1,502 research outputs found

    Person-centered approaches to examining links between self-regulation and conduct problems, attention-deficit/hyperactivity disorder, and callous-unemotional behaviors in childhood

    Get PDF
    Over the past two decades, the study of self-regulation and its associations with emerging psychopathology has become a major pursuit in developmental science. Early-childhood emotion regulation (ER) and executive function (EF), in particular, are interrelated aspects of self-regulation that have garnered extensive research and are theorized to promote social competence school readiness and achievement, and adjustment. However, the development of self-regulation is a complex process that occurs through coaction at multiple levels of analysis. Three studies were conducted to examine biobehavioral emotion responding in infancy, early childhood EF, and their prospective influences on trajectories of conduct problems (CPs), attention-deficit/hyperactivity disorder (ADHD), and callous-unemotional (CU) behaviors using multiple person-centered approaches. Study 1 used latent profile analysis (LPA) to prospectively examine the synchrony and asynchrony of infant behavioral reactivity, cortisol reactivity, and ER behaviors at 6, 15, and 24 months of age to determine whether groups of infants evidenced different patterns of arousal and regulation; and whether such patterns were bidirectionally related to parenting behavior over the same span of time. Study 2 used longitudinal latent class analysis (LLCA) to examine joint trajectories of CPs, ADHD symptoms, and CU behaviors from 3 years old to 5th grade in order to assess examine heterogeneity in CPs based on the presence of ADHD and CU behaviors. Study 3 built upon the prior two studies by in by investigating associations of infants’ emotional arousal and regulation with their later CP/ADUD/CU trajectories, as well as the role of early childhood EF in mediating these prospective associations. Results from Study 1 indicated that there is observable variation in infants’ patterns of behavioral reactivity, cortisol reactivity, and ER behaviors across infancy, and that infant emotion responding and parent sensitivity and harsh-intrusion were bidirectionally predictive of one another. Results from Study 2 showed that children did follow differing trajectories of CPs, but that these varied based on who reported their behavior (parents, teachers, or both), rather than on trajectories of ADHD symptoms and CU behaviors. In addition, these joint trajectories differentiated children’s likelihood of meeting diagnostic criteria for oppositional defiant disorder, conduct disorder, and ADHD, as well as clinically significant levels of CU behaviors, during preadolescence. Finally, results from Study 3 indicated that infants’ patterns of emotion responding were not prospectively related to their CP/ADHD/CU trajectories or their early childhood EF. However, better EF did significantly predict a decreased likelihood of following trajectories characterized by high problem behavior as rated by both parents and teachers, parents only, and teachers only. The implications for understanding the early development of self-regulation, CPs, ADHD, and CU behaviors are discussed, as is the utility of innovative person-centered approaches for understanding these phenomena

    Turning Unstructured and Incoherent Group Discussion into DATree: A TBL Coherence Analysis Approach

    Get PDF
    Despite the rapid growth of user-generated unstructured text from online group discussions, business decision-makers are facing the challenge of understanding its highly incoherent content. Coherence analysis attempts to reconstruct the order of discussion messages. However, existing methods only focus on system and cohesion features. While they work with asynchronous discussions, they fail with synchronous discussions because these features rarely appear. We believe that discussion logic features play an important role in coherence analysis. Therefore, we propose a TCA method for coherence analysis, which is composed of a novel message similarity measure algorithm, a subtopic segmentation algorithm and a TBL-based classification algorithm. System, cohesion and discussion logic features are all incorporated into our TCA method. Results from experiments showed that the TCA method achieved significantly better performance than existing methods. Furthermore, we illustrate that the DATree generated by the TCA method can enhance decision-makers’ content analysis capability

    Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Get PDF
    Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of emphspatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender

    Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation

    Get PDF
    Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm\u27s key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change the code. This thesis uses the Java Optimized Processor (JOP) to identify and _x SCA vulnerabilities to give a processor running RSA or AES code more protection against SCA attacks

    Heart Rate Variability Synchronizes When Non-experts Vocalize Together

    Get PDF
    Singing and chanting are ubiquitous across World cultures. It has been theorized that such practices are an adaptive advantage for humans because they facilitate bonding and cohesion between group members. Investigations into the effects of singing together have so far focused on the physiological effects, such as the synchronization of heart rate variability (HRV), of experienced choir singers. Here, we study whether HRV synchronizes for pairs of non-experts in different vocalizing conditions. Using time-frequency coherence (TFC) analysis, we find that HRV becomes more coupled when people make long (> 10 s) sounds synchronously compared to short sounds (< 1 s) and baseline measurements (p < 0.01). Furthermore, we find that, although most of the effect can be attributed to respiratory sinus arrhythmia, some HRV synchronization persists when the effect of respiration is removed: long notes show higher partial TFC than baseline and breathing (p < 0.05). In addition, we observe that, for most dyads, the frequency of the vocalization onsets matches that of the peaks in the TFC spectra, even though these frequencies are above the typical range of 0.04–0.4 Hz. A clear correspondence between high HRV coupling and the subjective experience of “togetherness" was not found. These results suggest that since autonomic physiological entrainment is observed for non-expert singing, it may be exploited as part of interventions in music therapy or social prescription programs for the general population

    Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

    Get PDF
    Tese de doutoramento, Informática (Ciências da Computação), Universidade de Lisboa, Faculdade de Ciências, 2010.The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrained wireless ad hoc networks. This is a fundamental problem in distributed computing because it abstracts the need to coordinate activities among various nodes. It has been shown to be a building block for several other important distributed computing problems like state-machine replication and atomic broadcast. The thesis begins by making a thorough performance assessment of existing intrusion-tolerant consensus protocols, which shows that the performance bottlenecks of current solutions are in part related to their system modeling assumptions. Based on these results, the communication failure model is identified as a model that simultaneously captures the reality of wireless ad hoc networks and allows the design of efficient protocols. Unfortunately, the model is subject to an impossibility result stating that there is no deterministic algorithm that allows n nodes to reach agreement if more than n2 omission transmission failures can occur in a communication step. This result is valid even under strict timing assumptions (i.e., a synchronous system). The thesis applies randomization techniques in increasingly weaker variants of this model, until an efficient intrusion-tolerant consensus protocol is achieved. The first variant simplifies the problem by restricting the number of nodes that may be at the source of a transmission failure at each communication step. An algorithm is designed that tolerates f dynamic nodes at the source of faulty transmissions in a system with a total of n 3f + 1 nodes. The second variant imposes no restrictions on the pattern of transmission failures. The proposed algorithm effectively circumvents the Santoro- Widmayer impossibility result for the first time. It allows k out of n nodes to decide despite dn 2 e(nk)+k2 omission failures per communication step. This algorithm also has the interesting property of guaranteeing safety during arbitrary periods of unrestricted message loss. The final variant shares the same properties of the previous one, but relaxes the model in the sense that the system is asynchronous and that a static subset of nodes may be malicious. The obtained algorithm, called Turquois, admits f < n 3 malicious nodes, and ensures progress in communication steps where dnf 2 e(n k f) + k 2. The algorithm is subject to a comparative performance evaluation against other intrusiontolerant protocols. The results show that, as the system scales, Turquois outperforms the other protocols by more than an order of magnitude.Esta tese investiga o problema do consenso tolerante a faltas acidentais e maliciosas em redes ad hoc sem fios. Trata-se de um problema fundamental que captura a essência da coordenação em actividades envolvendo vários nós de um sistema, sendo um bloco construtor de outros importantes problemas dos sistemas distribuídos como a replicação de máquina de estados ou a difusão atómica. A tese começa por efectuar uma avaliação de desempenho a protocolos tolerantes a intrusões já existentes na literatura. Os resultados mostram que as limitações de desempenho das soluções existentes estão em parte relacionadas com o seu modelo de sistema. Baseado nestes resultados, é identificado o modelo de falhas de comunicação como um modelo que simultaneamente permite capturar o ambiente das redes ad hoc sem fios e projectar protocolos eficientes. Todavia, o modelo é restrito por um resultado de impossibilidade que afirma não existir algoritmo algum que permita a n nós chegaram a acordo num sistema que admita mais do que n2 transmissões omissas num dado passo de comunicação. Este resultado é válido mesmo sob fortes hipóteses temporais (i.e., em sistemas síncronos) A tese aplica técnicas de aleatoriedade em variantes progressivamente mais fracas do modelo até ser alcançado um protocolo eficiente e tolerante a intrusões. A primeira variante do modelo, de forma a simplificar o problema, restringe o número de nós que estão na origem de transmissões faltosas. É apresentado um algoritmo que tolera f nós dinâmicos na origem de transmissões faltosas em sistemas com um total de n 3f + 1 nós. A segunda variante do modelo não impõe quaisquer restrições no padrão de transmissões faltosas. É apresentado um algoritmo que contorna efectivamente o resultado de impossibilidade Santoro-Widmayer pela primeira vez e que permite a k de n nós efectuarem progresso nos passos de comunicação em que o número de transmissões omissas seja dn 2 e(n k) + k 2. O algoritmo possui ainda a interessante propriedade de tolerar períodos arbitrários em que o número de transmissões omissas seja superior a . A última variante do modelo partilha das mesmas características da variante anterior, mas com pressupostos mais fracos sobre o sistema. Em particular, assume-se que o sistema é assíncrono e que um subconjunto estático dos nós pode ser malicioso. O algoritmo apresentado, denominado Turquois, admite f < n 3 nós maliciosos e assegura progresso nos passos de comunicação em que dnf 2 e(n k f) + k 2. O algoritmo é sujeito a uma análise de desempenho comparativa com outros protocolos na literatura. Os resultados demonstram que, à medida que o número de nós no sistema aumenta, o desempenho do protocolo Turquois ultrapassa os restantes em mais do que uma ordem de magnitude.FC
    • …
    corecore