...Computer Game Addiction - Symptoms, Treatment, & FAQs By Dr. Brent Conrad Clinical Psychologist for TechAddiction What is computer game addiction? Computer game addiction generally refers to an excessive, unhealthy amount of playing computer games. Rather than engaging in the real world, an addicted user devotes the majority of his or her time to gaming. The addicted gamer often isolates him/herself from others, ignores more important responsibilities, and is often obsessed with obtaining higher status / rankings / achievements in his/her favorite computer game. Is computer game addiction a diagnosable disorder? According to the DSM-IV (the current manual for classifying emotional, psychological, and mental disorders), no. Although there have been calls from some mental health professionals (and parents) to recognize computer game addiction as a "real" disorder, it has not been granted official diagnostic status. As more research on the effects of excessive gaming is conducted, many believe that it is only a matter of time before computer game addiction is classified as a compulsive behavior similar to gambling addiction. What are the symptoms of computer game addiction? Because there is no official diagnosis of computer game addiction, there is obviously no universally agreed upon list of symptoms. Psychologists and other mental health professionals initially adapted the diagnostic criteria for gambling addiction and used this as a rough assessment tool...
Words: 1815 - Pages: 8
...Becker, J. (2001) School investments in instructional technology. Teaching, learning, and computing report, report 8. Retrieved February 25, 2008, from http://www.crito.uci.edu/tlc/findings/report_8/startpage.htm Apple Classrooms of Tomorrow (ACOT). (2000) Influences and barriers to the adoption of instructional technology. In Proceedings of the mid-south instructional technology conference. Retrieved April, 20, 2008, from http://www.mtsu.edu/%7Eitconf/proceed00.htm Van Dusen, J. (2000) Integrating technology into the classroom: eight keys to success. J Technol Teach Educ 10(1):95–100 Perkins, L. (2001) Putting the pieces together. Paper presented at the international conference on learning with technology, does technology make a difference? Temple University, Philadelphia, March 2000 Erickson, N. (2002) Combining universal access with faculty development and academic facilities. Commun ACM 41(1):36–41. doi:10.1145/268092.268106 CrossRef Roblyer, L. (2007) Oversold and underused: computers in the classroom. Harvard University Press, Cambridge, MA 1. Glyn, P. (Winter 2005) High access and low use of technologies in high school classrooms: explaining an apparent paradox. Am Educ Res J 2. Debard R, Guidera S (2000) Adapting asynchronous communication to meet the seven principles of effective teaching. J Educ Technol Syst 28(3):219–230. doi:10.2190/W1U9-CB67-59W0-74LH CrossRef 3. Dede C (2000) Rethinking how to invest in technology...
Words: 1283 - Pages: 6
...Technovation 34 (2014) 339–341 Contents lists available at ScienceDirect Technovation journal homepage: www.elsevier.com/locate/technovation Editorial The challenge of cyber supply chain security to research and practice – An introduction a b s t r a c t The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as quickly and firmly as possible through government policy initiatives, public/private partnerships, and legal/insurance penalty and incentive regimes. However when we examine the academic literature, the research and publications in this area are rather sparse. Consequently, this special issue on Security in the Cyber Supply Chain is intended to act as a resource to practitioners and as a call to research. & 2014 Published by Elsevier Ltd. Introduction In general, the cyber supply chain provides tremendous advances in efficiency and effectiveness. The economy gains through transactions being more efficient through the low cost rapid transmission of information related to supply chain management. Not only does this rapid transmission reduce cost, but it also provides value through increased effectiveness allowing for services and decisions that were not possible...
Words: 2975 - Pages: 12
...Univ Access Inf Soc (2015) 14:81–95 DOI 10.1007/s10209-014-0348-1 LONG PAPER Technology acceptance model: a literature review from 1986 to 2013 ´ ´ Nikola Marangunic • Andrina Granic Published online: 16 February 2014 Ó Springer-Verlag Berlin Heidelberg 2014 Abstract With the ever-increasing development of technology and its integration into users’ private and professional life, a decision regarding its acceptance or rejection still remains an open question. A respectable amount of work dealing with the technology acceptance model (TAM), from its first appearance more than a quarter of a century ago, clearly indicates a popularity of the model in the field of technology acceptance. Originated in the psychological theory of reasoned action and theory of planned behavior, TAM has evolved to become a key model in understanding predictors of human behavior toward potential acceptance or rejection of the technology. The main aim of the paper is to provide an up-to-date, wellresearched resource of past and current references to TAMrelated literature and to identify possible directions for future TAM research. The paper presents a comprehensive concept-centric literature review of the TAM, from 1986 onwards. According to a designed methodology, 85 scientific publications have been selected and classified according to their aim and content into three categories such as (i) TAM literature reviews, (ii) development and extension of TAM, and (iii) modification...
Words: 9674 - Pages: 39
...482 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 42, NO. 2, APRIL 2012 An Adaptive Differential Evolution Algorithm With Novel Mutation and Crossover Strategies for Global Numerical Optimization Sk. Minhazul Islam, Swagatam Das, Member, IEEE, Saurav Ghosh, Subhrajit Roy, and Ponnuthurai Nagaratnam Suganthan, Senior Member, IEEE Abstract—Differential evolution (DE) is one of the most powerful stochastic real parameter optimizers of current interest. In this paper, we propose a new mutation strategy, a fitnessinduced parent selection scheme for the binomial crossover of DE, and a simple but effective scheme of adapting two of its most important control parameters with an objective of achieving improved performance. The new mutation operator, which we call DE/current-to-gr_best/1, is a variant of the classical DE/current-to-best/1 scheme. It uses the best of a group (whose size is q% of the population size) of randomly selected solutions from current generation to perturb the parent (target) vector, unlike DE/current-to-best/1 that always picks the best vector of the entire population to perturb the target vector. In our modified framework of recombination, a biased parent selection scheme has been incorporated by letting each mutant undergo the usual binomial crossover with one of the p top-ranked individuals from the current population and not with the target vector with the same index as used in all variants of DE. A DE variant obtained...
Words: 11062 - Pages: 45
...Ind. Eng. Chem. Res. 2010, 49, 8657–8669 8657 Single-Stage Scheduling of Multiproduct Batch Plants: An Edible-Oil Deodorizer Case Study Songsong Liu,† Jose M. Pinto,‡ and Lazaros G. Papageorgiou*,† Centre for Process Systems Engineering, Department of Chemical Engineering, UniVersity College London, Torrington Place, London WC1E 7JE, U.K., and Process Systems R&D, Praxair Inc., 39 Old Ridgebury Rad, Danbury, Connecticut 06810 This article considers the short-term scheduling of a single-stage batch edible-oil deodorizer that can process multiple products in several product groups. Sequence-dependent changeovers occur when switching from one product group to another. Based on the incorporation of products into product groups, mixed integer linear programming (MILP) models are proposed for two scenarios, with and without backlogs. Then, the models are successfully applied to a real-world case with 70 product orders over a 128-h planning horizon. Compared with a literature model developed for a similar problem, the proposed models exhibit significantly better performance. 1. Introduction In the past decade, a large number of optimization models and approaches have been proposed for batch scheduling and planning. A number of reviews on the planning and scheduling of batch processes have been presented in the literature.1-6 Initially, discrete-time formulation models using the state-task network7 (STN) or resource-task network8 (RTN) were used for batch scheduling problems...
Words: 7686 - Pages: 31
...IDPE 2015 Esquema Tema 1 Marc-R. Lloveras Tema 1. Ordenament jurídic privat. Aplicació i eficàcia de les normes jurídiques 1.1. Concepte de dret privat. 1.2. Dret civil, dret mercantil i dret laboral. 1.3. El dret civil com a dret privat general. 1.4. Els drets civils territorials. El dret civil català. 1.5. Aplicació i eficàcia de les normes jurídiques. Conceptes bàsics: frau de llei, abús de dret i prescripció. Concepte de dret privat L’ordenament jurídic com a conjunt de totes les normes jurídiques existents en una determinada unitat política i la seva divisió en branques que s’organitzen per raó de la matèria. La distinció històrica la trobem entre dret públic i dret privat, però el dret s’organitza amb major detall tot seleccionant parts de la realitat personal, social o econòmica present en les relacions entre persones i les regula com a bloc (civil, mercantil, penal, administratiu, social, internacional, constitucional...) que van evolucionant i generant noves sub-branques (dret del consum, dret de les telecomunicacions, dret d’internet...) tal com van sorgint noves realitats necessitades de regulació jurídica. La definició del dret privat com a conjunt de normes que regulen les relacions entre particulars, entre persones, sense la presència d’elements públics. El dret privat (relacions jurídiques entre particulars) parteix de la igualtat jurídica entre les persones i del reconeixement de la seva llibertat (llibertat civil o autonomia...
Words: 6856 - Pages: 28
...| САНХҮҮ ЭДИЙН ЗАСГИЙН ДЭЭД СУРГУУЛЬ МВА ХӨТӨЛБӨР БИЗНЕСИЙН УДИРДЛАГЫН ТЭНХИМ | | Сэдэв: Junk Food Addiction & Obesity Хичээлийн нэр: Стратегийн маркетингийн менежмент Хичээлийн код | MKT731 | Анги, групп | W1462 | Гүйцэтгэсэн: | Г.Номин | MS14M018 | Шалгасан: | Э.Нандин-Эрдэнэ | МВА | Улаанбаатар хот 2015 оны 05 дугаар сар 23 Агуулга I. Оршил 1 II. Онолын хэсэг 2 III. Судалгааны хэсэг 2 IV. Дүгнэлт 3 V. Номзүй 4 Оршил Одоогоос хорь хүрэхгүй жилийн өмнөх бидний бага насыг эргэн дурсахад үеийн найз нөхөдтэйгээ өдөржингөө гадаа тоглож, хорвоо дэлхийн талаар хоорондоо хэлэлцэн таамаглацгаадаг үе байлаа. Харин өдгөө дэлхий ертөнц даяарчлагдахын хэрээр бидний таамаглалд ч байгаагүй хол газрын улс орнуудтай хажууд юм шиг харилцаж найз нөхөд болцгоож мэдээлэл солилцдог болсон байна. Энэ бол яахын аргагүй техник технологи, хүний нийгмийн хөгжил хурдацтай явагдсаны нэгэн илрэл билээ. Төрөх гээд төрөхийн орон дээр байгаа ээж хүртэл өвдөлтөө үл хайхран байж статусаа солих гээд эмчээс яаран хүү юу охин уу? Гэж асууж байгаа нь энгийн зүйл биш болжээ. Төрөөд удаагүй байгаа нярай хүүхдүүд нь хүртэл зурагт үзэж, гар утас, I-pad хэрэглэдэг болсон байна. Нөгөө талаас бид үр хүүхэддээ цаг зав бага гаргадаг болжээ. Энэ нь хүүхдүүд маань компьютер тоглож, олон нийтийн сүлжээ, зурагт их үзэж сэтгэлзүйн хувьд ганцаардлаа нөхөн арга хэрэглүүр болгосоор байгаа явдал юм. Ингэж нэг төрлийн хамгаалах арга хэрэгслийг удаан, байнга хэрэглэх нь яваандаа...
Words: 2033 - Pages: 9
...WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2004; 4:247–249 (DOI: 10.1002/wcm.220) Guest Editorial Special Issue: Scalability Issues in Wireless Networks— Architectures, Protocols and Services By Amitabh Mishra, Guest Editor Scalability of computer-communication networks has been an important topic for quite some time. Internet community examined the services and protocols for scalability, and switching and routing researchers looked at the scalability of the switches and routers. Service providers studied the application architectures of the services for the scalable performance that they need to provide to subscribers and, the maintenance folks paid attention to scalability of service provisioning algorithms, protocols and software. Similarly, the wireless networking community has also started to look at the scalability issues that are relevant to wireless cellular, wireless local, as well as wireless personal area networks besides the emerging area of infrastructure-less networks such as ad-hoc and sensor networks. Surprisingly there is significant scope for research in the wireless scalability area as it relates to the ad hoc and sensor networks and this is one of the reasons why this topic was chosen for a special issue. A wireless sensor network is likely to have a large number of nodes perhaps in thousands to millions and that may create, potentially, numerous scaling problems in the networking protocols, addressing schemes, hardware architectures...
Words: 2043 - Pages: 9
...The Role of Software Testing in the Development of Quality Software MehwishZulfiqar 13414, MS (CS) Iqra University, Islamabad. Abstract: In software testing organizations, effective knowledge management of the testing process is the key to improve the quality of software testing. Quality must be built into our products and it can never be tested in after the fact. Although QA has an important role in assuring the quality of our products, their work is entirely indirect. Their role is to influence others in the organization. Testing programs are conducted to ensure that the software application meets the specifications and service level expectations of their product. Testing improves product quality. However, there is rarely enough quality control time built into development projects, and there is an endless possibility of testing that could be executed. In this article major issues are discuss that improve the quality of software and also discuss the role of software testing in the delivery of quality software product.Simply we say that process of testing is basic, but knowing what to test for is challenging for a developer. Software testing requires well-analyzed test cases and proper execution in order to find issues in the software. It also requires efficient management of the procedures. 1. Introduction: Software systems are an increasing part of life, from business applications to consumer products. Most people have had an experience with software that did not...
Words: 2071 - Pages: 9
...network users [2]. Because of this issue, various government agencies created methods of dealing with cybersecurity but they all lack for a unified strategic approach. Additionally, the US lacks explicit doctrine that addresses how the US should structure itself to handle national cyberspace defense. This review will clarify what constitutes as a cyber attack and define cyberwarfare, establish the credibility of cyber threats, and examine the current US cyberspace defense policy. [1] R. J. Harknett, J. P. Callaghan and R. Kauffman, "Leaving Deterrence Behind: War-Fighting and National Cybersecurity," J. Homel. Secur. Emerg. Manag., vol. 7, pp. 22, 2010. [2] E. E. Schultz, "The US Government - bigger and better information security?" Comput. Secur., vol. 21, pp. 578-580,...
Words: 252 - Pages: 2
...138 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 1, FEBRUARY 2012 A Fusion Approach for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colors across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin detection approach that combines a smoothed 2-D histogram and Gaussian model, for automatic human skin detection in color image(s). In our approach, an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required, and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach. Index Terms—Color space, dynamic threshold, fusion strategy, skin detection. ...
Words: 5432 - Pages: 22
...away because of something she did , she doesn’t even realize it. Dishonesty in a woman is a thing you never blame deeply – I was casually sorry, and then I forgot. - dishonesty Myrtle I told him im going to meet my sister but hes clueless, Daisy promised to wait for Gatsby but she married tom instead- dishonesty Social patrichy she challenges her mans role because she wants to be rescues by her a man She accepts affair Ideology was you don’t need your husband and you put up with the abuse Accepts but challenges role, because her affair with Gatsby, and the consequence her lover gets killed and she has to now be with tom. A women’s status is dependent on marriage Devoid of perpose they have a vacous life style , they don’t comput in anyway they just play pole together. Daisy like tom is one dimensional there is a lack of depth Women are represented as being more superficial more vacuous then the men, The colour white is ironic because they are not pure they don’t have a puridy of heart, Purpose to do something; The idea of planning is so foreign to someone like Daisy because she has never had to plan something because it has always been given to her. “what do people plan” Fitzgerald is cosutine against Being a divorced women then , no body wanted to be around you . Birth, In our society in north American society for the...
Words: 515 - Pages: 3
...Article pubs.acs.org/jcim Carboxyl−Peptide Plane Stacking Is Important for Stabilization of Buried E305 of Trichoderma reesei Cel5A Chunyan He, Jingfei Chen, Liaoyuan An, Yefei Wang, Zhiyu Shu, and Lishan Yao* Laboratory of Biofuels, Qingdao Institute of Bioenergy and Bioprocess Technology, Chinese Academy of Sciences, Qingdao 266061, China S * Supporting Information ABSTRACT: Hydrogen bonds or salt bridges are usually formed to stabilize the buried ionizable residues. However, such interactions do not exist for two buried residues D271 and E305 of Trichoderma reesei Cel5A, an endoglucanase. Mutating D271 to alanine or leucine improves the enzyme thermostability quantified by the temperature T50 due to the elimination of the desolvation penalty of the aspartic acid. However, the same mutations for E305 decrease the enzyme thermostability. Free energy calculations based on the molecular dynamics simulation predict the thermostability of D271A, D271L, and E305A (compared to WT) in line with the experimental observation but overestimate the thermostability of E305L. Quantum mechanical calculations suggest that the carboxyl−peptide plane stacking interactions occurring to E305 but not D271 are important for the carboxyl group stabilization. For the protonated carboxyl group, the interaction energy can be as much as about −4 kcal/mol for parallel stacking and about −7 kcal/mol for T-shaped stacking. For the deprotonated carboxyl group, the largest interaction energies for parallel...
Words: 8791 - Pages: 36
...Journal of Electronic Imaging 13(1), 146 – 165 (January 2004). Survey over image thresholding techniques and quantitative performance evaluation Mehmet Sezgin ¨ ˙ Tubıtak Marmara Research Center Information Technologies Research Institute Gebze, Kocaeli Turkey E-mail: sezgin@btae.mam.gov.tr ¨ Bulent Sankur ˇ ¸ Bogazici University Electric-Electronic Engineering Department Bebek, ˙stanbul I Turkey Abstract. We conduct an exhaustive survey of image thresholding methods, categorize them, express their formulas under a uniform notation, and finally carry their performance comparison. The thresholding methods are categorized according to the information they are exploiting, such as histogram shape, measurement space clustering, entropy, object attributes, spatial correlation, and local gray-level surface. 40 selected thresholding methods from various categories are compared in the context of nondestructive testing applications as well as for document images. The comparison is based on the combined performance measures. We identify the thresholding algorithms that perform uniformly better over nondestructive testing and document image applications. © 2004 SPIE and IS&T. [DOI: 10.1117/1.1631316] 1 Introduction In many applications of image processing, the gray levels of pixels belonging to the object are substantially different from the gray levels of the pixels belonging to the background. Thresholding then becomes a simple but effective tool to separate objects from the background...
Words: 16889 - Pages: 68