scholarly journals Paying attention to attention in depression

2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Arielle S. Keller ◽  
John E. Leikauf ◽  
Bailey Holt-Gosselin ◽  
Brooke R. Staveland ◽  
Leanne M. Williams

Abstract Attention is the gate through which sensory information enters our conscious experiences. Oftentimes, patients with major depressive disorder (MDD) complain of concentration difficulties that negatively impact their day-to-day function, and these attention problems are not alleviated by current first-line treatments. In spite of attention’s influence on many aspects of cognitive and emotional functioning, and the inclusion of concentration difficulties in the diagnostic criteria for MDD, the focus of depression as a disease is typically on mood features, with attentional features considered less of an imperative for investigation. Here, we summarize the breadth and depth of findings from the cognitive neurosciences regarding the neural mechanisms supporting goal-directed attention in order to better understand how these might go awry in depression. First, we characterize behavioral impairments in selective, sustained, and divided attention in depressed individuals. We then discuss interactions between goal-directed attention and other aspects of cognition (cognitive control, perception, and decision-making) and emotional functioning (negative biases, internally-focused attention, and interactions of mood and attention). We then review evidence for neurobiological mechanisms supporting attention, including the organization of large-scale neural networks and electrophysiological synchrony. Finally, we discuss the failure of current first-line treatments to alleviate attention impairments in MDD and review evidence for more targeted pharmacological, brain stimulation, and behavioral interventions. By synthesizing findings across disciplines and delineating avenues for future research, we aim to provide a clearer outline of how attention impairments may arise in the context of MDD and how, mechanistically, they may negatively impact daily functioning across various domains.

2017 ◽  
Vol 5 (1) ◽  
pp. 70-82
Author(s):  
Soumi Paul ◽  
Paola Peretti ◽  
Saroj Kumar Datta

Building customer relationships and customer equity is the prime concern in today’s business decisions. The emergence of internet, especially social media like Facebook and Twitter, changed traditional marketing thought to a great extent. The importance of customer orientation is reflected in the axiom, “The customer is the king”. A good number of organizations are engaging customers in their new product development activities via social media platforms. Co-creation, a new perspective in which customers are active co-creators of the products they buy and use, is currently challenging the traditional paradigm. The concept of co-creation involving the customer’s knowledge, creativity and judgment to generate value is considered not only an upcoming trend that introduces new products or services but also fitting their need and increasing value for money. Knowledge and innovation are inseparable. Knowledge management competencies and capacities are essential to any organization that aspires to be distinguished and innovative. The present work is an attempt to identify the change in value creation procedure along with one area of business, where co-creation can return significant dividends. It is on extending the brand or brand category through brand extension or line extension. This article, through an in depth literature review analysis, identifies the changes in every perspective of this paradigm shift and it presents a conceptual model of company-customer-brand-based co-creation activity via social media. The main objective is offering an agenda for future research of this emerging trend and ensuring the way to move from theory to practice. The paper acts as a proposal; it allows the organization to go for this change in a large scale and obtain early feedback on the idea presented. 


Author(s):  
Xu Pei-Zhen ◽  
Lu Yong-Geng ◽  
Cao Xi-Min

Background: Over the past few years, the subsynchronous oscillation (SSO) caused by the grid-connected wind farm had a bad influence on the stable operation of the system and has now become a bottleneck factor restricting the efficient utilization of wind power. How to mitigate and suppress the phenomenon of SSO of wind farms has become the focus of power system research. Methods: This paper first analyzes the SSO of different types of wind turbines, including squirrelcage induction generator based wind turbine (SCIG-WT), permanent magnet synchronous generator- based wind turbine (PMSG-WT), and doubly-fed induction generator based wind turbine (DFIG-WT). Then, the mechanisms of different types of SSO are proposed with the aim to better understand SSO in large-scale wind integrated power systems, and the main analytical methods suitable for studying the SSO of wind farms are summarized. Results: On the basis of results, using additional damping control suppression methods to solve SSO caused by the flexible power transmission devices and the wind turbine converter is recommended. Conclusion: The current development direction of the SSO of large-scale wind farm grid-connected systems is summarized and the current challenges and recommendations for future research and development are discussed.


Author(s):  
Matilda A. Haas ◽  
Harriet Teare ◽  
Megan Prictor ◽  
Gabi Ceregra ◽  
Miranda E. Vidgen ◽  
...  

AbstractThe complexities of the informed consent process for participating in research in genomic medicine are well-documented. Inspired by the potential for Dynamic Consent to increase participant choice and autonomy in decision-making, as well as the opportunities for ongoing participant engagement it affords, we wanted to trial Dynamic Consent and to do so developed our own web-based application (web app) called CTRL (control). This paper documents the design and development of CTRL, for use in the Australian Genomics study: a health services research project building evidence to inform the integration of genomic medicine into mainstream healthcare. Australian Genomics brought together a multi-disciplinary team to develop CTRL. The design and development process considered user experience; security and privacy; the application of international standards in data sharing; IT, operational and ethical issues. The CTRL tool is now being offered to participants in the study, who can use CTRL to keep personal and contact details up to date; make consent choices (including indicate preferences for return of results and future research use of biological samples, genomic and health data); follow their progress through the study; complete surveys, contact the researchers and access study news and information. While there are remaining challenges to implementing Dynamic Consent in genomic research, this study demonstrates the feasibility of building such a tool, and its ongoing use will provide evidence about the value of Dynamic Consent in large-scale genomic research programs.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1670
Author(s):  
Waheeb Abu-Ulbeh ◽  
Maryam Altalhi ◽  
Laith Abualigah ◽  
Abdulwahab Ali Almazroi ◽  
Putra Sumari ◽  
...  

Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Emily T. Wood ◽  
Kaitlin K. Cummings ◽  
Jiwon Jung ◽  
Genevieve Patterson ◽  
Nana Okada ◽  
...  

AbstractSensory over-responsivity (SOR), extreme sensitivity to or avoidance of sensory stimuli (e.g., scratchy fabrics, loud sounds), is a highly prevalent and impairing feature of neurodevelopmental disorders such as autism spectrum disorders (ASD), anxiety, and ADHD. Previous studies have found overactive brain responses and reduced modulation of thalamocortical connectivity in response to mildly aversive sensory stimulation in ASD. These findings suggest altered thalamic sensory gating which could be associated with an excitatory/inhibitory neurochemical imbalance, but such thalamic neurochemistry has never been examined in relation to SOR. Here we utilized magnetic resonance spectroscopy and resting-state functional magnetic resonance imaging to examine the relationship between thalamic and somatosensory cortex inhibitory (gamma-aminobutyric acid, GABA) and excitatory (glutamate) neurochemicals with the intrinsic functional connectivity of those regions in 35 ASD and 35 typically developing pediatric subjects. Although there were no diagnostic group differences in neurochemical concentrations in either region, within the ASD group, SOR severity correlated negatively with thalamic GABA (r = −0.48, p < 0.05) and positively with somatosensory glutamate (r = 0.68, p < 0.01). Further, in the ASD group, thalamic GABA concentration predicted altered connectivity with regions previously implicated in SOR. These variations in GABA and associated network connectivity in the ASD group highlight the potential role of GABA as a mechanism underlying individual differences in SOR, a major source of phenotypic heterogeneity in ASD. In ASD, abnormalities of the thalamic neurochemical balance could interfere with the thalamic role in integrating, relaying, and inhibiting attention to sensory information. These results have implications for future research and GABA-modulating pharmacologic interventions.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 461
Author(s):  
Yongbin Yim ◽  
Euisin Lee ◽  
Seungmin Oh

Recently, the demand for monitoring a certain object covering large and dynamic scopes such as wildfires, glaciers, and radioactive contaminations, called large-scale fluid objects (LFOs), is coming to the fore due to disasters and catastrophes that lately happened. This article provides an analytic comparison of such LFOs and typical individual mobile objects (IMOs), namely animals, humans, vehicles, etc., to figure out inherent characteristics of LFOs. Since energy-efficient monitoring of IMOs has been intensively researched so far, but such inherent properties of LFOs hinder the direct adaptation of legacy technologies for IMOs, this article surveys technological evolution and advances of LFOs along with ones of IMOs. Based on the communication cost perspective correlated to energy efficiency, three technological phases, namely concentration, integration, and abbreviation, are defined in this article. By reviewing various methods and strategies employed by existing works with the three phases, this article concludes that LFO monitoring should achieve not only decoupling from node density and network structure but also trading off quantitative reduction against qualitative loss as architectural principles of energy-efficient communication to break through inherent properties of LFOs. Future research challenges related to this topic are also discussed.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Géraldine Fauville ◽  
Anna C. M. Queiroz ◽  
Erika S. Woolsey ◽  
Jonathan W. Kelly ◽  
Jeremy N. Bailenson

AbstractResearch about vection (illusory self-motion) has investigated a wide range of sensory cues and employed various methods and equipment, including use of virtual reality (VR). However, there is currently no research in the field of vection on the impact of floating in water while experiencing VR. Aquatic immersion presents a new and interesting method to potentially enhance vection by reducing conflicting sensory information that is usually experienced when standing or sitting on a stable surface. This study compares vection, visually induced motion sickness, and presence among participants experiencing VR while standing on the ground or floating in water. Results show that vection was significantly enhanced for the participants in the Water condition, whose judgments of self-displacement were larger than those of participants in the Ground condition. No differences in visually induced motion sickness or presence were found between conditions. We discuss the implication of this new type of VR experience for the fields of VR and vection while also discussing future research questions that emerge from our findings.


Author(s):  
Jakub Zdarta ◽  
Katarzyna Jankowska ◽  
Karolina Bachosz ◽  
Oliwia Degórska ◽  
Karolina Kaźmierczak ◽  
...  

Abstract Purpose of Review In the presented review, we have summarized recent achievements on the use of immobilized oxidoreductases for biodegradation of hazardous organic pollutants including mainly dyes, pharmaceuticals, phenols, and bisphenols. In order to facilitate process optimization and achievement of high removal rates, effect of various process conditions on biodegradation has been highlighted and discussed. Recent Findings Current reports clearly show that immobilized oxidoreductases are capable of efficient conversion of organic pollutants, usually reaching over 90% of removal rate. Further, immobilized enzymes showed great recyclability potential, allowing their reuse in numerous of catalytic cycles. Summary Collected data clearly indicates immobilized oxidoreductases as an efficient biocatalytic tools for removal of hazardous phenolic compounds, making them a promising option for future water purification. Data shows, however, that both immobilization and biodegradation conditions affect conversion efficiency; therefore, process optimization is required to achieve high removal rates. Nevertheless, we have demonstrated future trends and highlighted several issues that have to be solved in the near-future research, to facilitate large-scale application of the immobilized oxidoreductases in wastewater treatment.


Aerospace ◽  
2021 ◽  
Vol 8 (2) ◽  
pp. 38
Author(s):  
Malik Doole ◽  
Joost Ellerbroek ◽  
Victor L. Knoop ◽  
Jacco M. Hoekstra

Large-scale adoption of drone-based delivery in urban areas promise societal benefits with respect to emissions and on-ground traffic congestion, as well as potential cost savings for drone-based logistic companies. However, for this to materialise, the ability of accommodating high volumes of drone traffic in an urban airspace is one of the biggest challenges. For unconstrained airspace, it has been shown that traffic alignment and segmentation can be used to mitigate conflict probability. The current study investigates the application of these principles to a highly constrained airspace. We propose two urban airspace concepts, applying road-based analogies of two-way and one-way streets by imposing horizontal structure. Both of the airspace concepts employ heading-altitude rules to vertically segment cruising traffic according to their travel direction. These airspace configurations also feature transition altitudes to accommodate turning flights that need to decrease the flight speed in order to make safe turns at intersections. While using fast-time simulation experiments, the performance of these airspace concepts is compared and evaluated for multiple traffic demand densities in terms of safety, stability, and efficiency. The results reveal that an effective way to structure drone traffic in a constrained urban area is to have vertically segmented altitude layers with respect to travel direction as well as horizontal constraints imposed to the flow of traffic. The study also makes recommendations for areas of future research, which are aimed at supporting dynamic traffic demand patterns.


2021 ◽  
Vol 11 (12) ◽  
pp. 5458
Author(s):  
Sangjun Kim ◽  
Kyung-Joon Park

A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.


Sign in / Sign up

Export Citation Format

Share Document