Search results for: parent node
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1000

Search results for: parent node

280 Second Generation Mozambican Migrant Youth’s Identity and Sense of Belonging: The Case of Hluvukani Village in Bushbuckridge, Mpumalanga

Authors: Betty Chiyangwa

Abstract:

This is a work in progress project focused on exploring the complexities surrounding the second generation Mozambican migrant youth’s experiences to construct their identity and develop a sense of belonging in post-apartheid, Bushbuckridge in South Africa. Established in 1884, Bushbuckridge is one of the earliest districts to accommodate Mozambicans who migrated to South Africa in the 1970s. Bushbuckridge as a destination for Mozambican migrants is crucial to their search for social freedom and space to “belong to.” The action of deliberately seeking freedom is known as an act of agency. Four major objectives govern the paper. The first objective observes how second-generation Mozambican migrant youth living in South Africa negotiate and construct their own identities. Secondly, it explores second-generation Mozambican migrant youth narratives regarding their sense of belonging in South Africa. Thirdly, the study intends to understand how social processes of identity and belonging influence second-generation Mozambican migrant youth experiences and future aspirations in South Africa. The last objective examines how Sen’s Capability approach is relevant in understanding second-generation Mozambican migrant youth identity and belonging in South Africa. This is a single case study informed by data from semi-structured interviews and narratives with youth between the ages of 18 and 34 who are born and raised in South Africa to at least one former Mozambican refugee parent living in Bushbuckridge. Drawing from Crenshaw’s Intersectionality and Sen’s Capability approaches, this study significantly contributes to the existing body of knowledge on South to South migration by demonstrating how both approaches can be operationalized towards understanding complex experiences and capabilities of the disadvantaged group simultaneously. The subject of second-generation migrants is often under-researched in South African migration; thus, their perspectives have been marginalized in Social Science research.

Keywords: second-generation, Mozambican, migrant, youth, bushbuckridge

Procedia PDF Downloads 223
279 Parents-Children Communication in College

Authors: Yin-Chen Liu, Chih-Chun Wu, Mei-He Shih

Abstract:

In this technology society, using ICT(Information and communications technology) to contact each other is very common. Interpersonal ICT communication maintains social support. Therefore, the study investigated the ICT communication between undergraduates and their parents, and gender differences were also detected. The sample size was 1,209 undergraduates, including 624(51.6%) males, 584(48.3%) females, and 1 gender unidentified. In the sample, 91.8% of the sample used phones to contact their fathers and 93.8% of them use phones to contact their mothers. 78.5% and 87.6% of the sample utilized LINE to contact their fathers and mothers respectively. As for Facebook, only 13.4% and 16.5% of the sample would use to contact their fathers and mothers respectively. Aforementioned results implied that the undergraduates nowadays use phone and LINE to contact their parents more common than Facebook. According to results from Pearson correlations, the more undergraduates refused to add their fathers as their Facebook friends, the more they refused to add their mothers as Facebook friends. The possible reasons for it could be that to distinguish different social network such as family and friends. Another possible reason could be avoiding parents’ controlling. It could be why the kids prefer to use phone and LINE to Facebook when contacting their parents. Result from Pearson correlations showed that the more undergraduates actively contact their fathers, the more they actively contact their mothers. On the other hand, the more their fathers actively contact them, the more their mothers actively contact them. Based on the results, this study encourages both parents and undergraduates to contact each other, for any contact between any two family members is associated with contact between other two family members. Obviously, the contact between family members is bidirectional. Future research might want to investigate if this bidirectional contact is associated with the family relation. For gender differences, results from the independent t-tests showed that compared to sons, daughters actively contacted their parents more. Maybe it is because parents keep saying that it is dangerous out there for their daughters, so they build up the habit for their daughters to contact them more. Results from paired sample t-tests showed that the undergraduates agreed that talking to mother on the phone had more satisfaction, felt more intimacy and supported than fathers.

Keywords: family ICT communication, parent-child ICT communication, FACEBOOK and LINE, gender differences

Procedia PDF Downloads 207
278 HIV/AIDS Family Dysfunction Trajectories, Child Abuse and Psychosocial Problems among Adolescents

Authors: Paul Narh Doku

Abstract:

The relationship between parental HIV/AIDS status or death and child mental health is well known, although the role of child maltreatment as a confounder or mediator in this relationship remains uncertain. This study examined the potential path mechanism through child maltreatment mediating the link between HIV/AIDS family dysfunction trajectories and psychosocial problems. A cross-sectional survey was conducted in the Lower Manya Municipal Assembly of Ghana. A questionnaire which consisted of the Strengths and Difficulties Questionnaire (SDQ), Social and Health Assessment (SAHA), Rosenberg Self-Esteem Scale (RSES), and the Conflict Tactics Scale (CTS) was completed by 291 adolescents. Controlling for relevant sociodemographic confounders, mediation analyses using linear regression were fitted to examine whether the association between family dysfunction and psychosocial problems is mediated by child maltreatment. The results indicate that, among adolescents, child maltreatment fully mediated the association between being orphaned by AIDS and self-esteem, delinquency and risky behaviours, and peer problems. Similarly, child maltreatment fully mediated the association between living with an HIV/AIDS-infected parent and self-esteem, delinquency and risky behaviours, depression/emotional problems, and peer problems. Partial mediation was found for hyperactivity. Child maltreatment mediates the association between the family dysfunction trajectories of parental HIV/AIDS or death and psychosocial problems among adolescents. This implies that efforts to address child maltreatment among families affected by HIV/AIDS may be helpful in the prevention of psychosocial problems among these children, thus enhancing their well-being. The findings, therefore, underscore the need for comprehensive psychosocial interventions that address both the unique negative exposures of HIV/AIDS and maltreatment for children affected by HIV.

Keywords: child maltreatment, child abuse, mental health, psychosocial problems, domestic violence, HIV/AIDS, adolescents

Procedia PDF Downloads 86
277 The Relation between Coping Strategies with Stress and Mental Health Situation in Flying Addicted Family of Self Introducer and Private

Authors: Farnoush Haghanipour

Abstract:

Recent research studies relation between coping strategies with stress and mental health situation in flying addicted family of self-introducer and private, Units of Guilan province. For this purpose 251 family (parent, spouse), that referred to private and self-introducer centers to break out of drug are selected in random sampling form. Research method was cross sectional-descriptive and purpose of research was fixing of between kinds of coping strategies with stress and mental health condition with attention to demographic variables. Therefore to collection of information, coping strategies questionnaire (CSQ) and mental health questionnaire (GHQ) was used and finally data analyzed by descriptive statistical methods (average, standard deviation) and inferential statistical correlation coefficient and regression. Study of correlation coefficient between mental healths with problem focused emotional focused and detachment strategies in level more than %99 is confirmed. Also mental health with avoidant focused hasn't correlation in other words relation is between mental health with problem focused strategies (r= 0/34) and emotional focused with mental health (r=0.52) and detachment with mental health (r= 0.18) in meaningful level 0.05. And also relation is between emotional focused strategies and mental health (r= 0.034) that is meaningless in Alpha 0.05. Also relation between problem processed coping strategies and mental health situation with attention to demographic variable is meaningful and relation level verified in confidence level more than 0.99. And result of anticipation equation regression statistical test has most a have in problem focused coping strategy, mental health, but relation of the avoidant emotional, detachment strategy with mental health was meaningless with attention to demographic variables.

Keywords: stress, coping strategy with stress, mental health, self introducer and private

Procedia PDF Downloads 313
276 A Prediction Model for Dynamic Responses of Building from Earthquake Based on Evolutionary Learning

Authors: Kyu Jin Kim, Byung Kwan Oh, Hyo Seon Park

Abstract:

The seismic responses-based structural health monitoring system has been performed to prevent seismic damage. Structural seismic damage of building is caused by the instantaneous stress concentration which is related with dynamic characteristic of earthquake. Meanwhile, seismic response analysis to estimate the dynamic responses of building demands significantly high computational cost. To prevent the failure of structural members from the characteristic of the earthquake and the significantly high computational cost for seismic response analysis, this paper presents an artificial neural network (ANN) based prediction model for dynamic responses of building considering specific time length. Through the measured dynamic responses, input and output node of the ANN are formed by the length of specific time, and adopted for the training. In the model, evolutionary radial basis function neural network (ERBFNN), that radial basis function network (RBFN) is integrated with evolutionary optimization algorithm to find variables in RBF, is implemented. The effectiveness of the proposed model is verified through an analytical study applying responses from dynamic analysis for multi-degree of freedom system to training data in ERBFNN.

Keywords: structural health monitoring, dynamic response, artificial neural network, radial basis function network, genetic algorithm

Procedia PDF Downloads 307
275 Knowledge, Perception and Practice of Deworming among Mothers of Under-Five Children in Rural Communities of Lafia Local Government Area, North Central Nigeria

Authors: Bahago I. N., Oyewole O. E.

Abstract:

Nigeria has the second highest prevalence of intestinal worms globally, which has not declined since the 1970s, especially in rural communities. Identifying the gaps in self-care practice will pave a way for a suitable intervention. This study investigated the knowledge, perception, and practice of deworming among mothers of under-five children in rural communities of Lafia Local Government Area, Nasarawa State. This study was descriptive cross-sectional and involved 419 mothers selected by systematic sampling technique. Information was obtained using a valid interviewer-questionnaire. Knowledge, perception, and practice was measured using a 10-point scale for each variable, respectively. Scores of 0-4, >4-6, and >6 were categorised as poor, average/fair, and good, respectively, at p<0.05 level of significance. Respondents’ age was 30.3±9.2 years; 46.5% were into trading, 26.7% were unemployed, 9.3% were skilled labour, and 7.4% were farmers. On literacy, secondary school (25.5%) while 9.1% above secondary school. Many (51.1%) had 2-3 children, while 42.2% had 5 or more children. Most of the respondents (96.2%) had good knowledge of deworming, and 3.8% had fair knowledge. Using multivariate model, Mothers between the ages of 25-34 years were 20 times likely to be more knowledgeable, given they have access to health information (O.R 2.39 -164.31). Most (62.3%) had good perception scores, 33.2% had fair scores, while 4.5% had poor perception scores. Majority (66.4%) had a good deworming practice of deworming, 66.4% had good, 28.4% had fair, and 5.3% had poor practice. The test of association between Parent's literacy level, religion, and age were significantly associated with the level of knowledge of deworming. Knowledge of deworming was above average; perception and practice was good. Women of ages 25-34 years could be trained as community volunteers to propagate the right information about deworming in rural communities, especially among young women of ages 13-19 years. Preferred channels to obtaining health information identified in the study should be explored.

Keywords: deworming, mothers of under-five, intestinal worms, rural communities

Procedia PDF Downloads 169
274 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 138
273 Phytobeds with Fimbristylis dichotoma and Ammannia baccifera for Treatment of Real Textile Effluent: An in situ Treatment, Anatomical Studies and Toxicity Evaluation

Authors: Suhas Kadam, Vishal Chandanshive, Niraj Rane, Sanjay Govindwar

Abstract:

Fimbristylis dichotoma, Ammannia baccifera, and their co-plantation consortium FA were found to degrade methyl orange, simulated dye mixture, and real textile effluent. Wild plants of Fimbristylis dichotoma and Ammannia baccifera with equal biomass showed 91 and 89% decolorization of methyl orange within 60 h at a concentration of 50 ppm, while 95% dye removal was achieved by consortium FA within 48 h. Floating phyto-beds with co-plantation (Fimbristylis dichotoma and Ammannia baccifera) for the treatment of real textile effluent in a constructed wetland was observed to be more efficient and achieved 79, 72, 77, 66 and 56% reductions in ADMI color value, chemical oxygen demand, biological oxygen demand, total dissolve solid and total suspended solid of textile effluent, respectively. High performance thin layer chromatography, gas chromatography-mass spectroscopy, Fourier transform infrared spectroscopy, Ultra violet-Visible spectroscopy and enzymatic assays confirmed the phytotransformation of parent dye in the new metabolites. T-RFLP analysis of rhizospheric bacteria of Fimbristylis dichotoma, Ammannia baccifera, and consortium FA revealed the presence of 88, 98 and 223 genera which could have been involved in dye removal. Toxicity evaluation of products formed after phytotransformation of methyl orange by consortium FA on bivalves Lamellidens marginalis revealed less damage in the gills architecture when analyzed histologically. Toxicity measurement by Random Amplification of Polymorphic DNA (RAPD) technique revealed normal banding pattern in treated methyl orange sample suggesting less toxic nature of phytotransformed dye products.

Keywords: constructed wetland, phyto-bed, textile effluent, phytoremediation

Procedia PDF Downloads 487
272 Features of Communication of Modern Children: Difficulties and Solutions

Authors: G. H. Vakhitova, E. P. Leontyev

Abstract:

\Modern children experience a huge impact on their psycho-emotional state due to globalization, comprehensive informatization and digitalization. This situation aggravates the problem of children's communication. In a constantly changing world, it is quite difficult for today’s child to maintain emotional well-being, especially in the process of communicating with various participants in communication. Despite the many works of scientists considering various aspects of communication and emotional well-being, the problem remains open, discussed from various angles by philosophers, teachers, psychologists, and sociologists. The article examines the causes of emerging communication difficulties in the context of “child–adult,” and “child-parent” since it is in this logic that the experience of common emotional experiences is formed, which is the basis not only for living together but also for the full development of personality. In this case, it is important to pay special attention to the need to ensure the emotional well-being of the child, first of all, by parents who, due to their busy lives, notice less and less the changes occurring with their children. At the same time, children need constructive dialogue, but often adults do not have the patience to choose the right emotions without breaking into shouting and insults if the child displays behavior that differs from the desired one. The reason for communication difficulties, as shown by the results of the survey and long-term observations of the authors, maybe adults ignoring the characteristics of children. These features manifest themselves in children in different ways: for example, inadequate self-esteem is associated with either excessive timidity or aggressiveness. Such children, as a rule, fearing ridicule not only from their peers but even from adults, live with distrust of the world; they lack initiative, often being rude or, on the contrary, mocking others. In addition, modern children are different, not the same as their peers were twenty to twenty-five years ago. Today, the concept of “digital children” and “clip-based” children has become firmly established in the description of children. This circumstance cannot be ignored when building their communication. The authors note that only if the capabilities and originality of modern children are taken into account is it possible to ensure their emotional well-being in the process of communication.

Keywords: emotional well-being, communication, emotional comfort, emotions, communication difficulties, constructive communication, dialogue

Procedia PDF Downloads 9
271 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 84
270 Bluetooth Communication Protocol Study for Multi-Sensor Applications

Authors: Joao Garretto, R. J. Yarwood, Vamsi Borra, Frank Li

Abstract:

Bluetooth Low Energy (BLE) has emerged as one of the main wireless communication technologies used in low-power electronics, such as wearables, beacons, and Internet of Things (IoT) devices. BLE’s energy efficiency characteristic, smart mobiles interoperability, and Over the Air (OTA) capabilities are essential features for ultralow-power devices, which are usually designed with size and cost constraints. Most current research regarding the power analysis of BLE devices focuses on the theoretical aspects of the advertising and scanning cycles, with most results being presented in the form of mathematical models and computer software simulations. Such computer modeling and simulations are important for the comprehension of the technology, but hardware measurement is essential for the understanding of how BLE devices behave in real operation. In addition, recent literature focuses mostly on the BLE technology, leaving possible applications and its analysis out of scope. In this paper, a coin cell battery-powered BLE Data Acquisition Device, with a 4-in-1 sensor and one accelerometer, is proposed and evaluated with respect to its Power Consumption. First, evaluations of the device in advertising mode with the sensors turned off completely, followed by the power analysis when each of the sensors is individually turned on and data is being transmitted, and concluding with the power consumption evaluation when both sensors are on and respectively broadcasting the data to a mobile phone. The results presented in this paper are real-time measurements of the electrical current consumption of the BLE device, where the energy levels that are demonstrated are matched to the BLE behavior and sensor activity.

Keywords: bluetooth low energy, power analysis, BLE advertising cycle, wireless sensor node

Procedia PDF Downloads 95
269 Family Treatment Drug Court Cost Analysis: An In-depth Look At The Cost And Savings Of A Southeastern Family Treatment Drug Court

Authors: Ashley R. Logsdon, Becky F. Antle, Cynthia M. Kamer

Abstract:

This study examines the cost and benefits of a family treatment drug court in an urban county in a southeastern state. Additionally, this cost analysis will provide a detailed description of the type and cost of activities to produce the services provided to child welfare families. This study utilized return-on-investment analysis, which uses child welfare practices, disaggregates them into separate activities and estimates costs for these activities including child-level placement data for total cost of care for the child. Direct and indirect costs were considered as well as saving calculations what costs would be associated with child welfare outcomes both short and long term. The costs included were general program costs (salaries, drug screens, transportation, childcare, parent education, program evaluation, visitation, incentives) or personnel costs for other team members (judges, court administrators, child welfare workers, child welfare supervisors, and community mental health provider). The savings that were used in the study were length of time in out of home care, Medicaid costs, substance exposed births, emergency room utilization and jail/probation costs. This study documents an overall savings of between $168,993.30 and $837,993.30. The total savings per family divided by the 40 families who have participated in the program was between $4,224.83 to $20,949.83 per family. The results of this cost benefit analysis are consistent with prior research documenting savings associated with out of home care and jail/probation; however, there are also unique contributions of this study to the literature on cost effectiveness of family treatment drug courts. We will present recommendations for further utilization of family treatment drug courts and how to expand the current model.

Keywords: child welfare, cost analysis, family drug court, family treatment drug court

Procedia PDF Downloads 192
268 Load Balancing Technique for Energy - Efficiency in Cloud Computing

Authors: Rani Danavath, V. B. Narsimha

Abstract:

Cloud computing is emerging as a new paradigm of large scale distributed computing. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., three service models, and four deployment networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics models. Load balancing is one of the main challenges in cloud computing, which is required to distribute the dynamic workload across multiple nodes, to ensure that no single node is overloaded. It helps in optimal utilization of resources, enhancing the performance of the system. The goal of the load balancing is to minimize the resource consumption and carbon emission rate, that is the direct need of cloud computing. This determined the need of new metrics energy consumption and carbon emission for energy-efficiency load balancing techniques in cloud computing. Existing load balancing techniques mainly focuses on reducing overhead, services, response time and improving performance etc. In this paper we introduced a Technique for energy-efficiency, but none of the techniques have considered the energy consumption and carbon emission. Therefore, our proposed work will go towards energy – efficiency. So this energy-efficiency load balancing technique can be used to improve the performance of cloud computing by balancing the workload across all the nodes in the cloud with the minimum resource utilization, in turn, reducing energy consumption, and carbon emission to an extent, which will help to achieve green computing.

Keywords: cloud computing, distributed computing, energy efficiency, green computing, load balancing, energy consumption, carbon emission

Procedia PDF Downloads 453
267 Eco-Friendly Control of Bacterial Speck on Solanum lycopersicum by Azadirachta indica Extract

Authors: Navodit Goel, Prabir K. Paul

Abstract:

Tomato (Solanum lycopersicum) is attacked by Pseudomonas syringae pv. tomato causing speck lesions on the leaves leading to severe economic casualty. In the present study, aqueous fruit extracts of Azadirachta indica (neem) were sprayed on a single node of tomato plants grown under controlled contamination-free conditions. The treatment of plants was performed with neem fruit extract either alone or along with the pathogen. The parameters of observation were activities of polyphenol oxidase (PPO) and lysozyme, and isoform analysis of PPO; both at the treated leaves as well as untreated leaves away from the site of extract application. Polyphenol oxidase initiates phenylpropanoid pathway resulting in the synthesis of quinines from cytoplasmic phenols and production of reactive oxygen species toxic to broad spectrum microbes. Lysozyme is responsible for the breakdown of bacterial cell wall. The results indicate the upregulation of PPO and lysozyme activities in both the treated and untreated leaves along with de novo expression of newer PPO isoenzymes (which were absent in control samples). The appearance of additional PPO isoenzymes in bioelicitor-treated plants indicates that either the isoenzymes were expressed after bioelicitor application or the already expressed but inactive isoenzymes were activated by it. Lysozyme activity was significantly increased in the plants when treated with the bioelicitor or the pathogen alone. However, no new isoenzymes of lysozyme were expressed upon application of the extract. Induction of resistance by neem fruit extract could be a potent weapon in eco-friendly plant protection strategies.

Keywords: Azadirachta indica, lysozyme, polyphenol oxidase, Solanum lycopersicum

Procedia PDF Downloads 292
266 Learning Dynamic Representations of Nodes in Temporally Variant Graphs

Authors: Sandra Mitrovic, Gaurav Singh

Abstract:

In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.

Keywords: churn prediction, dynamic networks, node2vec, auto-encoders

Procedia PDF Downloads 316
265 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 166
264 The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance

Authors: Florina Magdalena Anichitoae, Anca Dobrean, Ionut Stelian Florean

Abstract:

Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end.

Keywords: adolescent, attachment, cyberbullying victimization, parents, peers, unconditional self-acceptance

Procedia PDF Downloads 210
263 Effect of Exercise Training on Body Composition and Metabolic Profile in Older Adults during Cancer Treatment

Authors: Adeline Fontvieille, Hugo Parent-Roberge, Marie-France Langlois, Tamas Fulop, Michel Pavic, Eleonor Riesco

Abstract:

Introduction: Total lean body mass is reduced during cancer treatment. This loss is called cancer cachexia and is accompanied by a progressive loss of fat mass. In older adults, these body composition changes can have a larger impact on metabolic health, physical autonomy, and cancer survival. Although currently untreatable, exercise training could reduce these effects. Hence, the objective of this pilot study is to investigate if 12 weeks of exercise training during cancer treatment can mitigate the loss of muscle mass and fat mass in older adults. Methods: A total of 40 older adults (65-80 years) with an ongoing treatment for a curable cancer are currently recruited and randomised in two groups: 1) Combined training (EX, n=20) and 2) Control group (CON, n=20). All variables are measured before and after 12 weeks of intervention: Anthropometry (weight, height, body mass index), body composition (total fat mass, visceral adipose tissue, total and appendicular muscle mass; DXA), metabolic profile (HDL-C and LDL-C, triglycerides, glucose and insulin levels). Results: Preliminary analyses revealed no impact of exercise training on appendicular muscle mass (p=0,31) and fat mass (p=0,31). Furthermore, total body weight, waist circumference, HDL-cholesterol, LDL-cholesterol, glucose and insulin levels remained unchanged (all p ≥ 0.79) after 12 weeks of training. However, statistical analyses revealed that triglyceride levels slightly increased (p=0.03), irrespective of the group. Conclusion: Preliminary analyses did not reveal any impact of aerobic and resistance exercise training on body composition in oncogeriatric patients. Furthermore, exercise training seems not efficient to prevent the cancer treatment-related triglyceride levels increase.

Keywords: muscle mass, fat mass, metabolic profile, combined training, aging, cancer

Procedia PDF Downloads 367
262 hsa-miR-1204 and hsa-miR-639 Prominent Role in Tamoxifen's Molecular Mechanisms on the EMT Phenomenon in Breast Cancer Patients

Authors: Mahsa Taghavi

Abstract:

In the treatment of breast cancer, tamoxifen is a regularly prescribed medication. The effect of tamoxifen on breast cancer patients' EMT pathways was studied. In this study to see if it had any effect on the cancer cells' resistance to tamoxifen and to look for specific miRNAs associated with EMT. In this work, we used continuous and integrated bioinformatics analysis to choose the optimal GEO datasets. Once we had sorted the gene expression profile, we looked at the mechanism of signaling, the ontology of genes, and the protein interaction of each gene. In the end, we used the GEPIA database to confirm the candidate genes. after that, I investigated critical miRNAs related to candidate genes. There were two gene expression profiles that were categorized into two distinct groups. Using the expression profile of genes that were lowered in the EMT pathway, the first group was examined. The second group represented the polar opposite of the first. A total of 253 genes from the first group and 302 genes from the second group were found to be common. Several genes in the first category were linked to cell death, focal adhesion, and cellular aging. Two genes in the second group were linked to cell death, focal adhesion, and cellular aging. distinct cell cycle stages were observed. Finally, proteins such as MYLK, SOCS3, and STAT5B from the first group and BIRC5, PLK1, and RAPGAP1 from the second group were selected as potential candidates linked to tamoxifen's influence on the EMT pathway. hsa-miR-1204 and hsa-miR-639 have a very close relationship with the candidates genes according to the node degrees and betweenness index. With this, the action of tamoxifen on the EMT pathway was better understood. It's important to learn more about how tamoxifen's target genes and proteins work so that we can better understand the drug.

Keywords: tamoxifen, breast cancer, bioinformatics analysis, EMT, miRNAs

Procedia PDF Downloads 132
261 Effect of Microstructure and Texture of Magnesium Alloy Due to Addition of Pb

Authors: Yebeen Ji, Jimin Yun, Kwonhoo Kim

Abstract:

Magnesium alloys were limited for industrial applications due to having a limited slip system and high plastic anisotropy. It has been known that specific textures were formed during processing (rolling, etc.), and These textures cause poor formability. To solve these problems, many researchers have studied controlling texture by adding rare-earth elements. However, the high cost limits their use; therefore, alternatives are needed to replace them. Although Pb addition doesn’t directly improve magnesium properties, it has been known to suppress the diffusion of other alloying elements and reduce grain boundary energy. These characteristics are similar to the additions of rare-earth elements, and a similar texture behavior is expected as well. However, there is insufficient research on this. Therefore, this study investigates the behavior of texture and microstructure development after adding Pb to magnesium. This study compared and analyzed AZ61 alloy and Mg-15wt%Pb alloy to determine the effect of adding solute elements. The alloy was hot rolled and annealed to form a single phase and initial texture. Afterward, the specimen was set to contraction and elongate parallel to the rolling surface and the rolling direction and then subjected to high-temperature plane strain compression under the conditions of 723K and 0.05/s. Microstructural analysis and texture measurements were performed by SEM-EBSD. The peak stress in the true strain-stress curve after compression was higher in AZ61, but the shape of the flow curve was similar for both alloys. For both alloys, continuous dynamic recrystallization was confirmed to occur during the compression process. The basal texture developed parallel to the compressed surface, and the pole density was lower in the Mg-15wt%Pb alloy. It is confirmed that this change in behavior is because the orientation distribution of recrystallized grains has a more random orientation compared to the parent grains when Pb is added.

Keywords: Mg, texture, Pb, DRX

Procedia PDF Downloads 53
260 The Relationship between Mothers’ Attachment Style, Mindful Parenting and Perception of the Child

Authors: Brigitta Szabo, Miklosi Monika

Abstract:

Background/Aims: In early childhood, the context of development is the caregiver-child relationship. Maternal attachment style plays a major role in the intergenerational transmission of psychopathology. The aim of this study was to explore the relationship between the mothers’ attachment style, mindful parenting, and perception of the child. Method: Data was collected from 144 non-clinical mothers who have a child below the age of 3 years. Mothers completed self-report questionnaires, including the following scales: a demographic questionnaire, Attachment Style Questionnaire (ASQ), Interpersonal Mindfulness in Parenting Scale (IMP), and the Mothers’ Object Relations Scale (MORS-SF). K-means cluster analysis was used to identify the mothers’ attachment styles. Mediation analyses with Mothers’ Object Relations Scale (MORS-SF) positive emotions and dominance subscales as dependent variables, mothers’ attachment style (ASQ) as an independent variable, and mindful parenting (IMP) as a mediator were conducted. Results: Four attachment styles (secure, preoccupied, fearful, dismissing) were identified. The relationship between mothers’ attachment style and mindful parenting was significant (R2 = .51; F(4,139) = 36.60; p < .001). Compared to the secure attachment style as a reference group, both preoccupied and dismissing styles were related to lower levels of mindful parenting; however, this relationship was the strongest in case of fearful style. In mediation analysis the direct effects of mothers’ attachment style on the perception of the child were not significant (MORS positive emotions: R2= .29; F(5,138) = 11.22; p < .001; MORS dominance: R2= .39 F(5,138) = 17.54, p < .001). However, indirect effects through mindful parenting were significant; higher levels of mindful parenting were associated with higher levels of MORS positive emotions and lower levels of MORS dominance. Conclusions: These findings suggest that attachment styles are related to the perception of the child through mindful parenting. Mindfulness-based parenting training might be useful in case of attachment-related problems to improve the parent-child relationship.

Keywords: mindfulness, mindful parenting, attachement, perception

Procedia PDF Downloads 222
259 Mixed Tetravalent Cs₂RuₘPt₁-ₘX₆ (X = Cl-, Br-) Based Vacancy-Ordered Halide Double Perovskites for Enhanced Solar Water Oxidation

Authors: Jigar Shaileshumar Halpati, Aravind Kumar Chandiran

Abstract:

Vacancy ordered double perovskites (VOPs) have been significantly attracting researchers due to their chemical structure diversity and interesting optoelectronic properties. Some VOPs have been recently reported to be suitable photoelectrodes for photoelectrochemical water-splitting reactions due to their high stability and panchromatic absorption. In this work, we systematically synthesized mixed tetravalent VOPs based on Cs₂RuₘPt₁-ₘX₆ (X = Cl-, Br-) and reported their structural, optical, electrochemical and photoelectrochemical properties. The structural characterization confirms that the mixed tetravalent site intermediates formed their own phases. The parent materials, as well as their intermediates, were found to be stable in ambient conditions for over 1 year and also showed incredible stability in harsh pH media ranging from pH 1 to pH 11. Moreover, these materials showed panchromatic absorption with onset up to 1000 nm depending upon the mixture stoichiometry. The extraordinary stability and excellent absorption properties make them suitable materials for photoelectrochemical water-splitting applications. PEC studies of these series of materials showed a high water oxidation photocurrent of 0.56 mA cm-² for Cs₂Ru₀.₅Pt₀.₅Cl₆. Fundamental investigation from photoelectrochemical reactions revealed that the intrinsic ruthenium-based VOP showed enhanced hole transfer to the electrolyte, while the intrinsic platinum-based VOP showed higher photovoltage. The mix of these end members at the tetravalent site showed a synergic effect of reduced charge transfer resistance from the material to the electrolyte and increased photovoltage, which led to increased PEC performance of the intermediate materials.

Keywords: solar water splitting, photo electrochemistry, photo absorbers, material characterization, device characterization, green hydrogen

Procedia PDF Downloads 79
258 Physiological Normoxia and Cellular Adhesion of Diffuse Large B-Cell Lymphoma Primary Cells: Real-Time PCR and Immunohistochemistry Study

Authors: Kamila Duś-Szachniewicz, Kinga M. Walaszek, Paweł Skiba, Paweł Kołodziej, Piotr Ziółkowski

Abstract:

Cell adhesion is of fundamental importance in the cell communication, signaling, and motility, and its dysfunction occurs prevalently during cancer progression. The knowledge of the molecular and cellular processes involved in abnormalities in cancer cells adhesion has greatly increased, and it has been focused mainly on cellular adhesion molecules (CAMs) and tumor microenvironment. Unfortunately, most of the data regarding CAMs expression relates to study on cells maintained in standard oxygen condition of 21%, while the emerging evidence suggests that culturing cells in ambient air is far from physiological. In fact, oxygen in human tissues ranges from 1 to 11%. The aim of this study was to compare the effects of physiological lymph node normoxia (5% O2), and hyperoxia (21% O2) on the expression of cellular adhesion molecules of primary diffuse large B-cell lymphoma cells (DLBCL) isolated from 10 lymphoma patients. Quantitative RT-PCR and immunohistochemistry were used to confirm the differential expression of several CAMs, including ICAM, CD83, CD81, CD44, depending on the level of oxygen. Our findings also suggest that DLBCL cells maintained at ambient O2 (21%) exhibit reduced growth rate and migration ability compared to the cells growing in normoxia conditions. Taking into account all the observations, we emphasize the need to identify the optimal human cell culture conditions mimicking the physiological aspects of tumor growth and differentiation.

Keywords: adhesion molecules, diffuse large B-cell lymphoma, physiological normoxia, quantitative RT-PCR

Procedia PDF Downloads 279
257 Parameter Estimation of Additive Genetic and Unique Environment (AE) Model on Diabetes Mellitus Type 2 Using Bayesian Method

Authors: Andi Darmawan, Dewi Retno Sari Saputro, Purnami Widyaningsih

Abstract:

Diabetes mellitus (DM) is a chronic disease in human that occurred if pancreas cannot produce enough of insulin hormone or the body uses ineffectively insulin hormone which causes increasing level of glucose in the blood, or it was called hyperglycemia. In Indonesia, DM is a serious disease on health because it can cause blindness, kidney disease, diabetic feet (gangrene), and stroke. The type of DM criteria can also be divided based on the main causes; they are DM type 1, type 2, and gestational. Diabetes type 1 or previously known as insulin-independent diabetes is due to a lack of production of insulin hormone. Diabetes type 2 or previously known as non-insulin dependent diabetes is due to ineffective use of insulin while gestational diabetes is a hyperglycemia that found during pregnancy. The most one type commonly found in patient is DM type 2. The main factors of this disease are genetic (A) and life style (E). Those disease with 2 factors can be constructed with additive genetic and unique environment (AE) model. In this article was discussed parameter estimation of AE model using Bayesian method and the inheritance character simulation on parent-offspring. On the AE model, there are response variable, predictor variables, and parameters were capable of representing the number of population on research. The population can be measured through a taken random sample. The response and predictor variables can be determined by sample while the parameters are unknown, so it was required to estimate the parameters based on the sample. Estimation of AE model parameters was obtained based on a joint posterior distribution. The simulation was conducted to get the value of genetic variance and life style variance. The results of simulation are 0.3600 for genetic variance and 0.0899 for life style variance. Therefore, the variance of genetic factor in DM type 2 is greater than life style.

Keywords: AE model, Bayesian method, diabetes mellitus type 2, genetic, life style

Procedia PDF Downloads 287
256 Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia

Authors: Ahmad Fauzi Makarim, Okkie Puspitorini, Hani'ah Mahmudah, Nur Adi Siswandari, Ari Wijayanti

Abstract:

As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage.

Keywords: maritime of Indonesia, maritime communications, outdoor wifi, coverage, AODV

Procedia PDF Downloads 352
255 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing

Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca de Marchi

Abstract:

This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes available a larger monitored area. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary chars the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.

Keywords: data compression, ultrasonic communication, guided waves, FEM analysis

Procedia PDF Downloads 127
254 Emerging Social Media Presence of International Organisations - Challenges and Opportunities

Authors: Laura Hervai

Abstract:

One of the most significant phenomena of the 2000s was the emergence of social media sites and web 2.0 that revolutionized communication processes. Social networking platforms have fundamentally changed social and political participation of the public, which require organisations in the public and non-profit sector not only to adapt to these new trends but also to actively engage their audiences. Opportunity for interaction, freer expression of opinion and the proliferation of user generated content are major changes brought by web 2.0 technologies. Furthermore, due to the wide penetration of mobile technologies, social media sites are capable of connecting underdeveloped regions to the global flow of information. Taking advantage of these characteristics, organisations have the opportunity to engage much wider audiences, exploit new ways to raise awareness or reach out to regions that are difficult to access. The early adopters of these new communication tools soon recognized the need of developing social media guidelines for their organisations as well as the increased workload that they require. While ten years ago communication officers could handle their organisation’s social media presence, today it is a separate profession. International organisations face several challenges related to their social media presence. Early adopters have contributed to the development of best practices among which the ethics of social media usage still remained problematic. Another challenge for international organisations is to adapt to country-specific social media trends while they have to comply with the requirements of their parent organisation as well. However in the 21st century social media presence can be crucial to the successful operation of international organisations, their importance is still not taken seriously enough. The measurement of the effects and influence of social networking on the organisations’ productivity is an unsolved problem thus further research should focus on this matter. Research methods included primary research of major IGOs’ and NGOs’ social media presence and guidelines along with secondary research of social media statistics and scientific articles in the topic.

Keywords: international organisations, non-profit sector, NGO, social media, social network

Procedia PDF Downloads 311
253 The Analysis of Personalized Low-Dose Computed Tomography Protocol Based on Cumulative Effective Radiation Dose and Cumulative Organ Dose for Patients with Breast Cancer with Regular Chest Computed Tomography Follow up

Authors: Okhee Woo

Abstract:

Purpose: The aim of this study is to evaluate 2-year cumulative effective radiation dose and cumulative organ dose on regular follow-up computed tomography (CT) scans in patients with breast cancer and to establish personalized low-dose CT protocol. Methods and Materials: A retrospective study was performed on the patients with breast cancer who were diagnosed and managed consistently on the basis of routine breast cancer follow-up protocol between 2012-01 and 2016-06. Based on ICRP (International Commission on Radiological Protection) 103, the cumulative effective radiation doses of each patient for 2-year follow-up were analyzed using the commercial radiation management software (Radimetrics, Bayer healthcare). The personalized effective doses on each organ were analyzed in detail by the software-providing Monte Carlo simulation. Results: A total of 3822 CT scans on 490 patients was evaluated (age: 52.32±10.69). The mean scan number for each patient was 7.8±4.54. Each patient was exposed 95.54±63.24 mSv of radiation for 2 years. The cumulative CT radiation dose was significantly higher in patients with lymph node metastasis (p = 0.00). The HER-2 positive patients were more exposed to radiation compared to estrogen or progesterone receptor positive patient (p = 0.00). There was no difference in the cumulative effective radiation dose with different age groups. Conclusion: To acknowledge how much radiation exposed to a patient is a starting point of management of radiation exposure for patients with long-term CT follow-up. The precise and personalized protocol, as well as iterative reconstruction, may reduce hazard from unnecessary radiation exposure.

Keywords: computed tomography, breast cancer, effective radiation dose, cumulative organ dose

Procedia PDF Downloads 200
252 On the Existence of Homotopic Mapping Between Knowledge Graphs and Graph Embeddings

Authors: Jude K. Safo

Abstract:

Knowledge Graphs KG) and their relation to Graph Embeddings (GE) represent a unique data structure in the landscape of machine learning (relative to image, text and acoustic data). Unlike the latter, GEs are the only data structure sufficient for representing hierarchically dense, semantic information needed for use-cases like supply chain data and protein folding where the search space exceeds the limits traditional search methods (e.g. page-rank, Dijkstra, etc.). While GEs are effective for compressing low rank tensor data, at scale, they begin to introduce a new problem of ’data retreival’ which we observe in Large Language Models. Notable attempts by transE, TransR and other prominent industry standards have shown a peak performance just north of 57% on WN18 and FB15K benchmarks, insufficient practical industry applications. They’re also limited, in scope, to next node/link predictions. Traditional linear methods like Tucker, CP, PARAFAC and CANDECOMP quickly hit memory limits on tensors exceeding 6.4 million nodes. This paper outlines a topological framework for linear mapping between concepts in KG space and GE space that preserve cardinality. Most importantly we introduce a traceable framework for composing dense linguistic strcutures. We demonstrate performance on WN18 benchmark this model hits. This model does not rely on Large Langauge Models (LLM) though the applications are certainy relevant here as well.

Keywords: representation theory, large language models, graph embeddings, applied algebraic topology, applied knot theory, combinatorics

Procedia PDF Downloads 72
251 The Family as an Agent for Change in Aerobic Activity and Obesity in Grade 2-3 Schoolchildren

Authors: T. Goldstein, E. Serok, J. D. Kark

Abstract:

Background and Aim: The prevalence of obesity is increasing worldwide and in Israel. To meet this challenge, our study tests a new educational approach through a controlled school-based trial to achieve an improvement in eating habits, aerobic activity, and reduced obesity in Grades 2-3. Methods and Design: A cluster randomized controlled trial allocated 4 elementary schools (3rd and 2nd-grade classes each) to intervention or control groups. This allocation was switched with the next cohort of children. Recruitment was in first grade, randomization at the beginning of second grade, evaluation of results at the end of second grade and the beginning of third grade — intervention: 5 joint parent-children classroom activities on health topics and 5 educational workshops for parents only. Alfred Adler's concepts were guiding principles. Subjects: Of 743 children in 23-second grade classes, parents provided informed consent for 508 (68%). Information of retention health habits continued for third grade. Additional parental approvals were required. Parents provided informed consent for third-grade follow-up for 432. Results: At the end of 2nd grade, the amount of aerobic activity increased in the intervention group in comparison with the control group, the difference being marginally statistically significant (p=0.061). There is a significant difference between the groups in the percentage of "no activity being done" reported at the end of second grade when in the experimental group, the percentage is lower than the control. There are differences between genders in the percentage of aerobic activity at the end of second grade (p=0.044) and in the third grade (p < 0.0001). Height increased significantly (p=0.030 ), and waist circumference declined significantly (p=0.021) in the intervention compared with the control group. There were no significant between-group differences in BMI and weight. Conclusion: There were encouraging changes in aerobic activity and in anthropometric measurements. To maintain changes over longer periods, refreshing these nutrition and activity themes annually in school using the model is required.

Keywords: aerobic activity, child obesity, Alfred Adler, schoolchildren

Procedia PDF Downloads 152