118,213 research outputs found

    What do faculties specializing in brain and neural sciences think about, and how do they approach, brain-friendly teaching-learning in Iran?

    Get PDF
    Objective: to investigate the perspectives and experiences of the faculties specializing in brain and neural sciences regarding brain-friendly teaching-learning in Iran. Methods: 17 faculties from 5 universities were selected by purposive sampling (2018). In-depth semi-structured interviews with directed content analysis were used. Results: 31 sub-subcategories, 10 subcategories, and 4 categories were formed according to the “General teaching model”. “Mentorship” was a newly added category. Conclusions: A neuro-educational approach that consider the roles of the learner’s brain uniqueness, executive function facilitation, and the valence system are important to learning. Such learning can be facilitated through cognitive load considerations, repetition, deep questioning, visualization, feedback, and reflection. The contextualized, problem-oriented, social, multi-sensory, experiential, spaced learning, and brain-friendly evaluation must be considered. Mentorship is important for coaching and emotional facilitation

    Do optimization methods in deep learning applications matter?

    Get PDF
    With advances in deep learning, exponential data growth and increasing model complexity, developing efficient optimization methods are attracting much research attention. Several implementations favor the use of Conjugate Gradient (CG) and Stochastic Gradient Descent (SGD) as being practical and elegant solutions to achieve quick convergence, however, these optimization processes also present many limitations in learning across deep learning applications. Recent research is exploring higher-order optimization functions as better approaches, but these present very complex computational challenges for practical use. Comparing first and higher-order optimization functions, in this paper, our experiments reveal that Levemberg-Marquardt (LM) significantly supersedes optimal convergence but suffers from very large processing time increasing the training complexity of both, classification and reinforcement learning problems. Our experiments compare off-the-shelf optimization functions(CG, SGD, LM and L-BFGS) in standard CIFAR, MNIST, CartPole and FlappyBird experiments.The paper presents arguments on which optimization functions to use and further, which functions would benefit from parallelization efforts to improve pretraining time and learning rate convergence

    Medication management in mental health: nurses’ perceptions of their work with service users and carers

    Get PDF
    Aim: This study aimed to ascertain registered mental health nurses’ perceptions of their role involving medication management interventions with clients and their carers. Medicine-related interventions include administration, assessment of therapeutic effect potential side-effects education, liaison with service users and influence in prescribing decisions. Design and methods: The study used a qualitative design. Ten registered nurses were interviewed. Findings: Three themes were identified all related to the nurse context of work, role and client and carer need: improved dialogue, information and education, and adherence issues. Practice implications: Nurses use their clinical expertise in medication management to help achieve optimum therapeutic outcomes

    Gamified cognitive control training for remitted depressed individuals : user requirements analysis

    Get PDF
    Background: The high incidence and relapse rates of major depressive disorder demand novel treatment options. Standard treatments (psychotherapy, medication) usually do not target cognitive control impairments, although these seem to play a crucial role in achieving stable remission. The urgent need for treatment combined with poor availability of adequate psychological interventions has instigated a shift toward internet interventions. Numerous computerized programs have been developed that can be presented online and offline. However, their uptake and adherence are oftentimes low. Objective: The aim of this study was to perform a user requirements analysis for an internet-based training targeting cognitive control. This training focuses on ameliorating cognitive control impairments, as these are still present during remission and can be a risk factor for relapse. To facilitate uptake of and adherence to this intervention, a qualitative user requirements analysis was conducted to map mandatory and desirable requirements. Methods: We conducted a user requirements analysis through a focus group with 5 remitted depressed individuals and individual interviews with 6 mental health care professionals. All qualitative data were transcribed and examined using a thematic analytic approach. Results: Results showed mandatory requirements for the remitted sample in terms of training configuration, technological and personal factors, and desirable requirements regarding knowledge and enjoyment. Furthermore, knowledge and therapeutic benefits were key requirements for therapists. Conclusions: The identified requirements provide useful information to be integrated in interventions targeting cognitive control in depression

    Methods of the survey of consumer finances

    Get PDF
    Consumer surveys

    KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

    Full text link
    Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is used. Within the used code, a certain part is invoked only at runtime while the rest are executed at startup and/or shutdown phases in the kernel's lifetime run. In this paper, we propose a reliable and practical system, named KASR, which transparently reduces attack surfaces of commodity OS kernels at runtime without requiring their source code. The KASR system, residing in a trusted hypervisor, achieves the attack surface reduction through a two-step approach: (1) reliably depriving unused code of executable permissions, and (2) transparently segmenting used code and selectively activating them. We implement a prototype of KASR on Xen-4.8.2 hypervisor and evaluate its security effectiveness on Linux kernel-4.4.0-87-generic. Our evaluation shows that KASR reduces the kernel attack surface by 64% and trims off 40% of CVE vulnerabilities. Besides, KASR successfully detects and blocks all 6 real-world kernel rootkits. We measure its performance overhead with three benchmark tools (i.e., SPECINT, httperf and bonnie++). The experimental results indicate that KASR imposes less than 1% performance overhead (compared to an unmodified Xen hypervisor) on all the benchmarks.Comment: The work has been accepted at the 21st International Symposium on Research in Attacks, Intrusions, and Defenses 201

    Binding an event to its source at encoding improves children\u27s source monitoring

    Get PDF
    Children learn information from a variety of sources and often remember the content but forget the source. While the majority of research has focused on retrieval mechanisms for such difficulties, the present investigation examines whether the way in which sources are encoded influences future source monitoring. In Study 1, 86 children aged 3 to 8 years participated in two photography sessions on different days. Children were randomly assigned to either the Difference condition (they were asked to pay attention to differences between the two events), the Memory control condition (asked to pay attention with no reference to differences), or the No-Instruction control (no special instructions were given). One week later, during a structured interview about the photography session, the 3-4 year-olds in the No-Instruction condition were less accurate and responded more often with \u27don\u27t know\u27 than the 7-8 year-olds. However, the older children in the Difference condition made more source confusions than the younger children suggesting improved memory for content but not source. In Study 2, the Difference condition was replaced by a Difference-Tag condition where details were pointed out along with their source (i.e., tagging source to content). Ninety-four children aged 3 to 8 years participated. Children in the Difference-Tag condition made fewer source-monitoring errors than children in the Control condition. The results of these two studies together suggest that binding processes at encoding can lead to better source discrimination of experienced events at retrieval and may underlie the rapid development of source monitoring in this age range
    • …
    corecore