final round
Recently Published Documents


TOTAL DOCUMENTS

127
(FIVE YEARS 43)

H-INDEX

8
(FIVE YEARS 3)

Nutrients ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 4087
Author(s):  
Yan Yin Phoi ◽  
Maxine P. Bonham ◽  
Michelle Rogers ◽  
Jillian Dorrian ◽  
Alison M. Coates

Unusual meal timing has been associated with a higher prevalence of chronic disease. Those at greater risk include shift workers and evening chronotypes. This study aimed to validate the content of a Chrononutrition Questionnaire for shift and non-shift workers to identify temporal patterns of eating in relation to chronotype. Content validity was determined using a Delphi study of three rounds. Experts rated the relevance of, and provided feedback on, 46 items across seven outcomes: meal regularity, times of first eating occasion, last eating occasion, largest meal, main meals/snacks, wake, and sleep, which were edited in response. Items with greater than 70% consensus of relevance were accepted. Rounds one, two, and three had 28, 26, and 24 experts, respectively. Across three rounds, no outcomes were irrelevant, but seven were merged into three for ease of usage, and two sections were added for experts to rate and comment on. In the final round, all but one of 29 items achieved greater than 70% consensus of relevance with no further changes. The Chrononutrition Questionnaire was deemed relevant to experts in circadian biology and chrononutrition, and could represent a convenient tool to assess temporal patterns of eating in relation to chronotype in future studies.


2021 ◽  
Author(s):  
Dongmei Sun ◽  
Thanh M Nguyen ◽  
Robert J Allaway ◽  
Jelai Wang ◽  
Verena Chung ◽  
...  

To develop machine learning methods to quantify joint damage in patients with rheumatoid arthritis (RA), we developed the RA2 DREAM Challenge, a crowdsourced competition that utilized existing radiographic images and "gold-standard" scores on 674 sets of films from 562 patients. Training and leaderboard sets were provided to participants to develop methods to quantify joint space narrowing and erosions. In the final round, participants submitted containerized codes on a test set; algorithms were evaluated using weighted root mean square error (RMSE). In the leaderboard round, there were 173 submissions from 26 teams in 7 countries. Of the 13 submissions in the final round, four top-performing teams were identified. Robustness of results was assessed using Bayes factor and validated using an independent set of radiographs. The top-performing algorithms, which consisted of different styles of deep learning models, provided accurate and robust quantification of joint damage in RA. Ultimately, these methods lay the groundwork to accelerate research and help clinicians to optimize treatments to minimize joint damage.


2021 ◽  
Vol 4 (2) ◽  
pp. 157-164
Author(s):  
Shally Amna ◽  
Wienda Gusta ◽  
Yeng Primawati

Abstract: Spelling Bee is a word spelling game which assessed the accuracy of words and the pronunciation of the letters in English. MTSN 7 Bungus, Padang was chosen as PKM partners due to the students’ low English language skills and interest. Therefore, through the Spelling Bee competition, the team tried to improve the students’ skills and interest in learning English language, especially their ability to write and spell words correctly. In this competition, there were 280 students previously trained before join the competition. This competition is divided into three rounds, namely the preliminary round, the semi-final round and the final round.  In addition, the English teachers also helped to coordinate the competition. During the activity, students were also given lessons on writing and spelling correctly. As a result, students’ enthusiasm in participating in competition can be one of the factors that triggers the enthusiasm and interests in learning so that they get more satisfying learning outcomes. During the competition, students were guided by the English teachers and given clear instructions. After participating in Spelling Bee competition, the students were not only given rewards but also some improvement in their English writing and spelling skills.Key Words: Spelling Bee, writing, spelling. Abstrak : Spelling Bee merupakan permainan mengeja kata dengan menilai keakuratan kata dan ketepatan pengucapan huruf yang disebutkan dalam Bahasa Inggris. MTSN 7 Bungus, Padang dipilih sebagai mitra PKM karena kemampuan dan minat Bahasa Inggris siswanya yang sangat rendah. Oleh karena itu, lewat kompetisi Spelling Bee, Tim PKM berusaha untuk meningkatkan kemampuan dan minat siswa terhadap Bahasa Inggris terutama pada kemampuan menulis dan mengeja kata. Dalam Kegiatan Spelling Bee ini, sebanyak 280 siswa dilatih sebelum mengikuti kompetisi Spelling Bee yang terbagi atas tiga babak, yaitu preliminary Round, Semi Final Round dan yang terakhir Final round. Selain itu, guru Bahasa Inggris di sekolah tersebut turut membantu demi kelancaran kegiatan kompetisi ini. Siswa diberikan pelajaran tentang menulis dan mengeja bahasa Inggris dengan benar. Antusias siswa dalam mengikuti kompetisi dapat merupakan salah satu faktor yang memicu semangat dan daya tarik siswa dalam belajar sehingga memperoleh hasil belajar yang jauh lebih memuaskan. Selama kompetisi, siswa dipandu oleh guru bahasa Inggrisnya dan diberikan instruksi yang jelas. Setelah mengikuti kompetisi Spelling Bee ini, siswa siswi MTSN 7 Bungus tidak hanya diberikan reward namun juga dapat meningkatkan kemampuan menulis dan mengeja Bahasa Inggrisnya.Kata Kunci: spelling bee; writing; spelling. 


BMJ Open ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. e043800
Author(s):  
Francesco Langella ◽  
Steffan Wittrup McPhee Christensen ◽  
Thorvaldur Skuli Palsson ◽  
Morten Høgh ◽  
Nicolo Gagni ◽  
...  

ObjectiveThis study aims to define appropriate domains and items for the development of a self-administered questionnaire to assess the risk of developing work-related musculoskeletal disorder (WMSD) and the risk of its progression to chronicity.DesignLiterature review and survey study.Setting and participantsA literature review and a two-round interview with 15 experts in musculoskeletal pain were performed to identify the available domains for WMSD assessment.Interventions and outcomeTo ensure quality, only validated questionnaires were included for the Delphi process. A three-round Delphi method, with three round steps, was used to select the most pertinent and relevant domains and items.ResultsNine questionnaires were identified through the expert discussion and literature review, comprising 38 candidate domains and 504 items. In the first round of the Delphi group, 17 domains reached more than 70% agreement and were selected. In the second round, 10 domains were rejected, while 11 were selected to complete the pool of domains. In the third and final round, 89 items belonging to 28 domains were defined as significant to develop a WMSDs risk assessment questionnaire.ConclusionsNo specific risk assessment questionnaires for WMSDs were identified from the literature. WMSD risk of presence and chronicity can be defined by an assessment tool based on the biopsychosocial model and the fear-avoidance components of chronic pain. The present study provides the formulation and operationalisation of the constructs in domains and items needed for developing and validating the questionnaire.


2021 ◽  
Vol VI (I) ◽  
pp. 125-132
Author(s):  
Maria Shiraz ◽  
Mubashar Nadeem ◽  
Shahzada Qaisar

Saphier, Haley-Speca., & Gower (2008) stated that teaching practice is to create a dynamic schoolroom environment that fosters fantastic, powerful communication amongst school students, teachers, parents and other members of the school community. This descriptive research is focused on the significance of teaching practice for the prospective teachers and was conducted by administering a questionnaire having fifteen question items on one hundred B.Ed (Hons) students of a public sector university after their final round of practicum. The results of the study through light on the importance of teaching practice component and its modalities and further reflects that teaching practice is highly significant, fruitful, and a must for any students interested in taking up teaching as a future profession both in teacher education and other programs with the remark that the concerned universities may extend to at least four months instead of restricting it to 12-16 credits or so.


2021 ◽  
Vol 6 (2) ◽  
pp. 86-90
Author(s):  
María del Carmen Meza Téllez ◽  
Ignacio Ortiz Betancourt ◽  
Patricia Margarita Villar Sánchez ◽  
Leidy Margarita López Castro ◽  
Jessica Andrea Muñoz Carrillo

In this research the entrepreneurial actions and intentions that drive university students to create social businesses and participate in an international competition were analyzed. The study was conducted during the training week of a social business competition in September 2019. The methodology was qualitative, with case studies in a group of twelve students whose projects were selected to compete at the semi-final round of an international social business competition. Interviews were applied to competitors which revealed the circumstances that encouraged them to address a social problem and develop a project with a solution which will be presented in an international stage. Simultaneously, an observation guide was applied for the interpretation of the emotional expressions (typical of social entrepreneurship) associated with their responses and finally, an electronic link was shared with participants for them to answer a validated instrument that measured the university entrepreneurial potential. Main findings indicate that entrepreneurial actions of the students to create a social business and present it in a competition in the form of a social business project rest on motives that vary from a personal origin to the collective, revealed from moments of inspiration and personal commitment to address a social problem and seeking a sustainable solution, designed from resources and personal skills in a very particular emotional atmosphere. Finally, a sum up from all inputs (surveys and direct observation) revealed that social entrepreneurial intentions lie on a positive attitude, strong enterprise convictions and high desirability for becoming an entrepreneur and contribute to solve social problems.


Author(s):  
Alejandro Sánchez-Pay ◽  
David Sanz-Rivas

The aim of this study was to analyse and compare the activity pattern and technical-tactical parameters of men’s wheelchair tennis matches from the Paralympic Games (PG) in Athens 2004 (A), Beijing 2008 (B), London 2012 (L) and Rio 2016 (R). A total of 5702 shots from twelve final round matches were analysed. Activity patterns (e.g., rally duration, shots per rally…) and technical effectivity (e.g., errors, winners…) were recorded. An ANOVA test with post hoc pairwise comparisons was conducted to compare the mean differences among matches of different PG. Game duration, points and shots per game differed according to the PG (R and L > B and A). Rally duration (p < 0.001) and shots per rally (p < 0.001) were longer at R and L than B and A. The effectivity of the last shots was different, the errors have been increasing and the winners have been decreasing. The main finding indicates that activity patterns and technical parameters have evolved mainly between A and B to L and R. This study gives an overview of the development of the sport over time, and coaches can use this information to adapt their training sessions to the current needs of the competition.


2021 ◽  
Vol 12 ◽  
Author(s):  
Santiago Veiga ◽  
Jesús Santos del Cerro ◽  
Luis Rodriguez ◽  
Alfonso Trinidad ◽  
José María González-Ravé

The primary goal of the present research was to determine the order of swimmers on a mixed relay team that would ensure the best performance in the Fédération Internationale de Natation (FINA) World Championships held in Kazan (Russia, 2015), Budapest (Hungary, 2017), and Gwangju (South Korea, 2019). The data were obtained from database websites for the 4 × 100 m freestyle and 4 × 100 m medley official results,1 including 660 records from 188 entries of finals and 472 preliminary events. The results showed that the fastest swimmers (according to their best season times) were located primarily in the first or second positions of the freestyle relay. The most successful gender strategy for the 4 × 100 m freestyle (57 out of 82 observations) and for the 4 × 100 m medley (29 out of 83) relays was the order male-male-female-female, although no statistical differences were found (p = 0.79) for the medley relays. In the 4 × 100 m freestyle, the second (p = 0.002; β = 1.62) and third (p =0.003; β = 1.41) relay legs had a statistical effect on the total relay time, whereas in the 4 × 100 m medley, all four relay legs had a statistical effect (p &lt; 0.001) on the final performance, the weight of the four strokes being different in heats with respect to the final round. Also, a later position of the first female swimmer or the consecutive position of two female swimmers in the team order significantly affected the relay performance in specific events. Mixed relay events appeared to present specific strategies in comparison to traditional male- or female-only relay lineups.


Author(s):  
Peter Pessl ◽  
Lukas Prokop

NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process and enable appropriately secure wider deployment after standardization. However, lattice-based key-encapsulation mechanisms (KEMs), which are prominently represented among the finalists, have thus far received little attention when it comes to fault attacks.Interestingly, many of these KEMs exhibit structural similarities. They can be seen as variants of the encryption scheme of Lyubashevsky, Peikert, and Rosen, and employ the Fujisaki-Okamoto transform (FO) to achieve CCA2 security. The latter involves re-encrypting a decrypted plaintext and testing the ciphertexts for equivalence. This corresponds to the classic countermeasure of computing the inverse operation and hence prevents many fault attacks.In this work, we show that despite this inherent protection, practical fault attacks are still possible. We present an attack that requires a single instruction-skipping fault in the decoding process, which is run as part of the decapsulation. After observing if this fault actually changed the outcome (effective fault) or if the correct result is still returned (ineffective fault), we can set up a linear inequality involving the key coefficients. After gathering enough of these inequalities by faulting many decapsulations, we can solve for the key using a bespoke statistical solving approach. As our attack only requires distinguishing effective from ineffective faults, various detection-based countermeasures, including many forms of double execution, can be bypassed.We apply this attack to Kyber and NewHope, both of which belong to the aforementioned class of schemes. Using fault simulations, we show that, e.g., 6,500 faulty decapsulations are required for full key recovery on Kyber512. To demonstrate practicality, we use clock glitches to attack Kyber running on a Cortex M4. As we argue that other schemes of this class, such as Saber, might also be susceptible, the presented attack clearly shows that one cannot rely on the FO transform’s fault deterrence and that proper countermeasures are still needed.


Sign in / Sign up

Export Citation Format

Share Document