812 resultados para examination of reproductive system
Resumo:
The current case study examined the effects of the STARS-PAC anxiety reduction program on the social and test anxiety levels of a middle school student. The literature supporting the effectiveness of cognitive behavioral therapy programs which incorporate methods such as those used in the STARS-PAC program were reviewed. The findings of this case study indicated decreased levels of overall anxiety during the intervention phase; however, the student’s test anxiety level displayed little improvement. Implications of the findings and for future research are discussed.
Resumo:
Therapeutic Drug Utilization Review (DUR) is an important component of state-level pharmaceutical assistance programs.
Resumo:
PURPOSE: We evaluated the incidence of pathological findings of the ureter at cystectomy for transitional cell carcinoma of the bladder and assessed the usefulness of intraoperative frozen section examination of the ureter. MATERIALS AND METHODS: Histopathological findings of ureteral frozen section examination were compared to the corresponding permanent sections and the diagnostic accuracy of frozen section examination was evaluated. These segments were then compared to the more proximal ureteral segments resected at the level where they cross over the common iliac arteries. The histopathological findings of the ureteral segments were then correlated for upper urinary tract recurrence and overall survival. RESULTS: Transitional cell carcinoma or carcinoma in situ was found on frozen section examination of the distal ureter in 39 of 805 patients (4.8%) and on permanent sections in 29 (3.6%). In 755 patients the false-negative rate of frozen section examination of the ureters was 0.8%. Of the patients with carcinoma in situ diagnosed on the first frozen section examination 80% also had carcinoma in situ in the bladder. Transitional cell carcinoma or carcinoma in situ in the most proximally resected ureteral segments was found in 1.2% of patients. After radical cystectomy there was tumor recurrence in the upper urinary tract in 3% of patients with negative ureteral frozen section examination and in 17% with carcinoma in situ on frozen section examination. CONCLUSIONS: Routine frozen section examination of the ureters at radical cystectomy is only recommended for patients with carcinoma in situ of the bladder, provided the ureters are resected where they cross the common iliac arteries.
Resumo:
During 2003, a total of 258 new patients with oral soft tissue lesions were admitted at the Stomatology Service of the Department of Oral Surgery and Stomatology at the University of Berne. For the present study, 185 patients with clinically and histopathologically verified diagnoses were included. The following data was collected: prevalence of oral mucosal lesions, distribution of benign, precancerous and malign lesions in different age groups, and the concordance of the referral with the working diagnosis at the Stomatology Service. The most frequent pathological soft tissue findings were fibrous hyperplasias (n = 44) and oral lichen planus (n = 30). Precancerous lesions were present in 41 cases (30 patients with oral lichen planus, eleven oral leukoplakias), and ten patients had oral malignomas. Most lesions were found in patients between the age of 40 and 60 years. The referral diagnosis concurred in 36.6% (n = 67) of the cases with the definite diagnosis before initiation of treatment, the working diagnosis in 70% (n = 128) of the cases. Therefore, it can be concluded that a specialised Stomatology Service serves as a center of competence due to large numbers of patients/cases seen and treated, and the resulting high level of clinical experience of the staff. Moreover, it is important in the primary diagnosis of oral squamous cell carcinoma, in collaboration with the referring dentist in private practice.
Resumo:
Comments on an article by Kashima et al. (see record 2007-10111-001). In their target article Kashima and colleagues try to show how a connectionist model conceptualization of the self is best suited to capture the self's temporal and socio-culturally contextualized nature. They propose a new model and to support this model, the authors conduct computer simulations of psychological phenomena whose importance for the self has long been clear, even if not formally modeled, such as imitation, and learning of sequence and narrative. As explicated when we advocated connectionist models as a metaphor for self in Mischel and Morf (2003), we fully endorse the utility of such a metaphor, as these models have some of the processing characteristics necessary for capturing key aspects and functions of a dynamic cognitive-affective self-system. As elaborated in that chapter, we see as their principal strength that connectionist models can take account of multiple simultaneous processes without invoking a single central control. All outputs reflect a distributed pattern of activation across a large number of simple processing units, the nature of which depends on (and changes with) the connection weights between the links and the satisfaction of mutual constraints across these links (Rummelhart & McClelland, 1986). This allows a simple account for why certain input features will at times predominate, while others take over on other occasions. (PsycINFO Database Record (c) 2008 APA, all rights reserved)
Resumo:
Neuromorphic computing has become an emerging field in wide range of applications. Its challenge lies in developing a brain-inspired architecture that can emulate human brain and can work for real time applications. In this report a flexible neural architecture is presented which consists of 128 X 128 SRAM crossbar memory and 128 spiking neurons. For Neuron, digital integrate and fire model is used. All components are designed in 45nm technology node. The core can be configured for certain Neuron parameters, Axon types and synapses states and are fully digitally implemented. Learning for this architecture is done offline. To train this circuit a well-known algorithm Restricted Boltzmann Machine (RBM) is used and linear classifiers are trained at the output of RBM. Finally, circuit was tested for handwritten digit recognition application. Future prospects for this architecture are also discussed.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
This investigation was started in an effort to find an accurate and efficient method of determining the freezing points of ferrous and cuprous sulphides, mixtures of the two substances, and from this to establish the liquidus line of the equilibrium diagram.
Resumo:
Real-time battery impedance spectrum is acquired using a one-time record. Fast Summation Transformation (FST) is a parallel method of acquiring a real-time battery impedance spectrum using a one-time record that enables battery diagnostics. An excitation current to a battery is a sum of equal amplitude sine waves of frequencies that are octave harmonics spread over a range of interest. A sample frequency is also octave and harmonically related to all frequencies in the sum. The time profile of this signal has a duration that is a few periods of the lowest frequency. The voltage response of the battery, average deleted, is the impedance of the battery in the time domain. Since the excitation frequencies are known and octave and harmonically related, a simple algorithm, FST, processes the time record by rectifying relative to the sine and cosine of each frequency. Another algorithm yields real and imaginary components for each frequency.
Resumo:
Methods of rapidly measuring an impedance spectrum of an energy storage device in-situ over a limited number of logarithmically distributed frequencies are described. An energy storage device is excited with a known input signal, and aresponse is measured to ascertain the impedance spectrum. An excitation signal is a limited time duration sum-of-sines consisting of a select number offrequencies. In one embodiment, magnitude and phase of each frequency ofinterest within the sum-of-sines is identified when the selected frequencies and sample rate are logarithmic integer steps greater than two. This technique requires a measurement with a duration of one period of the lowest frequency. In another embodiment, where selected frequencies are distributed in octave steps, the impedance spectrum can be determined using a captured time record that is reduced to a half-period of the lowest frequency.
Resumo:
Real time battery impedance spectrum is acquired using one time record, Compensated Synchronous Detection (CSD). This parallel method enables battery diagnostics. The excitation current to a test battery is a sum of equal amplitude sin waves of a few frequencies spread over range of interest. The time profile of this signal has duration that is a few periods of the lowest frequency. The voltage response of the battery, average deleted, is the impedance of the battery in the time domain. Since the excitation frequencies are known, synchronous detection processes the time record and each component, both magnitude and phase, is obtained. For compensation, the components, except the one of interest, are reassembled in the time domain. The resulting signal is subtracted from the original signal and the component of interest is synchronously detected. This process is repeated for each component.
Resumo:
Periapical surgery is required when periradicular pathosis associated with endodontically treated teeth cannot be resolved by nonsurgical root canal therapy (retreatment), or when retreatment was unsuccessful, not feasible or contraindicated. Endodontic failures can occur when irritants remain within the confines of the root canal, or when an extraradicular infection cannot be eradicated by orthograde root canal treatment. Foreign-body reponses towards filling materials, towards cholesterol crystals or radicular cysts might prevent complete periapical healing. Following enhanced microsurgical techniques in the last years the success rates of apical surgery have improved considerably. The aim of the current case report is to describe the therapeutical approach to a persistent periapical lesion and its histologic examination.