scispace - formally typeset
Search or ask a question
Institution

University of North Texas

EducationDenton, Texas, United States
About: University of North Texas is a education organization based out in Denton, Texas, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 11866 authors who have published 26984 publications receiving 705376 citations. The organization is also known as: Fight, North Texas & UNT.


Papers
More filters
Journal ArticleDOI
TL;DR: Carbon nanotube-coated electrodes are expected to improve current electrophysiological techniques and to facilitate the development of long-lasting brain-machine interface devices.
Abstract: Implanting electrical devices in the nervous system to treat neural diseases is becoming very common. The success of these brain-machine interfaces depends on the electrodes that come into contact with the neural tissue. Here we show that conventional tungsten and stainless steel wire electrodes can be coated with carbon nanotubes using electrochemical techniques under ambient conditions. The carbon nanotube coating enhanced both recording and electrical stimulation of neurons in culture, rats and monkeys by decreasing the electrode impedance and increasing charge transfer. Carbon nanotube-coated electrodes are expected to improve current electrophysiological techniques and to facilitate the development of long-lasting brain-machine interface devices.

665 citations

Journal ArticleDOI
TL;DR: The author, a well-known researcher in paralle l computing, once again has proved his expertise and authority on the materials covered and this book will certainly have an impact to the psychology of students and researchers alike.
Abstract: In the ever-expanding field of parallel computing, we have seen a number of textbooks , some emphasizing the design aspects of parallel algorithms based on abstract models of paralle l machines (such as PRAMs) and some others focusing on the topological properties of paralle l architectures . What is needed in this area is a book which provides a linkage between th e topological properties of a parallel network and its computational capabilities or limitations , as well as comparative analyses of parallel architectures, not only among the proposed ones but also in view of a desirable general-purpose parallel machine which is yet to be built . The book under review comes closest to this goal . The author, a well-known researcher in paralle l computing, once again has proved his expertise and authority on the materials covered . This book will certainly have an impact to the psychology of students and researchers alike, on ho w to correlate parallel architectures and algorithms . Physically, this book is organized around three categories of parallel architectures : Arrays and Trees, Meshes of Trees, and Hypercubic networks . Each category covers not only th e basic type of architectures but also other variants or related models . For example, Chapter 1 on Arrays and Trees encompasses linear arrays, two-dimensional arrays, trees, ring, torus, X tree, pyramid, multigrid networks, systolic and semisystolic networks, and higher-dimensional arrays as well . Similarly, Chapter 2 on Meshes of Trees shows different ways of looking at two-dimensional meshes of trees at the beginning and further extends to higher-dimensiona l meshes of trees, and shuffle-tree graphs at the end . The third chapter, Hypercubes and Related Networks, covers butterfly, cube-connected-cycles, Benes network, shuffle-exchange, de Bruij n network, butterfly-like networks (Omega network, flip network, baseline and reverse baselin e networks, Banyan and delta networks, and k-ary butterfy), and de Bruijn-type networks (k-ar y de Bruijn network, and generalized shuffle-exchange network) . Whereas the above parallel networks constitute the architectural domain of the hook as th e basis, the application domain — parallel computation problems and algorithms — threads th e chapters together and helps a reader to view the similarities and differences of each network , from algorithm design standpoint . In addition to the definitions and characterizations of th e topological properties of the parallel architectures, each chapter examines a carefully-chose n subset of fundamental computational problems such as integer arithmetic, prefix computation , list ranking, sorting and counting, matrix arithmetic, graph problems, Fast Fourier Transfor m and Discrete Fourier Transform, computational geometry, and image analysis etc . The solution s to these problems are explored from simple algorithms to more complicated ones until it achieve s optimality. This approach seems to be adequate to reveal the capability and limitations of eac h network . The problems and algorithms are not treated in an isolated context but provokes a reader to capture what is achievable in terms of speedup and efficiency, and what is the limi t in terms of lower hounds, in a particular parallel network under focus . The author pays special attention to the routing problem . Considering that routing is a common vehicle for solving most of the regular and irregular parallel computation problem s in a fixed-connection network, the general capability of each network against an abstract parallel machine model is properly exposed via routing problem . Also discussed are the containment/embedding of one network in another, i .e . mapping between networks and the simulatio n

665 citations

Journal ArticleDOI
TL;DR: Poe and Tate as mentioned in this paper found that military regimes lead to somewhat greater human rights abuse, defined in terms of violations of personal integrity, once democracy and a host of other factors are controlled.
Abstract: Here we seek to build on our earlier research (Poe and Tate, 1994) by re-testing similar models on a data set covering a much longer time span; the period from 1976 to 1993. Several of our findings differ from those of our earlier work. Here we find statistical evidence that military regimes lead to somewhat greater human rights abuse, defined in terms of violations of personal integrity, once democracy and a host of other factors are controlled. Further, we find that countries that have experienced British colonial influence tend to have relatively fewer abuses of personal integrity rights than others. Finally, our results suggest that leftist countries are actually less repressive of these basic human rights than non-leftist countries. Consistent with the Poe and Tate (1994) study, however, we find that past levels of repression, democracy, population size, economic development, and international and civil wars exercise statistically significant and substantively important impacts on personal integrity abuse.

659 citations

Journal ArticleDOI
TL;DR: In 4 studies, evidence is provided for the estimated reliability and construct validity of a client-rated measure of a therapist's cultural humility, and it is demonstrated that client perceptions of their therapist'scultural humility are positively associated with developing a strong working alliance.
Abstract: Building on recent theory stressing multicultural orientation, as well as the development of virtues and dispositions associated with multicultural values, we introduce the construct of cultural humility, defined as having an interpersonal stance that is other-oriented rather than self-focused, characterized by respect and lack of superiority toward an individual's cultural background and experience. In 4 studies, we provide evidence for the estimated reliability and construct validity of a client-rated measure of a therapist's cultural humility, and we demonstrate that client perceptions of their therapist's cultural humility are positively associated with developing a strong working alliance. Furthermore, client perceptions of their therapist's cultural humility were positively associated with improvement in therapy, and this relationship was mediated by a strong working alliance. We consider implications for research, practice, and training.

657 citations

Proceedings ArticleDOI
16 Mar 2008
TL;DR: The construction of a large data set annotated for six basic emotions, ANGER, DISGUST, FEAR, JOY, SADNESS and SURPRISE, and several knowledge-based and corpusbased methods for the automatic identification of these emotions in text are proposed.
Abstract: This paper describes experiments concerned with the automatic analysis of emotions in text. We describe the construction of a large data set annotated for six basic emotions: ANGER, DISGUST, FEAR, JOY, SADNESS and SURPRISE, and we propose and evaluate several knowledge-based and corpusbased methods for the automatic identification of these emotions in text.

648 citations


Authors

Showing all 12053 results

NameH-indexPapersCitations
Steven N. Blair165879132929
Scott D. Solomon1371145103041
Richard A. Dixon12660371424
Thomas E. Mallouk12254952593
Hong-Cai Zhou11448966320
Qian Wang108214865557
Boris I. Yakobson10744345174
J. N. Reddy10692666940
David Spiegel10673346276
Charles A. Nelson10355740352
Robert J. Vallerand9830141840
Gerald R. Ferris9333229478
Michael H. Abraham8972637868
Jere H. Mitchell8833724386
Alan Needleman8637339180
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

95% related

Pennsylvania State University
196.8K papers, 8.3M citations

94% related

University of Tennessee
87K papers, 2.8M citations

93% related

Michigan State University
137K papers, 5.6M citations

93% related

State University of New York System
78K papers, 2.9M citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202390
2022300
20211,796
20201,769
20191,645
20181,484