190 research outputs found

    Motor reaction time, sarcopenia and functional skills in elderly women: a cross-sectional study

    Get PDF
    IMPORTANCE: Aging generates changes over the years. Because of this, the musculoskeletal system is directly degraded and suffer deficits in its performance in elderly patients with Sarcopenia, as this condition is characterized by a decrease in muscle mass and function. OBJECTIVE: Correlate the motor reaction time and functional skills of non-sarcopenic, pre-sarcopenic and sarcopenic elderly women, and analyze influence on the risk of falls. DESIGN: Cross-sectional observational analytical study, following the methodological strategies of STROBE (Strengthening the Reporting of Observational Studies in Epidemiology), carried out under the approval of the Research Ethics Committee of the Unievangélica University, no. 3.694.235/2019. SETTING: Participants were evaluated regarding: cognitive status, level of physical activity, fear of falling, body composition, motor reaction time, static and dynamic balance, gait kinetics, strength and endurance of the lower limbs and finally handgrip strength. PARTICIPANTS: A total of 59 volunteer elderly women were assessed following the diagnostic criteria for sarcopenia proposed by the European Working Group on Sarcopenia in Older People (EWGSOP). RESULTS: The results show that there was a greater difference in motor reaction time between the non-sarcopenic and sarcopenic elderly women due to the executing organ being damaged by the presence of sarcopenia, causing motor response to slowdown. Functional deficit, fear of falling and greater risk of falls were observed in the sarcopenic group, under the harmful influence of increased motor reaction time. CONCLUSION: Sarcopenic elderly women present increased motor reaction time, that is, slowed motor responses due to decreased muscle mass, strength and impaired musculature, which generate functional deficits that contribute to an increased risk of falls.info:eu-repo/semantics/publishedVersio

    Cryptography Adapted to the New European Area of Higher Education

    Get PDF
    9 pages, no figures.-- Contributed to: Computational Science – ICCS 2008: 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part II.A new experience for teaching Cryptography to engineering students is shown. The aim is to give them a better understanding of secure and cryptographic algorithms by using Maple software, in a graduate-level course. In this paper we discuss how to structure, define, and implement a web-based course as a part of the traditional classes, according to the convergence of the European Higher Education Project. The proposed course facilitates the use of new Information and Communication Technologies.This work has been supported by Ministerio de Industria, Turismo y Comercio (Spain) in collaboration with Telef¶onica I+D (Project SEGUR@) with reference CENIT-2007 2004.Peer reviewe

    Morphological phenotypic dispersion of garlic cultivars by cluster analysis and multidimensional scaling

    Get PDF
    Multivariate techniques have become a useful tool for studying the phenotypic diversity of Germplasm Bank accessions, since they make it possible to combine a variety of different information from these accessions. This study aimed to characterize the phenotypic dispersion of garlic (Allium sativum L.) using two multivariate techniques with different objective functions. Twenty accessions were morphologically characterized for bulb diameter, length, and weight; number of cloves per bulb; number of leaves per plant; and leaf area. Techniques based on generalized quadratic distance of Mahalanobis, UPGMA (Unweighted Pair Group Method with Arithmetic Mean) clustering, and nMDS (nonmetrric MultiDimensional Scaling) were applied and the relative importance of variables quantified. The two multivariate techniques were capable of identifying cultivars with different characteristics, mainly regarding their classification in subgroups of common garlic or noble garlic, according to the number of cloves per bulb. The representation of the phenotypic distance of cultivars by multidimensional scaling was slightly more effective than that with UPGMA clustering

    Magnetic Catalysis: A Review

    Full text link
    We give an overview of the magnetic catalysis phenomenon. In the framework of quantum field theory, magnetic catalysis is broadly defined as an enhancement of dynamical symmetry breaking by an external magnetic field. We start from a brief discussion of spontaneous symmetry breaking and the role of a magnetic field in its a dynamics. This is followed by a detailed presentation of the essential features of the phenomenon. In particular, we emphasize that the dimensional reduction plays a profound role in the pairing dynamics in a magnetic field. Using the general nature of underlying physics and its robustness with respect to interaction types and model content, we argue that magnetic catalysis is a universal and model-independent phenomenon. In support of this claim, we show how magnetic catalysis is realized in various models with short-range and long-range interactions. We argue that the general nature of the phenomenon implies a wide range of potential applications: from certain types of solid state systems to models in cosmology, particle and nuclear physics. We finish the review with general remarks about magnetic catalysis and an outlook for future research.Comment: 37 pages, to appear in Lect. Notes Phys. "Strongly interacting matter in magnetic fields" (Springer), edited by D. Kharzeev, K. Landsteiner, A. Schmitt, H.-U. Yee. Version 2: references adde

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Get PDF
    This paper is primarily concerned with the CBC block cipher mode. The impact on the usability of this mode of recently proposed padding oracle attacks, together with other related attacks described in this paper, is considered. For applications where unauthenticated encryption is required, the use of CBC mode is compared with its major symmetric rival, namely the stream cipher. It is argued that, where possible, authenticated encryption should be used, and, where this is not possible, a stream cipher would appear to be a superior choice. This raises a major question mark over the future use of CBC mode, except as part of a more complex mode designed to provide authenticated encryption
    • …
    corecore