263 research outputs found

    An examination of experiential avoidance as a vulnerability factor for posttraumatic stress symptoms and excessive behaviors in parent and young adult child dyads

    Get PDF
    Experiential avoidance is receiving increasing conceptual and empirical review as an emotion regulation strategy and crucial factor in the development and maintenance of symptoms of Posttraumatic Stress Disorder (PTSD; Kumpula, Orcutt, Bardeen, & Varkovitzky, 2011; Thompson & Waltz, 2010). It is also implicated in a variety of topographically dissimilar problem behaviors (Kingston, Clarke, & Remington, 2010; Mansell et al., 2009) and poor mental health outcomes. The transmission of effective emotion regulatory strategies (Duncombe et al., 2012) is increasingly important to understanding the development of these problems. Experiential avoidance may be a learned response style from one’s parent. This conceptual model was used to test the predictive power of parent experiential avoidance to young adult child experiential avoidance, posttraumatic stress symptoms, and excessive behaviors. Cross-sectional survey methodology was employed in a university setting, using a sample of parent and young adult child dyads. Significant discrepancies in the measurement of experiential avoidance were observed. Overall, the Acceptance and Action Questionnaire-II was the strongest predictor of posttraumatic stress symptoms and excessive behaviors between and within dyads, above and beyond trauma itself. Parent experiential avoidance influenced young adult child experiential avoidance and parents appeared to engage in more harmful behaviors than their young adult children. Implications for understanding the influence of parent behaviors and experiential avoidance for young adults are discussed

    Completion of the restructuring of China\u27s coast guard administration: challenges and opportunities

    Get PDF
    The dissertation is a study of the restructuring activities of entities of China’s maritime law enforcement by focusing on the establishment of China’s Coast Guard Administration. Because China’s Coast Guard Administration was just established two years ago, the aim of this dissertation is to analyse the current situation of China’s Coast Guard Administration, and then identify and analyse challenges and opportunities in China’s Coast Guard Administration. In order to provide a comprehensive cognition of the reasons for establishing China’s Coast Guard Administration, the dissertation initially provides a brief explanation of the drawbacks of the past situation of entities of maritime law enforcement in China. Then the current situation of China’s Coast Guard Administration is analysed by stating the framework and initial mandates of China’s Coast Guard Administration. Importantly, the legal foundations for previous departments are analysed and some of them are still available for China’s Coast Guard Administration. The legal analysis is divided into two levels, which are international laws and domestic laws. Significantly, a vast number of challenges faced by China’s Coast Guard Administration are identified and analysed by internal and external challenges. Besides, existing opportunities within China’s Coast Guard Administration are analysed as well as three different aspects. The concluding chapter summarizes the discussion and analysis of this dissertation, as well as confirming the challenges and opportunities are fulfilling the aim of this dissertation. Finally, several feasible recommendations are put forward which are based on the analysis of challenges and opportunities to promote the development of China’s Coast Guard Administration

    The role of cognitive functioning within the homeless population

    No full text
    Few studies have investigated cognitive functioning within the homeless population but it has been recognised as asignificant difficulty within this group. A review of the literature considered studies that investigated the different components of cognitive functioning and their prevalence with the homeless population. The potential factors that may have contributed to the cognitive dysfunction were then discussed. Though associations were not found in many areas, the complexity of this population is highlighted and the need for more comprehensive method of compiling this data is discussed. The influence of the different types of cognitive impairment is then considered and discussed with regard to clinical implications.Prevalence of childhood abuse, executive functioning difficulties and problem behaviours are high within the homeless population. The relationship between childhood abuse and problem behaviours has been found in a number of previous studies but the mediating effect of executive functioning has not so far been investigated. The empirical paper used a cross-sectional design with a sample of 83 participants recruited from homeless shelters in Southampton to investigate these relationships using self-report questionnaires and psychometrics to assess IQ and executive functioning. Results showed that this population showed scores of IQ and executive functioning that fell below the general population. Bootstrapping methodology suggested that a measure of impulsivity mediated the relationship between childhood abuse and problems behaviours. Further analysis also found associations between some of the subscales of the measures. These findings support the importance of considering these impairments when planning interventions for these population and also assessing interventions targeting these deficits within this group

    Half a century of computer methods and programs in biomedicine: A bibliometric analysis from 1970 to 2017

    Full text link
    © 2019 Background and Objective: Computer Methods and Programs in Biomedicine (CMPB) is a leading international journal that presents developments about computing methods and their application in biomedical research. The journal published its first issue in 1970. In 2020, the journal celebrates the 50th anniversary. Motivated by this event, this article presents a bibliometric analysis of the publications of the journal during this period (1970–2017). Methods: The objective is to identify the leading trends occurring in the journal by analysing the most cited papers, keywords, authors, institutions and countries. For doing so, the study uses the Web of Science Core Collection database. Additionally, the work presents a graphical mapping of the bibliographic information by using the visualization of similarities (VOS) viewer software. This is done to analyze bibliographic coupling, co-citation and co-occurrence of keywords. Results: CMPB is identified as a leading and core journal for biomedical researchers. The journal is strongly connected to IEEE Transactions on Biomedical Engineering and IEEE Transactions on Medical Imaging. Paper from Wang, Jacques, Zheng (published in 1995) is its most cited document. The top author in this journal is James Geoffrey Chase and the top contributing institution is Uppsala U (Sweden). Most of the papers in CMPB are from the USA followed by the UK and Italy. China and Taiwan are the only Asian countries to appear in the top 10 publishing in CMPB. A keyword co-occurrences analysis revealed strong co-occurrences for classification, picture archiving and communication system (PACS), heart rate variability, survival analysis and simulation. Keywords analysis for the last decade revealed that machine learning for a variety of healthcare problems (including image processing and analysis) dominated other research fields in CMPB. Conclusions: It can be concluded that CMPB is a world-renowned publication outlet for biomedical researchers which has been growing in a number of publications since 1970. The analysis also conclude that the journal is very international with publications from all over the world although today European countries are the most productive ones

    Recognizing addictive disorders through transdiagnostic assessment

    Get PDF
    Some evidence suggests high rates of comorbidity between substance and other related addictive disorders. However, few self-report instruments adopt a transdiagnostic approach, which would be best positioned to answer questions about comorbidity as well as other related phenomenon, such as discontinuation of one type of behavior and initiation of another. The current work aimed to develop a measure that screened for seven types of potentially addictive behavior: alcohol use, drug use, tobacco use, gambling, binge eating, hypersexual behavior, and excessive video game playing. Data were collected at three time-points to develop a large pool of possible items, establish the initial factor structure and reduce the total item pool to 35 items, and confirm the factor structure as well as examine support for reliability and validity. Initial results provided some support for the purported factor structure, though some problems with fit were evident. Subsequent validation with an independent sample, provided strong support for the measure, including evidence of excellent fit for the factor structure and excellent internal consistency reliability. The measure was also positively correlated with several associated constructs, including depression, anxiety, trauma, and emotion dysregulation. Differences in the magnitude of the correlation between subscales and associated constructs were also evident. Overall, the evidence supports use of the instrument as a continuous measure of addictive behaviors. Future research is warranted to understand the validity of the measure in clinical samples and examine the accuracy for detecting with sensitivity and specificity those who do and do not meet criteria for a substance or other related addictive disorder

    Torque Controlled Drive for Permanent Magnet Direct Current Brushless Motors

    Get PDF
    This thesis describes the design and implementation of a simple variable speed drive (VSD) based on a brushless direct current (BLDC) machine and discrete logic circuits. A practical VSD was built, capable of operating a BLDC machine in two quadrants, motoring and regenerative braking. The intended applications are electric scooters and electric bicycles, where the recovered energy from braking extends the range of the vehicle. A conceptual four quadrant VSD, suitable for three and four wheelers requiring reverse operation, was designed and tested in simulation. Simplicity was emphasized in this design to help achieve a robust, easy to analyse system. The versatility of multi-function gate integrated circuits (ICs) made them ideal for implementing the commutation logic and keeping the system simple. The BLDC machine has sensors with a resolution of 60 ed to determine rotor position. An electronic commutator or phase switcher module interprets the position signals and produces a switching pattern. This effectively transforms the BLDC machine into a direct current (DC) brushed machine. A synchronous step down converter controls the BLDC machine current with a tolerance band scheme. This module treats the BLDC machine as if it was a DC machine. The leakage inductance of the electric machine is used as the inductive filter element. The unipolar switching scheme used ensures that current flows out of the battery only for motoring operation and into the battery only during regeneration. The current and torque are directly related in a DC brushed machine. The action of an electronic commutator or phase switcher creates that same relationship between torque and current in a BLDC machine. Torque control is achieved in the BLDC machine using a single channel current controller. The phase switcher current is monitored and used to control the duty ratio of the synchronous converter switches. Successful operation of the practical VSD was achieved in two quadrants: forwards motoring and forwards regenerating. The maximum tested power outputs were 236W in motoring mode and 158W in regenerating mode. The output torque could be smoothly controlled from a positive to a negative value. iv v Simulation of the conceptual four quadrant design was successful in all the motoring, generating and active braking zones. The required manipulation of logic signals to achieve this type of operation was done automatically while the machine was running. The resulting output torque is smoothly controlled in all of the operating zones. Commutation at certain speeds and torques are handled better by some topologies than others. Some current sensing strategies adversely affect instantaneous phase currents under certain conditions. The final design chose the method where phase currents experience no overshoot, minimizing component stress. The battery, or energy storage system, used in verifying the operation of the VSD in the practical electric bicycle was found to be the most limiting component. In regenerating mode, the low charge acceptance rate of the battery reduced the maximum retarding torque and energy recovery rate

    The impact of experiential avoidance on the relationships among military sexual trauma, excessive behaviors, and health-related outcomes in female veterans

    Get PDF
    Military Sexual Trauma (MST) as defined in United States Public Law, refers to inappropriate sexual conduct, assault, or harassment experienced by a military service member during his or her course of active duty or active duty for training (38 U.S.C. § 1720D). MST has emerged as a distinct form of trauma, resulting in different and often more severe sequelae than other forms of civilian sexual assault and/or non-sexual trauma. This study sought to explore the potential moderating and mediating roles of experiential avoidance on the relationship between MST and health outcomes in an attempt to identify a unifying mechanism through which poor outcomes were more likely to emerge or become amplified. Participants included 65 female veterans seeking treatment through the women’s health clinic located within the VA Ann Arbor Healthcare System (VAAAHS). Eligible participants completed a series of questionnaires assessing for the presence of trauma exposure, including MST, experiential avoidance, and potential outcomes such as depression, anxiety, PTSD, physical health concerns, and engagement in excessive/problem behaviors. Within this sample, 29.2% of respondents endorsed exposure to MST. Subsequent mediation and moderation analyses were computed and it was determined that experiential avoidance partially mediated the relationship between MST exposure and PTSD symptomatology. Furthermore, levels of experiential avoidance, PTSD, anxiety, and physical health concerns varied as a result of trauma exposure type (i.e., MST, civilian sexual assault/childhood sexual abuse, or non-sexual trauma). These findings support the hypothesis that MST exposure is associated with poorer post-trauma functioning across a variety of symptoms measures. Furthermore, the findings suggest that the presence of experiential avoidance may impact post-trauma functionality. Implications for the treatment of MST are discussed

    Adversarial Machine Learning for the Protection of Legitimate Software

    Get PDF
    Obfuscation is the transforming a given program into one that is syntactically different but semantically equivalent. This new obfuscated program now has its code and/or data changed so that they are hidden and difficult for attackers to understand. Obfuscation is an important security tool and used to defend against reverse engineering. When applied to a program, different transformations can be observed to exhibit differing degrees of complexity and changes to the program. Recent work has shown, by studying these side effects, one can associate patterns with different transformations. By taking this into account and attempting to profile these unique side effects, it is possible to create a classifier using machine learning which can analyze transformed software and identifies what transformation was used to put it in its current state. This has the effect of weakening the security of obfuscating transformations used to protect legitimate software. In this research, we explore options to increase the robustness of obfuscation against attackers who utilize machine learning, particular those who use it to identify the type of obfuscation being employed. To accomplish this, we segment our research into three stages. For the first stage, we implement a suite of classifiers that are used to xiv identify the obfuscation used in samples. These establish a baseline for determining the effectiveness of our proposed defenses and make use of three varied feature sets. For the second stage, we explore methods to evade detection by the classifiers. To accomplish this, attacks setup using the principles of adversarial machine learning are carried out as evasion attacks. These attacks take an obfuscated program and make subtle changes to various aspects that will cause it to be mislabeled by the classifiers. The changes made to the programs affect features looked at by our classifiers, focusing mainly on the number and distribution of opcodes within the program. A constraint of these changes is that the program remains semantically unchanged. In addition, we explore a means of algorithmic dead code insertion in to achieve comparable results against a broader range of classifiers. In the third stage, we combine our attack strategies and evaluate the effect of our changes on the strength of obfuscating transformations. We also propose a framework to implement and automate these and other measures. We the following contributions: 1. An evaluation of the effectiveness of supervised learning models at labeling obfuscated transformations. We create these models using three unique feature sets: Code Images, Opcode N-grams, and Gadgets. 2. Demonstration of two approaches to algorithmic dummy code insertion designed to improve the stealth of obfuscating transformations against machine learning: Adversarial Obfuscation and Opcode Expansion 3. A unified version of our two defenses capable of achieving effectiveness against a broad range of classifiers, while also demonstrating its impact on obfuscation metrics
    corecore