Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 931 - 960 of 13646

Full-Text Articles in Physical Sciences and Mathematics

An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang Dec 2018

An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang

Research Collection School Of Computing and Information Systems

It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer marketplace model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awareness. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its strategic …


A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim Dec 2018

A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

Demand forecasting has been a challenging problem especially for products with short life cycles such as electronic goods and fashion items. Additionally, in the presence of limited past or historical data as well as the need for fast turnaround for forecast, producing timely and accurate demand forecast can be extremely challenging. In this study, we describe a cloud-based data gathering and processing system for intelligent demand forecasting.


Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim Dec 2018

Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In this research, we focus on the social phenomenon of suicide. Specifically, we perform social sensing on digital traces obtained from Reddit. We analyze the posts and comments in that are related to depression and suicide. We perform natural language processing to better understand different aspects of human life that relate to suicide.


Sybmatch: Sybil Detection For Privacy-Preserving Task Matching In Crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng Dec 2018

Sybmatch: Sybil Detection For Privacy-Preserving Task Matching In Crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng

Research Collection School Of Computing and Information Systems

The past decade has witnessed the rise of crowdsourcing, and privacy in crowdsourcing has also gained rising concern in the meantime. In this paper, we focus on the privacy leaks and sybil attacks during the task matching, and propose a privacy-preserving task matching scheme, called SybMatch. The SybMatch scheme can simultaneously protect the privacy of publishers and subscribers against semi-honest crowdsourcing service provider, and meanwhile support the sybil detection against greedy subscribers and efficient user revocation. Detailed security analysis and thorough performance evaluation show that the SybMatch scheme is secure and efficient.


Making A Good Thing Better: Enhancing Password/Pin-Based User Authentication With Smartwatch, Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, Robert H. Deng Dec 2018

Making A Good Thing Better: Enhancing Password/Pin-Based User Authentication With Smartwatch, Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed. This idea is motivated by our observation that a sensor-rich smartwatch is capable of tracking the wrist motions of its bearer typing a password or PIN, which can be used as an authentication factor. The major challenge in this research is that a sophisticated attacker may imitate a user’s typing behavior as shown in previous research on keystroke dynamics based user authentication. We address this …


Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou Dec 2018

Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou

Research Collection School Of Computing and Information Systems

Uncertainty identification is an important semantic processing task, which is crucial to the quality of information in terms of factuality in many techniques, e.g. topic detection, question answering. Especially in social media, the texts are written informally which are widely used in many applications, so the factuality has become a premier concern. However, existing approaches that still rely on lexical cues suffer greatly from the casual or word-of-mouth peculiarity of social media, in which the cue phrases are often expressed in sub-standard form or even omitted from sentences. To tackle these problems, this paper proposes the attention-based LSTM-CNNs for the …


Preprocess-Then-Ntt Technique And Its Applications To Kyber And Newhope, Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He Dec 2018

Preprocess-Then-Ntt Technique And Its Applications To Kyber And Newhope, Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He

Research Collection School Of Computing and Information Systems

The Number Theoretic Transform (NTT) provides efficient algorithm for multiplying large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With Errors problem (RLWE), which is a popular basis for post-quantum key exchange, encryption and digital signature.To apply NTT, modulus q should satisfy that , RLWE-based schemes have to choose an oversized modulus, which leads to excessive bandwidth. In this work, we present “Preprocess-then-NTT (PtNTT)” technique which weakens the limitation of modulus q, i.e., we only require or . Based on this technique, we provide new parameter settings for KYBER …


Three-Dimensional Bedrock Channel Evolution With Smoothed Particle Hydrodynamics, Nick Richmond Dec 2018

Three-Dimensional Bedrock Channel Evolution With Smoothed Particle Hydrodynamics, Nick Richmond

Electronic Theses and Dissertations

Bedrock channels are responsible for balancing and communicating tectonic and climatic signals across landscapes, but it is difficult and dangerous to observe and measure the flows responsible for removing weakly-attached blocks of bedrock from the channel boundary. Consequently, quantitative descriptions of the dynamics of bedrock removal are scarce. Detailed numerical simulation of violent flows in three dimensions has been historically challenging due to technological limitations, but advances in computational fluid dynamics aided by high-performance computing have made it practical to generate approximate solutions to the governing equations of fluid dynamics. From these numerical solutions we gain detailed knowledge of the …


Co-Location Resistant Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta Dec 2018

Co-Location Resistant Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to increasing number of avenues for conducting cross-virtual machine (VM) side-channel attacks, the security of public IaaS cloud data centers is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. To reduce the probability of malicious co-location, we propose a novel VM placement algorithm called “Previously Co-Located Users First”. We perform a theoretical and empirical analysis of our proposed algorithm to evaluate its resource efficiency and security. Our results, obtained using real-world cloud traces containing millions of VM requests and thousands of …


Data Center Holistic Demand Response Algorithm To Smooth Microgrid Tie-Line Power Fluctuation, Ting Yang, Yingjie Zhao, Haibo Pen, Zhaoxia Wang Dec 2018

Data Center Holistic Demand Response Algorithm To Smooth Microgrid Tie-Line Power Fluctuation, Ting Yang, Yingjie Zhao, Haibo Pen, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

With the rapid development of cloud computing, artificial intelligence technologies and big data applications, data centers have become widely deployed. High density IT equipment in data centers consumes a lot of electrical power, and makes data center a hungry monster of energy consumption. To solve this problem, renewable energy is increasingly integrated into data center power provisioning systems. Compared to the traditional power supply methods, renewable energy has its unique characteristics, such as intermittency and randomness. When renewable energy supplies power to the data center industrial park, this kind of power supply not only has negative effects on the normal …


1. Synthesis And Characterization Of A Vanadium Based Transition State Mimic For Organophosphate Hydrolase 2. Catalytic Oxidation Of Thioanisole And 2-Chloroethyl Ethyl Sulfide Using Resin Bead Supported Oxoperoxidovanadium(V) Complexes, Efram Goldberg Dec 2018

1. Synthesis And Characterization Of A Vanadium Based Transition State Mimic For Organophosphate Hydrolase 2. Catalytic Oxidation Of Thioanisole And 2-Chloroethyl Ethyl Sulfide Using Resin Bead Supported Oxoperoxidovanadium(V) Complexes, Efram Goldberg

Theses and Dissertations

Two vanadium(V) complexes were prepared for different projects. First the ONS tridentate ligand 14 was prepared according to literature procedure. This ligand was chosen to make the ONS dioxovanadium complex 15 for conjugation to a protein and to eventually elicit catalytic antibodies for the hydrolysis of the chemical weapon VX. Complex 15 was prepared in 65% overall yield and a full characterization was performed including X-ray diffraction. Initial screening performed at the Naval Research Laboratory indicated an IC50 of 84 nM for inhibition of a bacterial cholinesterase. It was also found to be 50% as effective as the control antiobiotic …


Collection And Analysis Of Digital Forensic Data From Devices In The Internet Of Things, Raed Alharbi Dec 2018

Collection And Analysis Of Digital Forensic Data From Devices In The Internet Of Things, Raed Alharbi

Theses and Dissertations

Despite the abundance articles that have been written about the Internet of Things (IoT), little attention has been given to how digital forensics approaches can be utilized to direct advanced investigations in IoT-based frameworks. As of yet, IoT has not completely adjusted to digital forensic strategies given the fact that current digital forensic tools and functions are not ready to tackle the complexity of IoT frameworks for the purpose of collecting, analyzing, and testing potential evidence from IoT environments that might be utilized as permissible evidence in a court. Hence, the issue addressed is that; currently, there is no accepted …


Towards Enhanced Security For Automotive Operating Systems, Maksym Hryhorenko Dec 2018

Towards Enhanced Security For Automotive Operating Systems, Maksym Hryhorenko

Theses and Dissertations

Modern automotive infotainment systems are represented by highly complex components with broad functionality and network capabilities. As a result, they are becoming more exposed to the outer world, thus turning into potentially lucrative targets for remote cyber attacks. In the worst case scenario, an attacker could gain complete control over critical vehicle’s systems, for instance, steering, braking, engine, etc. This thesis proposes security hardening features based on ARM’s TrustZone technology for infotainment systems that ensures confidentiality and integrity of critical applications. In addition, we present a technique that allows to mitigate the impact of certain attacks on the car’s internal …


First Steps In Retrofitting A Versatile Software Testing Infrastructure To Android, Carol Anne Oliver Dec 2018

First Steps In Retrofitting A Versatile Software Testing Infrastructure To Android, Carol Anne Oliver

Theses and Dissertations

Are existing software testing technologies satisfying the needs of mobile software testing practitioners? This dissertation provides evidence that the existing technologies fall short of practitioner’s actual needs and analyzes some reasons why this is so. The first contribution presents a framework for analyzing the software testing needs of practitioners, which is then used to assess the existing software testing tools and body of research, revealing significant gaps. The second contribution proposes a vision for a new software testing technology for mobile apps, which is then applied to a real-world problem causing problems for software testing practitioners (namely, the verification of …


Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour Dec 2018

Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour

Theses and Dissertations

The threat of government and corporate surveillance around the world, as well as the publicity surrounding major cybersecurity attacks, have increased interest in secure and private end-to-end communications. In response to this demand, numerous secure messaging applications have been developed in recent years. These applications have been welcomed and publically used not just by political activists and journalists but by everyday users as well. Most of these popular secure messaging applications are usable because they hide many of the details of how encryption is provided. The strength of the security properties of these applications relies on the authentication ceremony, wherein …


Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu Dec 2018

Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu

Dissertations and Theses Collection (Open Access)

In the past few decades, supervised machine learning approach is one of the most important methodologies in the Natural Language Processing (NLP) community. Although various kinds of supervised learning methods have been proposed to obtain the state-of-the-art performance across most NLP tasks, the bottleneck of them lies in the heavy reliance on the large amount of manually annotated data, which is not always available in our desired target domain/task. To alleviate the data sparsity issue in the target domain/task, an attractive solution is to find sufficient labeled data from a related source domain/task. However, for most NLP applications, due to …


Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie Dec 2018

Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie

Dissertations and Theses Collection (Open Access)

In this dissertation, we address the subject of modeling and simulation of agents and their movement decision in a network environment. We emphasize the development of high quality agent-based simulation models as a prerequisite before utilization of the model as an evaluation tool for various recommender systems and policies. To achieve this, we propose a methodological framework for development of agent-based models, combining approaches such as discrete choice models and data-driven modeling.

The discrete choice model is widely used in the field of transportation, with a distinct utility function (e.g., demand or revenue-driven). Through discrete choice models, the movement decision …


Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook Nov 2018

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook

Dr. David M Cook

Despite the variety of global research on the identification and proliferation of ransomware and other online scams, there is still a relative vacuum of research with respect to the problem of digitally and socially engineered deception in the form of ransomware on an individual. This is particularly problematic for older cohorts, where life experience in many endeavours sits alongside novice understanding and experience in the use of online technology. This paper examines the indicators that characterize authenticity and deception within ransomware and phishing. A survey of older Australian people over the age of 65 reveals markers and patterns that assist …


Generating High-Order Optical And Spin Harmonics From Ferromagnetic Monolayers, G.P. Zhang, M.S. Si, M. Murakami, Y.H. Bai, Thomas F. George Nov 2018

Generating High-Order Optical And Spin Harmonics From Ferromagnetic Monolayers, G.P. Zhang, M.S. Si, M. Murakami, Y.H. Bai, Thomas F. George

Thomas George

High-order harmonic generation (HHG) in solids has entered a new phase of intensive research, with envisioned band-structure mapping on an ultrashort time scale. This partly benefits from a flurry of new HHG materials discovered, but so far has missed an important group. HHG in magnetic materials should have profound impact on future magnetic storage technology advances. Here we introduce and demonstrate HHG in ferromagnetic monolayers. We find that HHG carries spin information and sensitively depends on the relativistic spin–orbit coupling; and if they are dispersed into the crystal momentum k space, harmonics originating from real transitions can be k-resolved and …


Engaging Undergraduate Students In Planetary Science Research For Parabolic Flights, Gillian Gomer, Adrienne Dove, Seamus Anderson, Jeffery Jorges, Alexandra Yates Nov 2018

Engaging Undergraduate Students In Planetary Science Research For Parabolic Flights, Gillian Gomer, Adrienne Dove, Seamus Anderson, Jeffery Jorges, Alexandra Yates

Gillian Gomer

Microgravity investigations are key to understanding the behavior or regolith, or dusty granular material, that is ubiquitous on planetary surfaces. We see features on other planets that resemble avalanches and landslides seen here on Earth, while eroded craters and so-called ponds (smooth level dusty deposits at the bottom of some craters) reveal the action of various regolith flow mechanisms. The SLOPEs experiment was designed by an undergraduate group to address questions on the statics and dynamics of granular matter on the surfaces of small Solar System bodies, including a) the flow behavior of granular material along slopes (landslides and avalanches) …


Finite Simple Graphs And Their Associated Graph Lattices, James B. Hart, Brian Frazier Nov 2018

Finite Simple Graphs And Their Associated Graph Lattices, James B. Hart, Brian Frazier

Theory and Applications of Graphs

In his 2005 dissertation, Antoine Vella explored combinatorical aspects of finite graphs utilizing a topological space whose open sets are intimately tied to the structure of the graph. In this paper, we go a step further and examine some aspects of the open set lattices induced by these topological spaces. In particular, we will characterize all lattices that constitute the opens for finite simple graphs endowed with this topology, explore the structure of these lattices, and show that these lattices contain information necessary to reconstruct the graph and its complement in several ways.


Environmental Fate And Microbial Effects Of Monensin, Lincomycin, And Sulfamethazine Residues In Soil, Matteo D'Alessio, Lisa M. Durso, Daniel N. Miller, Brian Woodbury, Chittaranjan Ray, Daniel D. Snow Nov 2018

Environmental Fate And Microbial Effects Of Monensin, Lincomycin, And Sulfamethazine Residues In Soil, Matteo D'Alessio, Lisa M. Durso, Daniel N. Miller, Brian Woodbury, Chittaranjan Ray, Daniel D. Snow

Nebraska Water Center: Faculty Publications

The impact of commonly-used livestock antibiotics on soil nitrogen transformations under varying redox conditions is largely unknown. Soil column incubations were conducted using three livestock antibiotics (monensin, lincomycin and sulfamethazine) to better understand the fate of the antibiotics, their effect on nitrogen transformation, and their impact on soil microbial communities under aerobic, anoxic, and denitrifying conditions. While monensin was not recovered in the effluent, lincomycin and sulfamethazine concentrations decreased slightly during transport through the columns. Sorption, and to a limited extent degradation, are likely to be the primary processes leading to antibiotic attenuation during leaching. Antibiotics also affected microbial respiration …


Validation Of The Nonhydrostatic General Curvilinear Coastal Ocean Model (Gccom) For Stratified Flows, Mariangel Garcia, Paul Choboter, Ryan K. Walter, Jose E. Castillo Nov 2018

Validation Of The Nonhydrostatic General Curvilinear Coastal Ocean Model (Gccom) For Stratified Flows, Mariangel Garcia, Paul Choboter, Ryan K. Walter, Jose E. Castillo

Physics

While global- and basin-scale processes can be captured quite well with computationally-inexpensive hydrostatic models, smaller-scale features such as shoaling nonlinear internal waves and bores, coastal fronts, and other convective processes require the use of a nonhydrostatic model to accurately capture dynamics. Here the nonhydrostatic capabilities of the General Curvilinear Coastal Ocean Model (GCCOM) in a stratified environment are introduced. GCCOM is a three-dimensional, nonhydrostatic Large Eddy Simulation (LES), rigid lid model that has the ability to run in a fully three-dimensional general curvilinear coordinate system. This model was previously validated for unstratified flows with curvilinear coordinates. Here, recent advances of …


The Firece Green Fire: Vol. 9 Issue 12, Wofford College Environmental Studies Program Nov 2018

The Firece Green Fire: Vol. 9 Issue 12, Wofford College Environmental Studies Program

The Fierce Green Fire

No abstract provided.


Effects Of Age, Mass, And Terrestrial Duration On Oxygen Store Development In Phocids And Otariids, Rachael M. Stevenson Nov 2018

Effects Of Age, Mass, And Terrestrial Duration On Oxygen Store Development In Phocids And Otariids, Rachael M. Stevenson

HCNSO Student Capstones

Diving ontogeny among pinniped species was explored to determine how oxygen store development was affected by age, mass, and terrestrial duration between Phocidae and Otariidae. Distinct physiological and post-natal developmental differences exist between the two families which contribute to oxygen store and diving development. Blood oxygen data for six phocids and otariids and muscle oxygen data for two phocids and otariids were obtained. Body mass significantly (p


Concentrations Of Criteria Pollutants In The Contiguous U.S., 1979 – 2015: Role Of Model Parsimony In Integrated Empirical Geographic Regression, Sun-Young Kim, Matthew Bechle, Steve Hankey, Elizabeth (Lianne) A. Sheppard, Adam A. Szpiro, Julian D. Marshall Nov 2018

Concentrations Of Criteria Pollutants In The Contiguous U.S., 1979 – 2015: Role Of Model Parsimony In Integrated Empirical Geographic Regression, Sun-Young Kim, Matthew Bechle, Steve Hankey, Elizabeth (Lianne) A. Sheppard, Adam A. Szpiro, Julian D. Marshall

UW Biostatistics Working Paper Series

BACKGROUND: National- or regional-scale prediction models that estimate individual-level air pollution concentrations commonly include hundreds of geographic variables. However, these many variables may not be necessary and parsimonious approach including small numbers of variables may achieve sufficient prediction ability. This parsimonious approach can also be applied to most criteria pollutants. This approach will be powerful when generating publicly available datasets of model predictions that support research in environmental health and other fields. OBJECTIVES: We aim to (1) build annual-average integrated empirical geographic (IEG) regression models for the contiguous U.S. for six criteria pollutants, for all years with regulatory monitoring data …


A Gcn5-Related N-Acetyltransferase (Gnat) Capable Of Acetylating Polymyxin B And Colistin Antibiotics In Vitro, Mateusz P. Czub, Brian Zhang, M. Paul Chiarelli, Karolina A. Majorek, Layton Joe, Pryemyslaw J. Prebski, Alina Revilla, Weiming Wu, Daniel P. Becker, Wladek Minor, Misty L. Kuhn Nov 2018

A Gcn5-Related N-Acetyltransferase (Gnat) Capable Of Acetylating Polymyxin B And Colistin Antibiotics In Vitro, Mateusz P. Czub, Brian Zhang, M. Paul Chiarelli, Karolina A. Majorek, Layton Joe, Pryemyslaw J. Prebski, Alina Revilla, Weiming Wu, Daniel P. Becker, Wladek Minor, Misty L. Kuhn

Chemistry: Faculty Publications and Other Works

Deeper exploration of uncharacterized Gcn5-related N-acetyltransferases has the potential to expand our knowledge of the types of molecules that can be acylated by this important superfamily of enzymes and may offer new opportunities for biotechnological applications. While determining native or biologically relevant in vivo functions of uncharacterized proteins is ideal, their alternative or promiscuous in vitro capabilities provide insight into key active site interactions. Additionally, this knowledge can be exploited to selectively modify complex molecules and reduce byproducts when synthetic routes become challenging. During our exploration of uncharacterized Gcn5-related N-acetyltransferases from Pseudomonas aeruginosa, we identified such an …


Microbiome Diversity Of Coastal Tidal Floodwater In Southeastern Florida, Marissa Wickes Nov 2018

Microbiome Diversity Of Coastal Tidal Floodwater In Southeastern Florida, Marissa Wickes

HCNSO Student Theses and Dissertations

Over 3.7 million people are in high risk of coastal flooding and live within 1 mile of high tide in the US alone. The Atlantic coast is one of the most vulnerable areas due to its low elevation, large population, and economic importance (Bray, et. al, 2016). Coastal municipalities in the region of Southeast Florida, such as the cities of Miami, Miami Beach, Fort Lauderdale, etc., are at especial risk from coastal flooding related to sea level rise. The US National Climate Assessment has named Miami, Florida as the economically most vulnerable city impacted by this sea level rise …


Isostructural Metal-Insulator Transition In Vo2, J. W. Spinuzzi, D. A. Tenne Nov 2018

Isostructural Metal-Insulator Transition In Vo2, J. W. Spinuzzi, D. A. Tenne

Physics Faculty Publications and Presentations

The metal-insulator transition in correlated materials is usually coupled to a symmetry-lowering structural phase transition. This coupling not only complicates the understanding of the basic mechanism of this phenomenon but also limits the speed and endurance of prospective electronic devices. Here, we design and demonstrate an isostructural, purely electronically-driven metal-insulator transition in epitaxial heterostructures of an archetypal correlated material vanadium dioxide. A combination of thin-film synthesis, structural and electrical characterizations, and theoretical modeling reveals that an interface interaction suppresses the electronic correlations without changing the crystal structure in this otherwise correlated insulator. It stabilizes a non-equilibrium metallic phase, and leads …


Pizza And Hamburger Consumption To Overweight Among Adolescents In Jambi City, Ummi Kalsum, Sahridayanti Nainggolan, Nawi Ng Nov 2018

Pizza And Hamburger Consumption To Overweight Among Adolescents In Jambi City, Ummi Kalsum, Sahridayanti Nainggolan, Nawi Ng

Kesmas

Junk food is unhealthy and poor in nutrient quality, and may result in weight gain, obesity, and coronary heart disease, if consumed regularly. The prevalence of overweight in adolescents is 5-10% higher in urban areas. Adolescents undergo lifestyle changes, including in food consumption behavior. This study aimed to determine relation between junk food consumption patterns and overweight in adolescents. This study was conducted based on a cross-sectional design. A total of 137 high school students in Jambi City were involved in this study. Patterns of junk food consumption were assessed using food frequency questionnaires that examined the eating habits of …