1,092 research outputs found

    Stress, Depression, Quality of Life, and Language Recovery in Constraint Induced Aphasia Therapy (CIAT)

    Get PDF
    Traditional aphasia treatment approaches focus initially on restoration of language, but quickly move to use of alternative modes of communication when progress is slow. Constraint Induced Aphasia Therapy (CIAT), a more intensive form of treatment, is based on the concept of frequent, long sessions and forced use of the impaired language system. Prior to the present study, the relationship between CIAT and stress had not been explored; therefore, this study compared cortisol stress levels and improvement of language skills in two groups of subjects, all of whom presented with expressive aphasia. Ten subjects participated in CIAT, and received 10 days of intensive treatment over two weeks. Ten subjects received traditional aphasia treatment, and received six days of treatment over two weeks. The study also examined perceived stress, depression, and quality of life as variables that might influence candidacy for CIAT. All participants in each group provided salivary cortisol samples, and completed perceived stress, depression, and quality of life questionnaires pre-treatment, mid-treatment, and post-treatment. Language skills were assessed pre-treatment and post-treatment. Results showed that, at baseline and at the end of treatment, there was no difference between groups on measures of cortisol stress levels; however, at mid-treatment, cortisol stress levels were significantly higher in the CIAT group. Participants in the CIAT group showed significant improvement on word repetition and overall aphasia quotient, whereas participants in the traditional treatment group showed no significant change. There were no significant changes in perceived stress scores, depression scores, or quality of life scores across time in either of the two groups. Implications for use of CIAT as a viable and effective treatment method for individuals with aphasia are discussed

    Selected Resources for Ministers of Music in Evangelical Christian Churches.

    Get PDF
    Ministers of music in Evangelical Christian churches today are usually trained as choral conductors but take positions that require them to unexpectedly be an instrumental conductor, administrator, counselor, recruiter, evangelist, and even associate pastor. There was no central resource for information to assist these musicians, thus this annotated bibliography was developed. It includes books and magazine articles on vocal and instrumental pedagogy, conducting, hymnology, theology, musical terminology, leadership skills, evangelism, and administration. Because of time limitations, only sources available at Sherrod Library, East Tennessee State University, and on the Internet were cited. Time restraints also limited the number of resources evaluated; this will be an ongoing project as more resources become available

    Extending Hardware Based Mandatory Access Controls to Multicore Architectures

    Get PDF
    Memory based vulnerabilities have plagued the computer industry since the release of the Morris worm twenty years ago. In addition to buffer overflow attacks like the Morris worm, format strings, ret-libC, and heap double free() viruses have been able to take advantage of pervasive programming errors. A recent example is the unspecified buffer overflow vulnerability present in Mozilla Firefox 3.0. From the past one can learn that these coding mistakes are not waning. A solution is needed that can close off these security shortcomings while still being of minimal impact to the user. Antivirus software makers continuously overestimate the lengths that the everyday user is willing to go to in order to protect his or her system. The ideal protection scheme will be of little or no inconvenience to the user. A technique that fits this niche is one that is built into the hardware. Typical users will never know of the added protection they\u27re receiving because they are getting it by default. Unlike the NX bit technology in modern x86 machines, the correct solution should be mandatory and uncircumventable by user programs. The idea of marking memory as non-executable is maintained but in this case the granularity is refined to the byte level. The standard memory model is extended by one bit per byte to indicate whether the data stored there is trusted or not. While this design is not unique in the architecture field, the issues that arise from multiple processing units in a single system causes complications. Therefore, the purpose of this work is to investigate hardware based mandatory access control mechanisms that work in the multicore paradigm. As a proof of concept, a buffer overflow style attack has been crafted that results in an escalation of privileges for a nonroot user. While effective against a standard processor, a CPU modified to include byte level tainting successfully repels the attack with minimal performance overhead

    A three-dimensional finite-element thermal/mechanical analytical technique for high-performance traveling wave tubes

    Get PDF
    Current research in high-efficiency, high-performance traveling wave tubes (TWT's) has led to the development of novel thermal/ mechanical computer models for use with helical slow-wave structures. A three-dimensional, finite element computer model and analytical technique used to study the structural integrity and thermal operation of a high-efficiency, diamond-rod, K-band TWT designed for use in advanced space communications systems. This analysis focused on the slow-wave circuit in the radiofrequency section of the TWT, where an inherent localized heating problem existed and where failures were observed during earlier cold compression, or 'coining' fabrication technique that shows great potential for future TWT development efforts. For this analysis, a three-dimensional, finite element model was used along with MARC, a commercially available finite element code, to simulate the fabrication of a diamond-rod TWT. This analysis was conducted by using component and material specifications consistent with actual TWT fabrication and was verified against empirical data. The analysis is nonlinear owing to material plasticity introduced by the forming process and also to geometric nonlinearities presented by the component assembly configuration. The computer model was developed by using the high efficiency, K-band TWT design but is general enough to permit similar analyses to be performed on a wide variety of TWT designs and styles. The results of the TWT operating condition and structural failure mode analysis, as well as a comparison of analytical results to test data are presented

    Malaria in South Africa the past, the present and selected implications for the future

    Get PDF
    No Abstract

    Rise in Malaria Incidence Rates in South Africa: A Small-Area Spatial Analysis of Variation in Time Trends

    Get PDF
    Using Bayesian statistical models, the authors investigated spatial and temporal variations in small-area malaria incidence rates for the period mid-1986 to mid-1999 for two districts in northern KwaZulu Natal, South Africa. Maps of spatially smoothed incidence rates at different time points and spatially smoothed time trends in incidence gave a visual impression of the highest increase in incidence occurring where incidence rates previously had been lowest. This was confirmed by conditional autoregressive models, which showed that there was a significant negative association between time trends and smoothed baseline incidence before the steady rise in caseloads began. Growth rates also appeared to be higher in the areas close to the Mozambican border. The main findings of this analysis were that: 1) the spatial distribution of the rise in malaria incidence is uneven and strongly suggests a geographic expansion of high-malaria-risk areas; 2) there is evidence of a stabilization of incidence in areas that had the highest rates before the current escalation of rates began; and 3) areas immediately adjoining the Mozambican border appear to have undergone larger increases in incidence, in contrast to the general pattern of low growth in the more northern, high-baseline-incidence areas, but this was not confirmed by modeling. Smoothing of small-area maps of incidence and growth in incidence (trend) is important for interpretation of the spatial distribution of disease incidence and the spatial distribution of rapid changes in disease incidenc

    Beware of the Parallel-Replacement Zombies

    Get PDF
    In this paper, the authors discuss the use of computer homework systems and describe what many students do when they are completing their work online. Strategies are provided to help students develop a more conceptual understanding of mathematics and help to avoid the number replacement method
    corecore