Infant gaze serves as a measure of attention to food cues in adults and children and may play a role in signalling infant hunger and satiation. Maternal responsiveness to infant satiation cues, including gaze, support...
详细信息
Infant gaze serves as a measure of attention to food cues in adults and children and may play a role in signalling infant hunger and satiation. Maternal responsiveness to infant satiation cues, including gaze, supports healthy appetite development and may reduce obesity risk. However, mothers often experience difficulty in interpreting feeding cues, and there have been few attempts to study cues systematically. This study aimed to develop a reliable coding scheme for categorising and tracking infant gaze behaviours during complementary feeding (CF). Twenty infants aged between six and eighteen months were filmed during typical meals on two occasions at home. The Infant Gaze at Mealtime (IGM) coding scheme was devised from the analysis of a sample of videos, a piloting and testing process, and the feeding cues and developmental psychology literature. Inter and intra-rater reliability tests of the scheme with 20% of the study videos revealed high levels of reliability. When applied to the full sample of 225 video clips, the IGM coding scheme revealed a significant decrease over time in the frequency of infants gazing at food and a significant increase in exploratory gaze behaviour within a meal. These changes were consistent across main and dessert courses, suggesting they may be indicative of changes in infant feeding state. The results suggest that infant gaze may offer a means of identifying infant hunger and satiation and, as an easily observed behaviour, an effective tool for mothers and professionals for promoting responsive feeding.
It is important for researchers to efficiently conduct quality literature studies. Hence, a structured and efficient approach is essential. We overview work that has demonstrated the potential for using software tools...
详细信息
It is important for researchers to efficiently conduct quality literature studies. Hence, a structured and efficient approach is essential. We overview work that has demonstrated the potential for using software tools in literature reviews. We highlight the untapped opportunities in using an end-to-end tool-supported literature review methodology. Qualitative data-analysis tools such as NVivo are immensely useful as a means to analyze, synthesize, and write up literature reviews. In this paper, we describe how to organize and prepare papers for analysis and provide detailed guidelines for actually coding and analyzing papers, including detailed illustrative strategies to effectively write up and present the results. We present a detailed case study as an illustrative example of the proposed approach put into practice. We discuss the means, value, and also pitfalls of applying tool-supported literature review approaches. We contribute to the literature by proposing a four-phased tool-supported methodology that serves as best practice in conducting literature reviews in IS. By viewing the literature review process as a qualitative study and treating the literature as the "data set", we address the complex puzzle of how best to extract relevant literature and justify its scope, relevance, and quality. We provide systematic guidelines for novice IS researchers seeking to conduct a robust literature review.
The flow, or optimal experience, is a highly focused mental state leading to immersion and high performance. Although flow theory has been widely applied to research on videogames, methods based on behavior observatio...
详细信息
The flow, or optimal experience, is a highly focused mental state leading to immersion and high performance. Although flow theory has been widely applied to research on videogames, methods based on behavior observation to identify flow states are limited in this domain. The aim of the present study was to develop a new method to detect flow episodes occurring during a gaming session from observation of players' behaviors and analysis of game replays. The authors developed an optimal experience behavior pattern and a related coding scheme. In-depth interviews were then conducted to determine whether episodes coded as flow by researchers were also described as such by the players themselves. Findings showed that intense concentration followed by an expression of satisfaction could be a useful pattern to detect flow. Unexpectedly, the interviews suggested that frustration, as well as joy, may also be an emotional signature of flow. This study shed new light on the relationship between gameplay and flow.
Biological neural networks tend to exhibit a variety of spatial structures. Here, we study the effect of spatial embedding in a specific example motivated by cortical circuits in which inhibitory cells densely occupy ...
详细信息
Biological neural networks tend to exhibit a variety of spatial structures. Here, we study the effect of spatial embedding in a specific example motivated by cortical circuits in which inhibitory cells densely occupy a central region and are surrounded by a larger and more dispersed population of excitatory cells. To instantiate space, neuronal time delays are chosen to be proportional to the distance between neurons. We use simulations of spiking neural networks, operating close to a critical bifurcation between stationary behavior and population-wide oscillatory behavior, whereas in a nonspatial network, shorter time delays tend to enhance stationary population dynamics;here, the imposition of space reverses the effect: the shorter the time delays, the more oscillatory the network becomes. We conclude that the specific geometries of spatial embedding and their subtle effects on the distributions of time delays in a network can have significant repercussions for network dynamics. (C) 2010 Wiley Periodicals, Inc. Complexity 16: 45-50, 2010
Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information ...
详细信息
Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information should be considered by any organization migrating to cloud, which makes the research on relational database system based on encryption schemes to preserve the integrity and confidentiality of data in cloud be an interesting subject. So far there have been various solutions for realizing SQL queries on encrypted data in cloud without decryption in advance, where generally homomorphic encryption algorithm is applied to support queries with aggregate functions or numerical computation. But the existing homomorphic encryption algorithms cannot encrypt floating-point numbers. So in this paper, we present a mechanism to enable the trusted party to encrypt the floating-points by homomorphic encryption algorithm and partial trusty server to perform summation on their ciphertexts without revealing the data itself. In the first step, we encode floating-point numbers to hide the decimal points and the positive or negative signs. Then, the codes of floating-point numbers are encrypted by homomorphic encryption algorithm and stored as sequences in cloud. Finally, we use the data structure of Double List Tree to implement the aggregate function of SUM and later do some extra processes to accomplish the summation.
It is shown that, in addition to a stable single soliton, a dispersion-managed system can also support a stable symmetric bi-soliton. The system parameters in which the symmetric bisoliton can exist are also studied.
It is shown that, in addition to a stable single soliton, a dispersion-managed system can also support a stable symmetric bi-soliton. The system parameters in which the symmetric bisoliton can exist are also studied.
A complementary approach is presented for obtaining the link adaptation (LA) switching thresholds defining the regions (CIR ranges) where each coding scheme is most suitable. The approach is based on multiple replicat...
详细信息
A complementary approach is presented for obtaining the link adaptation (LA) switching thresholds defining the regions (CIR ranges) where each coding scheme is most suitable. The approach is based on multiple replications providing an indication of the accuracy of the threshold. GPRS and different operating environments are studied.
Recent advances on physical-layer cross-technology communication (PHY-CTC) enable high-throughput direct communication between heterogeneous wireless technologies (e.g., WiFi, ZigBee, and Bluetooth) via signal emulati...
详细信息
Recent advances on physical-layer cross-technology communication (PHY-CTC) enable high-throughput direct communication between heterogeneous wireless technologies (e.g., WiFi, ZigBee, and Bluetooth) via signal emulation. This technique opens a new way for efficient coordination and cooperation among heterogeneous Internet of Things (IoT) devices in the same ISM band. However, the state of the arts in PHY-CTC can hardly ensure data transmission reliability due to emulation errors. To solve this problem, we present (IC)-C-2, a joint coding scheme with intra-packet coding and inter-packet coding for reliable data transmission in PHY-CTC. In our design, the intra-packet coding is adopted to rectify intrinsic errors introduced by PHY-CTC signal emulation, while the inter-packet coding is leveraged to further recover original data despite packet loss, and PHY-CTC feedbacks are employed to ensure data integrity. We implement (IC)-C-2 on USRP N210 with 802.11g PHY as WiFi sender and Tmote Sky as ZigBee receiver. Evaluation results show that (IC)-C-2 achieves 99.7% reliability with higher throughput than other schemes.
The strength of long short-term memory neural networks (LSTMs) that have been applied is more located in handling sequences of variable length than in handling geometric variability of the image patterns. In this pape...
详细信息
The strength of long short-term memory neural networks (LSTMs) that have been applied is more located in handling sequences of variable length than in handling geometric variability of the image patterns. In this paper, an end-to-end convolutional LSTM neural network is used to handle both geometric variation and sequence variability. The best results for LSTMs are often based on large-scale training of an ensemble of network instances. We show that high performances can be reached on a common benchmark set by using proper data augmentation for just five such networks using a proper coding scheme and a proper voting scheme. The networks have similar architectures (convolutional neural network (CNN): five layers, bidirectional LSTM (BiLSTM): three layers followed by a connectionist temporal classification (CTC) processing step). The approach assumes differently scaled input images and different feature map sizes. Three datasets are used: the standard benchmark RIMES dataset (French);a historical handwritten dataset KdK (Dutch);the standard benchmark George Washington (GW) dataset (English). Final performance obtained for the word-recognition test of RIMES was 96.6%, a clear improvement over other state-of-the-art approaches which did not use a pre-trained network. On the KdK and GW datasets, our approach also shows good results. The proposed approach is deployed in the Monk search engine for historical-handwriting collections.
Channel memory and intersymbol interference (ISI) are harmful factors in diffusion-based molecular communication (DBMC) between bionanosensors. To tackle these problems, this article proposes a lightweight ISI-mitigat...
详细信息
Channel memory and intersymbol interference (ISI) are harmful factors in diffusion-based molecular communication (DBMC) between bionanosensors. To tackle these problems, this article proposes a lightweight ISI-mitigating coding scheme to improve the system performance by shaping the signal using a constrained code. To characterize the proposed coding scheme theoretically, we derive analytical expressions for the bit error rate (BER) and the achievable rate based on the central limit theorem. Computer simulations are conducted to verify the accuracy of the theoretical results and demonstrate the superiority of the proposed coding scheme compared with the existing coding schemes.
暂无评论