specific scheme
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 24)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Vol 64 (11) ◽  
pp. 844-850
Author(s):  
Angela Yun Kim ◽  
Gi-Hwan Ryu ◽  
Hyunseok Choi ◽  
June Choi ◽  
Gi Jung Im ◽  
...  

Cognitive behavioral therapy, first introduced by Beck in the 1950s to treat depression by integrating cognitive and behavioral therapies, is now an established psychotherapy technique used to treat insomnia, chronic pain, and anxiety. Currently, cognitive behavioral therapy is widely used to treat tinnitus in European countries, and the efficacy and safety of the treatment have been proven through randomized clinical trials and meta-analyses. Although interest in cognitive behavioral therapy for tinnitus is increasing in Korea, there are limited reports. Because many studies so far have targeted patients in Western countries, it is difficult to apply the same to domestic patients due to cultural and linguistic differences, the absence of standardized guidelines, and limitations in clinic hours. We experienced various cases in which tinnitus was effectively treated simultaneously with pharmacotherapy and cognitive behavioral therapy, so here we report an introduction to the program along with a literature review. Cognitive behavioral therapy was performed as a 4-week program in our hospital, and progress was evaluated through Visual Analogue Scales (VAS) and tinnitus handicap inventory (THI). After each weekly 20-minute individual counseling session, a take-home writing task was given to the patient. The main goal was to guide the patient to discover and correct automatic thoughts related to their tinnitus symptoms. This paper aimed to introduce a specific scheme on how to perform cognitive behavioral therapy for domestic tinnitus patients.


Author(s):  
Sergey Fedorchenko

The aim of the article is to reconceptualize the political science heritage of V.L. Tsymbursky in the context of digitalization of legitimation, international relations and geopolitics. At the same time, political science reconceptualization was originally understood as a refinement, adjustment of the previous political science conceptual schemes in the changed conditions. The principles of discourse analysis of three analyzed arrays of specialized literature (works of the Tsymbursky himself, studies of other authors on the works of Tsymbursky, works in the field of legitimation and digitalization) and Case Study of modern facts of legitimation of political regimes in the context of digitalization of international relations were used as a basic methodological toolkit for reconceptualization. The analysis made it possible to conditionally divide the geopolitical schemes of a political scientist into «island» and «cyclical» schemes, as well as highlight a specific scheme of «fact-recognition». Reconceptualization of the «Island of Russia» and «Great Limitroph» schemes is determined by the possibility of adapting to the analysis of the phenomenon of digital sovereignty associated with the consolidation of «island» features of regimes in the information space and the conditions of information wars of regimes in limitrophic countries. It has been determined that the schemes «Abduction of Europe» and «Extra-long military cycles» can be useful in identifying the correlations of crises of legitimizing formulas with constitutional cycles and cycles of foreign policy activity of the regimes. In parallel, it was found that the most important, umbrella, interdisciplinary nature is precisely the «fact-recognition» scheme. It allows you to link the analysis of digitalization of international relations, sovereignty with the theory of legitimation. As conclusions, it is indicated that the digitalization of international relations has led to an exaggerated role of external legitimation of the regime, «sovereignty of recognition» by other regimes, weakening the meaning of «sovereignty of fact» and reducing the monopoly of internal legitimation. The digitalization of international relations was also found to have shaken the former monopoly of top-down political legitimation. The factors of information, fake wars, challenges of digital diplomacy forced the elites to look for ways to establish an upward legitimation of their regimes, allowing elements of an empowerment strategy. The theoretical significance of the carried out political science reconceptualization is seen in the serious prospects for adapting Tsymbursky's geopolitical schemes to the actual analysis of modern digitalization of various forms of political legitimation and international relations.


2021 ◽  
Vol 69 (2) ◽  
pp. 274-293
Author(s):  
Marta Harasimowicz

Abstract The article deals with internet memes related to the person of the socialist leader of Yugoslavia, Josip Broz Tito. For purposes of our research, we define internet meme as conventionalized text-iconic composition, built on a basis of a specific scheme. In intentions of contemporary narratology we also consider it as a text of its kind and its creating, reproduction, transformation and reading process – as a special discursive activity. Based on analysing the primary material occurring and spreading on internet, we provide a typology of the representations of Tito from a narratological and semiotic point of view, and regarding its function in current discourse on socialist Yugoslavia. We focus mainly on cultural meanings generated by this meme culture, its relation to the narratives formed in the context of official and unofficial representations of the leader during the socialist era and to a wider context of contemporary popular culture. Pursuant to the analysis, we try to follow the features of postmodern cultural images of the socialist Yugoslavia and its leader, and relation of these narratives to nostalgic and social-critical attitudes in the contemporary world.


2021 ◽  
Author(s):  
Marco Seeber ◽  
Jef Vlegels ◽  
Elwin Reimink ◽  
Ana Marušić ◽  
David G Pina

Abstract We have limited understanding of why reviewers tend to strongly disagree when scoring the same research proposal. Thus far, research that explored disagreement has focused on the characteristics of the proposal or the applicants, while ignoring the characteristics of the reviewers themselves. This article aims to address this gap by exploring which reviewer characteristics most affect disagreement among reviewers. We present hypotheses regarding the effect of a reviewer’s level of experience in evaluating research proposals for a specific granting scheme, that is, scheme reviewing experience. We test our hypotheses by studying two of the most important research funding programmes in the European Union from 2014 to 2018, namely, 52,488 proposals evaluated under three funding schemes of the Horizon 2020 Marie Sklodowska-Curie Actions (MSCA), and 1,939 proposals evaluated under the European Cooperation in Science and Technology Actions. We find that reviewing experience on previous calls of a specific scheme significantly reduces disagreement, while experience of evaluating proposals in other schemes—namely, general reviewing experience, does not have any effect. Moreover, in MSCA—Individual Fellowships, we observe an inverted U relationship between the number of proposals a reviewer evaluates in a given call and disagreement, with a remarkable decrease in disagreement above 13 evaluated proposals. Our results indicate that reviewing experience in a specific scheme improves reliability, curbing unwarranted disagreement by fine-tuning reviewers’ evaluation.


2021 ◽  
pp. 1063293X2110085
Author(s):  
A Siva Kumar ◽  
S Godfrey Winster ◽  
R Ramesh

Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.


2021 ◽  
pp. 003072702110028
Author(s):  
Filiberto Altobelli ◽  
Anna Dalla Marta ◽  
Marius Heinen ◽  
Claire Jacobs ◽  
Elisa Giampietri ◽  
...  

Irrigation Advisory Services (IAS) are powerful management instruments aiming to achieve the best efficiency in irrigation water use. So far the literature on farmers’ preferences for a specific scheme design of IAS’ characteristics and the related willingness to pay (WTP) is scant. This study provides evidence on farmers’ preference towards six attributes related to the IAS configuration by using a hypothetical choice experiment. Data were collected from an original survey among 108 farmers from Spain, The Netherlands, Italy, Poland and South Africa. Moreover, we investigated the interplay between these preferences and the individual risk attitude (elicited through a lottery task) as a novel contribution. On average, the results suggest a clear farmers’ preference, especially for receiving weather forecasts from the service and for the feature related to water data recording; as the opposite, on average, crop water requirement seems irrelevant. Finally, we found that farmers’ WTP for the different IAS services varies across countries and, in some cases, also according to the individual risk attitude.


Dementia ◽  
2021 ◽  
pp. 147130122110020
Author(s):  
Yan Zhang

Dementia, which used to be a private issue due to the stigma and cultural expectations of family-based support in China, has been transformed into a social concern due to its increasing number in recent years. As a response, advocates have introduced the dementia-friendly initiative to deal with related challenges. Yet, as a project mainly proposed by developed countries, we know little about its localisation in developing countries. Based on 20-month ethnographic research in Shanghai, this article explores the localisation process of this global project. While many stakeholders who advocate on behalf of people with dementia and their family caregivers have made remarkable progress in terms of embracing the global concepts and practices, one project – community-based dementia care units – generates a lot of resistance from nearby residents due to the feng shui damage, a specific scheme in traditional Chinese culture. These findings reveal an important source of obstacle – the cultural context that shapes the public understanding of dementia and the ways of arranging dementia care – that may prevent the dementia-friendly initiative from further localisation in China. Through this ethnographic analysis, I call attention to the significance of cultural contexts in the design and implementation of dementia-friendly projects globally.


2021 ◽  
pp. 1-13
Author(s):  
Wu Jing

In year 2020, a large-scale outbreak of pneumonia caused by new coronavirus has affected the development of many industries and enterprises in China. Under the strong leadership of the Chinese government, the development of the epidemic situation in China has been well controlled. The development of various industries also began to show a good situation, many large-scale sports competitions also need to be restored. In order to ensure the normal development of large-scale sports events, we need to consider the development of epidemic situation to determine the time of sports events. Based on the study of FPGA theory, this paper designs a specific scheme of programming and system debugging, which includes a variety of program operations. In order to better predict the situation of the epidemic situation, this paper also uses the basic knowledge of machine learning to establish a relevant model to evaluate the situation of large-scale sports events under the development of the epidemic situation, and provide feasible suggestions for the recovery of large-scale sports events under the epidemic situation.


Author(s):  
Rainer Krug ◽  
Owen Petchey

1. Metadata plays an essential role in the long term preservation, reuse, and interoperability of data. Nevertheless, creating useful metadata can be sufficiently difficult and weakly-enough incentivised that many datasets may be accompanied by little or no metadata. One key challenge is, therefore, how to make metadata creation easier and more valuable. We present a solution that involves creating domain specific metadata schemes that are as complex as necessary and as simple as possible. These goals are achieved by co-development between a metadata expert and the researchers (i.e. the data creators). The final product is a bespoke metadata scheme into which researchers can enter information (and validate it) via the simplest of interfaces: a web browser application and a spreadsheet. 2.We provide the R package [‘dmdScheme‘](https://CRAN.R-project.org/package=dmdScheme) [@Krug2019] for creating a template domain specific scheme. We describe how to create a domain specific scheme from this template, including the iterative co-development process, and the simple methods for using the scheme, and simple methods for quality assessment, improvement, and validation. 3.The process of developing a metadata scheme following the outlined approach was successful, resulting in a metadata scheme which is used for the data generated in our research group. The validation quickly identifies forgotten metadata, as well as inconsistent metadata, therefore improving the quality of the metadata. Multiple output formats are available, including XML. 4. Making the provision of metadata easier while also ensuring high quality must be a priority for data curation initiatives. We show how both objectives are achieved by very close collaboration between metadata experts and researchers to create domain specific schemes. A near-future priority is to provide methods to interface domain specific schemes with general metadata schemes, such as the Ecological Metadata Language, to increase interoperability.


Sign in / Sign up

Export Citation Format

Share Document