520,931 research outputs found

    UA3/2/1 Annual Report on Enrollment, ROTC

    Get PDF
    Annual report regarding the WKU Reserve Officers\u27 Training Program

    Memantine treatment does not affect compulsive behavior or frontostriatal connectivity in an adolescent rat model for quinpirole-induced compulsive checking behavior

    Get PDF
    Rationale: Compulsivity often develops during childhood and is associated with elevated glutamate levels within the frontostriatal system. This suggests that anti-glutamatergic drugs, like memantine, may be an effective treatment. Objective: Our goal was to characterize the acute and chronic effect of memantine treatment on compulsive behavior and frontostriatal network structure and function in an adolescent rat model of compulsivity. Methods: Juvenile Sprague–Dawley rats received repeated quinpirole, resulting in compulsive checking behavior (n = 32; compulsive) or saline injections (n = 32; control). Eight compulsive and control rats received chronic memantine treatment, and eight compulsive and control rats received saline treatment for seven consecutive days between the 10th and 12th quinpirole/saline injection. Compulsive checking behavior was assessed, and structural and functional brain connectivity was measured with diffusion MRI and resting-state fMRI before and after treatment. The other rats received an acute single memantine (compulsive: n = 12; control: n = 12) or saline injection (compulsive: n = 4; control: n = 4) during pharmacological MRI after the 12th quinpirole/saline injection. An additional group of rats received a single memantine injection after a single quinpirole injection (n = 8). Results: Memantine treatment did not affect compulsive checking nor frontostriatal structural and functional connectivity in the quinpirole-induced adolescent rat model. While memantine activated the frontal cortex in control rats, no significant activation responses were measured after single or repeated quinpirole injections. Conclusions: The lack of a memantine treatment effect in quinpirole-induced compulsive adolescent rats may be partly explained by the interaction between glutamatergic and dopaminergic receptors in the brain, which can be evaluated with functional MRI

    Creative Pressure Tactics

    Get PDF
    [Excerpt] Saul Alinsky, a great labor and community organizer, once said that “tactics that drag on become a drag.” Stewards know that tactics used too often can lose their effectiveness and burn members out. That’s why wise stewards are always looking for new and creative ways to put pressure on an employer. Here are some ideas that have worked for other unionists

    In the Trenches at the Talent Wars: Competitive Interaction for Scarce Human Resources - A Qualitative Study

    Get PDF
    The purpose of this paper is to examine how firms are competing for scarce human resources in the talent wars. First, the paper makes the distinction between responding to labor shortages with investments in recruiting and retention and directly competing against identified labor market competitors for scarce human resources. It appears firms compete with rivals in the open labor market and in initiating and defending against talent raids. The process of identifying and responding to the tactics of labor market competitors is reviewed for both types of direct competition. Firms tend to respond to rivals’ tactics either by changing the employment relationship with threatened employees or engaging in tactics to influence the behavior of the competing firm. Factors that determine the propensity and type of response to competitor’s tactics are reviewed and integrated. The greater the threat posed by the rival’s tactics the greater the likelihood affected firms will respond with externally as opposed to internally oriented tactics. The greater the skill mobility of threatened employees, the more administrative and financial resources will be invested in the counter-response. Finally, firms use a variety of preemptive tactics to reduce the threat of talent raids. These tactics are listed and explained. The paper concludes with recommendations for firms seeking to gain or protect advantage relative to rivals in the war for talent

    Instructional strategies and tactics for the design of introductory computer programming courses in high school

    Get PDF
    This article offers an examination of instructional strategies and tactics for the design of introductory computer programming courses in high school. We distinguish the Expert, Spiral and Reading approach as groups of instructional strategies that mainly differ in their general design plan to control students' processing load. In order, they emphasize topdown program design, incremental learning, and program modification and amplification. In contrast, tactics are specific design plans that prescribe methods to reach desired learning outcomes under given circumstances. Based on ACT* (Anderson, 1983) and relevant research, we distinguish between declarative and procedural instruction and present six tactics which can be used both to design courses and to evaluate strategies. Three tactics for declarative instruction involve concrete computer models, programming plans and design diagrams; three tactics for procedural instruction involve worked-out examples, practice of basic cognitive skills and task variation. In our evaluation of groups of instructional strategies, the Reading approach has been found to be superior to the Expert and Spiral approaches

    Power Processes in Bargaining

    Get PDF
    This is a theoretical article that integrates and extends a particular program of work on power in bargaining relationships. Power is conceptualized as a structurally based capability, and power use as tactical action falling within either conciliatory or hostile categories. The core propositions are (1) the greater the total amount of power in a relationship, the greater the use of conciliatory tactics and the lower the use of hostile tactics; and (2) an unequal power relationship fosters more use of hostile tactics and less use of conciliatory tactics than an equal power relationship. Distinct research on power dependence and bilateral deterrence provides support for both propositions. Implications are discussed for power struggle in ongoing relationships

    Ownership-dependent mating tactics of minor males of the beetle Librodor japonicus (Nitidulidae) with intra-sexual dimorphism of mandibles

    Get PDF
    Intra-sexual dimorphism is found in the weapons of many male beetles. Different behavioral tactics to access females between major and minor males, which adopt fighting and alternative tactics, respectively, are thought to maintain the male dimorphism. In these species major males have enlarged weapons that they use in fights with rival males. Minor males also have small weapons in some of these species, and it is unclear why these males possess weapons. We examined the hypothesis that minor males might adopt a fighting tactic when their status was relatively high in comparison with that of other males (e.g., ownership of a territory). We observed the behavioral tactics of major and minor males of the beetle Librodor japonicus, whose males have a dimorphism of their mandibles. Major males fought for resources, whereas minor males adopted two status-dependent tactics, fighting and sneaking, to access females, depending on their ownership of a sap site. We suggest that ownership status-dependent mating tactics in minor males may maintain the intra-sexual dimorphism in this beetle.</p

    Manufactured vulnerability: eco-activist tactics in Britain

    Get PDF
    This article examines the development of tactics in radical environmentalist protests against new roads and other environmental issues in Britain during the 1990s. These tactics depend heavily upon the technical creativity of protesters. Their repertoire has been influenced by British traditions of non-violent direct action and by tactics used previously by radical environmentalists in other countries, notably Australia. This form of non-violent direct action is defined here as manufactured vulnerability because of its reliance on technical devices to prolong vulnerability. Much evidence in this case confirms past studies of how new action forms are developed. Evidence also suggests that development of tactics in radical environmental groups is particularly likely to be influenced by latent networks of activists and cross-national diffusion
    • …
    corecore