81 research outputs found
Recommended from our members
Fear-Potentiated Startle and Fear Extinction in a Sample of Undergraduate Women Exposed to a Campus Mass Shooting
Posttraumatic stress disorder (PTSD) is a common psychological disorder that affects a substantial minority of individuals. Previous research has suggested that PTSD can be partially explained as a disorder of impaired fear inhibition. The current study utilized a previously validated fear acquisition and extinction paradigm in a sample of 75 undergraduate women who were exposed to a campus mass shooting that occurred in 2008. We used a protocol in which conditioned fear was first acquired through the presentation of one colored shape (reinforced conditioned stimulus, CS+) that was paired with an aversive airblast to the larynx (unconditioned stimulus, US) and a different colored shape that was not paired with the airblast (non-reinforced conditioned stimulus, CS-). Fear was extinguished 10 min later through repeated presentations of the CSs without reinforcement. Number of clinically significant posttraumatic stress symptoms (PTSS) immediately following the mass shooting were positively associated with fear-potentiated startle (FPS) to the CS+ and CS- during late periods of acquisition. During early periods of fear extinction, PTSS was positively associated with FPS to the CS+. Results from the current study suggest that PTSS is related to altered fear inhibition and extinction during an FPS paradigm. In line with similar research, women with greater PTSS demonstrated a greater “fear load,” suggesting that these women experienced elevated fear to the CS+ during extinction after conditioned fear was acquired
Embodied Emotion Modulates Neural Signature of Performance Monitoring
BACKGROUND:Recent research on the "embodiment of emotion" implies that experiencing an emotion may involve perceptual, somatovisceral, and motor feedback aspects. For example, manipulations of facial expression and posture appear to induce emotional states and influence how affective information is processed. The present study investigates whether performance monitoring, a cognitive process known to be under heavy control of the dopaminergic system, is modulated by induced facial expressions. In particular, we focused on the error-related negativity, an electrophysiological correlate of performance monitoring. METHODS/PRINCIPAL FINDINGS:During a choice reaction task, participants held a Chinese chop stick either horizontally between the teeth ("smile" condition) or, in different runs, vertically ("no smile") with the upper lip. In a third control condition, no chop stick was used ("no stick"). It could be shown on a separate sample that the facial feedback procedure is feasible to induce mild changes in positive affect. In the ERP sample, the smile condition, hypothesized to lead to an increase in dopaminergic activity, was associated with a decrease of ERN amplitude relative to "no smile" and "no stick" conditions. CONCLUSION:Embodying emotions by induced facial expressions leads to a changes in the neural correlates of error detection. We suggest that this is due to the joint influence of the dopaminergic system on positive affect and performance monitoring
LICSTER -- A Low-cost ICS Security Testbed for Education and Research
Unnoticed by most people, Industrial Control Systems (ICSs) control entire
productions and critical infrastructures such as water distribution, smart grid
and automotive manufacturing. Due to the ongoing digitalization, these systems
are becoming more and more connected in order to enable remote control and
monitoring. However, this shift bears significant risks, namely a larger attack
surface, which can be exploited by attackers. In order to make these systems
more secure, it takes research, which is, however, difficult to conduct on
productive systems, since these often have to operate twenty-four-seven.
Testbeds are mostly very expensive or based on simulation with no real-world
physical process. In this paper, we introduce LICSTER, an open-source low-cost
ICS testbed, which enables researchers and students to get hands-on experience
with industrial security for about 500 Euro. We provide all necessary material
to quickly start ICS hacking, with the focus on low-cost and open-source for
education and research
Congestion Control in a Reliable Scalable Message-Oriented Middleware
This paper presents congestion control mechanisms for reliable and scalable message-oriented middleware following the publish/subscribe communication model. We identify the key requirements of congestion control in this environment, how it differs from congestion control for the Internet, and propose a combination of two congestion control mechanisms, (1) driven by a publisher hosting broker (PDCC), (2) driven by a subscriber hosting broker (SDCC). SDCC decouples the notion of a receive window and a NACK window, and is used by subscriber hosting brokers in recovery mode. PDCC implements a scalable and low latency feedback loop between a publisher hosting broker and all subscriber hosting brokers, which is used to adjust the rate of publishing new messages, to allow brokers in recovery to eventually catch up, and other brokers to keep up. We present a detailed experimental evaluation of our implementation of these mechanisms in the Gryphon system by injecting network failures and link congestion
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today’s wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics. Results from two sets of measurements of a working RON deployed at sites scattered across the Internet demonstrate the benefits of our architecture. For instance, over a 64-hour sampling period in March 2001 across a twelve-node RON, there were 32 significant outages, each lasting over thirty minutes, over the 132 measured paths. RON’s routing mechanism was able to detect, recover, and route around all of them, in less than twenty seconds on average, showing that its methods for fault detection and recovery work well at discovering alternate paths in the Internet. Furthermore, RON was able to improve the loss rate, latency, or throughput perceived by data transfers; for example, about 5 % of the transfers doubled their TCP throughput and 5 % of our transfers saw their loss probability reduced by 0.05. We found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases. These improvements, particularly in the area of fault detection and recovery, demonstrate the benefits of moving some of the control over routing into the hands of end-systems
- …