Search results for: cognitive computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2729

Search results for: cognitive computing

2549 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 161
2548 The Effect of Cognitive Restructuring and Assertive Training on Improvement of Sexual Behavior of Secondary School Adolescents in Nigeria

Authors: Azu Kalu Oko, Ugboaku Nwanpka

Abstract:

The study investigated the effect of cognitive restructuring and assertive training on improvement of sexual behavior of secondary school adolescents in Nigeria. To guide the study, three research questions and four hypothesis were formulated. The study featured a 2X3 factorial design with a sample of 48 male and female students selected by random sampling using a table of random sample numbers. The three groups are assertive training, cognitive restructuring and control group. The study identified adolescents with deviant sexual behavior using Students Sexual Behavior Inventory (S.S.B.I.) as the research instrument. Ancova and T- Test statistic were used to analyze the data. The findings revealed that: I. Assertive Training and Cognitive Restructuring significantly improved sexual behavior of subjects at post test when compared with the control group. II. The treatment gains made by the two techniques were sustained at one month follow-up interval. III. Cognitive restructuring was more effective than assertiveness training in the improvement of the sexual behavior of students. Implication for education, psychotherapy and counseling were highlighted.

Keywords: cognitive restructuring, assertiveness training, adolescents, sexual behavior

Procedia PDF Downloads 569
2547 Cognitive Methods for Detecting Deception During the Criminal Investigation Process

Authors: Laid Fekih

Abstract:

Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.

Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health

Procedia PDF Downloads 42
2546 Impact of Neuropsychological Intervention in Mild Cognitive Impairment: A Controlled, Randomized and Blind Study

Authors: Amanda de Oliveira Ferreira Leite, Ana Luiza del Pino Ferreira, Bruna Garcez Correa, Janaíne de Souza Mello, Marla Manquevich, Mirna Wetters Portuguez

Abstract:

Objective: We sought to investigate a neuropsychological intervention focused on improving cognition, psychological aspects, and quality of life of elderly people with mild cognitive impairment. Method: A controlled and randomized study, blind to the evaluator, was executed. We evaluated 78 elderly people, divided into the neuropsychological and control groups, through a semi-structured interview, Addenbrooke’s Cognitive Examination, Katz Index, Lawton and Brody Scale, Geriatric Depression Scale, Beck Anxiety Inventory, Personal Development Scale, WHOQOL-bref and WHOQOL--old. Results: After the intervention, the neuropsychological group showed improvement in the cognitive subtests and in the total score, reduction in the frequency of symptoms associated with anxiety and depression, better psychological well-being, and quality of life. The research highlights useful intervention strategies for improving the general condition of these patients and rehabilitating damaged areas. Conclusion: We concluded that there is a relationship between neuropsychological intervention and improvement in cognitive and psychological performance, as well as in the quality of life in elderly people with mild cognitive impairment.

Keywords: aging, mild cognitive impairment, neuropsychology, quality of life

Procedia PDF Downloads 78
2545 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 105
2544 Identification of Training Topics for the Improvement of the Relevant Cognitive Skills of Technical Operators in the Railway Domain

Authors: Giulio Nisoli, Jonas Brüngger, Karin Hostettler, Nicole Stoller, Katrin Fischer

Abstract:

Technical operators in the railway domain are experts responsible for the supervisory control of the railway power grid as well as of the railway tunnels. The technical systems used to master these demanding tasks are constantly increasing in their degree of automation. It becomes therefore difficult for technical operators to maintain the control over the technical systems and the processes of their job. In particular, the operators must have the necessary experience and knowledge in dealing with a malfunction situation or unexpected event. For this reason, it is of growing importance that the skills relevant for the execution of the job are maintained and further developed beyond the basic training they receive, where they are educated in respect of technical knowledge and the work with guidelines. Training methods aimed at improving the cognitive skills needed by technical operators are still missing and must be developed. Goals of the present study were to identify which are the relevant cognitive skills of technical operators in the railway domain and to define which topics should be addressed by the training of these skills. Observational interviews were conducted in order to identify the main tasks and the organization of the work of technical operators as well as the technical systems used for the execution of their job. Based on this analysis, the most demanding tasks of technical operators could be identified and described. The cognitive skills involved in the execution of these tasks are those, which need to be trained. In order to identify and analyze these cognitive skills a cognitive task analysis (CTA) was developed. CTA specifically aims at identifying the cognitive skills that employees implement when performing their own tasks. The identified cognitive skills of technical operators were summarized and grouped in training topics. For every training topic, specific goals were defined. The goals regard the three main categories; knowledge, skills and attitude to be trained in every training topic. Based on the results of this study, it is possible to develop specific training methods to train the relevant cognitive skills of the technical operators.

Keywords: cognitive skills, cognitive task analysis, technical operators in the railway domain, training topics

Procedia PDF Downloads 121
2543 A Comparative Study of Cognitive Functions in Relapsing-Remitting Multiple Sclerosis Patients, Secondary-Progressive Multiple Sclerosis Patients and Normal People

Authors: Alireza Pirkhaefi

Abstract:

Background: Multiple sclerosis (MS) is one of the most common diseases of the central nervous system (brain and spinal cord). Given the importance of cognitive disorders in patients with multiple sclerosis, the present study was in order to compare cognitive functions (Working memory, Attention and Centralization, and Visual-spatial perception) in patients with relapsing- remitting multiple sclerosis (RRMS) and secondary progressive multiple sclerosis (SPMS). Method: Present study was performed as a retrospective study. This research was conducted with Ex-Post Facto method. The samples of research consisted of 60 patients with multiple sclerosis (30 patients relapsing-retrograde and 30 patients secondary progressive), who were selected from Tehran Community of MS Patients Supported as convenience sampling. 30 normal persons were also selected as a comparison group. Montreal Cognitive Assessment (MOCA) was used to assess cognitive functions. Data were analyzed using multivariate analysis of variance. Results: The results showed that there were significant differences among cognitive functioning in patients with RRMS, SPMS, and normal individuals. There were not significant differences in working memory between two groups of patients with RRMS and SPMS; while significant differences in these variables were seen between the two groups and normal individuals. Also, results showed significant differences in attention and centralization and visual-spatial perception among three groups. Conclusions: Results showed that there are differences between cognitive functions of RRMS and SPMS patients so that the functions of RRMS patients are better than SPMS patients. These results have a critical role in improvement of cognitive functions; reduce the factors causing disability due to cognitive impairment, and especially overall health of society.

Keywords: multiple sclerosis, cognitive function, secondary-progressive, normal subjects

Procedia PDF Downloads 214
2542 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 470
2541 A Daily Diary Study on Technology-Assisted Supplemental Work, Psychological Detachment, and Well-Being – The Mediating Role of Cognitive Coping

Authors: Clara Eichberger, Daantje Derks, Hannes Zacher

Abstract:

Technology-assisted supplemental work (TASW) involves performing job-related tasks after regular working hours with the help of technological devices. Due to emerging information and communication technologies, such behavior becomes increasingly common. Since previous research on the relationship of TASW, psychological detachment and well-being are mixed, this study aimed to examine the moderating roles of appraisal and cognitive coping. A moderated mediation model was tested with daily diary data from 100 employees. As hypothesized, TASW was positively related to negative affect at bedtime. In addition, psychological detachment mediated this relationship. Results did not confirm appraisal and cognitive coping as moderators. However, additional analyses revealed cognitive coping as a mediator of the positive relationship of TASW and positive affect at bedtime. These results suggest that, on the one hand engaging in TASW can be harmful to employee well-being (i.e., more negative affect) and on the other hand, it can also be associated with higher well-being (i.e., more positive affect) in case it is accompanied by cognitive coping.

Keywords: cognitive coping, psychological detachment, technology-assisted supplemental work, well-being

Procedia PDF Downloads 161
2540 Going Horizontal: Confronting the Challenges When Transitioning to Cloud

Authors: Harvey Hyman, Thomas Hull

Abstract:

As one of the largest cancer treatment centers in the United States, we continuously confront the challenge of how to leverage the best possible technological solutions, in order to provide the highest quality of service to our customers – the doctors, nurses and patients at Moffitt who are fighting every day for the prevention and cure of cancer. This paper reports on the transition from a vertical to a horizontal IT infrastructure. We discuss how the new frameworks and methods such as public, private and hybrid cloud, brokering cloud services are replacing the traditional vertical paradigm for computing. We also report on the impact of containers, micro services, and the shift to continuous integration/continuous delivery. These impacts and changes in delivery methodology for computing are driving how we accomplish our strategic IT goals across the enterprise.

Keywords: cloud computing, IT infrastructure, IT architecture, healthcare

Procedia PDF Downloads 354
2539 Combined Localization, Beamforming, and Interference Threshold Estimation in Underlay Cognitive System

Authors: Omar Nasr, Yasser Naguib, Mohamed Hafez

Abstract:

This paper aims at providing an innovative solution for blind interference threshold estimation in an underlay cognitive network to be used in adaptive beamforming by secondary user Transmitter and Receiver. For the task of threshold estimation, blind detection of modulation and SNR are used. For the sake of beamforming several localization algorithms are compared to settle on best one for cognitive environment. Beamforming algorithms as LCMV (Linear Constraint Minimum Variance) and MVDR (Minimum Variance Distortion less) are also proposed and compared. The idea of just nulling the primary user after knowledge of its location is discussed against the idea of working under interference threshold.

Keywords: cognitive radio, underlay, beamforming, MUSIC, MVDR, LCMV, threshold estimation

Procedia PDF Downloads 556
2538 A Study on How to Link BIM Services to Cloud Computing Architecture

Authors: Kim Young-Jin, Kim Byung-Kon

Abstract:

Although more efforts to expand the application of BIM (Building Information Modeling) technologies have be pursued in recent years than ever, it’s true that there have been various challenges in doing so, including a lack or absence of relevant institutions, lots of costs required to build BIM-related infrastructure, incompatible processes, etc. This, in turn, has led to a more prolonged delay in the expansion of their application than expected at an early stage. Especially, attempts to save costs for building BIM-related infrastructure and provide various BIM services compatible with domestic processes include studies to link between BIM and cloud computing technologies. Also in this study, the author attempted to develop a cloud BIM service operation model through analyzing the level of BIM applications for the construction sector and deriving relevant service areas, and find how to link BIM services to the cloud operation model, as through archiving BIM data and creating a revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources.

Keywords: construction IT, BIM (building information modeling), cloud computing, BIM service based cloud computing

Procedia PDF Downloads 464
2537 DNA PLA: A Nano-Biotechnological Programmable Device

Authors: Hafiz Md. HasanBabu, Khandaker Mohammad Mohi Uddin, Md. IstiakJaman Ami, Rahat Hossain Faisal

Abstract:

Computing in biomolecular programming performs through the different types of reactions. Proteins and nucleic acids are used to store the information generated by biomolecular programming. DNA (Deoxyribose Nucleic Acid) can be used to build a molecular computing system and operating system for its predictable molecular behavior property. The DNA device has clear advantages over conventional devices when applied to problems that can be divided into separate, non-sequential tasks. The reason is that DNA strands can hold so much data in memory and conduct multiple operations at once, thus solving decomposable problems much faster. Programmable Logic Array, abbreviated as PLA is a programmable device having programmable AND operations and OR operations. In this paper, a DNA PLA is designed by different molecular operations using DNA molecules with the proposed algorithms. The molecular PLA could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism, and extraordinary energy efficiency.

Keywords: biological systems, DNA computing, parallel computing, programmable logic array, PLA, DNA

Procedia PDF Downloads 91
2536 Navigating Cyber Attacks with Quantum Computing Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Md. Mushfiqur Rahman, Sajjat Hossain Abir, Ashif Newaz

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 7
2535 Method and Apparatus for Optimized Job Scheduling in the High-Performance Computing Cloud Environment

Authors: Subodh Kumar, Amit Varde

Abstract:

Typical on-premises high-performance computing (HPC) environments consist of a fixed number and a fixed set of computing hardware. During the design of the HPC environment, the hardware components, including but not limited to CPU, Memory, GPU, and networking, are carefully chosen from select vendors for optimal performance. High capital cost for building the environment is a prime factor influencing the design environment. A class of software called “Job Schedulers” are critical to maximizing these resources and running multiple workloads to extract the maximum value for the high capital cost. In principle, schedulers work by preventing workloads and users from monopolizing the finite hardware resources by queuing jobs in a workload. A cloud-based HPC environment does not have the limitations of fixed (type of and quantity of) hardware resources. In theory, users and workloads could spin up any number and type of hardware resource. This paper discusses the limitations of using traditional scheduling algorithms for cloud-based HPC workloads. It proposes a new set of features, called “HPC optimizers,” for maximizing the benefits of the elasticity and scalability of the cloud with the goal of cost-performance optimization of the workload.

Keywords: high performance computing, HPC, cloud computing, optimization, schedulers

Procedia PDF Downloads 57
2534 The Impact of Cognitive Load on Deceit Detection and Memory Recall in Children’s Interviews: A Meta-Analysis

Authors: Sevilay Çankaya

Abstract:

The detection of deception in children’s interviews is essential for statement veracity. The widely used method for deception detection is building cognitive load, which is the logic of the cognitive interview (CI), and its effectiveness for adults is approved. This meta-analysis delves into the effectiveness of inducing cognitive load as a means of enhancing veracity detection during interviews with children. Additionally, the effectiveness of cognitive load on children's total number of events recalled is assessed as a second part of the analysis. The current meta-analysis includes ten effect sizes from search using databases. For the effect size calculation, Hedge’s g was used with a random effect model by using CMA version 2. Heterogeneity analysis was conducted to detect potential moderators. The overall result indicated that cognitive load had no significant effect on veracity outcomes (g =0.052, 95% CI [-.006,1.25]). However, a high level of heterogeneity was found (I² = 92%). Age, participants’ characteristics, interview setting, and characteristics of the interviewer were coded as possible moderators to explain variance. Age was significant moderator (β = .021; p = .03, R2 = 75%) but the analysis did not reveal statistically significant effects for other potential moderators: participants’ characteristics (Q = 0.106, df = 1, p = .744), interview setting (Q = 2.04, df = 1, p = .154), and characteristics of interviewer (Q = 2.96, df = 1, p = .086). For the second outcome, the total number of events recalled, the overall effect was significant (g =4.121, 95% CI [2.256,5.985]). The cognitive load was effective in total recalled events when interviewing with children. All in all, while age plays a crucial role in determining the impact of cognitive load on veracity, the surrounding context, interviewer attributes, and inherent participant traits may not significantly alter the relationship. These findings throw light on the need for more focused, age-specific methods when using cognitive load measures. It may be possible to improve the precision and dependability of deceit detection in children's interviews with the help of more studies in this field.

Keywords: deceit detection, cognitive load, memory recall, children interviews, meta-analysis

Procedia PDF Downloads 33
2533 Cognitive Behavior Therapy with a Migrant Pakistani in Malaysia: A Single Case Study of Conversion Disorder

Authors: Fahad R. Choudhry., Khadeeja Munawar

Abstract:

This clinical case presents a 24 years old, Muslim Pakistani girl with a history of conversion disorder. Her symptoms comprised fits, restlessness, numbness in legs, poor coordination and balance, burning during urination and retention. A cognitive-behavioral model was used for conceptualizing her problem and devising a management plan based on cognitive behavioral therapy (CBT) and culturally adapted coping statements. She took 13 therapy sessions and was presented with idiosyncratic case conceptualization. Psychoeducation, coping statements, extinction, verbal challenging, and behavioral activation techniques were practiced in a collaborative way for cognitive restructuring of the client. Focus of terminal sessions was on anger management. The client needed a couple of more sessions in order to help her manage her anger. However, the therapy was terminated on the part of the client after attainment of short term goals. The client reported to have a 75 % improvement in her overall condition and remained compliant throughout the therapy.

Keywords: cognitive behavioral therapy, conversion disorder, female, Muslim, Pakistani

Procedia PDF Downloads 167
2532 Crow Search Algorithm-Based Task Offloading Strategies for Fog Computing Architectures

Authors: Aniket Ganvir, Ritarani Sahu, Suchismita Chinara

Abstract:

The rapid digitization of various aspects of life is leading to the creation of smart IoT ecosystems, where interconnected devices generate significant amounts of valuable data. However, these IoT devices face constraints such as limited computational resources and bandwidth. Cloud computing emerges as a solution by offering ample resources for offloading tasks efficiently despite introducing latency issues, especially for time-sensitive applications like fog computing. Fog computing (FC) addresses latency concerns by bringing computation and storage closer to the network edge, minimizing data travel distance, and enhancing efficiency. Offloading tasks to fog nodes or the cloud can conserve energy and extend IoT device lifespan. The offloading process is intricate, with tasks categorized as full or partial, and its optimization presents an NP-hard problem. Traditional greedy search methods struggle to address the complexity of task offloading efficiently. To overcome this, the efficient crow search algorithm (ECSA) has been proposed as a meta-heuristic optimization algorithm. ECSA aims to effectively optimize computation offloading, providing solutions to this challenging problem.

Keywords: IoT, fog computing, task offloading, efficient crow search algorithm

Procedia PDF Downloads 15
2531 Managing the Cognitive Load of Medical Students during Anatomy Lecture

Authors: Siti Nurma Hanim Hadie, Asma’ Hassan, Zul Izhar Ismail, Ahmad Fuad Abdul Rahim, Mohd. Zarawi Mat Nor, Hairul Nizam Ismail

Abstract:

Anatomy is a medical subject, which contributes to high cognitive load during learning. Despite its complexity, anatomy remains as the most important basic sciences subject with high clinical relevancy. Although anatomy knowledge is required for safe practice, many medical students graduated without having sufficient knowledge. In fact, anatomy knowledge among the medical graduates was reported to be declining and this had led to various medico-legal problems. Applying cognitive load theory (CLT) in anatomy teaching particularly lecture would be able to address this issue since anatomy information is often perceived as cognitively challenging material. CLT identifies three types of loads which are intrinsic, extraneous and germane loads, which combine to form the total cognitive load. CLT describe that learning can only occur when the total cognitive load does not exceed human working memory capacity. Hence, managing these three types of loads with the aim of optimizing the working memory capacity would be beneficial to the students in learning anatomy and retaining the knowledge for future application.

Keywords: cognitive load theory, intrinsic load, extraneous load, germane load

Procedia PDF Downloads 435
2530 Bridging the Gap: Theoretical Challenges in Cognitive Translation Studies and the Language Industry

Authors: Alvaro Marin

Abstract:

This paper explores the challenges in Cognitive Translation Studies (CTS) conceptual development to accommodate professionals’ perceptions in the language industry into CTS established theoretical apparatus, empirical research projects, and university pedagogical proposals. A comparative conceptual assessment framework is developed from a pluralist epistemological stance that promotes interdisciplinary explorations of the translation process. The framework is used to review key notions such as expertise or feedback, as understood by language industry stakeholders. This review is followed by an analysis of how these notions can enrich research constructs to be applied in empirical investigations of translators’ cognitive processes from an embedded, situated cognition perspective. Thus, it will be proposed to apply the conceptual assessment framework as an effort towards strengthening the interpretative research tools and bridging the gap between industry and academia. The conclusions of this analysis will serve as a basis to further discuss how professional practices, combined with our current knowledge about expertise development in cognitive science and Expertise Studies, can enhance the learning experience of university translation students and help them better understand the processes and requirements of professional cross-linguistic mediation.

Keywords: language industry, cognitive translation studies, translation cognitive theory, translation teaching

Procedia PDF Downloads 127
2529 The Evaluation of the Cognitive Training Program for Older Adults with Mild Cognitive Impairment: Protocol of a Randomized Controlled Study

Authors: Hui-Ling Yang, Kuei-Ru Chou

Abstract:

Background: Studies show that cognitive training can effectively delay cognitive failure. However, there are several gaps in the previous studies of cognitive training in mild cognitive impairment: 1) previous studies enrolled mostly healthy older adults, with few recruiting older adults with cognitive impairment; 2) they also had limited generalizability and lacked long-term follow-up data and measurements of the activities of daily living functional impact. Moreover, only 37% were randomized controlled trials (RCT). 3) Limited cognitive training has been specifically developed for mild cognitive impairment. Objective: This study sought to investigate the changes in cognitive function, activities of daily living and degree of depressive symptoms in older adults with mild cognitive impairment after cognitive training. Methods: This double-blind randomized controlled study has a 2-arm parallel group design. Study subjects are older adults diagnosed with mild cognitive impairment in residential care facilities. 124 subjects will be randomized by the permuted block randomization, into intervention group (Cognitive training, CT), or active control group (Passive information activities, PIA). Therapeutic adherence, sample attrition rate, medication compliance and adverse events will be monitored during the study period, and missing data analyzed using intent-to-treat analysis (ITT). Results: Training sessions of the CT group are 45 minutes/day, 3 days/week, for 12 weeks (36 sessions each). The training of active control group is the same as CT group (45min/day, 3days/week, for 12 weeks, for a total of 36 sessions). The primary outcome is cognitive function, using the Mini-Mental Status Examination (MMSE); the secondary outcome indicators are: 1) activities of daily living, using the Lawton’s Instrumental Activities of Daily Living (IADLs) and 2) degree of depressive symptoms, using the Geriatric Depression Scale-Short form (GDS-SF). Latent growth curve modeling will be used in the repeated measures statistical analysis to estimate the trajectory of improvement by examining the rate and pattern of change in cognitive functions, activities of daily living and degree of depressive symptoms for intervention efficacy over time, and the effects will be evaluated immediate post-test, 3 months, 6 months and one year after the last session. Conclusions: We constructed a rigorous CT program adhering to the Consolidated Standards of Reporting Trials (CONSORT) reporting guidelines. We expect to determine the improvement in cognitive function, activities of daily living and degree of depressive symptoms of older adults with mild cognitive impairment after using the CT.

Keywords: mild cognitive impairment, cognitive training, randomized controlled study

Procedia PDF Downloads 420
2528 The Embodied World — A Redefinition of "Emptiness" in Heart Sutra from the Perspective of Cognitive Science

Authors: Ke Ma

Abstract:

Through the long course of history, Buddhism has captivated generations of brilliant minds with its enlightening but elusive discernment. Far from religious dogmas, Buddhism not only represents spiritual revelation, but also logical reasoning.Among all of Buddhism’s concepts, emptiness is the most famous, and abstruse one. This word resulted from an inaccurate translation confuses both Buddhists and religious scholars who understand Heart Sutra based on its English version. In this essay, the idea of “emptiness” will be reinterpreted as “information,” leading not only to a clarification of the ideology of Buddhism, but also to greater correspondence between Buddhism concepts and cognitive science.

Keywords: religion, cognitive science, psychology, Buddhism

Procedia PDF Downloads 250
2527 Clinical Neuropsychology in India: Challenges and Achievements

Authors: Garima Joshi, Ashima N. Wadhawan

Abstract:

Neuropsychology in India is a fairly new field, having started only four decades back. Neuropsychology has come a long way since the establishment of the first department, from using western batteries for assessing patients to the development of highly reliable indigenous tools for assessing neuropsychological functioning. Clinical neuropsychology has risen as a discipline in the field of assessing and rehabilitating patients with various neurological conditions such as Traumatic Brain Injury, Stroke, Mild Cognitive Impairment, Alzheimer’s, Schizophrenia and other disorders with cognitive decline. The current review attempts to assimilate the history of the discipline in India, along with the current developments and future direction of the field and highlights the pursuit and undertakings of the scientists to provide culturally appropriate services, in terms of assessment and rehabilitation, to the Indian population.

Keywords: clinical neuropsychology, cognitive assessment, cognitive rehabilitation, neuropsychological test batteries in India

Procedia PDF Downloads 298
2526 Examining the Cognitive Abilities and Financial Literacy Among Street Entrepreneurs: Evidence From North-East, India

Authors: Aayushi Lyngwa, Bimal Kishore Sahoo

Abstract:

The study discusses the relationship between cognitive ability and the level of education attained by the tribal street entrepreneurs on their financial literacy. It is driven by the objective of examining the effect of cognitive ability on financial ability on the one hand and determining the effect of the same on financial literacy on the other. A field experiment was conducted on 203 tribal street vendors in the north-eastern Indian state of Mizoram. This experiment's calculations are conditioned by providing each question scores like math score (cognitive ability), financial score and debt score (financial ability). After that, categories for each of the variables, like math category (math score), financial category (financial score) and debt category (debt score), are generated to run the regression model. Since the dependent variable is ordinal, an ordered logit regression model was applied. The study shows that street vendors' cognitive and financial abilities are highly correlated. It, therefore, confirms that cognitive ability positively affects the financial literacy of street vendors through the increase in attainment of educational levels. It is also found that concerning the type of street vendors, regular street vendors are more likely to have better cognitive abilities than temporary street vendors. Additionally, street vendors with more cognitive and financial abilities gained better monthly profits and performed habits of bookkeeping. The study attempts to draw a particular focus on a set-up which is economically and socially marginalized in the Indian economy. Its finding contributes to understanding financial literacy in an understudied area and provides policy implications through inclusive financial systems solutions in an economy limited to tribal street vendors.

Keywords: financial literacy, education, street entrepreneurs, tribals, cognitive ability, financial ability, ordered logit regression.

Procedia PDF Downloads 67
2525 Scenario Based Reaction Time Analysis for Seafarers

Authors: Umut Tac, Leyla Tavacioglu, Pelin Bolat

Abstract:

Human factor has been one of the elements that cause vulnerabilities which can be resulted with accidents in maritime transportation. When the roots of human factor based accidents are analyzed, gaps in performing cognitive abilities (reaction time, attention, memory…) are faced as the main reasons for the vulnerabilities in complex environment of maritime systems. Thus cognitive processes in maritime systems have arisen important subject that should be investigated comprehensively. At this point, neurocognitive tests such as reaction time analysis tests have been used as coherent tools that enable us to make valid assessments for cognitive status. In this respect, the aim of this study is to evaluate the reaction time (response time or latency) of seafarers due to their occupational experience and age. For this study, reaction time for different maneuverers has been taken while the participants were performing a sea voyage through a simulator which was run up with a certain scenario. After collecting the data for reaction time, a statistical analyze has been done to understand the relation between occupational experience and cognitive abilities.

Keywords: cognitive abilities, human factor, neurocognitive test battery, reaction time

Procedia PDF Downloads 276
2524 A Study of EFL Learners with Different Goal Orientations in Response to Cognitive Diagnostic Reading Feedback

Authors: Yuxuan Tang

Abstract:

Cognitive diagnostic assessment has received much attention in second language education, and assessment for it can provide pedagogically useful feedback for language learners. However, there is a lack of research on how students interpret and use cognitive diagnostic feedback. Thus the present study aims to adopt a mixed-method approach mainly to explore the relationship between the goal-orientation and students' response to cognitive diagnostic feedback. Almost 200 Chinese undergraduates from two universities in Xi'an, China, will be invited to do a cognitive diagnostic reading test, and each student will receive specialized cognitive diagnostic feedback, comprising of students' reading attributes mastery level generated by applying a well-selected cognitive diagnostic model, students' perceived reading ability assessed by a self-assessing questionnaire and students’ level position in the whole class. And a goal-orientation questionnaire and a self-generated questionnaire on the perception of feedback will be given to students the moment they receive feedback. In addition, interviews of students will be conducted on their future plans to see whether they have awareness of carrying out studying plans. The study aims to find a new perspective towards how students use and interpret cognitive diagnostic feedback in terms of their different goal-orientation (self-based, task-based, and other-based goals) by applying the newest goal orientation model, which is an important construct of motivation in psychology, seldom researched under language learning area. And the study is expected to provide evidence on how diagnostic feedback promotes students' learning under the educational belief of assessment for learning. Practically speaking, according to the personalized diagnostic feedback, students can take remedial self-learning more purposefully, and teachers can target students' weaknesses to adjust teaching methods and carry out tailored teaching.

Keywords: assessment for learning, cognitive diagnostic assessment, goal-orientation, personalized feedback

Procedia PDF Downloads 107
2523 A Critical Analysis of Cognitive Explanations of Afterlife Belief

Authors: Mahdi Biabanaki

Abstract:

Religion is present in all human societies and has been for tens of thousands of years. What is noteworthy is that although religious traditions vary in different societies, there are considerable similarities in their religious beliefs. In all human cultures, for example, there is a widespread belief in the afterlife. Cognitive science of Religion (CSR), an emerging branch of cognitive science, searches for the root of these widespread similarities and the widespread prevalence of beliefs such as beliefs in the afterlife in common mental structures among humans. Accordingly, the cognitive architecture of the human mind has evolved to produce such beliefs automatically and non-reflectively. For CSR researchers, belief in the afterlife is an intuitive belief resulting from the functioning of mental tools. Our purpose in this article is to extract and evaluate the cognitive explanations presented in the CSR field for explaining beliefs in the afterlife. Our research shows that there are two basic theories in this area of CSR, namely "intuitive dualism" and "simulation constraint" theory. We show that these two theories face four major challenges and limitations in explaining belief in the afterlife: inability to provide a causal explanation, inability to explain cultural/religious differences in afterlife belief, the lack of distinction between the natural and the rational foundations of belief in the afterlife and disregarding the supernatural foundations of the afterlife belief.

Keywords: afterlife, cognitive science of religion, intuitive dualism, simulation constraint

Procedia PDF Downloads 175
2522 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 258
2521 Clinical and Sleep Features in an Australian Population Diagnosed with Mild Cognitive Impairment

Authors: Sadie Khorramnia, Asha Bonney, Kate Galloway, Andrew Kyoong

Abstract:

Sleep plays a pivotal role in the registration and consolidation of memory. Multiple observational studies have demonstrated that self-reported sleep duration and sleep quality are associated with cognitive performance. Montreal Cognitive Assessment questionnaire is a screening tool to assess mild cognitive (MCI) impairment with a 90% diagnostic sensitivity. In our current study, we used MOCA to identify MCI in patients who underwent sleep study in our sleep department. We then looked at the clinical risk factors and sleep-related parameters in subjects found to have mild cognitive impairment but without a diagnosis of sleep-disordered breathing. Clinical risk factors, including physician, diagnosed hypertension, diabetes, and depression and sleep-related parameters, measured during sleep study, including percentage time of each sleep stage, total sleep time, awakenings, sleep efficiency, apnoea hypopnoea index, and oxygen saturation, were evaluated. A total of 90 subjects who underwent sleep study between March 2019 and October 2019 were included. Currently, there is no pharmacotherapy available for MCI; therefore, identifying the risk factors and attempting to reverse or mitigate their effect is pivotal in slowing down the rate of cognitive deterioration. Further characterization of sleep parameters in this group of patients could open up opportunities for potentially beneficial interventions.

Keywords: apnoea hypopnea index, mild cognitive impairment, sleep architecture, sleep study

Procedia PDF Downloads 119
2520 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 394