A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chauhan, Neeta
- Effect of Core Stability Exercises Versus Conventional Treatment in Chronic Low Back Pain
Authors
1 Dept of Physiotherapy, IAHSET,Govt. Medical College Haldwani
Source
Indian Journal of Physiotherapy & Occupational Therapy-An International Journal, Vol 7, No 3 (2013), Pagination: 76-80Abstract
Aims and Objectives: To determine whether the use of core stability exercises on Swiss ball for LBPgives better results.Hypothesis: Core stability exercises on Swiss ball will be more effective in long term improvement in chronic low back pain.
Study Design: Experimental.
Subjects: 30 subjects with chronic low back pain participated in the study.
Methodology: Based on the inclusion and exclusion criteria subjects were included in the study. Convenient samplings was done for patients with random allocation into the following two groups:
GROUP A : (Experimental Group) exercises on the Swiss ball (15 patients).
GROUP B : ( Control Group) conventional treatment (15 patients). /
Conclusion: The present study reported significant rate of improvement with exercises done on the Swiss ball. Hence the study concludes that core stabilization exercises on Swiss ball are safe and effective in long term management of chronic low back pain.
Keywords
LBP, Low Back Pain, VAS, Visual Analogue Scale, ODI, Oswestry Disability IndexReferences
- Punjabi M.M, The stabilizing systems of the spine, part II, neutral zone and instability hypothesis. Journal of Spinal Disorders, 5,4,390-397,1992.
- Tesh K.M. et at, The abdominal muscles and vertebral stability, Spine 12,5,1987.
- Kinser C, Colby L.A. Therapeutic exercise foundation and techniques, 3rd edition, Jaypee Brothers Medical Publishers (P) Ltd.
- Miller R.S. Exercises ball therapy for low back pain. JAMA October 22, 2003.
- O’ Sullivan et at, Evaluation of specific stabilizing exercise in the treatment of chronic low back pain with radiology diagnosis of spondylolysis and spondylolisthesis. Spine 22,24,2959-2967, 1997.
- Foster N, Thompson K Baxter G, Allen J. Management of non specific low back pain by physiotherapists in Britain and Ireland, a descriptive questionnaire of current clinical practice. Spine 1999; 24: 1332-42.
- Chiradejnant A, Maher C, Latimer J. Efficacy of therapist selected versus randomly selected mobilization techniques for the treatment of low back pain: a randomized controlled trail. Aust J Physiotherapy 2003; 49: 233-41.
- Rasmussen-Barr E, Nilsson-Wikmar L, Arvison I. Stabilizing training compared with manual treatment in sub-acute chronic low back pain. Manual Therapy 2003; 8(4): 233-41.
- Cairns M, Foster N, Wright C. Randomized controlled conventional physiotherapy for recurrent low back pain. Spine 2006; 31(19): E6 70-81.
- Hurwitz E, Morgenstern H, Harber P et al. Second prize the effectiveness of physical modalities among patients with low back pain randomized to chiropractic care: findings from the UCLS low back pain study. J. Manipulative Physio Therapy 2002; 25(1): 10-20.
- Secure Web Application : Rudimentary Perspective
Authors
1 National Informatics Centre, New Delhi, IN
Source
Journal of Engineering Education Transformations, Vol 36, No SP (2022), Pagination: 185-190Abstract
WWW, one of the most pervasive technologies for information and service delivery over Internet with a potential to revise and preserve the web applications without dispensing and installing software on doubtlessly millions of client computers. As the web applications are increasingly used for crucial services, they have become a prominent and relevant target for any security outbreak. Software security is a methodology which guards against the malicious attacks and security failures along with an aim to increase system reliability. The prime objective of software security is to gain knowledge about the vulnerabilities in a system and foresee attacker’s motive and perception.
This paper reviews the existing techniques of web application security, with the aim of standardizing them into a bigger picture to enable the future research areas. The scrutiny of a web application attack and the attack techniques are also enclosed in details. Lastly the parameters to provide a secure hosting surrounding to the applications are indexed. The paper summarizes the security of web application in a holistic manner and provides a range of ways to ensure that it’s as secure as it can be, as well as forever improving.
Keywords
Security, OWASP, SDLC, SQL Injection, Web Application Firewall.References
- D. H. G. B. ,. P. L. A. P. Suzanne Widup, "2020 Verizon Data Breach Investigations Report," 2020.
- R. M. N. K. S. K. K. Sandeep Kumar, "A study on web application security and detecting security vulnerabilities," in 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), 2017.
- S. a. H. M. a. H. B. a. A. A. a. A. M. a. I. K. Rafique, "Web application security vulnerabilities detection approaches: A systematic mapping study," in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015.
- X. a. X. Y. Li, "A Survey on Server-Side Approaches to Securing Web Applications," ACM Comput. Surv., p. 29, 2014.
- N. P. a. M. R. B. a. M. H. Khan, "Software Security Issues: Requirement Perspectives," International Journal of Scientific & Engineering Research, 2014.
- A. a. J. S. Dalai, "Evaluation of web application security risks and secure design patterns," in Proceedings of the 2011 International Conference on Communication, Computing & Security, 2011.
- D. a. P. S. Banerjee, "Research on software security awareness: problems and prospects," ACM SIGSOFT Software Engineering Notes, pp. 1-5, 10 2010.
- J. a. W. S. Andress, "The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice: Second Edition," pp. 1-217, 01 2014.
- M. Al-ibrahim, "The Reality of Applying Security in Web Applications in Academia," International Journal of Advanced Computer Science and Applications, 2014.
- O. M. Y. a. R. I. Alhazmi, "Security Vulnerabilities in Software Systems: A Quantitative Perspective," in Data and Applications Security XIX, Berlin, Heidelberg, 2005.
- P. technologies, "www.ptsecurity.com".