104,071 research outputs found

    Inter-rater reliability and validity of the Australian Football League\u27s kicking and handball tests

    Get PDF
    Talent identification tests used at the Australian Football League’s National Draft Combine assess the capacities of athletes to compete at a professional level. Tests created for the National Draft Combine are also commonly used for talent identification and athlete development in development pathways. The skills tests created by the Australian Football League required players to either handball (striking the ball with the hand) or kick to a series of 6 randomly generated targets. Assessors subjectively rate each skill execution giving a 0-5 score for each disposal. This study aimed to investigate the inter-rater reliability and validity of the skills tests at an adolescent sub-elite level. Male Australian footballers were recruited from sub-elite adolescent teams (n=121, age=15.7 ± 0.3 years, height=1.77 ± 0.07 m, mass=69.17 ± 8.08 kg). The coaches (n=7) of each team were also recruited. Inter-rater reliability was assessed using Inter-class correlations (ICC) and Limits of Agreement analysis. Both the kicking (ICC=0.96, P\u3c0.01) and handball tests (ICC=0.89, P\u3c0.01) demonstrated strong reliability and acceptable levels of absolute agreement. Content validity was determined by examining test scores sensitivity to laterality and distance. Concurrent validity was assessed by comparing coaches’ perceptions of skill to actual test outcomes. Multivariate analysis of variance (MANOVA) examined the main effect of laterality, with scores on the dominant hand (P=0.04) and foot (P\u3c0.01) significantly higher compared to the non-dominant side. Follow-up univariate analysis showing significant differences at every distance in the kicking test. A poor correlation was found between coaches’ perceptions of skill and testing outcomes. The results of this study demonstrate both skill tests demonstrate acceptable inter-rater reliable. Partial content validity was confirmed for the kicking test, however further research is required to confirm validity of the handball test

    Acyclic Solos and Differential Interaction Nets

    Full text link
    We present a restriction of the solos calculus which is stable under reduction and expressive enough to contain an encoding of the pi-calculus. As a consequence, it is shown that equalizing names that are already equal is not required by the encoding of the pi-calculus. In particular, the induced solo diagrams bear an acyclicity property that induces a faithful encoding into differential interaction nets. This gives a (new) proof that differential interaction nets are expressive enough to contain an encoding of the pi-calculus. All this is worked out in the case of finitary (replication free) systems without sum, match nor mismatch

    Strength Training Prior to Endurance Exercise: Impact on the Neuromuscular System, Endurance Performance and Cardiorespiratory Responses

    Get PDF
    This study aimed to investigate the acute effects of two strength-training protocols on the neuromuscular and cardiorespiratory responses during endurance exercise. Thirteen young males (23.2 ± 1.6 years old) participated in this study. The hypertrophic strength-training protocol was composed of 6 sets of 8 squats at 75% of maximal dynamic strength. The plyometric strength-training protocol was composed of 6 sets of 8 jumps performed with the body weight as the workload. Endurance exercise was performed on a cycle ergometer at a power corresponding to the second ventilatory threshold until exhaustion. Before and after each protocol, a maximal voluntary contraction was performed, and the rate of force development and electromyographic parameters were assessed. After the hypertrophic strength-training and plyometric strength-training protocol, significant decreases were observed in the maximal voluntary contraction and rate of force development, whereas no changes were observed in the electromyographic parameters. Oxygen uptake and a heart rate during endurance exercise were not significantly different among the protocols. However, the time-to-exhaustion was significantly higher during endurance exercise alone than when performed after hypertrophic strength-training or plyometric strength-training (p <0.05). These results suggest that endurance performance may be impaired when preceded by strength-training, with no oxygen uptake or heart rate changes during the exercise

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead

    Using protocol analysis to explore the creative requirements engineering process

    Full text link
    Protocol analysis is an empirical method applied by researchers in cognitive psychology and behavioural analysis. Protocol analysis can be used to collect, document and analyse thought processes by an individual problem solver. In general, research subjects are asked to think aloud when performing a given task. Their verbal reports are transcribed and represent a sequence of their thoughts and cognitive activities. These verbal reports are analysed to identify relevant segments of cognitive behaviours by the research subjects. The analysis results may be cross-examined (or validated through retrospective interviews with the research subjects). This paper offers a critical analysis of this research method, its approaches to data collection and analysis, strengths and limitations, and discusses its use in information systems research. The aim is to explore the use of protocol analysis in studying the creative requirements engineering process.<br /

    Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks

    Full text link
    Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security. We propose here a new approach to achieve resistance against Man-in-The-Middle attacks. Our requirements - in terms of extra communications and hardware - are surprisingly low.Comment: submitted to IEEE Transactions on Information Theor

    Probabilistic DCS: An RFID reader-to-reader anti-collision protocol

    Get PDF
    The wide adoption of radio frequency identification (RFID) for applications requiring a large number of tags and readers makes critical the reader-to-reader collision problem. Various anti-collision protocols have been proposed, but the majority require considerable additional resources and costs. Distributed color system (DCS) is a state-of-the-art protocol based on time division, without noteworthy additional requirements. This paper presents the probabilistic DCS (PDCS) reader-to-reader anti-collision protocol which employs probabilistic collision resolution. Differently from previous time division protocols, PDCS allows multichannel transmissions, according to international RFID regulations. A theoretical analysis is provided in order to clearly identify the behavior of the additional parameter representing the probability. The proposed protocol maintains the features of DCS, achieving more efficiency. Theoretical analysis demonstrates that the number of reader-to-reader collisions after a slot change is decreased by over 30%. The simulation analysis validates the theoretical results, and shows that PDCS reaches better performance than state-of-the-art reader-to-reader anti-collision protocol

    Real-time detection of grid bulk transfer traffic

    Get PDF
    The current practice of physical science research has yielded a continuously growing demand for interconnection network bandwidth to support the sharing of large datasets. Academic research networks and internet service providers have provisioned their networks to handle this type of load, which generates prolonged, high-volume traffic between nodes on the network. Maintenance of QoS for all network users demands that the onset of these (Grid bulk) transfers be detected to enable them to be reengineered through resources specifically provisioned to handle this type of traffic. This paper describes a real-time detector that operates at full-line-rate on Gb/s links, operates at high connection rates, and can track the use of ephemeral or non-standard ports

    SCRIPTKELL : a tool for measuring cognitive effort and time processing in writing and other complex cognitive activities

    Get PDF
    We present SCRIPTKELL, a computer-assisted experimental tool that makes it possible to measure the time and cognitive effort allocated to the subprocesses of writing and other cognitive activities, SCRIPTKELL was designed to easily use and modulate Kellogg's (1986) triple-task procedure,.which consists of a combination of three tasks: a writing task (or another task), a reaction time task (auditory signal detection), and a directed retrospection task (after each signal detection during writing). We demonstrate how this tool can be used to address several novel empirical and theoretical issues. In sum, SCRIPTKELL should facilitate the flexible realization of experimental designs and the investigation of critical issues concerning the functional characteristics of complex cognitive activities

    Towards a model of how designers mentally categorise design information

    Get PDF
    This study aims to explore how designers mentally categorise design information during the early sketching performed in the generative phase. An action research approach is particularly appropriate for identifying the various sorts of design information and the cognitive operations involved in this phase. Thus, we conducted a protocol study with eight product designers based on a descriptive model derived from cognitive psychological memory theories. Subsequent protocol analysis yielded a cognitive model depicting the mental categorisation of design information processing performed by designers. This cognitive model included a structure for design information (high, middle, and low levels) and linked cognitive operations (association and transformation). Finally, this paper concludes by discussing directions for future research on the development of new computational tools for designers
    corecore