117 research outputs found

    Contemplative Psychopharmacology: Exploring the intersection of mindfulness and pharmacologically-assisted change

    Get PDF
    Background: Mindfulness protocols, though beneficial for a range of indications, often involve long-term commitment and may not be accessible for those naturally low in trait mindfulness (e.g. attention-/ anxiety-related disorders). It remains unclear which ‘dose’ of mindfulness is necessary to produce beneficial effects, and broadly, how drugs such as nootropics and psychedelics may interact with mindfulness meditation. / Aims: The aims of this thesis are (1) to explore what dose of mindfulness is necessary to enhance state mindfulness (among other outcomes) and whether a drug can modulate, or add to the effects of a mindfulness strategy, (2) to explore how psychedelics may affect a meditation experience, and (3) to examine what role changes in mindfulness play in regards to beneficial psychological health outcomes shown after ceremonial psychedelic use. / Methods: A mixture of methodologies were applied to answer the above questions. Specifically, single-session mindfulness literature was systematically reviewed, and a double-placebo controlled study was designed and conducted to explore the potential for pharmacological enhancement of a single mindfulness strategy. A thematic analysis was conducted to explore user accounts of combined psychedelic and meditation experiences. Finally, linear multilevel models and longitudinal mediation models were used to explore the associations between changes in mindfulness capacity and psychological health over the course of a naturalistic ayahuasca study. / Results: Single-session mindfulness studies are capable of producing a variety of beneficial effects, and adjunctive modafinil appears to enhance some effects of behavioural strategies as well as participant engagement in subsequent practice. Psychedelics may also prove to be useful counterparts to meditations, and conversely, while psychedelics appear to enhance mindfulness, meditation practice can assist also in the navigation of, and potentially enhance effects of the psychedelic process

    PROFILING - CONCEPTS AND APPLICATIONS

    Get PDF
    Profiling is an approach to put a label or a set of labels on a subject, considering the characteristics of this subject. The New Oxford American Dictionary defines profiling as: “recording and analysis of a person’s psychological and behavioral characteristics, so as to assess or predict his/her capabilities in a certain sphere or to assist in identifying a particular subgroup of people”. This research extends this definition towards things demonstrating that many methods used for profiling of people may be applied for a different type of subjects, namely things. The goal of this research concerns proposing methods for discovery of profiles of users and things with application of Data Science methods. The profiles are utilized in vertical and 2 horizontal scenarios and concern such domains as smart grid and telecommunication (vertical scenarios), and support provided both for the needs of authorization and personalization (horizontal usage).:The thesis consists of eight chapters including an introduction and a summary. First chapter describes motivation for work that was carried out for the last 8 years together with discussion on its importance both for research and business practice. The motivation for this work is much broader and emerges also from business importance of profiling and personalization. The introduction summarizes major research directions, provides research questions, goals and supplementary objectives addressed in the thesis. Research methodology is also described, showing impact of methodological aspects on the work undertaken. Chapter 2 provides introduction to the notion of profiling. The definition of profiling is introduced. Here, also a relation of a user profile to an identity is discussed. The papers included in this chapter show not only how broadly a profile may be understood, but also how a profile may be constructed considering different data sources. Profiling methods are introduced in Chapter 3. This chapter refers to the notion of a profile developed using the BFI-44 personality test and outcomes of a survey related to color preferences of people with a specific personality. Moreover, insights into profiling of relations between people are provided, with a focus on quality of a relation emerging from contacts between two entities. Chapters from 4 to 7 present different scenarios that benefit from application of profiling methods. Chapter 4 starts with introducing the notion of a public utility company that in the thesis is discussed using examples from smart grid and telecommunication. Then, in chapter 4 follows a description of research results regarding profiling for the smart grid, focusing on a profile of a prosumer and forecasting demand and production of the electric energy in the smart grid what can be influenced e.g. by weather or profiles of appliances. Chapter 5 presents application of profiling techniques in the field of telecommunication. Besides presenting profiling methods based on telecommunication data, in particular on Call Detail Records, also scenarios and issues related to privacy and trust are addressed. Chapter 6 and Chapter 7 target at horizontal applications of profiling that may be of benefit for multiple domains. Chapter 6 concerns profiling for authentication using un-typical data sources such as Call Detail Records or data from a mobile phone describing the user behavior. Besides proposing methods, also limitations are discussed. In addition, as a side research effect a methodology for evaluation of authentication methods is proposed. Chapter 7 concerns personalization and consists of two diverse parts. Firstly, behavioral profiles to change interface and behavior of the system are proposed and applied. The performance of solutions personalizing content either locally or on the server is studied. Then, profiles of customers of shopping centers are created based on paths identified using Call Detail Records. The analysis demonstrates that the data that is collected for one purpose, may significantly influence other business scenarios. Chapter 8 summarizes the research results achieved by the author of this document. It presents contribution over state of the art as well as some insights into the future work planned

    Actuators for Intelligent Electric Vehicles

    Get PDF
    This book details the advanced actuators for IEVs and the control algorithm design. In the actuator design, the configuration four-wheel independent drive/steering electric vehicles is reviewed. An in-wheel two-speed AMT with selectable one-way clutch is designed for IEV. Considering uncertainties, the optimization design for the planetary gear train of IEV is conducted. An electric power steering system is designed for IEV. In addition, advanced control algorithms are proposed in favour of active safety improvement. A supervision mechanism is applied to the segment drift control of autonomous driving. Double super-resolution network is used to design the intelligent driving algorithm. Torque distribution control technology and four-wheel steering technology are utilized for path tracking and adaptive cruise control. To advance the control accuracy, advanced estimation algorithms are studied in this book. The tyre-road peak friction coefficient under full slip rate range is identified based on the normalized tyre model. The pressure of the electro-hydraulic brake system is estimated based on signal fusion. Besides, a multi-semantic driver behaviour recognition model of autonomous vehicles is designed using confidence fusion mechanism. Moreover, a mono-vision based lateral localization system of low-cost autonomous vehicles is proposed with deep learning curb detection. To sum up, the discussed advanced actuators, control and estimation algorithms are beneficial to the active safety improvement of IEVs

    Sensor Data Integrity Verification for Real-time and Resource Constrained Systems

    Full text link
    Sensors are used in multiple applications that touch our lives and have become an integral part of modern life. They are used in building intelligent control systems in various industries like healthcare, transportation, consumer electronics, military, etc. Many mission-critical applications require sensor data to be secure and authentic. Sensor data security can be achieved using traditional solutions like cryptography and digital signatures, but these techniques are computationally intensive and cannot be easily applied to resource constrained systems. Low complexity data hiding techniques, on the contrary, are easy to implement and do not need substantial processing power or memory. In this applied research, we use and configure the established low complexity data hiding techniques from the multimedia forensics domain. These techniques are used to secure the sensor data transmissions in resource constrained and real-time environments such as an autonomous vehicle. We identify the areas in an autonomous vehicle that require sensor data integrity and propose suitable water-marking techniques to verify the integrity of the data and evaluate the performance of the proposed method against different attack vectors. In our proposed method, sensor data is embedded with application specific metadata and this process introduces some distortion. We analyze this embedding induced distortion and its impact on the overall sensor data quality to conclude that watermarking techniques, when properly configured, can solve sensor data integrity verification problems in an autonomous vehicle.Ph.D.College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttp://deepblue.lib.umich.edu/bitstream/2027.42/167387/3/Raghavendar Changalvala Final Dissertation.pdfDescription of Raghavendar Changalvala Final Dissertation.pdf : Dissertatio

    Weight Management

    Get PDF
    Weight management is a multi- and cross-disciplinary challenge. This book covers many etiological and diagnostic aspects of weight-related disorders and their treatment. This book explains how body weight influences and is influenced by the brain, hormones and immune system, diet, physical activity, posture and gait, and the social environment. This book also elucidates the health consequences of significantly low or pathologically increased body weight. Furthermore, ideas on how to influence and manage body weight including anti-obesity medical devices, diet counselling, artificial sweeteners, prebiotics and probiotics, proanthocyanidins, bariatric surgery, microbiota transplantation, warming, physical exercise, music and psychological therapy are discussed

    The Impossibilities of the Circular Economy

    Get PDF
    The fifth Factor X publication from the Federal Environment Agency (Umweltbundesamt, UBA), The Impossibilities of the Circular Economy provides an overview of the limits to the circular economy, emphasising the relationship between integrated resource use and more systemic leadership-management approaches. On a European level, the book ties into the recent European Green Deal and aims to empower actors across sectors and EU member countries to transition from existing linear models of value capture and expression to more systemic-circular solutions of value capture and expression. The volume provides a hands-on contribution towards building the knowledge and skill sets of current and future decision-makers who face these complex-systemic crises in their day-to-day business. The book further provides access to best practices from cutting-edge research and development findings, which will empower decision-makers to develop a more sustainable and equitable economy. Providing solutions for a more sustainable economy, this book is essential reading for scholars and students of natural resource use, sustainable business, environmental economics and sustainable development, as well as decision-makers and experts from the fields of policy development, industry and civil society

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects
    corecore