Nutrition Coach


1. Do you think sports nutrition is applicable only to competitive athletes? Why or Why not? Defend your answer.

2. Josh has soccer practice each day from 6-8 am and weight training from 8-9 am. He struggles with what to consume before early morning practice and post work out prior to heading to class. Occasionally Josh skips breakfast or lunch due to lack of ideas for fuel and is short on time. Recommend 2-3 meals or snacks that would be appropriate for pre and post exercise.

3. Sarah is a track and field long distance runner who typically runs 12-16 miles per week during practice. She states she has reduced the amount of carbohydrate in her diet because she is concerned carbs may cause weight gain. Sarah also complains of feeling tired most days and needing to take a nap. As her nutrition coach what are your recommendations for Sarah?

4. What type of diets have you noticed trending currently for average individuals and/or athletes in regards to carbohydrate? What is your take on these? (1 point)

Sample Answer

Nutrition is the study of nutrients in food, how the body uses them, and the relationship between diet, health, and disease. Nutritionists use ideas from molecular biology, biochemistry, and genetics to understand how nutrients affect the human body. Even though nutrition is recommended to everyone, sportsmen require nutrition more to address the quick changes in their body chemistry and the heightened metabolic rate in their bodies and to replace the worn body tissues and energy during sporting activity.


The remainder of the paper is composed as follows: We present in segment 7 segments of and issues in a self-implanting plan together with the audit of papers dependent on it. Segment 8 presents audit of stage and likelihood dissemination based delicate watermarking plans. Area 9 presents audit of hamming code based delicate watermarking plans. Segment 10 presents survey of DCT/DWT based delicate watermarking plans. Area 11 presents survey of delicate watermarking plans of different methodologies. Area 12 closes the paper


Fridrich and Goljan[1] proposed the principal ever self implanting plan as a methods for ensuring picture content. Self-implanting based delicate watermarking plans by and large have 6 segments in particular (a) Block deterioration (b) Watermark age (c) Block mapping (d) watermark inserting (e) validation and alter limitation (f) Tampered area recuperation. In square decay arrange the picture is deteriorated into number of non-covering squares of same size and afterward watermark bits are processed at the square level. The watermark may have two sections – validation and recuperation bits. For the most part the quantity of recuperation bits is more than the quantity of validation bits. In specific plans [25] [27] confirmation information are created both at pixel level and at the square level. When the watermark bits are produced they are implanted either in a similar square or in some other square as indicated by a square guide. In specific plans, for example, [4][12] the confirmation bits are installed in a similar square while reclamation bits in another square. It's by utilizing a square guide that square reliance among the squares made which makes the plan impervious to VQ assaults or collection assaults. The length of the watermark impacts the nature of the watermarked picture; specifically if 3 LSB/2LSB/1LSB of a pixel in the picture are utilized for watermark inserting the PSNR of the watermarked picture will be 37.9dB/44.15 dB/51.14 dB separately. The picture verification worries with the uprightness of the got picture while the alter localisation worries with the recognizing the altered areas in the picture on the off chance that the picture has been altered. The littler square size can yield better alter localisation. When the altered areas are recognized starts the recuperation of the altered squares.


Constrained watermark implanting limit: Since a bigger payload can influence the nature of the watermarked picture, the picture highlights can't be very nitty gritty. Furthermore, any adjustment that leaves this packed data flawless can't be recognized. For example the steady normal assault on any square normal force based plan