2,295,277 research outputs found

    Sweat rate and Sweat Electrolyte Concentrations in Football Players During Exercise in Cool versus Warm Environmental Conditions: A Cross Over Study

    Get PDF
    Objectives: To determine if sweat rate and sweat electrolyte concentrations differ when football players exercise in warm versus cool environmental conditions. Participants: Eleven unacclimatized football players exercised for 60 min in warm (24°C and 75%RH) and cool (10°C and 25%RH) randomly assigned trials. Methods: Sweat patches made from sterile gauze were placed on forearm, low back and thigh sites after skin was thoroughly washed and dried. Sweat rate was calculated as change in pre-exercise to post-exercise nude body weight adjusted for fluid consumed and urine produced during exercise. Sweat patches were removed after exercise and centrifuged to separate sweat from gauze and analyzed for Na+, K+ and Cl- via ion selective electrode. Data was analyzed using two-way ANOVA and dependent t-tests with significance set at pResults: Sweat rate was higher in warm (1.40.6 L/Hr) versus cool (0.90.6 L/Hr) conditions, but no differences existed in Na+, K+ or Cl- in any of the three sites. Because sweat rate was higher in warm, calculated full body NaCl losses (6843.9 ± 3784.5/Hr) were also higher versus cool (4398.8 ± 3939.5/Hr) conditions, t =2.77, P=0.019). Conclusion: As expected, sweat rate was higher in warm versus cool conditions, but there were no differences found in sweat electrolyte concentrations at any site measured. Thus, electrolyte replacement does not need to be changed for each player in different environments other than accounting for sweat losses. However, individual replacement plans should be specialized due to considerable individual variability in both sweat rate and sweat electrolyte concentrations

    State of the Young Child in India

    Get PDF
    This Report is one of the first comprehensive studies on young children in India. It focuses on children under 6 years of age and presents key aspects of their well-being and development. With the highest number of neonatal, infant and under-5 deaths in the world, there is an urgent need to address issues that continue to affect the young child in India. This volume: Introduces two young child indices aggregating selected indicators to separately track child outcomes and child circumstances. Provides an account of the current situation of the young child in terms of physical and cognitive development, access to care, disadvantaged children and major issues that have led to the continued neglect of this age group. Explores the policy and legal framework, fiscal space and the role and obligations of key stakeholders, including the state, private sector, civil society, media and the family. Highlights key recommendations and action points that can help to improve the ecosystem for early childhood care and development. Drawing on specially commissioned technical background papers, supplemented by extensive field experience of Mobile Creches in childcare, this Report will be of interest to practitioners, policymakers and influencers, think tanks and researchers of public policy, development studies, human rights, sociology and social anthropology, as well as general readers.  The Open Access version of this book, available at http://www.tandfebooks.com/doi/view/10.4324/9781003026488, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

    Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015

    Get PDF
    EXECUTIVE SUMMARY As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference. Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that: will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve; is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers; hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks; risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks; will be a significant deterrent to technological investment in Australia; imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia; fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action; carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians; lacks transparency; and fails to provide adequate consultative mechanisms and avenues of appeal

    WEST: A Web Browser for Small Terminals

    Get PDF
    We describe WEST, a WEb browser for Small Terminals, that aims to solve some of the problems associated with accessing web pages on hand-held devices. Through a novel combination of text reduction and focus+context visualization, users can access web pages from a very limited display environment, since the system will provide an overview of the contents of a web page even when it is too large to be displayed in its entirety. To make maximum use of the limited resources available on a typical hand-held terminal, much of the most demanding work is done by a proxy server, allowing the terminal to concentrate on the task of providing responsive user interaction. The system makes use of some interaction concepts reminiscent of those defined in the Wireless Application Protocol (WAP), making it possible to utilize the techniques described here for WAP-compliant devices and services that may become available in the near future

    Mobile phone dependence, social support and impulsivity in Chinese university students

    Get PDF
    This study examined the frequency of mobile phone dependence in Chinese university students and explored its association with social support and impulsivity. Altogether, 909 university students were consecutively recruited from a large university in China. Mobile phone use, mobile phone dependence, impulsivity, and social support were measured with standardized instruments. The frequency of possible mobile phone use and mobile phone dependence was 78.3% and 7.4%, respectively. Multinomial logistic regression analyses revealed that compared with no mobile phone dependence, possible mobile phone dependence was significantly associated with being male (p = 0.04, OR = 0.7, 95% CI: 0.4–0.98), excessive mobile phone use (p \u3c 0.001, OR = 1.2, 95% CI: 1.09–1.2), and impulsivity (p \u3c 0.001, OR = 1.05, 95% CI: 1.03–1.06), while mobile phone dependence was associated with length of weekly phone use (p = 0.01, OR = 2.5, 95% CI: 1.2–5.0), excessive mobile phone use (p \u3c 0.001, OR = 1.3, 95% CI: 1.2–1.4), and impulsivity (p \u3c 0.001, OR = 1.08, 95% CI: 1.05–1.1). The frequency of possible mobile phone dependence and mobile phone dependence was high in this sample of Chinese university students. A significant positive association with impulsivity was found, but not with social support

    NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

    Full text link
    As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and improve mobile network security through better understanding of the threat landscape. NEMESYS will gather and analyze information about the nature of cyber-attacks targeting mobile users and the mobile network so that appropriate counter-measures can be taken. We will develop a data collection infrastructure that incorporates virtualized mobile honeypots and a honeyclient, to gather, detect and provide early warning of mobile attacks and better understand the modus operandi of cyber-criminals that target mobile devices. By correlating the extracted information with the known patterns of attacks from wireline networks, we will reveal and identify trends in the way that cyber-criminals launch attacks against mobile devices.Comment: Accepted for publication in Proceedings of the 28th International Symposium on Computer and Information Sciences (ISCIS'13); 9 pages; 1 figur
    corecore