350 research outputs found

    EFFECT OF REPETITIVE SET OF MULTIPLE EXERCISE RESISTANCE TRAINING ON SELECTED BODY COMPOSITION VARIABLES

    Get PDF
    The purpose of the study was to find out the effect of repetitive set of multiple exercise resistance training on selected body composition variables. To achieve the purpose of the present study, thirty college male students were selected as subjects at random and their ages ranged from 18 to 25 years. The subjects were divided into two equal groups of fifteen male students each. The study was formulated as a true random group design, consisting of a pre-test and post-test. The groups were assigned as repetitive set of multiple exercise resistance training and control group in an equivalent manner. The experimental group participated the training for a period of twelve weeks to find out the outcome of the training packages and the control group did not participated in any training programme. Paired ‘t’ test was applied. In all cases 0.05 level of confidence was fixed to test hypotheses. Results reveals that the repetitive set of multiple exercise resistance training group had shown significant improvement in all the selected body composition variables after undergoing training for a period of twelve weeks

    Basis-independent methods for the two-Higgs-doublet model II. The significance of tan(beta)

    Full text link
    In the most general two-Higgs-doublet model (2HDM), there is no distinction between the two complex hypercharge-one SU(2) doublet scalar fields, Phi_a (a=1,2). Thus, any two orthonormal linear combinations of these two fields can serve as a basis for the Lagrangian. All physical observables of the model must therefore be basis-independent. For example, tan(beta)=/ is basis-dependent and thus cannot be a physical parameter of the model. In this paper, we provide a basis-independent treatment of the Higgs sector with particular attention to the neutral Higgs boson mass-eigenstates, which generically are not eigenstates of CP. We then demonstrate that all physical Higgs couplings are indeed independent of tan(beta). In specialized versions of the 2HDM, tan(beta) can be promoted to a physical parameter of the Higgs-fermion interactions. In the most general 2HDM, the Higgs-fermion couplings can be expressed in terms of a number of physical "tan(beta)--like" parameters that are manifestly basis-independent. The minimal supersymmetric extension of the Standard Model provides a simple framework for exhibiting such effects.Comment: 56 pages, 5 tables, with Eq. (65) corrected (erratum to appear in Physical Review D

    A case of elbow hyperextension leading to complete brachial artery rupture

    Get PDF
    BACKGROUND: To our knowledge there are no cases in the literature of traumatic vascular injury of the brachial artery by elbow hyperextension without elbow dislocation based on either clinical or radiological evidence. CASE PRESENTATION: We present the first case of complete brachial artery rupture resulting from a hyperextension injury to an elbow, without dislocation. The history, early assessment and operative treatment with figures are presented. CONCLUSION: We advocate prompt clinical assessment by orthopaedic and vascular teams and early surgical exploration and repair

    Intensive care outcomes in bone marrow transplant recipients: a population-based cohort analysis

    Get PDF
    Abstract Introduction Intensive care unit (ICU) admission for bone marrow transplant recipients immediately following transplantation is an ominous event, yet the survival of these patients with subsequent ICU admissions is unknown. Our objective was to determine the long-term outcome of bone marrow transplant recipients admitted to an ICU during subsequent hospitalizations. Methods We conducted a population-based cohort analysis of all adult bone marrow transplant recipients who received subsequent ICU care in Ontario, Canada from 1 January 1992 to 31 March 2002. The primary endpoint was mortality at 1 year. Results A total of 2,653 patients received bone marrow transplantation; 504 of which received ICU care during a subsequent hospitalization. Patients receiving any major procedure during their ICU stay had higher 1-year mortality than those patients who received no ICU procedure (87% versus 44%, P < 0.0001). Death rates at 1 year were highest for those receiving mechanical ventilation (87%), pulmonary artery catheterization (91%), or hemodialysis (94%). In combination, the strongest independent predictors of death at 1 year were mechanical ventilation (odds ratio, 7.4; 95% confidence interval, 4.8 to 11.4) and hemodialysis (odds ratio, 8.7; 95% confidence interval, 2.1 to 36.7), yet no combination of procedures uniformly predicted 100% mortality. Conclusion The prognosis of bone marrow transplant recipients receiving ICU care during subsequent hospitalizations is very poor but should not be considered futile

    Establishing a meaningful human rights due diligence process for corporations : learning from experience of human rights impact assessment

    Get PDF
    The United Nations Special Representative of the Secretary-General on Business and Human Rights, Professor John Ruggie, has constructed a new international framework, which is set to become the cornerstone for all action on human rights and business at the international level. The principle of human rights due diligence (HRDD) is the central component of the corporate duty to respect human rights within that framework. This article argues that Ruggie's HRDD principle contains the majority of the core procedural elements that a reasonable human rights impact assessment (HRIA) process should incorporate. It is likely that the majority of corporations will adopt HRIA as a mechanism for meeting their due diligence responsibilities. However, in the context of the contentious debate around corporate human rights performance, the current state of the art in HRIA gives rise to concerns about the credibility and robustness of likely practice. Additional requirements are therefore essential if HRDD is to have a significant impact on corporate human rights performance – requirements in relation to transparency; external participation and verification; and independent monitoring and review

    Online Video Promotion with User Specific Information

    Get PDF
    ABSTRACT: There are various ways and methods used in video recommendation which are purely statistical. These would give recommendations to users based on either their previous search or other criteria. These systems set up a large number of context collectors at the terminals. However, the context collecting and exchanging result in heavy network overhead, and the context processing consumes huge computation. Due to these criterion users end up getting unnecessary content which makes the browser slow. In this paper we propose a user specific category based promotion, we propose and provide for characterization of individual content as well as social attributes that help distinguish each user class. Thus a user defined video recommendation would ensure faster access to only important information which is in the user&apos;s domain of interest which utilises low buffer space and increase the speed of the system for user satisfaction. KEYWORDS: Spammer ,User created content, Video-Tag , private storage, recommender. I.INTRODUCTION Online video sharing systems, out of which YouTube[1] is the most popular, provide features that allow users to post a video as a response to a discussion topic. These features open opportunities for users to introduce polluted content, or simply pollution, into the system. So we find For instance, spammers[2] may post an unrelated video as response to a popular one, their objective being to increase the viewer-ship of their content. According to Cisco forecast[3] by 2015, two-thirds of the world&apos;s mobile data traffic and 62% of the consumer Internet traffic will be video. Video sharing has continuously increased ground due to advancement in network bandwidth Internet users post a large number of video clips on Video-sharing websites and social network applications[5] every day. The video content may be duplicate, similar, related, or quite different. Facing billions of multimedia WebPages, online users are usually having a hard time finding their favourites. Some video-sharing websites recommend video lists for end users according to video classification, video description tags, or watching history. However, these recommendations are not accurate and are always not consistent with the end users&apos; interests. To improve this, some websites also provide users with search engine[6] to search their desired videos quickly. This led to the development of personalization methods which collect and analyse the viewing patterns, such as: the target user&apos;s viewing pattern for contents, statistical information for the overall user&apos;s viewing patterns, a user&apos;s private profile or preference information through the analysis of a user&apos;s computing environment, a communication service, and the preferred device types such as a mobile phone, personal computer, etc. A content-based recommendations system recommends the most likely matched item, then compares the recommendation list to a user&apos;s previous input data or compared to preference items. It is also based on information searching and generally uses a rating method which is used in the information searching. The rating method calculates a user&apos;s preference information and items in a recommendation list. It recommends the most likely program in a user&apos;s profile. This method has the advantage with easily adopt in recommendation result and enable more quickly recommendation. But it has problems with difference result and efficient refer to appropriate rating configuration. In use there are several video recommendation algorithms that have been developed; these would include content-based filtering (CB) by Google[7]. This has adopted for their recommender system in AdWords services. It returns search results with keyword-related advertisements, like spam these advertisements annoy most users and have been ignored by most users. Also included are social network filtering (SNF) In Internet User Created Contents (UCC), and Online Digital Video (ODV) enabled the rapid increase of online Video and programs which can be selected by consumers. This was not expected when we consider the conventional Video technologies and policies. Due to these paradigm changes, thousand of video and programs are now available to consumers. In the existing limited content providers existed, such as licensed broadcasting companies and a small number of video and satellite broadcasting operators. Thus the number of movie and programs were limited. It has become difficult and time consuming to find an interesting movie video and program via the remote control or channel guide map. In this paper we propose a user defined recommendation system(UDC) under a cloud computing environment. The proposed UDV system analyses and uses the viewing pattern of consumers to personalize the program recommendations, and to efficiently use computing resources. A proposed framework for recommending online videos operates by constructing user profiles as an aggregate of tag clouds and generating recommendations according to similar viewing patterns. The proposed personalization method collects and analyses the viewing patterns, such as : the target user&apos;s viewing pattern for contents, statistical information for the overall user&apos;s viewing patterns, a user&apos;s private profile or preference information through the analysis of a user&apos;s computing environment, a communication service, and implemented in personal computer, but in future we preferred the Mobile device . II. RELATED WORK It considers a network with N mobile unlicensed nodes that move in an environment according to some stochastic mobility models. It also assumes that entire spectrum is divided into number of M non-overlapping orthogonal channels having different bandwidth. The access to each licensed channel is regulated by fixed duration time slots. Slot timing is assumed to be broadcast by the primary system. Before transmitting its message, each transmitter node, which is a node with the message, first selects a path node and a frequency channel to copy the message. After the path and channel selection, the transmitter node negotiates and handshakes with its path node and declares the selected channel frequency to the path. The communication needed for this coordination is assumed to be accomplished by a fixed length frequency hopping sequence (FHS) that is composed of K distinct licensed channels. In each time slot, each node consecutively hops on FHS within a given order to transmit and receive a coordination packet. The aim of coordination packet that is generated by a node with message is to inform its path about the frequency channel decided for the message copying. , they present an overview of the field of recommender systems and describe the current generation of recommendation methods that are classified as: 1. content-based, 2. collaborative, and 3. hybrid recommendation They went further to describe some shortcomings of present recommendation systems and also proposed possible extensions that can improve recommendation capabilities and make recommender systems applicable to an even broader range of applications. These extensions include an improvement of understanding of users and items, incorporation of the contextual information into the recommendation process, support for multi-criteria ratings, and a provision of more flexible and less intrusive types of recommendations

    Utilisasi Probiotik Cair Asal Fermentasi Black Soldier Fly Larvae (Hermetia illucens) terhadap Performa Ayam Broiler: Utilization of Liquid Probiotics from Black Soldier Fly Larvae (Hermetia illucens) Fermentation on Broiler Chickens Performance

    Get PDF
    This study aimed to evaluate the utilization of liquid probiotics from black soldier fly larvae (BSFL) fermentation on broiler chickens' performance. A total of 250 male broilers strain Cobb CP 707 were given 5 treatments of probiotics in drinking water with 5 replications using a completely randomized design. The treatments in this study were P0=commercial broiler feed+drinking water without probiotics, P1=commercial broiler chicken feed+ drinking water with 1 mL L-1 commercial probiotic, P2=commercial broiler chicken feed+water with 1 mL L-1 probiotics from BSFL fermentation, P3=commercial boiler chicken &nbsp;feed+water with 3 mL L-1 probiotics from BSFL fermentation, and P4=commercial broiler chicken feed+water with 5 mL L-1 probiotics from BSFL fermentation. The results showed that BSFL fermentation probiotics were not significantly different on broiler chicken performance. Income over feed and chick cost (IOFCC) in addition to 5 mL L-1 in drinking water was more efficient in saving feed cost and the highest performance index during the broiler rearing. In conclusion, the utilization of BSFL fermentation probiotics in drinking water gave the same effect on broiler chicken performance as the other treatments yet the IOFCC and broiler chicken performance index were more advantageous. Key words:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; black soldier fly larvae, broiler, performance, probiotic

    An ongoing secondary task can reduce the illusory truth effect

    Get PDF
    IntroductionPeople are more likely to believe repeated information—this is known as the Illusory Truth Effect (ITE). Recent research on the ITE has shown that semantic processing of statements plays a key role. In our day to day experience, we are often multi-tasking which can impact our ongoing processing of information around us. In three experiments, we investigate how asking participants to engage in an ongoing secondary task in the ITE paradigm influences the magnitude of the effect of repetition on belief.MethodsUsing an adapted ITE paradigm, we embedded a secondary task into each trial of the encoding and/or test phase (e.g., having participants count the number of vowels in a target word of each trivia claim) and calculated the overall accuracy on the task.ResultsWe found that the overall ITE was larger when participants had no ongoing secondary task during the experiment. Further, we predicted and found that higher accuracy on the secondary task was associated with a larger ITE.DiscussionThese findings provide initial evidence that engaging in an ongoing secondary task may reduce the impact of repetition. Our findings suggest that exploring the impact of secondary tasks on the ITE is a fruitful area for further research

    Identity Based Partial Aggregate Signature Scheme Without Pairing

    Get PDF
    An identity based signature allows users to sign their documents using their private keys and the signature can be verified by any one, using the identity of the signer and public parameters of the system. An aggregate signature scheme is a digital signature scheme which allows aggregation of different signatures by different users on different messages. The primary objective of aggregate signature scheme is to achieve both computational and communication efficiency. Here, we propose an identity based aggregate signature scheme, which uses a variation of light weight Schnorr type identity based signature scheme, where in the signers need not agree upon a common randomness and the aggregation is done without having any kind of interaction among the signers. The scheme does not involve any pairing operations even for aggregate signature verification. It is computationally efficient since it avoids the costlier operation in elliptic curve groups (Bilinear Pairings). It should be noted that our signature achieves only partial aggregation because the private key of each user is generated by a randomized extract algorithm and hence a random value is to be propagated with each single signature generated
    corecore