Global

New esthetic researches come from the concept of art as vehicle. The twenty-first century theatre is characterized by a lot of particular events, for example the idea of theater as vehicle (by Grotowski) and, consequently, the birth of Education to Theatricality. This is an element that testimony how much the theatrical art is changing during this new century.
This study intends to describe the patterns of Non Accidental Injury (NAI) in the population of children seen at Red Cross War Memorial Children’s Hospital trauma unit. Child abuse is a serious problem worldwide and can be difficult to detect. Children who experience the consequences of abuse in most cases end up being treated at Emergency Centres. All children between the ages of 0 – 13 years will be sampled by the use of selective selection. Trauma registers and ward registers will be used to identify children with suspected non–accidental injuries. The data will be analysed to show which types of non-accidental injuries were most prominent, what the causes were, where they happened, who the caregiver was and how long it took before presenting the child to hospital after infliction of such injury.
The objective of this research is to give an explanation why low-technology enterprises can catch up with high-technology ones even when they are unable to invest in R&D. The answer is the existence of technology diffusion, however, how does technology diffusion take place and can we quantify this process? To answer this question, we structure variables which represent the transmission channel of technology diffusion from high-technology enterprises to low-technology ones, then quantifying impacts of technology diffusion and applying this methodology into the analysis of impacts of technology diffusion on total factory productivity (TFP) convergence of Vietnamese enterprises. We establish two TFP series in accordance with the methods developed by Olley-Pakes [7] and extended by Levinsohn and Petrin [5]. On the basis of two constructed TFP series, we estimate the unconditional convergence model and the convergence model under the effects of technology diffusion. The estimation results of two models show that the impacts of technology diffusion occur complicatedly but the total effect of the variables representing for impacts of technology diffusion on TFP convergence is positive and the speed of convergence in the model including the variables of technology diffusion is faster than one in the model excluding this variables.
The new hypothesis about the building mechanism of hail showers is made under atmosphere conditions. It is suggested, contrary to other famous theories that hail showers building is stipulated by the generation of high temperature in lightning strike in atmosphere. Quick water evaporation along and around the discharge channel leads to its rough freezing with the advent of hail showers of different sizes. The transition of zero-degree isotherm is not necessary for the building of hail showers; they are formed in the lower atmosphere. Storm is accompanied by hail showers. Hailstorm is observed only in case of severe thunderstorm. In contrast to the previous well-known theory of hail showers, in this paper we propose an original and simple method to prevent hail with the use of a lightning rod. Lightning rod in turn, can prevent together with hail and lightning discharge.
This paper presents an accurate and flexible method for robust recognition and tracking of multiple objects in video sequence. Object tracking is the process of separating the moving object from the video sequences. Tracking is essentially a matching problem in object tracking. In order to avoid this matching problem, object recognition is done on the tracked object. Background separation algorithm separate moving object from the background based on white and black pixels. Support Vector Machines classifier is used to recognize the tracked object. SVM classifier are supervised learning that associates with machine learning algorithm that analyse and recognize the data used for classification. SVM uses Kalman filter which makes the system more robust by tracking and reduce the noise introduced by inaccurate detections.
Provisioning of video streaming over ad hoc wireless networks exhibits challenges associated with high packet loss rates and are delay sensitive. Excessive packet loss can cause significant degradation in quality of video perceived by users of real-time video applications. The recent studies suggest that Forward Error Correction (FEC) is a good technique for decreasing the negative impact of packet loss on video quality in error control scheme. This paper introduces an Estimation based Error Reduction Scheme(EBERS) to support video communication in ad hoc wireless networks. The EBERS considers a frame estimation parameter to support varied bandwidths and attain the delay requirements to support video communication. It is also responsible for improvising the QoS offered. The EBERS considers layered and embodies distortion limiting features owing to which reduced forward error correction is achieved, thus obtaining reduced frame errors, transmission errors and retransmission of frames. Thereby obtaining high degree of quality of service(QoS).The comparative study conducted proves the efficiency of the EBERS scheme over the existing mechanisms.
Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Generally data embedding is achieved in text, image, audio, video, network for the purpose of secret communication. This paper proposes a secure method for hiding text based on adaptive pixel pair matching (APPM). The basic idea of Pixel Pair Matching (PPM) is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. APPM allows users to select digits in any notational system for data embedding, and thus achieves a better image quality. Compared with the optimal pixel adjustment process (OPAP) Method and diamond encoding (DE), the proposed method always has lower distortion for various payloads. This paper proposes an extension to conceal text into an image for conveying secret messages confidentially.
The study was conducted in three selected commercial banks in Uganda that is Centenary Rural Development Bank (CERUDEB), Orient Bank and Standard Chartered Bank (Stanchart) and was based on information relating to the banks’ performance for the years 2007-2011. The objective of the study was to establish the corporate governance employed by the selected commercial banks. The total population of the study was 267 respondents comprising of employees of the three selected banks, who work at the headquarters. The sample size for the study was 159 respondents. This was based on Krejcie and Morgan’s (1970) table for determining sample size. The study used a self administered questionnaire, structured to have both open-ended and closed questions. It was concluded that corporate governance in the selected commercial banks was moderately employed with means of 3.00 for Centenary bank, 2.82 for Orient bank and 2.71 for Standard Chartered bank.
This study demonstrates an innovative tool of utilizing translation to study linguistic phenomena; connectives (cf. Moeschler, 1989; Degand, 2009;). Based on the Relevance Theoretic Framework and polysemy approach, this paper not only consolidates the polysemy of English but (cf. Wilson and Sperber, 2004; Fischer, 2006) and rejects the ambiguity account by Anscombre, and Ducrot (1977) and Hall (2004) but it also establishes a paradigm of correspondences to but in Kurdish. Data for this study has been built from 50 opinion articles from English and Kurdish online newspapers. Then, all the occurrences of but and its equivalents in Kurdish are examined and translated, in order to build the paradigm of correspondences. The study proves that there are four different interpretations of a general procedure encoded by but, namely; contrary to expectations, contrast, correction and dismissal, and that these procedural meanings are translated into Kurdish as: keҫi, bełam, be pêçewanewe and bełkû respectively.
First episodes of DVT in adults and elderly are elicited in two-thirds of cases by risk factors, including varicose veins, cancer, pregnancy/postpartum, oral contraceptives below the age of 50 years, immobility or surgery. Pain and tenderness in the calf and popliteal fossa may occur resulting from conditions labeled as alternative diagnosis (AD) including Baker’s cyst, hematoma, or muscle tears or pulls. The requirement for a safe diagnostic strategy of deep vein thrombosis (DVT) should be based on an objective post-test incidence of venous thromboembolism (VTE) of less than 0.1% with a negative predictive value for exclusion of DVT of 99.90% during 3 months follow-up. Complete duplex ultrasonography (CDUS) does pick up AD not only Bakers cyste but also muscle hematomas, old DVT, and superficial vein thrombosis (SVT). AD with a negative CDUS include leg edema, varices erysipelas are picked up by physical examination. The sequential use of DUS, a sensitive D-dimer test and objective clinical score assessment is a safe costeffective non-invasive strategy to rule in and out DVT and AD in patients with suspected DVT.