1,082 research outputs found

    Services Available to Alzheimer\u27s Diseased Patients and Their Families

    Get PDF
    The focus of this project is an overview of services that are available to Alzheimer\u27s Disease clients. Since our society has seen an increase in the number of patients diagnosed with the disease, it\u27s necessary to plan into the future and direct our goals in providing good health care. One wants to be capable of handling every aspect of the disease we see today. One must also protect the client and health care professionals. The client must be allowed to live a productive and happy life. Unfortunately, because of the disease process, I feel it robs the client of the happiness they are entitled to. There will be insight as to how a family may cope with an Alzheimer\u27s diseased loved one -- how the disease will effect the family members -- how the husband, wife, or children may cope with the unpredictability of an Alzheimer\u27s patient -- the changes that the patients/ clients will experience. In the field of health care I have found varying correlation in the study of Alzheimer\u27s Disease. What I have set out to accomplish is some understanding of the interaction of the studies. However, I find it necessary to concentrate on the services available to the Alzheimer\u27s patient. I have found that the number of Alzheimer\u27s patients in nursing facilities are increasing. Also, yearly, large numbers of patients are diagnosed with signs or symptoms of Alzheimer\u27s Disease. It\u27s believed that the disease ·has relationship to previously termed Dementia. Dementia is not a disease in itself, but a group of symptoms that have characteristics of certain diseases and conditions

    Status, Dispersal, and Breeding Biology of the Exotic Eurasian Collared-Dove (Streptopelia decaocto) in Arkansas

    Get PDF
    The exotic Eurasian Collared-Dove (Streptopelia decaocto) was first sighted in Arkansas at Harrison (Boone Co.) on 25 June 1989. Since this initial sighting the species has grown in numbers and is now present in 42 of 75 counties across the state. In the spring and summer of 2009 and 2010, 20 nests were observed in the urban areas of Fort Smith (Sebastian County). Fifteen of the 20 nests (75%) were located on human-made structures of which 13 (65%) were on an electrical substation and two (10%) were on utility poles. The remaining 5 nests (25%) were in trees. Mean nest height was 7.62 m (n = 20 nests), and the mean width of the nest site support was 40 cm (n = 6 nests). Thirteen of the 20 nests (65%) yielded fledgling(s). Three focal nests were chosen for intense observation. Nest building lasted 1 to 3 days (mean = 2 days); incubation period was 15 days; and fledging occurred 17-18 days after hatching (n = 3 nests). A total of 6 young fledged from these 3 nests

    Reactions of NaCl with Gaseous SO3, SO2, and O2

    Get PDF
    Hot corrosion of gas turbine engine components involves deposits of Na2SO4 which are produced by reactions between NaCl and oxides of sulfur. For the present investigation, NaCl single crystals were exposed at 100 to 850 C to gaseous mixtures of SO3, SO2, and O2. The products formed during this exposure depend, primarily, on the temperatures. The four product films were: NaCl-SO3; Na2S2O7; Na2SO4; and NaCl-Na2SO4. The kinetics of the reactions were measured

    Optimizing time allocation for network defence

    Get PDF
    The presence of unpatched, exploitable vulnerabilities in software is a prerequisite for many forms of cyberattack. Because of the almost inevitable discovery of a vulnerability and creation of an exploit for all types of software, multiple layers of security are usually used to protect vital systems from compromise. Accordingly, attackers seeking to access protected systems must circumvent all of these layers. Resource- and budget-constrained defenders must choose when to execute actions such as patching, monitoring and cleaning infected systems in order to best protect their networks. Similarly, attackers must also decide when to attempt to penetrate a system and which exploit to use when doing so. We present an approach to modelling computer networks and vulnerabilities that can be used to find the optimal allocation of time to different system defence tasks. The vulnerabilities, state of the system and actions by the attacker and defender are used to build partially observable stochastic games. These games capture the uncertainty about the current state of the system and the uncertainty about the future. The solution to these games is a policy, which indicates the optimal actions to take for a given belief about the current state of the system. We demonstrate this approach using several different network configurations and types of player. We consider a trade-off for the system administrator, where they must allocate their time to performing either security-related tasks or performing other required non-security tasks. The results presented highlight that, with the requirement for other tasks to be performed, following the optimal policy means spending time on only the most essential security-related tasks, while the majority of time is spent on non-security tasks

    Production-line calf feeding

    Get PDF
    MANY cream-producing dairy farmers have found that it can be profitable to increase the number of calves they rear. In fact, it is big business for those who can rear up to 200 calves a year, and a few have already achieved this number

    Let\u27s look at herringbone dairies

    Get PDF
    THE first of the modern type herringbone dairies in Western Australia was constructed by Mr. F. Tucker of Ruabon, in 1957. Since then there has been strong interest in this system, and there are now at least six such sheds operating in the district between Ludlow and Augusta. Many more are being constructed

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    Empirically-Driven Multiwavelength K-corrections At Low Redshift

    Full text link
    K-corrections, conversions between flux in observed bands to flux in rest-frame bands, are critical for comparing galaxies at various redshifts. These corrections often rely on fits to empirical or theoretical spectral energy distribution (SED) templates of galaxies. However, the templates limit reliable K-corrections to regimes where SED models are robust. For instance, the templates are not well-constrained in some bands (e.g., WISE W4), which results in ill-determined K-corrections for these bands. We address this shortcoming by developing an empirically-driven approach to K-corrections as a means to mitigate dependence on SED templates. We perform a polynomial fit for the K-correction as a function of a galaxy's rest-frame color determined in well-constrained bands (e.g., rest-frame (g-r)) and redshift, exploiting the fact that galaxy SEDs can be described as a one parameter family at low redshift (0.01 < z < 0.09). For bands well-constrained by SED templates, our empirically-driven K-corrections are comparable to the SED fitting method of Kcorrect and SED template fitting employed in the GSWLC-M2 catalogue (the updated medium-deep GALEX-SDSS-WISE Legacy Catalogue). However, our method dramatically outperforms the available SED fitting K-corrections for WISE W4. Our method also mitigates incorrect template assumptions and enforces the K-correction to be 0 at z = 0. Our K-corrected photometry and code are publicly available.Comment: 15 pages, 9 figures, submitted to MNRA

    Predator telemetry informs temporal and spatial overlap with stocked salmonids in Lake Huron

    Get PDF
    Double-Crested Cormorants (Phalacrocorax auratus), Walleyes (Sander vitreus), and Lake Trout (Salvelinus namaycush) are migratory predators that undergo extensive movements in Lake Huron. Stocking of juvenile salmonid fish (Oncorhynchus and Salmo sp.) is an important component of fishery management in Lake Huron and assessing the spatial and temporal extent of predator movements is a useful consideration for determining when and where to stock juvenile fish to reduce predation and maximize survival. Previous investigation indicated that some Walleyes migrate to the main basin of Lake Huron in spring from Saginaw Bay. Similarly, telemetry studies of Lake Trout movement in Lake Huron have indicated an onshore movement in the spring. We used detection histories of Walleyes implanted with acoustic transmitters tagged in Saginaw Bay and Lake Trout implanted in northern Lake Huron to estimate the arrival date of migrating adults at eight ports in Lake Huron, where hatchery reared juvenile salmonids are stocked. Satellite telemetry of Cormorants that return to nesting grounds in northern Lake Huron were used to estimate their arrival dates at the same Lake Huron ports. Arrival of Walleye at Lake Huron ports ranged from April 10th to May 7th. Cormorants arrived earlier than Walleye at most Lake Huron ports (April 11th–April 18th). Lake Trout were more variable with a range of onshore movement from March 28th to May 16th. Our results suggested stocking efforts at these ports should generally occur before April 14th to decrease predatory impact from Cormorants, Walleyes, and Lake Trout
    • …
    corecore