program function
Recently Published Documents


TOTAL DOCUMENTS

25
(FIVE YEARS 9)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Vol 14 ◽  
pp. 1179173X2110411
Author(s):  
Carla J Berg ◽  
Katelyn F Romm ◽  
Brooke Patterson ◽  
Christina Wysota ◽  
Lorien C Abroms

Significance Given limited research on young-adult tobacco cessation interventions, we examined preferred tobacco/e-cigarette cessation approaches among young-adult tobacco/e-cigarette users. Methods We analyzed Spring 2020 data from a longitudinal study of young adults (ages 18–34) across 6 metropolitan areas (Atlanta, Boston, Minneapolis, Oklahoma City, San Diego, and Seattle). We examined tobacco/e-cigarette use and self-reported appeal of various intervention approaches, and regarding technology-based approaches, the appeal of types of technology and intervention functions. Results In this sample of past 6-month tobacco/e-cigarette users (Mage = 24.69; 48.4% male; 73.3% White), 59.6% used e-cigarettes, and 48.2% used cigarettes. The most frequently endorsed intervention approach was nicotine replacement therapy (NRT; 72.7%), followed by technology-based programs (70.0%) and oral medications (53.0%). The most frequently endorsed technology-based approach was smartphone apps (85.9%), followed by programs involving text-messaging (62.1%), websites (57.1%), social media (48.4%), and video counseling (41.6%). The most frequently endorsed technology-based program function was behavioral monitoring (68.3%), followed by earning rewards (60.3%). We identified no differences in approach appeal among subcategories of tobacco/e-cigarette users. Conclusions Findings underscore the promise of technology-based approaches, particularly apps, and text-messaging for tobacco/e-cigarette cessation, and functions like behavioral monitoring and gamification. Additionally, appropriate and effective NRT use for young-adult tobacco/e-cigarette users warrants further research.


2020 ◽  
Vol 5 (3) ◽  
pp. 96
Author(s):  
Aris Hadisopiyan ◽  
Christian Dwi Suhendra ◽  
Parma Hadi Rantelinggi

Game is an activity that aims to have fun, light exercise, fill spare time, and sometimes used as a means of education. One of the most downloaded desktop games is a game made in Indonesia with the survival horror genre made with Unity. Unity is a user-friendly game engine that supports more than 25 platforms and provides many ready-to-use assets. The authors made a desktop-based 3d game with the survival horror genre made with Unity. The method used in this game's manufacture and design is the Multimedia Development Life Cycle, which has six stages, namely Concept, Design, Material Collecting, Assembly, Testing, and Distribution. In making this game using Blender, Camtasia Studio, Adobe Photoshop, Unity, Inno Setup, and the C# programming language. The program function testing phase has been successful using the black box method, and from this research, a 3d game called "Suanggi Survival Papua" based on the desktop with single-player mode has been produced. Games with the survival horror genre combined with the local culture can add insight into the knowledge and train the players' concentration.


2020 ◽  
Author(s):  
Elizabeth J. Ragan ◽  
Christopher J. Gill ◽  
Matthew Banos ◽  
Tara C. Bouton ◽  
Jennifer Rooney ◽  
...  

UNSTRUCTURED A major challenge for prospective, clinical tuberculosis (TB) research is accurately defining a metric for measuring medication adherence. We present the design and methodology of a mobile health (mHealth)-based directly observed therapy (DOT) program developed for the purpose of measuring anti-TB medication adherence for a prospective TB cohort in Western Cape Province, South Africa. DOT workers collect daily adherence data on mobile smartphones. Both participant-level adherence as well as program-level adherence and program function are systematically and regularly monitored to assess implementation of the DOT program. A data dashboard allows for regular visualization of indicators. Numerous mechanisms were designed to prevent or limit data falsification and ensure study data integrity. This approach can be adapted in other settings to improve the capture of anti-TB medication adherence outside of a hospitalized setting.


Author(s):  
Gabriel Landini ◽  
Giovanni Martinelli ◽  
Filippo Piccinini

Abstract Motivation Microscopy images of stained cells and tissues play a central role in most biomedical experiments and routine histopathology. Storing colour histological images digitally opens the possibility to process numerically colour distribution and intensity to extract quantitative data. Among those numerical procedures are colour deconvolution, which enable decomposing an RGB image into channels representing the optical absorbance and transmittance of the dyes when their RGB representation is known. Consequently, a range of new applications become possible for morphological and histochemical segmentation, automated marker localization and image enhancement. Availability and implementation Colour deconvolution is presented here in two open-source forms: a MATLAB program/function and an ImageJ plugin written in Java. Both versions run in Windows, Macintosh and UNIX-based systems under the respective platforms. Source code and further documentation are available at: https://blog.bham.ac.uk/intellimic/g-landini-software/colour-deconvolution-2/. Supplementary information Supplementary data are available at Bioinformatics online.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Yu Qin ◽  
Jingbin Liu ◽  
Shijun Zhao ◽  
Dengguo Feng ◽  
Wei Feng

Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had caused large-scale cyber attack and even breakdown of important information infrastructure. Software measurement and attestation are general methods to detect software integrity and their executing states in IoT. However, they cannot resist TOCTOU attack due to their static features and seldom verify correctness of control flow integrity. In this paper, we propose a novel and practical scheme for software trusted execution based on lightweight trust. Our scheme RIPTE combines dynamic measurement and control flow integrity with PUF device binding key. Through encrypting return address of program function by PUF key, RIPTE can protect software integrity at runtime on IoT device, enabling to prevent the code reuse attacks. The results of our prototype’s experiment show that it only increases a small size TCB and has a tiny overhead in IoT devices under the constraint on function calling. In sum, RIPTE is secure and efficient in IoT device protection at runtime.


2020 ◽  
Author(s):  
Carolyn Gardner ◽  
Elizabeth Galoozis ◽  
Rebecca Halpern

This work is the introduction from the book, Hidden Architectures of Information Literacy Programs: Structures, Practices, and Contexts edited by Carolyn Caffrey Gardner, Elizabeth Galoozis, and Rebecca Halpern published by ALA editions. Creating, running, and coordinating an information literacy program requires not only the visible labor of scheduling and teaching classes, but a host of invisible mechanics that makes a program function in its entirety. Hidden Architectures of Information Literacy Programs captures some of the tacit knowledge information literacy coordinators accumulate through trial and error and informal conversations with professional networks, and details practices of information literacy programs that are both innovative and the core functions of our jobs.In 39 chapters, authors from a variety of diverse institutions highlight the day-to-day work of running and coordinating information literacy programs and the soft skills necessary for success in the coordinator role. They discuss the institutional context into which their work fits, their collaborators, students, marketing, and assessment, as well as the many varied duties they balance. Chapters examine the delicate balancing act of labor distribution, minimal or absent positional authority coupled with making decisions and assignments, generating buy-in for programmatic goals and approaches, and maintaining positive relationships throughout the organization.


2020 ◽  
Author(s):  
Carolyn Gardner ◽  
Tessa Withorn

This work is chapter #13 from the book, Hidden Architectures of Information Literacy Programs: Structures, Practices, and Contexts edited by Carolyn Caffrey Gardner, Elizabeth Galoozis, and Rebecca Halpern published by ALA editions. Creating, running, and coordinating an information literacy program requires not only the visible labor of scheduling and teaching classes, but a host of invisible mechanics that makes a program function in its entirety. Hidden Architectures of Information Literacy Programs captures some of the tacit knowledge information literacy coordinators accumulate through trial and error and informal conversations with professional networks, and details practices of information literacy programs that are both innovative and the core functions of our jobs.In 39 chapters, authors from a variety of diverse institutions highlight the day-to-day work of running and coordinating information literacy programs and the soft skills necessary for success in the coordinator role. They discuss the institutional context into which their work fits, their collaborators, students, marketing, and assessment, as well as the many varied duties they balance. Chapters examine the delicate balancing act of labor distribution, minimal or absent positional authority coupled with making decisions and assignments, generating buy-in for programmatic goals and approaches, and maintaining positive relationships throughout the organization.


2020 ◽  
Vol 9 (1) ◽  
pp. 87
Author(s):  
Shams-Aldeen M. Qaro ◽  
Zeki M. Akrawee

The objectives of this study are to testing the impacts of Atrush forests on the environment and oxygen production based on I-Tree program, function and management decisions that will improve human health and environmental quality. Human communities derive many essential benefits from natural ecosystems; these benefits represent important and familiar parts of the economy. What has been less appreciated up to this day is that natural ecosystems also perform fundamental life-support services without them human civilizations would cease to thrive. Evaluation of the vegetation structure, conducted during 2017. Data from 21 fields located were analyzed using the I-Tree Eco program. The most common species of trees are Pinus brutia (Turkish pine). Quercus aegilops (Ajo mountain scrub oak ), Plantanus orientalis (Oriental plane tree), Pistacia atlantica (Mt.atlas mastic tree) as well as shrubs Crataegus azarolus (Mediterranean Medlar), Junipours occidentalis (Western juniper), Prunus amygdalus (Almendro), Rhus coriaria (sumac spp), Nerium oleander (Oleander). Results show that the Pollution removal is ( 0.106 ton/year) referred ($280 /year) for sum of surveyed trees and shrubs in Atrush location, and oxygen production is (2 ton/year) .That means there are a effected role of trees on ecosystem in selected area.


2015 ◽  
Vol 4 (4) ◽  
pp. 58
Author(s):  
Radu Bucea-Manea-Tonis ◽  
Rocsana Tonis (Bucea-Manea)

Today software technology evolves very quickly, to an old paradigm, called functional programming. This paradigm uses lambda functions ready to be used where declared instead of function pointers. The long term target is to let compilers evaluate rather than execute a program/function.  The new C++14 standard allows lambda calculus as we demonstrate in the applicative section of implementing conditionals, booleans and numbers.


Sign in / Sign up

Export Citation Format

Share Document