191 research outputs found

    Risk Factors for Severe Violence in Intimate Partner Stalking Situations: An Analysis of Police Records

    Get PDF
    Stalkers can be violent, and empirical studies have sought to identify factors associated with violence perpetrated by the stalker. Most of these works view physical violence as a homogeneous construct and do not differentiate between moderate and severe violence. The present study aims to identify correlates of nonviolent, moderate, and severe physical violence within an archival sample of 369 domestically violent police incident reports, where stalking behavior was indicated. The incident reports utilized in this study occurred between 2013 and 2017, among intimate or ex-intimate partners. The present study explored 12 independent variables that have yielded mixed findings in previous stalking violence literature, as well as two previously untested factors of nonfatal strangulation and child contact. The police records were coded for severity of physical violence using the Revised Conflict Tactics Scale and analyzed using a logistic regression. The regression analysis revealed significant independent associations between the outcome variable of severe physical violence and child contact, history of domestic violence, separation, nonfatal strangulation, jealousy, previous injury, and victim belief of potential harm. These results may help produce pragmatic recommendations for law enforcement agencies and other relevant bodies who seek to identify victims at risk of severe violence, increasing the potential for early intervention and prevention of physical harm. The awareness of factors that are shown to be related to serious physical violence may assist first responders in recognizing which victims may be at risk of serious harm, as well as effectively allocating any appropriate resources to reduce and prevent harm

    Adaptive versus Static Security in the UC Model

    Get PDF
    We show that for certain class of unconditionally secure protocols and target functionalities, static security implies adaptive security in the UC model. Similar results were previously only known for models with weaker security and/or composition guarantees. The result is, for instance, applicable to a wide range of protocols based on secret sharing. It ``explains\u27\u27 why an often used proof technique for such protocols works, namely where the simulator runs in its head a copy of the honest players using dummy inputs and generates a protocol execution by letting the dummy players interact with the adversary. When a new player PiP_i is corrupted, the simulator adjusts the state of its dummy copy of PiP_i to be consistent with the real inputs and outputs of PiP_i and gives the state to the adversary. Our result gives a characterisation of the cases where this idea will work to prove adaptive security. As a special case, we use our framework to give the first proof of adaptive security of the seminal BGW protocol in the UC framework

    Associations between diffusion MRI microstructure and cerebrospinal fluid markers of Alzheimer's disease pathology and neurodegeneration along the Alzheimer's disease continuum

    Get PDF
    INTRODUCTION: White matter (WM) degeneration is a critical component of early Alzheimer's disease (AD) pathophysiology. Diffusion-weighted imaging (DWI) models, including diffusion tensor imaging (DTI), neurite orientation dispersion and density imaging (NODDI), and mean apparent propagator MRI (MAP-MRI), have the potential to identify early neurodegenerative WM changes associated with AD. METHODS: We imaged 213 (198 cognitively unimpaired) aging adults with DWI and used tract-based spatial statistics to compare 15 DWI metrics of WM microstructure to 9 cerebrospinal fluid (CSF) markers of AD pathology and neurodegeneration treated as continuous variables. RESULTS: We found widespread WM injury in AD, as indexed by robust associations between DWI metrics and CSF biomarkers. MAP-MRI had more spatially diffuse relationships with Aβ42/40 and pTau, compared with NODDI and DTI. DISCUSSION: Our results suggest that WM degeneration may be more pervasive in AD than is commonly appreciated and that innovative DWI models such as MAP-MRI may provide clinically viable biomarkers of AD-related neurodegeneration in the earliest stages of AD progression

    Solar granulation from photosphere to low chromosphere observed in BaII 4554 A line

    Full text link
    The purpose of this paper is to characterize the statistical properties of solar granulation in the photosphere and low chromosphere up to 650 km. We use velocity and intensity variations obtained at different atmospheric heights from observations in BaII 4554 A. The observations were done during good seeing conditions at the VTT at the Observatorio del Teide on Tenerife. The line core forms rather high in the atmosphere and allows granulation properties to be studied at heights that have been not accessed before in similar studies. In addition, we analyze the synthetic profiles of the BaII 4554 A line by the same method computed taking NLTE effects into account in the 3D hydrodynamical model atmosphere. We suggest a 16-column model of solar granulation depending on the direction of motion and on the intensity contrast measured in the continuum and in the uppermost layer. We calculate the heights of intensity contrast sign reversal and velocity sign reversal. We show that both parameters depend strongly on the granulation velocity and intensity at the bottom photosphere. The larger the two parameters, the higher the reversal takes place in the atmosphere. On average, this happens at about 200-300 km. We suggest that this number also depends on the line depth of the spectral line used in observations. Despite the intensity and velocity reversal, about 40% of the column structure of granulation is preserved up to heights around 650 km.Comment: accepted by Astronomy and Astrophysic

    The recency ratio assessed by story recall is associated with cerebrospinal fluid levels of neurodegeneration biomarkers

    Get PDF
    Recency refers to the information learned at the end of a study list or task. Recency forgetting, as tracked by the ratio between recency recall in immediate and delayed conditions, i.e., the recency ratio (Rr), has been applied to list-learning tasks, demonstrating its efficacy in predicting cognitive decline, conversion to mild cognitive impairment (MCI), and cerebrospinal fluid (CSF) biomarkers of neurodegeneration. However, little is known as to whether Rr can be effectively applied to story recall tasks. To address this question, data were extracted from the database of the Alzheimer's Disease Research Center at the University of Wisconsin – Madison. A total of 212 participants were included in the study. CSF biomarkers were amyloid-beta (Aβ) 40 and 42, phosphorylated (p) and total (t) tau, neurofilament light (NFL), neurogranin (Ng), and α-synuclein (a-syn). Story Recall was measured with the Logical Memory Test (LMT). We carried out Bayesian regression analyses with Rr, and other LMT scores as predictors; and CSF biomarkers (including the Aβ42/40 and p-tau/Aβ42 ratios) as outcomes. Results showed that models including Rr consistently provided best fits with the data, with few exceptions. These findings demonstrate the applicability of Rr to story recall and its sensitivity to CSF biomarkers of neurodegeneration, and encourage its inclusion when evaluating risk of neurodegeneration with story recall

    The Edited Truth

    Get PDF
    We introduce two new cryptographic notions in the realm of public and symmetric key encryption. Encryption with invisible edits is an encryption scheme with two tiers of users: privileged and unprivileged . Privileged users know a key pair (pk,sk)(pk, sk) and unprivileged users know a key pair (pke,ske)(pk_e, sk_e) which is associated with an underlying edit ee to be applied to messages encrypted. Each key pair on its own works exactly as in standard public-key encryption, but when an unprivileged user attempts to decrypt a ciphertext generated by a privileged user of an underlying plaintext mm, it will be decrypted to an edited m2˘7=Edit(m,e)m\u27 = Edit(m,e). Here, EditEdit is some supported edit function and ee is a description of the particular edit to be applied. For example, we might want the edit to overwrite several sensitive blocks of data, replace all occurrences of one word with a different word, airbrush an encrypted image, etc. A user shouldn\u27t be able to tell whether he\u27s an unprivileged or a privileged user. An encryption with deniable edits is an encryption scheme which allows a user who owns a ciphertext cc encrypting a large corpus of data mm under a secret key sksk, to generate an alternative but legitimate looking secret key ske,csk_{e,c} that decrypts cc to an edited version of the data m2˘7=Edit(m,e)m\u27=Edit(m,e). This generalizes classical receiver deniable encryption, which can be viewed as a special case of deniable edits where the edit function performs a complete replacement of the original data. The new flexibility allows us to design solutions with much smaller key sizes than required in classical receiver deniable encryption, and in particular allows the key size to only scale with the description size of the edit ee which can be much smaller than the size of the plaintext data mm. We construct encryption schemes with deniable and invisible edits for any polynomial-time computable edit function under minimal assumptions: in the public-key setting we only require the existence of standard public-key encryption and in the symmetric-key setting we only require the existence of one-way functions. The solutions to both problems use common ideas, however there is a significant conceptual difference between deniable edits and invisible edits. Whereas encryption with deniable edits enables a user to modify the meaning of a single ciphertext in hindsight, the goal of encryption with invisible edits is to enable ongoing modifications of multiple ciphertexts

    A comparison of diagnostic performance of word-list and story recall tests for biomarker-determined Alzheimer’s disease

    Get PDF
    BACKGROUND: Wordlist and story recall tests are routinely employed in clinical practice for dementia diagnosis. In this study, our aim was to establish how well-standard clinical metrics compared to process scores derived from wordlist and story recall tests in predicting biomarker determined Alzheimer’s disease, as defined by CSF ptau/Aβ42 ratio. METHODS: Data from 295 participants (mean age = 65 ± 9.) were drawn from the University of Wisconsin – Madison Alzheimer’s Disease Research Center (ADRC) and Wisconsin Registry for Alzheimer’s Prevention (WRAP). Rey’s Auditory Verbal Learning Test (AVLT; wordlist) and Logical Memory Test (LMT; story) data were used. Bayesian linear regression analyses were carried out with CSF ptau/Aβ42 ratio as outcome. Sensitivity analyses were carried out with logistic regressions to assess diagnosticity. RESULTS: LMT generally outperformed AVLT. Notably, the best predictors were primacy ratio, a process score indexing loss of information learned early during test administration, and recency ratio, which tracks loss of recently learned information. Sensitivity analyses confirmed this conclusion. CONCLUSIONS: Our study shows that story recall tests may be better than wordlist tests for detection of dementia, especially when employing process scores alongside conventional clinical scores

    Towards Multiparty Computation Withstanding Coercion of All Parties

    Get PDF
    Incoercible multi-party computation (Canetti-Gennaro ’96) allows parties to engage in secure computation with the additional guarantee that the public transcript of the computation cannot be used by a coercive outsider to verify representations made by the parties regarding their inputs, outputs, and local random choices. That is, it is guaranteed that the only deductions regarding the truthfulness of such representations, made by an outsider who has witnessed the communication among the parties, are the ones that can be drawn just from the represented inputs and outputs alone. To date, all incoercible secure computation protocols withstand coercion of only a fraction of the parties, or else assume that all parties use an execution environment that makes some crucial parts of their local states physically inaccessible even to themselves. We consider, for the first time, the setting where all parties are coerced, and the coercer expects to see the entire history of the computation. We allow both protocol participants and external attackers to access a common reference string which is generated once and for all by an uncorruptable trusted party. In this setting we construct: - A general multi-party function evaluation protocol, for any number of parties, that withstands coercion of all parties, as long as all parties use the prescribed ``faking algorithm\u27\u27 upon coercion. This holds even if the inputs and outputs represented by coerced parties are globally inconsistent with the evaluated function. - A general two-party function evaluation protocol that withstands even the %``mixed\u27\u27 case where some of the coerced parties do follow the prescribed faking algorithm. (For instance, these parties might collude with the coercer and disclose their true local states.) This protocol is limited to functions where the input of at least one of the parties is taken from a small (poly-size) domain. It uses fully deniable encryption with public deniability for one of the parties; when instantiated using the fully deniable encryption of Canetti, Park, and Poburinnaya (Crypto\u2720), it takes 3 rounds of communication. Both protocols operate in the common reference string model, and use fully bideniable encryption (Canetti Park and Poburinnaya, Crypto\u2720) and sub-exponential indistinguishability obfuscation. Finally, we show that protocols with certain communication pattern cannot be incoercible, even in a weaker setting where only some parties are coerced

    Insulin resistance is related to cognitive decline but not change in CSF biomarkers of Alzheimer's disease in non-demented adults

    Get PDF
    Introduction: We investigated whether insulin resistance (IR) was associated with longitudinal age-related change in cognition and biomarkers of Alzheimer's disease (AD) pathology and neurodegeneration in middle-aged and older adults who were non-demented at baseline. Methods: IR was measured with homeostatic model assessment of insulin resistance (HOMA2-IR). Core AD-related cerebrospinal fluid (CSF) biomarkers and cognition were assessed, respectively, on n = 212 (1 to 5 visits) and n = 1299 (1 to 6 visits). Linear mixed models tested whether HOMA2-IR moderated age-related change in CSF biomarkers and cognition. Linear regressions tested whether HOMA2-IR x apolipoprotein E ε4 allele (APOE ε4) carrier status predicted amyloid beta [Aβ] chronicity (estimated duration of amyloid positron emission tomography [PET] positivity) (n = 253). Results: Higher HOMA2-IR was associated with greater cognitive decline but not with changes in CSF biomarkers. HOMA2-IR x APOE4 was not related to Aβ chronicity but was significantly associated with CSF phosphorylated tau (P-tau)181/Aβ42 level. Discussion: In non-demented adults IR may not be directly associated with age-related change in AD biomarkers. Additional research is needed to determine mechanisms linking IR to cognitive decline
    • …
    corecore