1,089 research outputs found

    Predictors of Performance In A Professional Counselor Masters Program

    Get PDF

    Address by Hon. Thomas M. Cooley, and Poem by D. Bethune Duffield, Esq., on the Dedication of the Law Lecture Hall of the Michigan University

    Get PDF
    A stirring address by Professor Cooley upon the occasion of the dedication of the Law Lecture Hall of the first Law School Building. He begins: Students in the Department of Law: While Michigan was yet a wilderness, only feeling along its borders the advancing tread of civilization, and only hearing here and there the sound of the woodman\u27s axe, the wisdom of American statesmen made provision for the establishment in the territory of a great University...

    Implementing ideal health policy in a fragile health system: the example of expanding the use of malaria rapid diagnostic tests in mainland Tanzania

    Get PDF
    Malaria confirmation before treatment provides an opportunity for improving the quality of malaria case management in endemic regions. However, increased coverage of this strategy is facing many organizational, logistical and technical challenges that threaten its success. Introducing an intervention with system-wide effect, such as the use of malaria rapid diagnostic tests in areas where malaria is still a public health problem, should be accompanied by system strengthening measures to better attain the goal of improving quality of care

    Comment on: Randomized controlled trial of plain English and visual abstracts for disseminating surgical research via social media

    Get PDF
    This article is freely available via Open Access. Click on the publisher URL to access it via the publisher's site.pre-print, post-print (12 month embargo

    C1 inhibitor deficiency: 2014 United Kingdom consensus document

    Get PDF
    C1 inhibitor deficiency is a rare disorder manifesting with recurrent attacks of disabling and potentially life-threatening angioedema. Here we present an updated 2014 United Kingdom consensus document for the management of C1 inhibitor-deficient patients, representing a joint venture between the United Kingdom Primary Immunodeficiency Network and Hereditary Angioedema UK. To develop the consensus, we assembled a multi-disciplinary steering group of clinicians, nurses and a patient representative. This steering group first met in 2012, developing a total of 48 recommendations across 11 themes. The statements were distributed to relevant clinicians and a representative group of patients to be scored for agreement on a Likert scale. All 48 statements achieved a high degree of consensus, indicating strong alignment of opinion. The recommendations have evolved significantly since the 2005 document, with particularly notable developments including an improved evidence base to guide dosing and indications for acute treatment, greater emphasis on home therapy for acute attacks and a strong focus on service organisation. This article is protected by copyright. All rights reserved

    Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors

    Full text link
    We compare the performance of various quantum key distribution (QKD) systems using a novel single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche photodiode (APD). The comparison is based on the secure communication rate as a function of distance for three QKD protocols: the Bennett-Brassard 1984 (BB84), the Bennett, Brassard, and Mermin 1992 (BBM92), and the coherent differential phase shift keying (DPSK). We show that the up-conversion detector allows for higher communication rates and longer communication distances than the commonly used InGaAs/InP APD for all the three QKD protocols.Comment: 9 pages, 9 figure

    A perfect storm: a routine activity analysis of female undergraduate sexual assault

    Get PDF
    Institutions of higher education have been traditionally viewed as a safe place to explore entry into adulthood. However, sexual assault on college campuses is not uncommon, and awareness of sexual assaults on college campuses has increased tremendously in recent years. It is hypothesized in this paper that the lifestyle and activities associated with college life increase the likelihood of sexual assault on college campuses. Crime is expected to occur when the arrangements of social life place a motivated offender and a suitable victim in a space with no “capable” guardians. This paper uses routine activity theory as a foundational framework to examine the situational and individual characteristics that make college students more likely to offend or be victims of sexual assault. The data used in the present project comes from a 2005-2006 Campus Sexual Assault Survey, which was conducted online at two diverse, large public universities. Logistic regression analysis is used to separately assess patterns of sexual offending and victimization. Findings demonstrate that participation in certain social events increase the likelihood of offending and victimization. While this research is a first-step in attempting to understand why sexual assault occurs at a much higher rate in the college setting, the data indicate that many routine activities are important factors in explaining college campuses as a “hot spots” for sexual assault

    Autocompensating Quantum Cryptography

    Full text link
    Quantum cryptographic key distribution (QKD) uses extremely faint light pulses to carry quantum information between two parties (Alice and Bob), allowing them to generate a shared, secret cryptographic key. Autocompensating QKD systems automatically and passively compensate for uncontrolled time dependent variations of the optical fiber properties by coding the information as a differential phase between orthogonally-polarized components of a light pulse sent on a round trip through the fiber, reflected at mid-course using a Faraday mirror. We have built a prototype system based on standard telecom technology that achieves a privacy-amplified bit generation rate of ~1000 bits/s over a 10-km optical fiber link. Quantum cryptography is an example of an application that, by using quantum states of individual particles to represent information, accomplishes a practical task that is impossible using classical means.Comment: 18 pages, 6 figures, 1 table. Submitted to the New Journal of Physic

    Comparison of Bond Character in Hydrocarbons and Fullerenes

    Full text link
    We present a comparison of the bond polarizabilities for carbon-carbon bonds in hydrocarbons and fullerenes, using two different models for the fullerene Raman spectrum and the results of Raman measurements on ethane and ethylene. We find that the polarizabilities for single bonds in fullerenes and hydrocarbons compare well, while the double bonds in fullerenes have greater polarizability than in ethylene.Comment: 7 pages, no figures, uses RevTeX. (To appear in Phys. Rev. B.

    Thermodynamic description of Be(II) solubility and hydrolysis in acidic to hyperalkaline NaCl and KCl solutions

    Get PDF
    The solubility of Be(II) is investigated in carbonate-free dilute to concentrated HCl–NaCl–NaOH, KCl–KOH, NaOH and KOH solutions. Undersaturation experiments were performed under Ar atmosphere at T= (22 ± 2) °C. XRD, XPS, SEM and quantitative chemical analysis confirm that α-Be(OH)2_{2}(cr) is the solid phase controlling the solubility in all evaluated systems. No transformation of α-Be(OH)2_{2}(cr) to ÎČ-Be(OH)2_{2}(cr) or ternary solid phases Na/K–Be(II)–OH(s) is observed in the investigated systems within the timeframe of this study (t ≀ 600 days). An amphoteric solubility behaviour of Be(II) is observed with a solubility minimum at pHm_{m} ≈ 9.5 (with [Be(II)] ≈ 10−6.8^{-6.8}M), regardless of the ionic strength. The combination of solubility data determined in acidic pHm_{m} conditions and the hydrolysis scheme reported in the literature for cationic hydrolysis species of Be(II) is used for the determination of the solubility constant of α-Be(OH)2_{2}(cr), log *K°s,0_{s,0} = (6.9 ± 0.4). Slope analysis of the solubility data in alkaline to hyperalkaline conditions and 9^{9}Be NMR support the predominance of the monomeric hydrolysis species Be(OH)2_{2}(aq), Be(OH)3_{3}– and Be(OH)4_{4}2−^{2-} within the strongly alkaline pHm_{m}-conditions relevant in cementitious systems. The comprehensive solubility dataset collected within this study in combination with extensive solid and aqueous phase characterization allow the development of a complete chemical, thermodynamic and (SIT) activity model for the system Be2+^{2+}–Na+^{+}–K+^{+}–H+^{+}–Cl−^{-}–OH−^{-}–H2_{2}O(l). This model provides an accurate and robust tool for the evaluation of Be(II) solubility and speciation in a diversity of geochemical conditions, including source term calculations of beryllium in the context of the nuclear waste disposal Safety Case
    • 

    corecore