66 research outputs found

    Three Studies Investigating Comprehensive School Physical Activity Program-Aligned Opportunities To Enhance Studentsā€™ Physical Education Learning

    Get PDF
    Schools have been identified as key venues that have a positive impact on studentsā€™ development through physical activity (PA) and physical education (PE) programming. A comprehensive school physical activity program (CSPAP) is the Centers for Disease Control and Preventionā€™s [CDC] national framework for school-based PA (CDC, 2019). A CSPAP was conceptualized as a strategic approach to leverage the full range of resources needed to meet two broad goals: (a) provide school-aged youth with the opportunity to meet the nationally recommended 60 minutes of daily PA, and (b) achieve Society of Health and Physical Educators (SHAPE) Americaā€™s National Standards for K-12 learners (SHAPE America, 2014). While it is well established that a CSPAP can facilitate childrenā€™s PA opportunities, little is known about the extent to which the different components of a CSPAP can support studentsā€™ achievement of the PE standards. Originally, the purpose of this dissertation was to investigate the potential of opportunities outside of traditional PE to bolster studentsā€™ PE learning. The dissertation was based on the idea that a CSPAP can be used to enhance and accelerate what students learn in PE, including physical, cognitive, and social and emotional skills. From this perspective, all CSPAP components are connected not only through PA experiences but also PE learning. Three studies were proposed for this dissertation, including (a) a systematic review and meta-analysis of the effectiveness of CSPAP-aligned PA interventions in increasing elementary childrenā€™s motor competence (MC), in line with SHAPE Americaā€™s (2014) Standard 1 (Study 1); (b) a systematic review and metaanalysis of the effectiveness of CSPAP-aligned PA interventions on the development of elementary childrenā€™s social and emotional learning (SEL), in line with SHAPE Americaā€™s Standard 4 and 5 (Study 2); and (c) a school-based pilot intervention examining the efficacy of classroom movement integration (MI) to support elementary childrenā€™s MC and SEL. Due to the onset of the COVID-19 pandemic during this dissertation, conducting the intervention for Study 3 was not possible because of school closures and the author and his committee agreed to substitute the intervention with the development of a new research measure for assessing online physical education (OLPE), which was considered appropriate in the context of the pandemic. As such, the revised purpose of this dissertation was to examine CSPAP-aligned strategies, particularly beyond traditional PE, for supporting studentsā€™ PE learning. While no changes were made to Studies 1 or 2, the updated purpose of Study 3 was to develop a systematic observation instrument ā€“ the System for Observing Virtual Real Time Lessons in Physical Education (SOVRTL-PE) ā€“ for assessing synchronous OLPE lessons in K-12 PE. Studies 1 and 2 followed the updated Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines (Page et al., 2021) and synthesized the evidence of the effectiveness of PA interventions in increasing MC and SEL of children aged 5-12. The CSPAP framework was used to categorize the different intervention approaches. The results of both studies demonstrate that the PA intervention programs had a positive effect on the development of MC and SEL. In light of our results, extensive CSPAP-aligned PA intervention approaches appear to be promising avenues for enhancing childrenā€™s MC and SEL. Study 3 used five phases to develop and establish the reliability of the SOVRTL-PE. Specifically, the instrument was content validated, using an extensive literature search, observations of synchronous OLPE lessons, and consensus from a Delphi survey with several experts within the field. The result of Study 3 provides an overview of key features of synchronous OLPE and underscores the importance of optimizing family and community resources to better understand how to support studentsā€™ learning during virtual PE instruction. In essence, this study provides one possibility for systematically assessing and improving professional practices amid increased shifts toward virtual teaching and learning alternatives in PE within the CSPAP framework. Ultimately, understanding the potential of CSPAPs, whether facilitated in-person or remotely, for supporting studentsā€™ PE learning fundamentally changes the way both researchers and practitioners might approach implementing such programs

    Effects of Early Morning Physical Activity on Elementary School Studentsā€™ Physical Fitness and Sociality

    Get PDF
    As part of the Comprehensive School Physical Activity Program, we investigated how early morning physical activity affects elementary school studentsā€™ physical fitness and sociality. Seventy-five boys in 6th grade of one elementary school located in G Metropolitan City, Korea comprised the experimental group that participated in early morning physical activity for 6 months. The control group did not perform said activities. Experimental design for this study adopted pre- and post-measurement and comparison methods between groups. Collected data were ana-lyzed with analyses of covariance and Bonferroni post-hoc tests. The experimental group showed significant differences in the improvement of cardiorespiratory endurance and muscle strength among the sub-elements of physical fitness compared to controls. They also showed signifi-cant differences in the development of sociability, activity, autonomy, stability, and dominance among the sub-factors of sociality compared to controls. We elucidated the importance of early morning physical activity performed before school, which has implications for schoolsā€™ physical education programs

    Pixel data real time processing as a next step for HL-LHC upgrades and beyond

    Full text link
    The experiments at LHC are implementing novel and challenging detector upgrades for the High Luminosity LHC, among which the tracking systems. This paper reports on performance studies, illustrated by an electron trigger, using a simplified pixel tracker. To achieve a real-time trigger (e.g. processing HL-LHC collision events at 40 MHz), simple algorithms are developed for reconstructing pixel-based tracks and track isolation, utilizing look-up tables based on pixel detector information. Significant gains in electron trigger performance are seen when pixel detector information is included. In particular, a rate reduction up to a factor of 20 is obtained with a signal selection efficiency of more than 95\% over the whole Ī·\eta coverage of this detector. Furthermore, it reconstructs p-p collision points in the beam axis (z) direction, with a high precision of 20 Ī¼\mum resolution in the very central region (āˆ£Ī·āˆ£<0.8|\eta| < 0.8), and, up to 380 Ī¼\mum in the forward region (2.7 <āˆ£Ī·āˆ£<< |\eta| < 3.0). This study as well as the results can easily be adapted to the muon case and to the different tracking systems at LHC and other machines beyond the HL-LHC. The feasibility of such a real-time processing of the pixel information is mainly constrained by the Level-1 trigger latency of the experiment. How this might be overcome by the Front-End ASIC design, new processors and embedded Artificial Intelligence algorithms is briefly tackled as well.Comment: To be submitted to JHE

    Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

    Get PDF
    WSN (wireless sensor network) is one of the main technologies in IoT (Internet of Things) applications or services. To date, several schemes have been proposed to establish a pair-wise key between two nodes in WSN, and most of them are designed to establish long-term keys used throughout the network lifetime. However, in the near future, if WSN will be used for information infrastructures in various fields such as manufacturing, distribution, or public facilities management and its life cycle can be as long as that of other common networks, it will definitely be advantageous in terms of security to encrypt messages using session keys instead of long-term keys. In this paper, we propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH) key exchange and hash chain. The proposed scheme eliminates vulnerabilities of existing schemes for WSN and has improved security. The proposed scheme is efficient in terms of energy costs compared to related schemes

    Developing the Framework of Drone Curriculum to Educate the Drone Beginners in the Korean Construction Industry

    No full text
    Both drones and laser scanners digitally take the as-built context of an object into the computer, and the data taken are transmitted to a Building Information Modeling (BIM) world to create accurate 3D models. Although the laser scanner is the leading method of the Scan-to-BIM procedure, many professionals indicate drawbacks of the technology and point out the drone is an alternative that can improve the shortcomings, leading to the UAV-to-BIM process. The Korean construction industry plans to implement drone technology for scrutinizing as-built construction quality by 2025. However, drones are not popular in construction projects. Korean universities where Construction Engineering and Management programs have been implemented have requested to develop a drone curriculum for construction professionals. Since the majority of the professionals are not familiar with drone operation, in order for the schools to be successful in developing the curriculum, it is very necessary to perform a preliminary experimental study for identifying the essential education contents that are appropriate for drone beginners. The main objective of this paper is to perform a study for drone beginners and recognize the recommendations and the framework of a drone curriculum that will be beneficial for the schools to develop a comprehensive curriculum later on

    Exploring South Korean Elementary School Classroom Teachers&rsquo; Beliefs and Practices in Physical Education

    No full text
    Physical education (PE) is beneficial for the development of elementary school-age children through its promotion of different educational learning outcomes, which in turn affects the long-term development of physically active lifestyles. In many countries, PE is taught by classroom teachers (CTs), who are thought to be in a unique position to positively impact students&rsquo; learning. While a substantial body of studies examines the challenges that CTs encounter when teaching PE, less research has been directed towards gaining a comprehensive understanding of how CTs visualize PE and, in turn, how to promote various types of PE. The purpose of this study, therefore, was to explore elementary school CTs&rsquo; beliefs about and practices in PE in South Korea. To achieve the research goal, a semi-structured face-to face interview with six CTs was performed to collect the qualitative data source, using the ground theory as an analysis method. Three themes emerged from these interviews concerning the CTs&rsquo; beliefs in PE: (a) the importance of understanding students&rsquo; characteristics, (b) the importance of centering internal perceptions in PE method, and (c) the importance of meaningful experiences. The results also identified two themes for teaching practices in PE that corresponded to CTs&rsquo; beliefs: (a) crafting personalized instructional methods and (b) connecting PE experiences. This study lends important insights to future practices and research recommendations for CTs&rsquo; PE teaching and teacher education programs

    Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    No full text
    Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols

    Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    No full text
    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et alā€™s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration

    Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    No full text
    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.ā€™s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme
    • ā€¦
    corecore