117 research outputs found

    Comparing league formats with respect to match importance in Belgian football

    Get PDF
    Recently, most clubs in the highest Belgian football division have become convinced that the format of their league should be changed. Moreover, the TV station that broadcasts the league is pleading for a more attractive competition. However, the clubs have not been able to agree on a new league format, mainly because they have conflicting interests. In this paper, we compare the current league format, and three other formats that have been considered by the Royal Belgian Football Association. We simulate the course of each of these league formats, based on historical match results. We assume that the attractiveness of a format is determined by the importance of its games; our importance measure for a game is based on the number of teams for which this game can be decisive to reach a given goal. Furthermore, we provide an overview of how each league format aligns with the expectations and interests of each type of club

    Теоретико-методологічні основи розуміння механізму правового регулювання

    Get PDF
    Метою цієї статті є аналіз напрямів наукових досліджень, що у своїй єдності формують теорію механізму правового регулювання (МПР), розкриття теоретикометодологічних проблем, які мають місце при осмисленні МПР, визначення та систематизація методологічних підходів до розуміння МПР

    Drug Use Changes at the Individual Level: Results from a Longitudinal, Multisite Survey in Young Europeans Frequenting the Nightlife Scene

    Get PDF
    Background: Monitoring emerging trends in the increasingly dynamic European drug market is vital; however, information on change at the individual level is scarce. In the current study, we investigated changes in drug use over 12 months in European nightlife attendees. / Method: In this longitudinal online survey, changes in substances used, use frequency in continued users, and relative initiation of use at follow-up were assessed for 20 different substances. To take part, participants had to be aged 18–34 years; be from Belgium, Italy, the Netherlands, Sweden, or the UK; and have attended at least 6 electronic music events in the past 12 months at baseline. Of 8,045 volunteers at baseline, 2,897 completed the survey at both time points (36% follow-up rate), in 2017 and 2018. / Results: The number of people using ketamine increased by 21% (p < 0.001), and logarithmized frequency of use in those continuing use increased by 15% (p < 0.001; 95% CI: 0.07–0.23). 4-Fluoroamphetamine use decreased by 27% (p < 0.001), and logarithmized frequency of use in continuing users decreased by 15% (p < 0.001, 95% CI: −0.48 to −0.23). The drugs with the greatest proportion of relative initiation at follow-up were synthetic cannabinoids (73%, N = 30), mephedrone (44%, N = 18), alkyl nitrites (42%, N = 147), synthetic dissociatives (41%, N = 15), and prescription opioids (40%, N = 48). / Conclusions: In this European nightlife sample, ketamine was found to have the biggest increase in the past 12 months, which occurred alongside an increase in frequency of use in continuing users. The patterns of uptake and discontinuation of alkyl nitrates, novel psychoactive substances, and prescription opioids provide new information that has not been captured by existing cross-sectional surveys. These findings demonstrate the importance of longitudinal assessments of drug use and highlight the dynamic nature of the European drug landscape

    Decline in age at menarche among Spanish women born from 1925 to 1962

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>While the timing of reproductive events varies across populations, a downward trend in age at menarche has nevertheless been reported in most of the developed world over the past century. Given the impact of change in age at menarche on health conditions, this study sought to examine secular trends in age at menarche among women living in Navarre (Northern Spain) who participated in a population-based breast cancer screening programme.</p> <p>Methods</p> <p>The study was based on 110545 women born from 1925 to 1962. Trends were tested using a linear regression model, in which year of birth was entered continuously as the predictor and age at menarche (years) as the response variable, using size of town and region of birth as covariates.</p> <p>Results</p> <p>Among women born in Navarre between 1925 and 1962, age at menarche declined steadily from an average of 13.72 years in the 1925-1929 birth-cohorts to 12.83 years in the 1958-1962 birth-cohorts. Controlling for size of town or city of birth, age at menarche declined by an average of 0.132 years every 5 years over the period 1925-1962. This decline was greater in women born in rural versus urban settings. Trends were also different among regions of birth.</p> <p>Conclusion</p> <p>We report a population-based study showing a downward trend in age of onset of menarche among Spanish women born in the period 1925-1962, something that is more pronounced among women born in rural settings and varies geographically.</p

    Does economic development contribute to sex differences in ischaemic heart disease mortality? Hong Kong as a natural experiment using a case-control study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The male excess risk of premature ischemic heart disease (IHD) mortality may be partially due to an unknown macro-environmental influence associated with economic development. We examined whether excess male risk of IHD mortality was higher with birth in an economically developed environment.</p> <p>Methods</p> <p>We used multivariable logistic regression in a population-based case-control study of all adult deaths in Hong Kong Chinese in 1998 to compare sex differences in IHD mortality (1,189 deaths in men, 1,035 deaths in women and 20,842 controls) between Hong Kong residents born in economically developed Hong Kong or in contemporaneously undeveloped Guangdong province in China.</p> <p>Results</p> <p>Younger (35–64 years) native-born Hong Kong men had a higher risk of IHD death than such women (odds ratio 2.91, 95% confidence interval 1.66 to 5.13), adjusted for age, socio-economic status and lifestyle. There was no such sex difference in Hong Kong residents who had migrated from Guangdong. There were no sex differences in pneumonia deaths by birth place.</p> <p>Conclusion</p> <p>Most of these people migrated as young adults; we speculate that environmentally mediated differences in pubertal maturation (when the male disadvantage in lipids and fat patterning emerges) may contribute to excess male premature IHD mortality in developed environments.</p

    Growth status and menarcheal age among adolescent school girls in Wannune, Benue State, Nigeria

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Menarcheal age is a sensitive indicator of environmental conditions during childhood. The aim of study is to determine the age at menarche and growth status in adolescents in a rural area of Tarka, Wannune, Nigeria.</p> <p>Methods</p> <p>Data on 722 female students (aged 12-18 years) were collected in February 2009. Height and weight were measured. Body mass index (BMI; kg m<sup>-2</sup>) was used as an index of relative weight.</p> <p>Results</p> <p>Mean and median menarcheal age calculated by probit analysis were 13.02 (SD 3.0) (95% CI: 13.02-13.07), and age 13.00 (SD 2.8) (95% CI: 12.98-13.04), respectively. Girls who reach menarche are significantly heavier and taller with higher BMIs than those of their pre-menarcheal peers.</p> <p>Conclusion</p> <p>The age of menarche is probably still declining in Nigeria. Although BMI is an important factor in the onset of menstruation, some other unmeasured environmental variables may be implicated in this population.</p

    A spontaneous ad hoc network to share www access

    Get PDF
    In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.Authors want to give thanks to the anonymous reviewers for their valuable suggestions, useful comments, and proofreading of this paper. This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant no. TIN2008-06441-C02-01, and by the "Ayudas complementarias para proyectos de I+D para grupos de calidad de la Generalitat Valenciana" (ACOMP/2010/005).Lacuesta Gilaberte, R.; Lloret, J.; García Pineda, M.; Peñalver Herrero, ML. (2010). A spontaneous ad hoc network to share www access. EURASIP Journal on Wireless Communications and Networking. 2010:1-16. https://doi.org/10.1155/2010/232083S1162010Preuß S, Cap CH: Overview of spontaneous networking-evolving concepts and technologies. In Rostocker Informatik-Berichte. Volume 24. Fachbereich Informatik der Universit at Rostock; 2000:113-123.Gallo S, Galluccio L, Morabito G, Palazzo S: Rapid and energy efficient neighbor discovery for spontaneous networks. Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 2004, Venice, ItalyLatvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wireless Communications 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Zarate Silva VH, De Cruz Salgado EI, Quintana FR: AWISPA: an awareness framework for collaborative spontaneous networks. Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference (FIE '06), October 2006 1-6.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine 2001, 39(6):176-181. 10.1109/35.925687Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), August 1994 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, Ad Hoc Networking. Addison-Wesley Longman Publishing, Boston, Mass, USA; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003Park V, Corson MS: IETF MANET Internet Draft "draft-ietf-MANET-tora-spe03.txt". Novemmer 2000.Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Gilaberte RL, Herrero LP: IP addresses configuration in spontaneous networks. Proceedings of the 9th WSEAS International Conference on Computers, July 2005, Athens, GreeceViana AC, Dias de Amorim M, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Alvarez-Hamelin JI, Carneiro Viana A, Dias De Amorim M: Architectural considerations for a self-configuring routing scheme for spontaneous networks.,Tech. Rep. 1 October 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '07), October 2007, Valencia, SpainFoulks EF: Social network therapies and society: an overview. Contemporary Family Therapy 1985, 3(4):316-320.Wang Y, Wu H: DFT-MSN: the delay/fault-tolerant mobile sensor network for pervasive information gathering. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006Kindberg T, Zhang K: Validating and securing spontaneous associations between wireless devices. In Proceedings of the 6th Information Security Conference (ISC '03), 2003. Springer; 44-53.Al-Jaroodi J: Routing security in open/dynamic mobile ad hoc networks. The International Arab Journal of Information Technology 2007, 4(1):17-25.Stajano F, Anderson RJ: The resurrecting duckling: security issues for ad-hoc wireless networks. Proceedings of the 7th International Workshop on Security Protocols, April 1999 172-194.Zhou L, Haas ZJ: Securing ad hoc networks. IEEE Network 1999, 13(6):24-30. 10.1109/65.806983Hauspie M, Simplot-Ryl I: Cooperation in ad hoc networks: enhancing the virtual currency based models. Proceedings of the 1st International Conference on Integrated Internet Ad Hoc and Sensor Networks (InterSense '06), May 2006, Nice, FranceWang X, Dai F, Qian L, Dong H: A way to solve the threat of selfish and malicious nodes for ad hoc networks. Proceedings of the International Symposium on Information Science and Engieering (ISISE '08), December 2008, Shanghai, China 1: 368-370.Kargl F, Klenk A, Weber M, Schlott S: Sensors for detection of misbehaving nodes in MANETs. Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA '04), July 2004, Dortmund, Germany 83-97.Kargl F, Geiss A, Scholott S, Weber M: Secure dynamic source routing. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS '05), January 2005, Big Island, Hawaii, USAGokhale S, Dasgupta P: Distributed authentication for peer-to-peer networks. Proceedings of the Symposium on Applications and the Internet Workshops, January 2003 347-353.Capkun S, Buttyán L, Hubaux J-P: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2003, 2(1):52-64. 10.1109/TMC.2003.1195151Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, 1999, Berlin, Germany, Lecture Notes in Computer Science. Volume 1796. Springer; 172-194.Balfanz D, Smetters DK, Stewart P, Wong HC: Talking to strangers: authentication in ad-hoc wireless networks. Proceedings of the International Symposium on Network and Distributed Systems Security (NDSS '02), February 2002, San Diego, Calif, USABarbara D, Imielinski T: Sleepers and workaholics: caching strategies in mobile environments. Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1994 1-12.Cao G: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering 2003, 15(5):1251-1265. 10.1109/TKDE.2003.1232276Hu Q, Lee D: Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing 1998, 1(1):39-50. 10.1023/A:1019012927328Jing J, Elmagarmid A, Helal A, Alonso R: Bit-sequences: an adaptive cache invalidation method in mobile client/server environments. Mobile Networks and Applications 1997, 2(2):115-127. 10.1023/A:1013616213333Kahol A, Khurana S, Gupta S, Srimani P: An efficient cache management scheme for mobile environment. Proceedings of the 20th International Conference on Distributied Computing System (ICDCS '00), April 2000, Taipei, Taiwan 530-537.Kazar M: Synchronization and caching issues in the Andrew file system. Proceedings of USENIX Conference, February 1988, Dallas, Tex, USA 27-36.Roussopoulos M, Baker M: CUP: controlled update propagation in peer-to-peer networks. Proceedings of USENIX Annual Technical Conference, June 2003, San Antonio, Tex, USASandberg S, Kleiman S, Goldberg D, Walsh D, Lyon B: Design and implementation of the sun network file system. Proceedings of USENIX Summer Conference, June 1985, Portland, Ore, USA 119-130.Wu K, Yu PS, Chen M: Energy-efficient caching for wireless mobile computing. Proceedings of the 12th IEEE International Conference on Data Engineering, February-March 1996, New Orleans, La, USA 336-343.Yeung MKH, Kwok Y-K: Wireless cache invalidation schemes with link adaptation and downlink traffic. IEEE Transactions on Mobile Computing 2005, 4(1):68-83.Wessels D, Claffy K: Internet cache protocol (IC) v.2. http://www.ietf.org/rfc/rfc2186.txtFan L, Cao P, Almeida J, Broder AZ: Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking 2000, 8(3):281-293. 10.1109/90.851975Dykes SG, Robbins KA: A viability analysis of cooperative proxy caching. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 3: 1205-1214.Wessels D, Claffy K: RFC 2186: Internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Wessels D, Claffy K: RFC 2187: application of internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Ren Q, Dunhan MH: Using semantic caching to manage location dependent data in mobile computing. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, Boston, Mass, USA 210-221.Lim S, Lee W-C, Cao G, Das CR: Cache invalidation strategies for internet-based mobile ad hoc networks. Computer Communications 2007, 30(8):1854-1869. 10.1016/j.comcom.2007.02.020Park B-N, Lee W, Lee C: QoS-aware internet access schemes for wireless mobile ad hoc networks. Computer Communications 2007, 30(2):369-384. 10.1016/j.comcom.2006.09.004Hara T: Effective replica allocation in ad hoc networks for improving data accessibility. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 1568-1576.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless converage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Can P, Irani S: Cost-aware WWW proxy caching algorithms. Proceedings of the USENIX Symposium on lnternet Technology and Systems, December 1997Rizzo L, Vicisano L: Replacement policies for a proxy cache. IEEE/ACM Transactions on Networking 2000, 8(2):158-170. 10.1109/90.842139Williams S, Abrams M, Strandridge CR, Abdulla G, Fox EA: Removal policies in network caches for world-wide web documents. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 1996, Palo Alto, Calif, USA 293-305.Hara T: Replica allocation in ad hoc networks with period data update. Proceedings of the 3rd International Conference on Mobile Data Management (MDM '02), July 2002, Edmonton, Canada 79-86.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Sailhan F, Issarny V: Cooperative caching in ad hoc networks. Proceedings of the 4th International Conference on Mobile Data Management (MDM '03), January 2003, Melbourne, Australia, Lecture Notes in Computer Science 2574: 13-28.Yin L, Cao G: Supporting cooperative caching in ad hoc networks. IEEE Transactions on Mobile Computing 2006, 5(1):77-89.Karumanchi G, Muralidharan S, Prakash R: Information dissemination in partitionable mobile ad hoc networks. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (SRDS '99), October 1999, Lausanne, Switzerland 4-13.Corson MS, Macker JP, Cirincione GH: Internet-based mobile ad hoc networking. IEEE Internet Computing 1999, 3(4):63-70. 10.1109/4236.780962Lim S, Lee W-C, Cao G, Das CR: A novel caching scheme for improving internet-based mobile ad hoc networks performance. Ad Hoc Networks 2006, 4(2):225-239. 10.1016/j.adhoc.2004.04.013Opnet Modeler http://www.opnet.com/solutions/network_rd/modeler_wireless.htmlLacuesta R, Lloret J, Garcia M, Peñalver L: Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. Journal of Network and Computer Applications. In pres
    corecore