on service utilization by homeless youth.
Resumo:
A systematic social skills training intervention to teach reciprocal sharing was designed and implemented with triads of preschool-age children, including one child with an autism spectrum disorder (ASD) and two untrained classroom peers who had no delays or disabilities. A multiple-baseline research design was used to evaluate effects of the social skills training intervention on social-communication and sharing behaviors exhibited by the participants with ASD during interactive play activities with peers. Social-communication behaviors measured included contact and distal gestures, touching peers and speaking. Four sharing behaviors were also measured, including sharing toys and objects, receiving toys and objects, asking others to share, and giving requested items. Results indicated considerable gains in overall social-communication behaviors. The greatest improvements were observed in the participants’ use of contact gestures and speaking. Slightly increasing trends were noted and suggested that participants with ASD made modest gains in learning the sharing skills taught during social skills training lessons. Social validity data indicate that participants with ASD and peer participants found the intervention appropriate and acceptable, and staff perception ratings indicated significant changes in the social skills of participants with ASD. Study outcomes have practical implications for educational practitioners related to enhancing social-communication and social interactions of young children with ASD. Study limitations and future directions for research are discussed.
Resumo:
The decreasing number of women who are graduating in the Science, Technology, Engineering and Mathematics (STEM) fields continues to be a major concern. Despite national support in the form of grants provided by National Science Foundation, National Center for Information and Technology and legislation passed such as the Deficit Reduction Act of 2005 that encourages women to enter the STEM fields, the number of women actually graduating in these fields is surprisingly low. This research study focuses on a robotics competition and its ability to engage female adolescents in STEM curricula. Data have been collected to help explain why young women are reticent to take technology or engineering type courses in high school and college. Factors that have been described include attitudes, parental support, social aspects, peer pressure, and lack of role models. Often these courses were thought to have masculine and “nerdy” overtones. The courses were usually majority male enrollments and appeared to be very competitive. With more female adolescents engaging in this type of competitive atmosphere, this study gathered information to discover what about the competition appealed to these young women. Focus groups were used to gather information from adolescent females who were participating in the First Lego League (FLL) and CEENBoT competitions. What enticed them to participate in a curriculum that data demonstrated many of their peers avoided? FLL and CEENBoT are robotics programs based on curricula that are taught in afterschool programs in non-formal environments. These programs culminate in a very large robotics competition. My research questions included: What are the factors that encouraged participants to participate in the robotics competition? What was the original enticement to the FLL and CEENBoT programs? What will make participants want to come back and what are the participants’ plans for the future? My research mirrored data of previous findings such as lack of role models, the need for parental support, social stigmatisms and peer pressure are still major factors that determine whether adolescent females seek out STEM activities. An interesting finding, which was an exception to previous findings, was these female adolescents enjoyed the challenge of the competition. The informal learning environments encouraged an atmosphere of social engagement and cooperative learning. Many volunteers that led the afterschool programs were women (role models) and a majority of parents showed support by accommodating an afterschool situation. The young women that were engaged in the competition noted it was a friendly competition, but they were all there to win. All who participated in the competition had a similar learning environment: competitive but cooperative. Further research is needed to determine if it is the learning environment that lures adolescent females to the program and entices them to continue in the STEM fields or if it is the competitive aspect of the culminating activity. Advisors: James King and Allen Steckelberg
Resumo:
Using auto-ethnographic methods, supplementing by current race theories, along with interviews from other scholars, I regard academentia as a form of professionalism most readily communicable to academics of color seeking advance. It can also infect those whose embrace of blackness (widely defined across cultures) is the least tolerant of the racial designs of white cultural practices. Where in the interest of students and colleagues, such academics challenge the whiteness criteria defining academic success, most of their peers adhere to the racial standards of professionalism.
Resumo:
Cooperation between individuals is an important requisite for the maintenance of social relationships. The purpose of this study was to investigate cooperation in children in the school environment, where individuals could cooperate or not with their classmates in a public goods game. We investigated which of the following variables influenced cooperation in children: sex, group size, and information on the number of sessions. Group size was the only factor to significantly affect cooperation, with small-group children cooperating significantly more than those in large groups. Both sex and information had no effect on cooperation. We suggest that these results reflect the fact that, in small groups, individuals were more efficient in controlling and retaliating theirs peers than in large groups. (C) 2008 Elsevier Inc. All rights reserved.
Resumo:
The paper presents a study regarding babies' interactive processes with peers, which aimed to apprehend some of their qualitative aspects, considering babies' peculiarities. An empirical work was conducted with video recording scenes and interviews, regarding the "Babies' Adaptation to a Daycare Center" project, which followed up 21 babies (4-13 months) at a daycare center. Data analysis was based on the Network of Meanings perspective. Five episodes are here presented regarding three focal subjects and their peers. Analysis indicates the occurrence of interactions; among them it can be highlighted the role of the glance, presence of triadic relations (even among babies younger than nine months old), abbreviation of communicative resources and empathy. Moreover, despite verbal language absence at this age, it was verified meaning processes. Some practical-theoretical implications are pointed out as well.
Resumo:
We tested the short-term effects of a nonrigid tool, identified as an "anchor system" (e.g., ropes attached to varying weights resting on the floor), on the postural stabilization of blindfolded adults with and without intellectual disabilities (ID). Participants held a pair of anchors one in each hand, under three weight conditions (250 g, 500 g and 1,000 g), while they performed a restricted balance task (standing for 30 s on a balance beam placed on top of a force platform). These conditions were called anchor practice trials. Before and after the practice trials, a condition without anchors was tested. Control practice groups, who practiced blocks of trials without anchors, included individuals with and without ID. The anchor system improved subjects' balance during the standing task, for both groups. For the control groups, the performance of successive trials in the condition without the anchor system showed no improvement in postural stability. The individuals with intellectual disability, as well as their peers without ID, used the haptic cues of nonrigid tools (i.e., the anchor system) to stabilize their posture, and the short-term stabilizing effects appeared to result from their previous use of the anchor system.
Resumo:
Abstract Background a decline in immune and endocrine function occurs with aging. The main purpose of this study was to investigate the impact of long-term endurance training on the immune and endocrine system of elderly men. The possible interaction between these systems was also analysed. Results elderly runners showed a significantly higher T cell proliferative response and IL-2 production than sedentary elderly controls. IL-2 production was similar to that in young adults. Their serum IL-6 levels were significantly lower than their sedentary peers. They also showed significantly lower IL-3 production in comparison to sedentary elderly subjects but similar to the youngs. Anabolic hormone levels did not differ between elderly groups and no clear correlation was found between hormones and cytokine levels. Conclusion highly conditioned elderly men seem to have relatively better preserved immune system than the sedentary elderly men. Long-term endurance training has the potential to decelerate the age-related decline in immune function but not the deterioration in endocrine function.
Resumo:
Abstract Introduction We aimed to gather knowledge on the cardiac autonomic modulation in patients with fibromyalgia (FM) in response to exercise and to investigate whether this population suffers from chronotropic incompetence (CI). Methods Fourteen women with FM (age: 46 ± 3 years; body mass index (BMI): 26.6 ± 1.4 kg/m2) and 14 gender-, BMI- (25.4 ± 1.3 kg/m2), and age-matched (age: 41 ± 4 years) healthy individuals (CTRL) took part in this cross-sectional study. A treadmill cardiorespiratory test was performed and heart-rate (HR) response during exercise was evaluated by the chronotropic reserve. HR recovery (deltaHRR) was defined as the difference between HR at peak exercise and at both first (deltaHRR1) and second (deltaHRR2) minutes after the exercise test. Results FM patients presented lower maximal oxygen consumption (VO2 max) when compared with healthy subjects (22 ± 1 versus CTRL: 32 ± 2 mL/kg/minute, respectively; P < 0.001). Additionally, FM patients presented lower chronotropic reserve (72.5 ± 5 versus CTRL: 106.1 ± 6, P < 0.001), deltaHRR1 (24.5 ± 3 versus CTRL: 32.6 ± 2, P = 0.059) and deltaHRR2 (34.3 ± 4 versus CTRL: 50.8 ± 3, P = 0.002) than their healthy peers. The prevalence of CI was 57.1% among patients with FM. Conclusions Patients with FM who undertook a graded exercise test may present CI and delayed HR recovery, both being indicative of cardiac autonomic impairment and higher risk of cardiovascular events and mortality.
Resumo:
[ES] La educación es el medio más prolífico para la adquisición de habilidades y actitudes que modelan la personalidad de los infantes. El comportamiento óptimo como medio de relación social, está iniciado primeramente por la percepción corporal. El trabajo centra su mirada en la relación que el sujeto escolar construye con sus iguales a partir de la convivencia motriz. El espacio ideal para modelar y observar la corporeidad es la clase de educación física.
Resumo:
Interaction protocols establish how different computational entities can interact with each other. The interaction can be finalized to the exchange of data, as in 'communication protocols', or can be oriented to achieve some result, as in 'application protocols'. Moreover, with the increasing complexity of modern distributed systems, protocols are used also to control such a complexity, and to ensure that the system as a whole evolves with certain features. However, the extensive use of protocols has raised some issues, from the language for specifying them to the several verification aspects. Computational Logic provides models, languages and tools that can be effectively adopted to address such issues: its declarative nature can be exploited for a protocol specification language, while its operational counterpart can be used to reason upon such specifications. In this thesis we propose a proof-theoretic framework, called SCIFF, together with its extensions. SCIFF is based on Abductive Logic Programming, and provides a formal specification language with a clear declarative semantics (based on abduction). The operational counterpart is given by a proof procedure, that allows to reason upon the specifications and to test the conformance of given interactions w.r.t. a defined protocol. Moreover, by suitably adapting the SCIFF Framework, we propose solutions for addressing (1) the protocol properties verification (g-SCIFF Framework), and (2) the a-priori conformance verification of peers w.r.t. the given protocol (AlLoWS Framework). We introduce also an agent based architecture, the SCIFF Agent Platform, where the same protocol specification can be used to program and to ease the implementation task of the interacting peers.
Resumo:
The Peer-to-Peer network paradigm is drawing the attention of both final users and researchers for its features. P2P networks shift from the classic client-server approach to a high level of decentralization where there is no central control and all the nodes should be able not only to require services, but to provide them to other peers as well. While on one hand such high level of decentralization might lead to interesting properties like scalability and fault tolerance, on the other hand it implies many new problems to deal with. A key feature of many P2P systems is openness, meaning that everybody is potentially able to join a network with no need for subscription or payment systems. The combination of openness and lack of central control makes it feasible for a user to free-ride, that is to increase its own benefit by using services without allocating resources to satisfy other peers’ requests. One of the main goals when designing a P2P system is therefore to achieve cooperation between users. Given the nature of P2P systems based on simple local interactions of many peers having partial knowledge of the whole system, an interesting way to achieve desired properties on a system scale might consist in obtaining them as emergent properties of the many interactions occurring at local node level. Two methods are typically used to face the problem of cooperation in P2P networks: 1) engineering emergent properties when designing the protocol; 2) study the system as a game and apply Game Theory techniques, especially to find Nash Equilibria in the game and to reach them making the system stable against possible deviant behaviors. In this work we present an evolutionary framework to enforce cooperative behaviour in P2P networks that is alternative to both the methods mentioned above. Our approach is based on an evolutionary algorithm inspired by computational sociology and evolutionary game theory, consisting in having each peer periodically trying to copy another peer which is performing better. The proposed algorithms, called SLAC and SLACER, draw inspiration from tag systems originated in computational sociology, the main idea behind the algorithm consists in having low performance nodes copying high performance ones. The algorithm is run locally by every node and leads to an evolution of the network both from the topology and from the nodes’ strategy point of view. Initial tests with a simple Prisoners’ Dilemma application show how SLAC is able to bring the network to a state of high cooperation independently from the initial network conditions. Interesting results are obtained when studying the effect of cheating nodes on SLAC algorithm. In fact in some cases selfish nodes rationally exploiting the system for their own benefit can actually improve system performance from the cooperation formation point of view. The final step is to apply our results to more realistic scenarios. We put our efforts in studying and improving the BitTorrent protocol. BitTorrent was chosen not only for its popularity but because it has many points in common with SLAC and SLACER algorithms, ranging from the game theoretical inspiration (tit-for-tat-like mechanism) to the swarms topology. We discovered fairness, meant as ratio between uploaded and downloaded data, to be a weakness of the original BitTorrent protocol and we drew inspiration from the knowledge of cooperation formation and maintenance mechanism derived from the development and analysis of SLAC and SLACER, to improve fairness and tackle freeriding and cheating in BitTorrent. We produced an extension of BitTorrent called BitFair that has been evaluated through simulation and has shown the abilities of enforcing fairness and tackling free-riding and cheating nodes.
Resumo:
[EN]Introduction to Content Language and Integrated Learning ( CLIL) is a 60 hour on line course offered by Universidad de Las Palmas de Gran Canaria within its extracurricular courses. During three years we have had 76 students whose final assessment has been to create a CLIL lesson which was evaluated by their peers. The tool for the peer assessment has been the Moodle platform; forums. The assessment was guided by a list of questions they had to apply when evaluating the lessons, but the replies from the CLIL lesson creators did not have any predetermined structure or guidelines to be followed. We have analysed the assessments and replies by grouping them according to content similarities.
Resumo:
A prevalent claim is that we are in knowledge economy. When we talk about knowledge economy, we generally mean the concept of “Knowledge-based economy” indicating the use of knowledge and technologies to produce economic benefits. Hence knowledge is both tool and raw material (people’s skill) for producing some kind of product or service. In this kind of environment economic organization is undergoing several changes. For example authority relations are less important, legal and ownership-based definitions of the boundaries of the firm are becoming irrelevant and there are only few constraints on the set of coordination mechanisms. Hence what characterises a knowledge economy is the growing importance of human capital in productive processes (Foss, 2005) and the increasing knowledge intensity of jobs (Hodgson, 1999). Economic processes are also highly intertwined with social processes: they are likely to be informal and reciprocal rather than formal and negotiated. Another important point is also the problem of the division of labor: as economic activity becomes mainly intellectual and requires the integration of specific and idiosyncratic skills, the task of dividing the job and assigning it to the most appropriate individuals becomes arduous, a “supervisory problem” (Hogdson, 1999) emerges and traditional hierarchical control may result increasingly ineffective. Not only specificity of know how makes it awkward to monitor the execution of tasks, more importantly, top-down integration of skills may be difficult because ‘the nominal supervisors will not know the best way of doing the job – or even the precise purpose of the specialist job itself – and the worker will know better’ (Hogdson,1999). We, therefore, expect that the organization of the economic activity of specialists should be, at least partially, self-organized. The aim of this thesis is to bridge studies from computer science and in particular from Peer-to-Peer Networks (P2P) to organization theories. We think that the P2P paradigm well fits with organization problems related to all those situation in which a central authority is not possible. We believe that P2P Networks show a number of characteristics similar to firms working in a knowledge-based economy and hence that the methodology used for studying P2P Networks can be applied to organization studies. Three are the main characteristics we think P2P have in common with firms involved in knowledge economy: - Decentralization: in a pure P2P system every peer is an equal participant, there is no central authority governing the actions of the single peers; - Cost of ownership: P2P computing implies shared ownership reducing the cost of owing the systems and the content, and the cost of maintaining them; - Self-Organization: it refers to the process in a system leading to the emergence of global order within the system without the presence of another system dictating this order. These characteristics are present also in the kind of firm that we try to address and that’ why we have shifted the techniques we adopted for studies in computer science (Marcozzi et al., 2005; Hales et al., 2007 [39]) to management science.
Resumo:
Broad consensus has been reached within the Education and Cognitive Psychology research communities on the need to center the learning process on experimentation and concrete application of knowledge, rather than on a bare transfer of notions. Several advantages arise from this educational approach, ranging from the reinforce of students learning, to the increased opportunity for a student to gain greater insight into the studied topics, up to the possibility for learners to acquire practical skills and long-lasting proficiency. This is especially true in Engineering education, where integrating conceptual knowledge and practical skills assumes a strategic importance. In this scenario, learners are called to play a primary role. They are actively involved in the construction of their own knowledge, instead of passively receiving it. As a result, traditional, teacher-centered learning environments should be replaced by novel learner-centered solutions. Information and Communication Technologies enable the development of innovative solutions that provide suitable answers to the need for the availability of experimentation supports in educational context. Virtual Laboratories, Adaptive Web-Based Educational Systems and Computer-Supported Collaborative Learning environments can significantly foster different learner-centered instructional strategies, offering the opportunity to enhance personalization, individualization and cooperation. More specifically, they allow students to explore different kinds of materials, to access and compare several information sources, to face real or realistic problems and to work on authentic and multi-facet case studies. In addition, they encourage cooperation among peers and provide support through coached and scaffolded activities aimed at fostering reflection and meta-cognitive reasoning. This dissertation will guide readers within this research field, presenting both the theoretical and applicative results of a research aimed at designing an open, flexible, learner-centered virtual lab for supporting students in learning Information Security.