Global

a) New tests for scoliosis n the diagnosis of so-called idiopathic scoliosis we should use widely known old tests such as Adams & Meyer test, symmetry or asymmetry of waist test, but also new tests like – the side bending test for scoliosis (Lublin test), a test checking the habit of standing ‘at ease’– on the right versus on the left leg, Dunkan Elly – test to discover the flexion contracture of hips making “anterior tilt of pelvis”, pelvis rotation test (a new test since 2006), the adduction of hips test (similar to Ober test).This “adductions test” is deciding in new classification of scoliosis, explain character of scoliosis, place and character of curves, stiffness or flexibility of spine. All tests are presented below. List of the old and new tests (Fig. 1, 2, 3, 4, 5, 6, 7, 8, 9, 10) and clinical changes enabling an early discovery of scoliosis. The list of the new tests and symptoms (doctor’s/examination questions and answers) are important to recognize an early stage of scoliosis: Test of adduction of both hips (in extension position of joints – like the Ober test). Important is also checking the flexion contracture of the hips and the external rotation contracture of the right hip. The are three models of movements of right / left hip and in consequence three groups and four types of scoliosis. Below we describe tests using for early discovery of scoliosis (Figures 1 - 10): 1. Bending test for scoliosis - Adams/Meyer test. Flexion test performed with bent spine (and the whole of the body). When the shape is round it is good / proper, when stiff and in straight contracture – there is (it shows) the beginning of scoliosis. 2. Side bending test for scoliosis (bending to the left and to the right leg during standing in abduction), also called Karski or Lublin test, it is a modified Adams/Meyer test – more sensible as Adams test. A specially - in “C” II/A scoliosis and II/B group of scoliosis show very early beginning of deformity.
In this research work, performance of different channel equalization techniques and various M-ary modulation schemes (MPSK, MQAM and DPSK) for DWT based MIMO Multi-Carrier Code Division Multiple Access (MC-CDMA) wireless communication system has been analyzed through simulation. We propose this system using convolutional coding scheme over AWGN and Rayleigh fading channel with implementation of Walsh Hadamard code as orthogonal spreading code. In this paper, we derive a generalized analytical framework to evaluate the Bit Error rate (BER) with respect to Signal-to Noise Ratio (SNR) and also use Electronic Codebook (ECB) mode as cryptographic algorithm to encrypt the actual data for security issues.
This study aims to develop a model of teaching physical education using multiple intelligences approach and its influence on the development of society and the environment. Using research methods development research and experimental comparison group design. The population is kindergarten in town, Blitar, Malang, Batu, Malang regency, consisting of 36 preschool, kindergarten as many as 12 samples taken in 3 cities, namely Malang, Blitar stones and as many as 240 people, a path analysis using ANOVA (one way ANOVA) , the F-test at significance level of α = 0.05 level. Results, the model of physical education with a model of multiple intelligences approach to the game and play smart relay circuit cheerful, and its influence on social development and the environment with Fhit. = 60 636> F = 3,871.
Shari`ah compliance is regarded as the foundation of the Islamic banking. Though Islamic banks give priority on Shari`ah compliance, a number of factors hinder Shari`ah compliance. Shari`ah knowledge, efforts and seriousness of the bank authorities and bank employees are the pre-requisites for complying Shari`ah appropriately. But it is observed that there are lack of Shari`ah knowledge, efforts and seriousness among bank authorities and bank employees. The present study demonstrates the importance of Shari`ah compliance in general and particularly in Islamic banking to make them aware and serious in complying Shari`ah. The reasons for Shari`ah compliance are divided into six, such as: Shari`ah compliance for better life in the earth, Shari`ah compliance for saving life, property and honor, Shari`ah compliance for better life after death, Shari`ah compliance for salvation from punishment in the earth, Shari`ah compliance for salvation from punishment after death and Needs for Shari`ah compliance in Islamic banking. The paper also direct the way how Shari`ah compliance is being carried out at the organizational level.
Learning effect and deterioration do not always occur separately. If both of them are founded simultaneously, the actual processing time of the jobs will both increase and decrease at the same time. The actual processing time is defined by a function of the starting time and position of jobs in the sequence. In this paper, the effect of learning and deterioration is applied to single machine’s scheduling problem in a paper-mill. Learning effect as a result of regular performance-evaluation reduce the effect of deterioration up to 206, 5509 hours. This paper-mill operates jobs by their interest. This paper show that Earlier Due Date (EDD) rule construct a better sequence under maximum lateness problem then either Shortest Processing Time (SPT) rule or Most Urgent Job rule do. Maximum lateness of the jobs under EDD rule is 13,6% less then sequence that is recently used.
This paper about the study of Secure message Recovery and batch verification using Digital Signature. Security is increased in batch verification through triple DES algorithm. Encryption is used for the Security in which the plaintext is transforming into the cipher text. A digital signature scheme involves two phases, the signature generation phase which is performed at the sender side and the signature verification phase that is performed by the receiver of that message. In computer to computer communication, the computer at sender’s end usually transforms a plaintext into cipher text using encryption. When the message is recovered at the Receiver Side than the original text is converted in to the encrypted text. That encrypted text is secure for the authenticated person. After recover the message if authentic person wants to get the original text then he/she enter the key and take the plaintext.
E-business is a new revolution where initiative is needed to fully utilize the capabilities of Internet technology in a specific business setting. Such an initiative has built the fundamental strengths of the organization that creates a huge competitive advantage among the competitors in the market. In this paper, a method is presented for the development of an e-business which is based on the research of value creation, reward or creating promotions for customers to build a strong trust between company and customers, and also knowledge management. The proposed method is designed to help clarify a strategic e-business vision and to solicit management commitment to change and take action on new business opportunities. In addition, it also impacts the environment positively through the societal world demand of moving rapidly in the direction of valuing low-pollution and energy-efficient products.
In our paper, we have established criterion of Ψ-Eventual Stability for impulsive differential systems with variable moments of impulses by using piecewise continuous auxiliary functions which are analogous to Lyapunov’s functions. The work of Bainov, Kulev and Soliman has been extended. An example has been given to support the theoretical result. In the example, the zero solution is not stable in the sense of Lyapunov but it is uniformly eventually stable. Moreover a weight function Ψ is also associated with state vectors.
Security risk analysis is the thrust area for the information based world. The researchers in this field deployed numerous techniques to overcome the information security oriented problem. In this paper the researcher tried for a approach of using anomaly detection for the risk reduction. The hub initiative for this work is that the anomalies are the deviation which could increase the percentage of risk. The anomaly detection is guided by the PCA and the genetic based multi class classifier is used. The classification is induced by the decision tree approach were the genetic algorithm is set out for the optimization in the process of finding the nodes of the tree. The proposed approach is evaluated with the bench mark on PCA based ANN classifier. The proposed approach outperforms the existing one. The results are demonstrated.
Braslav Poozerye is situated in the northwestern part of Belarus. Here hill forts mainly of hill type, at least – fortified settlements located on the eskers ridges have spread since the Late Bronze Age. The most part of hill forts in this region has been known since the end of the 19th century. Information about it is included in “Archaeological maps” created by F. Pokrovsky, but excavation of these settlements hasn’t carried out till 1970’s. Purposeful research of early hill forts in Braslav Poozerye has been carried out by the author since 1992. During this period he has undertaken extensive excavations at the sites of Tarilovo (Uklja), Zazony, Ratjunki, Podvarinka. Last years A. Medvedev and Z. Haritonovich announced thesis about attribution of these settlements to Dnieper-Dvina culture. But research of hill forts in this region showed that they had passed under the control of Late Hatched Ware Culture by the beginning of the 1st century AD.