2,295,277 research outputs found
Sweat rate and Sweat Electrolyte Concentrations in Football Players During Exercise in Cool versus Warm Environmental Conditions: A Cross Over Study
Objectives: To determine if sweat rate and sweat electrolyte concentrations differ when football players exercise in warm versus cool environmental conditions. Participants: Eleven unacclimatized football players exercised for 60 min in warm (24°C and 75%RH) and cool (10°C and 25%RH) randomly assigned trials. Methods: Sweat patches made from sterile gauze were placed on forearm, low back and thigh sites after skin was thoroughly washed and dried. Sweat rate was calculated as change in pre-exercise to post-exercise nude body weight adjusted for fluid consumed and urine produced during exercise. Sweat patches were removed after exercise and centrifuged to separate sweat from gauze and analyzed for Na+, K+ and Cl- via ion selective electrode. Data was analyzed using two-way ANOVA and dependent t-tests with significance set at pResults: Sweat rate was higher in warm (1.40.6 L/Hr) versus cool (0.90.6 L/Hr) conditions, but no differences existed in Na+, K+ or Cl- in any of the three sites. Because sweat rate was higher in warm, calculated full body NaCl losses (6843.9 ± 3784.5/Hr) were also higher versus cool (4398.8 ± 3939.5/Hr) conditions, t =2.77, P=0.019). Conclusion: As expected, sweat rate was higher in warm versus cool conditions, but there were no differences found in sweat electrolyte concentrations at any site measured. Thus, electrolyte replacement does not need to be changed for each player in different environments other than accounting for sweat losses. However, individual replacement plans should be specialized due to considerable individual variability in both sweat rate and sweat electrolyte concentrations
State of the Young Child in India
This Report is one of the first comprehensive studies on young children in India. It focuses on children under 6 years of age and presents key aspects of their well-being and development. With the highest number of neonatal, infant and under-5 deaths in the world, there is an urgent need to address issues that continue to affect the young child in India. This volume: Introduces two young child indices aggregating selected indicators to separately track child outcomes and child circumstances. Provides an account of the current situation of the young child in terms of physical and cognitive development, access to care, disadvantaged children and major issues that have led to the continued neglect of this age group. Explores the policy and legal framework, fiscal space and the role and obligations of key stakeholders, including the state, private sector, civil society, media and the family. Highlights key recommendations and action points that can help to improve the ecosystem for early childhood care and development. Drawing on specially commissioned technical background papers, supplemented by extensive field experience of Mobile Creches in childcare, this Report will be of interest to practitioners, policymakers and influencers, think tanks and researchers of public policy, development studies, human rights, sociology and social anthropology, as well as general readers. The Open Access version of this book, available at http://www.tandfebooks.com/doi/view/10.4324/9781003026488, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015
EXECUTIVE SUMMARY
As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference.
Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that:
will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve;
is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers;
hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks;
risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks;
will be a significant deterrent to technological investment in Australia;
imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia;
fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action;
carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians;
lacks transparency; and
fails to provide adequate consultative mechanisms and avenues of appeal
WEST: A Web Browser for Small Terminals
We describe WEST, a WEb browser for Small Terminals, that aims to solve some of the problems associated with accessing web pages on hand-held devices. Through a novel combination of text reduction and focus+context visualization, users can access web pages from a very limited display environment, since the system will provide an overview of the contents of a web page even when it is too large to be displayed in its entirety. To make maximum use of the limited resources available on a typical hand-held terminal, much of the most demanding work is done by a proxy server, allowing the terminal to concentrate on the task of providing responsive user interaction. The system makes use of some interaction concepts reminiscent of those defined in the Wireless Application Protocol (WAP), making it possible to utilize the techniques described here for WAP-compliant devices and services that may become available in the near future
Recommended from our members
Mobile Informal Language Learning: Exploring Welsh Learners’ Practices
Mobile devices have great potential in supporting language learning, through providing access to vocabulary, lessons and resources, and supporting interactions with other speakers. There may be particular advantages, however, in using such technologies for
learning minority languages.
Welsh is a minority UK language spoken by around 611,000 people in Wales and there is considerable interest among adults in Wales and from Welsh families in learning Welsh. However the small numbers of speakers and their uneven distribution make it difficult for learners outside Welsh speaking “hotspots” to hear and practice Welsh.
Mobile learning therefore has great potential for Welsh learners by providing resources wherever the learner is and by supporting web-based learning communities. The study reported here investigates whether this potential is being exploited in practice. It employed interviews and a small survey to study the practices of Welsh learners at all levels. It was found that learners used mobile technologies widely, to access a wide range of resources, although not always on-the-move, and also that many were using courses, in particular one online course. Learners’ practices in using digital technologies for their Welsh language learning are discussed, and also the implications for both learning other minority languages and for informal mobile learning more generally
Mobile phone dependence, social support and impulsivity in Chinese university students
This study examined the frequency of mobile phone dependence in Chinese university students and explored its association with social support and impulsivity. Altogether, 909 university students were consecutively recruited from a large university in China. Mobile phone use, mobile phone dependence, impulsivity, and social support were measured with standardized instruments. The frequency of possible mobile phone use and mobile phone dependence was 78.3% and 7.4%, respectively. Multinomial logistic regression analyses revealed that compared with no mobile phone dependence, possible mobile phone dependence was significantly associated with being male (p = 0.04, OR = 0.7, 95% CI: 0.4–0.98), excessive mobile phone use (p \u3c 0.001, OR = 1.2, 95% CI: 1.09–1.2), and impulsivity (p \u3c 0.001, OR = 1.05, 95% CI: 1.03–1.06), while mobile phone dependence was associated with length of weekly phone use (p = 0.01, OR = 2.5, 95% CI: 1.2–5.0), excessive mobile phone use (p \u3c 0.001, OR = 1.3, 95% CI: 1.2–1.4), and impulsivity (p \u3c 0.001, OR = 1.08, 95% CI: 1.05–1.1). The frequency of possible mobile phone dependence and mobile phone dependence was high in this sample of Chinese university students. A significant positive association with impulsivity was found, but not with social support
NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
As a consequence of the growing popularity of smart mobile devices, mobile
malware is clearly on the rise, with attackers targeting valuable user
information and exploiting vulnerabilities of the mobile ecosystems. With the
emergence of large-scale mobile botnets, smartphones can also be used to launch
attacks on mobile networks. The NEMESYS project will develop novel security
technologies for seamless service provisioning in the smart mobile ecosystem,
and improve mobile network security through better understanding of the threat
landscape. NEMESYS will gather and analyze information about the nature of
cyber-attacks targeting mobile users and the mobile network so that appropriate
counter-measures can be taken. We will develop a data collection infrastructure
that incorporates virtualized mobile honeypots and a honeyclient, to gather,
detect and provide early warning of mobile attacks and better understand the
modus operandi of cyber-criminals that target mobile devices. By correlating
the extracted information with the known patterns of attacks from wireline
networks, we will reveal and identify trends in the way that cyber-criminals
launch attacks against mobile devices.Comment: Accepted for publication in Proceedings of the 28th International
Symposium on Computer and Information Sciences (ISCIS'13); 9 pages; 1 figur
- …