266 resultados para store names


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Diabetes mellitus has reached epidemic proportions worldwide. South Asians are known to have an increased predisposition for diabetes which has become an important health concern in the region. We discuss the prevalence of pre-diabetes and diabetes in South Asia and explore the differential risk factors reported. Methods Prevalence data were obtained by searching the Medline® database with; ‘prediabetes’ and ‘diabetes mellitus’ (MeSH major topic) and ‘Epidemology/EP’ (MeSH subheading). Search limits were articles in English, between 01/01/1980–31/12/2011, on human adults (≥19 years). The conjunction of the above results was narrowed down with country names. Results The most recent reported prevalence of pre-diabetes:diabetes in regional countries were; Bangladesh–4.7%:8.5% (2004–2005;Rural), India–4.6%:12.5% (2007;Rural); Maldives–3.0%:3.7% (2004;National), Nepal–19.5%:9.5% (2007;Urban), Pakistan–3.0%:7.2% (2002;Rural), Sri Lanka–11.5%:10.3% (2005–2006;National). Urban populations demonstrated a higher prevalence of diabetes. An increasing trend in prevalence of diabetes was observed in urban/rural India and rural Sri Lanka. The diabetes epidemicity index decreased with the increasing prevalence of diabetes in respective countries. A high epidemicity index was seen in Sri Lanka (2005/2006–52.8%), while for other countries, the epidemicity index was comparatively low (rural India 2007–26.9%; urban India 2002/2005–31.3%, and urban Bangladesh–33.1%). Family history, urban residency, age, higher BMI, sedentary lifestyle, hypertension and waist-hip ratio were associated with an increased risks of diabetes. Conclusion A significant epidemic of diabetes is present in the South Asian region with a rapid increase in prevalence over the last two decades. Hence there is a need for urgent preventive and curative strategies .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter will provide you with the some of the information you may need to make information on decisions in cases such as the one given above. In particular it will help you answer questions such as: 1. As Molly and Vikram are approaching the end of their shift, to attend will force them into overtime; could they refuse to attend the job on the basis of the refusal to do overtime outside of contracted hours? 2. Would their refusal be viewed as a breach of contract and therefore a disciplinary issue? 3. Why? 4. Does the need to attend this possibly gravely ill patient outweigh the demands of the paramedics to finish on time?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elements, types, rescission, exclusion clauses and impact of legislation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to segment male and female grocery shoppers based on store and product attribute evaluations. A rich profile for each segment is developed. Gender comparisons are operationalised and these developed contemporary shopper typologies are further contrasted against earlier works. Data of 560 grocery shoppers was attained by a survey questionnaire. Factor analysis, cluster analysis and ANOVA were employed to develop specific segments of shoppers. Four distinct cohorts of male shoppers and three cohorts of female shoppers emerge from the data of eight constructs, measured by 46 items. One new shopper type, not found in earlier typology literature, emerged from this research. This shopper presented as a young, well educated, at the commencement of their career and family lifecycle, attracted by a strong value offer and willingness to share the family food shopping responsibilities. This research makes a contribution to segmentation literature and grocery retail practice in several ways. It presents the first retail typology of male supermarket shoppers, employing a cluster analysis technique. Comparisons between male and female grocery shopping typologies are accordingly facilitated. The research provides insights into the modern family food shopping behaviour of men; a channel in which men are now recognised as equal contributors. Research outcomes encourage supermarket retailers to implement targeted marketing and rationalized operational strategies that deliver on attributes of importance. Finally, this research provides the basis for further cross-cultural, cross-contextual comparative studies.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As features of the landscape, waterfalls have been studied extensively by geographers, but the names given to these landforms have received relatively little scholarly attention. This paper examines the naming of waterfalls and addresses the question of classifying these hydronyms. The subject is considered in a global historical context, focusing on place names in the anglophone world. Until the 18th and 19th centuries, relatively few waterfalls were named.With the beginning of the Industrial Revolution, water power rose in economic importance, and at the same time, there was a growing scientific and aesthetic engagement with the landscape. These developments are suggested as reasons for the increased interest in waterfalls which were then being recorded in topographical literature and on maps, individual names being given to increasing numbers of falls. European exploration added to the knowledge of the world’s waterfalls, many of which were given names by their ‘discoverers’. This naming process accelerated with the growth of domestic and overseas tourism which exploited scenic resources such as waterfalls. Until now, research on the names of waterfalls has been fragmentary, and the classification of these hydronyms has been neglected. This paper demonstrates that waterfall names can be classified in accordance with a recognised toponymic typology. Using examples drawn from waterfall guidebooks, databases, maps, and other sources, the following discussion supports George Stewart’s claim that his toponymic classification is valid for place names of all kinds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book provides a comprehensive analysis of the practical and theoretical issues encountered in Australian civil procedure, including alternative dispute resolution. Each chapter features in-depth questions and notes together with lists of further reading to aid understanding of the issue. It also examines and discusses each substantive and procedural step in the trial process. Topics include jurisdiction of a court to consider a matter, alternative dispute resolution. limitations of actions, commencing proceedings, pleading, gathering evidence, trial and appeal, costs and practice directions. Each of the state, territory and federal procedures is covered.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The human kallikrein-related peptidases are a subgroup of trypsin and chymotrypsin-like serine peptidases that are characterized by their homology to tissue kallikrein or kallikrein 1 (KLK1) encoded by the KLK1 gene (reviewed in[1-4]). The human KLK locus spans an approximately 320 kb region on chromosome 19q13.3-13.4 and contains fifteen genes encoding KLK1 and fourteen other kallikrein-related peptidases, KLK2-KLK15, which have been named contiguously in the locus in the order of their discovery [5-8] (Figure 606.1). It is the largest contiguous cluster of serine protease encoding genes in the human genome which has evolved from gene duplication of KLK1 and then subsequent reduplication of the newly evolved KLK genes [2]. The high conservation noted for KLK1-KLK3 (62-77%) reflects the proposed duplication of the KLK1 gene that produced the KLK2 gene which further generated the KLK3 gene. In contrast, the newer KLK4-KLK15 proteases share much less similarity, from 24-66%, although strong homology between KLK4 and KLK5, KLK9 and KLK11, and KLK10 and KLK12 suggests these genes are duplications of each other [2]...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper gives an overview of the INEX 2011 Snippet Retrieval Track. The goal of the Snippet Retrieval Track is to provide a common forum for the evaluation of the effectiveness of snippets, and to investigate how best to generate snippets for search results, which should provide the user with sufficient information to determine whether the underlying document is relevant. We discuss the setup of the track, and the evaluation results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last two decades, the internet and e-commerce have reshaped the way we communicate, interact and transact. In the converged environment enabled by high speed broadband, web 2.0, social media, virtual worlds, user-generated content, cloud computing, VoIP, open source software and open content have rapidly become established features of our online experience. Business and government alike are increasingly using the internet as the preferred platform for delivery of their goods and services and for effective engagement with their clients. New ways of doing things online and challenges to existing business, government and social activities have tested current laws and often demand new policies and laws, adapted to the new realities. The focus of this book is the regulation of social, cultural and commercial activity on the World Wide Web. It considers developments in the law that have been, and continue to be, brought about by the emergence of the internet and e-commerce. It analyses how the law is applied to define rights and obligations in relation to online infrastructure, content and practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current diagnostic methods for assessing the severity of articular cartilage degenerative conditions, such as osteoarthritis, are inadequate. There is also a lack of techniques that can be used for real-time evaluation of the tissue during surgery to inform treatment decision and eliminate subjectivity. This book, derived from Dr Afara’s doctoral research, presents a scientific framework that is based on near infrared (NIR) spectroscopy for facilitating the non-destructive evaluation of articular cartilage health relative to its structural, functional, and mechanical properties. This development is a component of the ongoing research on advanced endoscopic diagnostic techniques in the Articular Cartilage Biomechanics Research Laboratory of Professor Adekunle Oloyede at Queensland University of Technology (QUT), Brisbane Australia.

Relevância:

10.00% 10.00%

Publicador: