72 research outputs found

    Novelty and the running-induced feeding suppression

    Get PDF
    In adult rats, wheel introduction induces a temporary feeding suppression, which may be the result of either a conditioned taste avoidance induced by wheel running (Left & Grant, 1996), or an anorectic effect produced by running (Mueller, Loft, & Eikelboom, 1997). The first experiment investigated the effect of alternate-day wheel access on consumption of novel 32% sucrose solution in 36 adult male rats. The first group of rats had no wheel access, the second continuous wheel access, and the third alternate-day wheel access. Rats without wheel access consumed large amounts of sucrose from the first day. Both groups with wheel access had similar, almost complete and long-lasting, suppressed sucrose consumption. The suppression occurred on both wheel and home cage days in the rats with alternate-day wheel exposure. This suggests that the unconditioned effect of running (whether sickness or some positive affect), when paired with a novel food, induces conditioned taste avoidance. CS pre-exposure has been shown to reduce conditioned taste avoidance, possibly through latent inhibition (Lubow & Moore, 1959; Lubow, 1989). The second experiment investigated the effect of alternate-day wheel access on consumption of a familiar sucrose solution (rats were given 10 days sucrose pre-exposure) in a similar design. The rats with continuous wheel access showed only a mild and short-lived suppression of the sucrose solution

    Neural and Behavioural Effects of the \u3cem\u3eGinkgo biloba\u3c/em\u3e Leaf Extract Egb 761

    Get PDF
    Numerous studies have documented the cognitive-enhancing effects of standardized Ginkgo biloba leaf extracts (Ginkgo) both in humans and in rodents. In addition to its antioxidant and platelet-activating factor inhibiting properties, Gingko has been shown to protect cellular membrane fluidity, to enhance cerebral blood flow and microcirculation, and to modulate cholinergic system functioning, properties that have been suggested to underlie its cognitive-enhancing effects. However, the possible neurogenic-enhancing effects of Ginkgo on adult hippocampal neurogenesis as a possible mechanism underlying its nootropic effects have not been evaluated. The experiments discussed in the present thesis assessed such a possibility. Chapter 1 reviews studies that have evaluated the nootropic effects of Ginkgo in humans and in rodents. The anti-stress properties of Ginkgo as well as several molecular mechanisms proposed to account for its beneficial effects on central nervous system functioning are also discussed. Experiments presented in Chapter 2 used c-Fos immunoreactivity to characterize functional activity in selected brain regions following acute oral (150 mg/kg) and intraperitoneal (2.5-25 mg/kg, i.p.) administration of Ginkgo. Both routes of administration increased c-Fos immunoreactivity in the insular cortext and amygdala. However, some additional regions including the nucleus accumbens and dentate gyrus showed increased c-Fos immunoreactivity only in response to parenteral administration. Experiments presented in Chapter 3 evaluated the possible neurogenic properties of Ginkgo. The anxiolytic effects of the extract using the elevated plus maze, light/dark emergencec and social interaction tests were also assessed. Acute administration of Ginkgo (2.5-25 mg/kg, i.p.) had neither stimulating nor depressive effects on cell proliferation in the adult dentate gyrus. Survival of newborn neurons in the dentate gyrus of adult male rats was also not affected by chronic Ginkgo administration. Furthermore, the results showed that chronic administration of Ginkgo treatment had neither anxiolytic nor anxiogenic properties; however acute administration of a high and moderate dose of Ginkgo induced anxiety in some measures. Experiments described in Chapter 4 investigated whether suppressed neurogenesis induced by corticosterone (CORT) treatment could be restored by Ginkgo co-treatment. The results revealed that survival of newborn cells was inhibited in the dorsal dentate gyrus of rats chronically treated with CORT; however, Ginkgo co-treatment did not buffer this effect. Finally, experiments described in Chapter 5 evaluated the cognitive-enhancing effects of Ginkgo on young adult male rats using a food-reinforced two-component double Y-maze task. Results showed that Ginkgo-treated rats reached the training criteria faster, and made fewer errors. Rats treated with Ginkgo during the learning phase made fewer working memory errors. However, neither acute nor chronic post-training treatment with Gingko enhanced spatial working memory. Taken together, the results of the present dissertation showed that Ginkgo increased c-Fos immunoreactivity in several brain structures involved in learning and memory. Moreover, Ginkgo enhanced acquisition and performance of a double-Y maze task, but did not offer any continued benefits in an already-learned working memory task. Interestingly, a dose of Ginkgo (13.75 mg/kg) that was found to improve cognitive functioned failed to promote either cell proliferation or cell survival in the adult dentate gyrus. It also failed to restore the suppressive effects of CORT on dentate gyrus cell survival. It is concluded that Ginkgo pre-treatment subtly enhances learning, but this effect is likely not related to a modulatory effect on adult hippocampal neurogenesis

    Rotating the boards:corporate governance

    Get PDF
    Can companies resolve groupthink issues and improve their performance by turning over their boards more often, ask Mark Rogers and Amir Satvat

    Verkürztes MR-Late Enhancement Protokoll zur Differenzierung zwischen Tumorprogression und therapieinduzierten Veränderungen beim Glioblastom

    Get PDF
    Die genaue Unterscheidung von Tumorprogression und therapieinduzierten Veränderungen beim Glioblastom mittels MRT kann für die behandelnden Ärzte eine Herausforderung sein (4, 5). Bislang ist eine frühzeitige ätiologische Zuordnung dieser Läsionen mit konventionellen MR-Sequenzen nicht immer möglich, was die Therapie erschwert (5–7). Im Laufe der letzten Jahre konzipierten mehrere Studien radiologische und nuklearmedizinische Verfahren zur Differenzierung von therapieinduziertem Pseudoprogress und Tumorrezidiv. Die Methoden konnten sich allerdings zum Teil noch nicht im klinischen Alltag im Rahmen der Nachsorgeuntersuchung etablieren oder boten keine ausreichende Sicherheit (7). Beispielhaft seien die MR- Spektroskopie, die Perfusions-MRT und die Aminosäurentracer-PET genannt. Daher untersuchten andere Studien das Verhalten von Kontrastmitteln (KM) in verdächtigen Arealen mit dem sogenannten Late Enhancement-Verfahren. Hierbei wurden über einen Zeitraum bis zu 75 Minuten nach der KM-Applikation hochauflösende T1- gewichtete MR-Sequenzen aufgenommen, aus denen anschließend Subtraktionskarten zur „einfacheren“ Visualisierung der KM-Extravasation erstellt wurden. Die positiven Ergebnisse der Studien von Zach et al. betonen die Bedeutung der Late Enhancement-basierten Verlaufsbeurteilung, die nur einen geringen technischen Mehraufwand im klinischen Alltag mit sich bringt (5, 8). Behandlungsbedingte Veränderungen führen bis zu 75 Minuten nach KM-Gabe nachweislich zu einer KM-Akkumulation (Pooling) im betroffenen Gewebe, während ein echtes Tumorrezidiv durch ein frühes Ausschwemmen (Wash-out) des KM gekennzeichnet ist. Angelehnt an diese Studie wurde in der Klinik für Neuroradiologie das MR-Protokoll für die Glioblastom-Nachsorge modifiziert. Um die Anwendbarkeit im klinischen Alltag zu optimieren, wurde das Late Enhancement-Untersuchungsprotokoll verkürzt, indem die T1w-Spätphase (Late Enhancement-Serie) bereits 20 Minuten nach KM-Gabe aufgenommen wurde.III, 70 Seiten ; Illustratione

    OSTINATO: Cross-host Attack Correlation Through Attack Activity Similarity Detection

    Full text link
    Modern attacks against enterprises often have multiple targets inside the enterprise network. Due to the large size of these networks and increasingly stealthy attacks, attacker activities spanning multiple hosts are extremely difficult to correlate during a threat-hunting effort. In this paper, we present a method for an efficient cross-host attack correlation across multiple hosts. Unlike previous works, our approach does not require lateral movement detection techniques or host-level modifications. Instead, our approach relies on an observation that attackers have a few strategic mission objectives on every host that they infiltrate, and there exist only a handful of techniques for achieving those objectives. The central idea behind our approach involves comparing (OS agnostic) activities on different hosts and correlating the hosts that display the use of similar tactics, techniques, and procedures. We implement our approach in a tool called Ostinato and successfully evaluate it in threat hunting scenarios involving DARPA-led red team engagements spanning 500 hosts and in another multi-host attack scenario. Ostinato successfully detected 21 additional compromised hosts, which the underlying host-based detection system overlooked in activities spanning multiple days of the attack campaign. Additionally, Ostinato successfully reduced alarms generated from the underlying detection system by more than 90%, thus helping to mitigate the threat alert fatigue problemComment: 21 pages, 5 figure

    Privacy Preserving Internet Browsers: Forensic Analysis of Browzar

    Full text link
    With the advance of technology, Criminal Justice agencies are being confronted with an increased need to investigate crimes perpetuated partially or entirely over the Internet. These types of crime are known as cybercrimes. In order to conceal illegal online activity, criminals often use private browsing features or browsers designed to provide total browsing privacy. The use of private browsing is a common challenge faced in for example child exploitation investigations, which usually originate on the Internet. Although private browsing features are not designed specifically for criminal activity, they have become a valuable tool for criminals looking to conceal their online activity. As such, Technological Crime units often focus their forensic analysis on thoroughly examining the web history on a computer. Private browsing features and browsers often require a more in-depth, post mortem analysis. This often requires the use of multiple tools, as well as different forensic approaches to uncover incriminating evidence. This evidence may be required in a court of law, where analysts are often challenged both on their findings and on the tools and approaches used to recover evidence. However, there are very few research on evaluating of private browsing in terms of privacy preserving as well as forensic acquisition and analysis of privacy preserving internet browsers. Therefore in this chapter, we firstly review the private mode of popular internet browsers. Next, we describe the forensic acquisition and analysis of Browzar, a privacy preserving internet browser and compare it with other popular internet browser
    corecore