788 research outputs found
Herbal versus synthetic drugs; beliefs and facts.
Herbal therapy is a holistic therapy, integrating emotional, mental and spiritual levels. Life style, emotional, mental and spiritual considerations are part of any naturopathic approach. The use of herbs does not generally involve "drug" actions or adverse effects. Although medicinal plants are widely used and assumed to be safe, however, they can potentially be toxic. Where poisoning from medicinal plants has been reported, it usually has been due to misidentification of the plants in the form, in which they are sold, or incorrectly preparation and administration by inadequately trained personnel. There are some "drug like" plants remedies that their actions approach that of pharmaceuticals. Herbalists use these plants in treatment strategies and in countries such as Britain their vast availability is restricted by law. Digitalis is one of these examples and the number of these plants is not a lot. The mechanisms by which the herbs generally act are not established, however, most of medicinal plants possess antioxidant activities. The plants have been shown to effective by this property is various conditions including cancer, memory deficit and Alzheimer, atherosclerosis, diabetes and other cardiovascular diseases. Antioxidant activities of herbal medicines are also effective in reducing the toxicities of toxic agents or other drugs
On the Origins of Risk-Taking
Risk-taking behavior is highly correlated between parents and their children; however, little is known about the extent to which these relationships are genetic or determined by environmental factors. We use data on stock market participation of Swedish adoptees and relate this to the investment behavior of both their biological and adoptive parents. We find that stock market participation of parents increases that of children by about 34% and that both pre-birth and post-birth factors are important. However, once we condition on having positive financial wealth, we find that nurture has a much stronger influence on risk-taking by children, and the evidence of a relationship between stock-holding of biological parents and their adoptive children becomes very weak. We find similar results when we study the share of financial wealth that is invested in stocks. This suggests that a substantial proportion of risk-attitudes and behavior is environmentally determined
Labor Market Opportunities and Women’s Decision Making Power within Households
Despite the perceived importance of labor market opportunities in shaping married women’s outside option, and their bargaining power within households as a result, this link has received very little empirical attention. Using longitudinal data on who makes the decision on a wide range of issues within Mexican households and data from the administrative records of the Mexican Social Security Institute, this paper identifies the effects of relative changes in labor market opportunities for men and women on both working and non-working women’s decision making power. I find that increases in labor market opportunities improve women’s decision-making power as well as children’s health. Using differential labor demand shocks across Mexican industries caused by China’s admission to the WTO gives similar results
Analysis and tests [of] L-shaped reinforced concrete column under combined biaxial bending and axial compression
A total of five tests on biaxially loaded column specimens were conducted to investigate the complete behavior of load-deformation characteristics from zero load until failure. The specimens were tested under horizontal position with 60 ton hydrolic jack. Pin end was used for both ends to obtain higher accuracy of plotting curves.
Two specimens were tested with dial gages to obtain load-deflection curves and the other three specimens were tested with demec and strain gages to obtain load strain and moment-curvature curves. The strain gages were measured by weston bridge and deme-gages were measured by mechanical dial gage.
The above moment-curvature curves can be incorporated in several special purpose computer programs, which calculate the moment rotation and the load-deflection relationships for L-Shaped reinforced concrete columns under combined biaxial bending and axial compression. Calculated results were compared with the theoretical results from computer program and satisfactory agreement was obtained
Posture-induced changes in peripheral nerve stiffness measured by ultrasound shear-wave elastography
Introduction: Peripheral nerves slide and stretch during limb movements. Changes in nerve stiffness associated with such movements have not been examined in detail but may be important in understanding movement-evoked pain in patients with a variety of different musculoskeletal conditions.
Methods: Shear-wave elastography was used to examine stiffness in the median and tibial nerves of healthy individuals during postures used clinically to stretch these nerves.
Results: Shear-wave velocity increased when limbs were moved into postures that are thought to increase nerve stiffness (mean increase: median nerve = 208% in arm, 236% in forearm; tibial nerve = 136%). There was a trend toward a negative correlation between age and shear-wave velocity (r = 0.58 for tibial nerve).
Conclusions: Shear-wave elastography provides a tool for examining nerve biomechanics in healthy individuals and patients. However, limb position, age, and effects of nerve tension on neural architecture should be taken into consideration
An Approach for Agile SOA Development using Agile Principals
In dynamic and turbulent business environment, the need for success and
survival of any organization is the ability of adapting to changes efficiently
and cost-effectively. So, for developing software applications, one of the
methods is Service Oriented Architecture (SOA) methodology and other is Agile
Methodology. Since embracing changes is the indispensable concept of SOA
development as well as Agile Development, using an appropriate SOA methodology
able to adapt changes even during system development with the preservation of
software quality is necessary. In this paper, a new approach consisted of five
steps is presented to add agility to SOA methodologies. This approach, before
any SOA-based development, helps architect(s) to determine Core Business
Processes (CBPs) by using agile principals for establishing Core Architecture.
The most important advantage of this approach according to the results of case
study is possibility of embracing changes with the preservation of software
quality in SOA developments.Comment: 8 pages, 1 figure, 1 table;
http://airccse.org/journal/ijcsit2012_curr.htm
Migrants' Inclusion in Civil Societies: The Case of Language Cafés in Sweden
This article investigates the role of language cafés as venues where newly arrived migrants to Sweden can socialize and practice the target language. More specifically, we aim to explore how café organizers and volunteers orient to social inclusion as they are interviewed about the goals of the local café and engage in talk‐in‐interaction with the visitors during video‐recorded café sessions. At the methodological level, we rely on ethnomethodologically informed ethnography and conversation analysis, through which we adopt an emic approach to data analysis by taking into account the members' interpretation of their social world and the actions they accomplish in it. Our analysis uncovers the organizers' and volunteers' conceptualization of social inclusion, which they articulate in terms of fostering a sense of belonging and empowerment; they also perceive the mutual benefits derived from the encounters with the migrants at the local café. Overall, the migrants' views dovetail with the concept of "everyday citizenship," which highlights the dimensions of belonging, rights, and access to resources for social participation as constitutive of social inclusion. These findings highlight the perceived role of language cafés as a way to act on the existing social reality to transform the local community into an inclusive, equal, and integrated society
Robust Low-Overhead Binary Rewriting: Design, Extensibility, And Customizability
Binary rewriting is the foundation of a wide range of binary analysis tools and techniques, including securing untrusted code, enforcing control-flow integrity, dynamic optimization, profiling, race detection, and taint tracking to prevent data leaks. There are two equally important and necessary criteria that a binary rewriter must have: it must be robust and incur low overhead. First, a binary rewriter must work for different binaries, including those produced by commercial compilers from a wide variety of languages, and possibly modified by obfuscation tools. Second, the binary rewriter must be low overhead. Although the off-line use of programs, such as testing and profiling, can tolerate large overheads, the use of binary rewriters in deployed programs must not introduce significant overheads; typically, it should not be more than a few percent. Existing binary rewriters have their challenges: static rewriters do not reliably work for stripped binaries (i.e., those without relocation information), and dynamic rewriters suffer from high base overhead. Because of this high overhead, existing dynamic rewriters are limited to off-line testing and cannot be practically used in deployment.
In the first part, we have designed and implemented a dynamic binary rewriter called RL-Bin, a robust binary rewriter that can instrument binaries reliably with very low overhead. Unlike existing static rewriters, RL-Bin works for all benign binaries, including stripped binaries that do not contain relocation information. In addition, RL-Bin does not suffer from high overhead because its design is not based on the code-cache, which is the primary mechanism for other dynamic rewriters such as Pin, DynamoRIO, and Dyninst. RL-Bin's design and optimization methods have empowered RL-Bin to rewrite binaries with very low overhead (1.04x on average for SPECrate 2017) and very low memory overhead (1.69x for SPECrate 2017). In comparison, existing dynamic rewriters have a high runtime overhead (1.16x for DynamoRIO, 1.29x for Pin, and 1.20x for Dyninst) and have a bigger memory footprint (2.5x for DynamoRIO, 2.73x for Pin, and 2.3x for Dyninst). RL-Bin differentiates itself from other rewriters by having negligible overhead, which is proportional to the added instrumentation. This low overhead is achieved by utilizing an in-place design and applying multiple novel optimization methods. As a result, lightweight instrumentation can be added to applications deployed in live systems for monitoring and analysis purposes.
In the second part, we present RL-Bin++, an improved version of RL-Bin, that handles various problematic real-world features commonly found in obfuscated binaries. We demonstrate the effectiveness of RL-Bin++ for the SPECrate 2017 benchmark obfuscated with UPX, PECompact, and ASProtect obfuscation tools. RL-Bin++ can efficiently instrument heavily obfuscated binaries (overhead averaging 2.76x, compared to 4.11x, 4.72x, and 5.31x overhead respectively caused by DynamoRIO, Dyninst, and Pin). However, the major accomplishment is that we achieved this while maintaining the low overhead of RL-Bin for unobfuscated binaries (only 1.04x). The extra level of robustness is achieved by employing dynamic deobfuscation techniques and using a novel hybrid in-place and code-cache design.
Finally, to show the efficacy of RL-Bin in the development of sophisticated and efficient analysis tools, we have designed, implemented, and tested two novel applications of RL-Bin; An application-level file access permission system and a security tool for enforcing secure execution of applications. Using RL-Bin's system call instrumentation capability, we developed a fine-grained file access permission system that enables the user to define separate file access policies for each application. The overhead is very low, only 6%, making this tool practical to be used in live systems. Secondly, we designed a security enforcement tool that instruments indirect control transfer instructions to ensure that the program execution follows the predetermined anticipated path. Hence, it would protect the application from being hijacked. Our implementation showed effectiveness in detecting exploits in real-world programs while being practical with a low overhead of only 9%
- …
