42 research outputs found

    Cognitive Structure and Processing During Cognitive Behavioral Therapy vs. Pharmacotherapy for Depression

    Get PDF
    Background: Evidence has converged to suggest that cognitive processing and content covary with depression severity, whereas indices of cognitive structure exhibit greater stability and promise as markers of vulnerability for depression. The objective of the current study was to investigate the temporal dynamics and causal role of cognitive structure and processing in treatment for depression. Method: A total of 104 patients with major depressive disorder were randomized to receive cognitive behavioral therapy (CBT; n = 54) or pharmacotherapy (n = 50). Patients completed the Hamilton Depression Rating Scale (HAM-D), Beck Depression Inventory-II (BDI-II), Psychological Distance Scaling Task (PDST), Redundancy Card-Sorting Task (RCST), and Self-Referent Encoding Task (SRET) before, during, and after treatment. Results: Most cognitive indices exhibited change over treatment to a similar degree across both treatments. Evidence for the mediating role of cognition was limited, and not specific to CBT. Discussion: Results suggest that both cognitive structure and processing may be amenable to change, by both CBT and pharmacotherapy. The role of cognitive structure in the course of depression may require qualification

    Quadrupole moment measurements for strongly deformed bands in Hf171,172

    Get PDF
    A lifetime experiment, using the Doppler-shift attenuation method, has been performed at Gammasphere to measure the transition quadrupole moments Q t of strongly deformed bands in Hf171 and Hf172. The measured value of Qt ~ 9.5 e b for the band labeled ED in Hf171 strongly supports the recent suggestion that this sequence and several structures with similar properties in neighboring Hf isotopes are associated with a near-prolate shape with a deformation enhanced relative to that of normal deformed structures. The measured values of Qt- 14 e b for the bands labeled SD1 and SD3 in Hf172 confirm that these sequences are associated with a prolate superdeformed shape, a property inferred in earlier work from other measured characteristics of the bands. Similar bands in Hf173-175 are also likely to be associated with superdeformed shapes. The observations are in contrast to predictions of cranking calculations performed with the ultimate cranker code

    Population and decay of a KÏ€=8- two-quasineutron isomer in Pu 244

    Get PDF
    The decay of a Kπ=8- isomer in Pu244 and the collective band structures populating the isomer were studied using deep inelastic excitations with Ti47 and Pb208 beams, respectively. Precise measurements of M1/E2 branching ratios in the band confirm a 9/2-[734]ν - 7/2+[624]ν configuration assignment for the isomer, validating the systematics of Kπ=8-, two-quasineutron isomers observed in even-Z, N=150 isotones. These isomers around the deformed shell gap at N=152 provide critical benchmarks for theoretical predictions of single-particle energies in this gateway region to superheavy nuclei

    Transverse wobbling in Pr 135

    Get PDF
    A pair of transverse wobbling bands is observed in the nucleus Pr135. The wobbling is characterized by ΔI=1, E2 transitions between the bands, and a decrease in the wobbling energy confirms its transverse nature. Additionally, a transition from transverse wobbling to a three-quasiparticle band comprised of strong magnetic dipole transitions is observed. These observations conform well to results from calculations with the tilted axis cranking model and the quasiparticle rotor model

    N=151Pu, Cm and Cf nuclei under rotational stress: Role of higher-order deformations

    Get PDF
    Fast-rotating N=151 isotones 245Pu, 247Cm and 249Cf have been studied through inelastic excitation and transfer reactions with radioactive targets. While all have a ground-state band built on a νj15/2[734]9/2- Nilsson configuration, new excited bands have also been observed in each isotone. These odd-N excited bands allow a comparison of the alignment behavior for two different configurations, where the νj15/2 alignment is either blocked or allowed. The effect of higher order deformations is explored through cranking calculations, which help clarify the elusive nature of νj15/2 alignments

    Location-aware IoT Search Framework based on Data Messaging and Aggregation Techniques

    No full text
    With the deeper penetration of the Internet of Things (IoT) devices into the physical infrastructure and wider acceptance of IoT technologies by the community has created a tremendous opportunity for designers and developers to put forth applications that aim to improve the present state-of-the-art solutions. Location-based Service (LBS) provisioning is one such area where location data is utilized to offer user-centric services and thus improve personalized user experience. In this paper, we propose a search framework for the IoT ecosystem that offers location-aware services based on data messaging and aggregation techniques. We design a taxonomy for the classification of the IoT devices based on their mobility frequency and leverage it to design a priority scheme to address the co-located devices that offer similar services. Experimental results show that our proposed LBS Provisioning System is more effective

    STLDAS: Secure Two Level Deduplication and Auditing of Shared Data in Cloud

    No full text
    With the cloud repository service furnished by the cloud computing, users can comfortably arrange themselves as a cluster and distribute information effectively. In order to empower public verifier to audit the distributed information, clients in the cluster need to Figure out signatures on complete chunks of collaborative information. Every client in the cluster modifies and signs his respective chunks, and deploys in the cloud server. Hence specific chunks of shared information are normally signed by specific clients. If anyone of the customers' is found malicious, he is immediately repudiated from the cluster. The prevailing clients in the cluster are permitted to re-sign the chunks that were earlier signed by this eliminated client. This approach is inefficient due to the massive amount of collaborative information in the cloud. By exploiting the approach of proxy re-signatures, the CSP is acknowledged to re-sign chunks in
    corecore