21 research outputs found

    Body image distortion, athletic participation and steroid use by high school students in southwestern Ontario.

    Get PDF
    This study was designed to explore the degree of use of anabolic steroids by high school students in Southwestern Ontario, Canada. Athletes and nonathletes have reported steroid use, with athletes reporting significantly more use than nonathletes (Anderson, Albect, McKeag, Hough, and McGrew, 1991; Terney and McLain, 1990; and Windsor and Demetru, 1989). Students have been reported to use steroids to improve their athletic performances and appearance (Terney and McLain, 1990; Chung and Moore, 1990; Krowchuk, Anglin, Goodfellow, Stancin, Williams, and Zimel, 1989; Addition Research Foundation, 1989-91) while ignoring the negative side effects associated with steroid use (Struass, 1987; and White, Richardson, Grosshans, Perkins, and Murdock, 1987). The use of steroids by high school students still continues (McFarland, 1991, Terney and McLain, 1990) and there is a need to educate students concerning the drastic side effects of steroid use. (McFarland, 1991 and White et al., 1987). The ratio of potential-actual steroid use between males and females was almost 2 to 1. Also, male athletes reported significantly more potential-actual steroid use than any other group of students. Students reported potential-actual use of steroids for both improving their appearance and sports performance enhancement, although the appearance motive was reported more frequently. Multivariate analyses were used to identify specific correlates of steroid use among the high school students. Results are discussed in terms of health ramifications for the users. Recommendations are made for the early identification of \u27at risk\u27 students and possible ways of preventing abuse of anabolic steroids in high schools. (Abstract shortened by UMI.) Source: Masters Abstracts International, Volume: 32-02, page: 0482. Adviser: Dick Moriarty. Thesis (M.H.K.)--University of Windsor (Canada), 1993

    Wolfgang: An Autonomous Mobile Robot for Outdoor Navigation

    Get PDF
    The goal of this project was to design and implement an autonomous robot capable of competing in the 2019 Intelligent Ground Vehicle Competition. The competition outlined several technical requirements including: lane detection and holding, obstacle avoidance, path planning, and GPS navigation. To achieve these tasks a Husky A100 platform was retrofitted with a more powerful computer and integrated with sensors such as a LIDAR, Camera, Satellite Compass, IMU, and GPS. A software architecture was developed based on Robot Operating System to reliably perceive the course lanes and obstacles, localize the robot through sensor fusion, and guide it through each waypoint

    Quitters are Winners: A Program to Reduce Smoking at WPI

    Get PDF
    There is a need to reduce the number of cigarettes smokers on WPI\u27s campus. Our approach will be to develop a program to assist WPI students in quitting smoking.https://digitalcommons.wpi.edu/gps-posters/1058/thumbnail.jp

    Sensitivity and Robustness of Quantum Spin-1/2 Rings to Parameter Uncertainty

    Get PDF
    Selective transfer of information between spin-1/2 particles arranged in a ring is achieved by optimizing the transfer fidelity over a readout time window via shaping, externally applied, static bias fields. Such static control fields have properties that clash with the expectations of classical control theory. Previous work has shown that there are cases in which the logarithmic differential sensitivity of the transfer fidelity to uncertainty in coupling strength or spillage of the bias field to adjacent spins is minimized by controllers that produce the best fidelity. Here we expand upon these examples and examine cases of both classical and non-classical behavior of logarithmic sensitivity to parameter uncertainty and robustness as measured by the p function for quantum systems. In particular we examine these properties in an 11-spin ring with a single uncertainty in coupling strength or a single bias spillage

    Promoting Culture and Traditions of Cumbe Through Tourism

    Get PDF
    Tourism introduces economic and social incentives to share and preserve a community’s traditions through promotion. In cooperation with La Asociación El Cántaro de Sancapac, this project investigates the progress of tourism implementation within the parochial community of Cumbe. We completed our research in three stages: tourism sustainability, resource documentation, and tourism viability. Through documentation, surveys, and interviews, we found plenty of resources in Cumbe that can be utilized for tourism, a tourist interest in the assets and activities in Cumbe, and how to solicit assistance from government organizations. We provided La Asociación with an archive of documentation, prototypes of promotional materials, a translation manual, and a Facebook page for online promotion

    Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards

    Get PDF
    MiFare Crypto 1 is a lightweight stream cipher used in London\u27s Oyster card, Netherland\u27s OV-Chipcard, US Boston\u27s CharlieCard, and in numerous wireless access control and ticketing systems worldwide. Recently, researchers have been able to recover this algorithm by reverse engineering. We have examined MiFare from the point of view of the so called algebraic attacks . We can recover the full 48-bit key of MiFare algorithm in 200 seconds on a PC, given 1 known IV (from one single encryption). The security of this cipher is therefore close to zero. This is particularly shocking, given the fact that, according to the Dutch press, 1 billion of MiFare Classic chips are used worldwide, including in many governmental security systems

    The Vehicle, Spring 2007

    Get PDF
    Table of Contents She Might Just Take You for GrantedRebecca M. Griffithpage 1 ShwagDarius Juttipage 2 In LoveAmanda Vealepage 9 SubmissiveSarah Ellerpage 10 Wedding SongRebecca M. Griffithpage 11 Why No Ladies and Gentlemen, My Shit Never StinksJacob Fosterpage 13 Death of an English MajorLindsey Durbinpage 14 Summer\u27s PerfumeRebecca M. Griffithpage 15 Gigavolt and ChrisEric Schumacherpage 16 UntitledKris Jonespage 22 Ode to the MuseGreg Harrellpage 23 TenderAmanda Vealepage 24 When the Muses HeaveElizabeth Hoodpage 25 Depression LiftingAmanda Vealepage 26 Red SwordAndrew Deckerpage 27 Warring IdeologyMargaret B. Hamperpage 29 ConfessionGreg Harrellpage 34 A Glass PuzzleBrittany Morganpage 35 Hey MaJacob Fosterpage 36 As July Faded AwayRebecca M. Griffithpage 37 About the LeftoversGina LoBiancopage 38 Me, Myself & ILindsey Durbinpage 39 Iced Parking LotRebecca M. Griffithpage 41 About the Authors Art Submissions Mike\u27s Revelation and MikeSean Walkercovers UntitledChad Navelpage 9 Morning in Tintern AbbeyCarrie Muellerpage 12 WestminsterCarrie Muellerpage 21 A Fighting ChanceOsha Rudduckpage 22 Rooftop SunsetJennifer O\u27Neilpage 25 EIU IVCarrie Muellerpage 28 MandolinOsha Rudduckpage 38 EIU IIICarrie Muellerpage 42https://thekeep.eiu.edu/vehicle/1087/thumbnail.jp

    The Vehicle, Spring 2010

    Get PDF
    Table of Contents ForgettingRashelle McNairpage 34 MuseMary Lieskepage 35 My CompulsionAshton Tembypage 38 MemoryKate Vandermeerpage 41 Killmercialize MeGreg Petersonpage 42 PenJake Smithpage 46 GrassKate Vandermeerpage 48 Character CreationMary Lieskepage 52 Ring Around TheKim Hunter-Perkinspage 54 The Great Cursive ScareJake Smithpage 55 OpiateDoug Urbanskipage 61 What Happens to Little Girls...Jennifer O\u27Neilpage 63 Poetry Sunny DaysRyan Poolpage 2 AtlantisDoug Urbanskipage 4 Garbage CityKate Vandermeerpage 6 Fat Girl ThongsKim Hunter-Perkinspage 7 MercilessRosalia Pecorapage 19 ChemistryMary Lieskepage 20 He-Who-Stopped-TalkingJustin Sudkamppage 22 In Which Iris Contemplates a Barren EarthSean Slatterypage 24 At the Bottom of the WorldNick Canadaypage 27 Dogma: Mush!Scott Maypage 28 ThiefMary Lieskepage 29 Prose Coming HomeDoug Urbanskipage 8 DodoDan Davispage 31 The Poet in the PedestrianScott Maypage 37 Toxic RainJacob Swansonpage 40 What\u27s Your Greatest Fear?Justine Fittonpage 43 Soul VoiceHolly Thomaspage 49 Conversations with a SniperKim Hunter-Perkinspage 56 LettersDaniel Paquinpage 65 Art San Marcos, MexicoKate Vandermeercover Contemplation of the World\u27s EndNicholas Giffordpage 18 Little Lady SitsSarah Hadwigerpage 26 MoodAlycia Rockeypage 30 Four Ducks in a RowMegan Mathypage 36 The Daily EasternBen Tillerypage 39 BirdsAlycia Rockeypage 45 March of the BugsMegan Mathypage 47 Mexico Work ExperienceKate Vandermeerpage 53 Feather and JewelsAlycia Rockeypage 60 The ForgottenMegan Mathypage 64 Special Features Fall 2009-Spring 2010 Vehicle Award Winnerspage 1 James K. Johnson Creative Writing Awardpage 74 Kim Hunter-PerkinsWinning Entries (Poetry)page 75 Clint WalkerWinning Entry (Fiction)page 86 Faculty Spotlight: Professor Jason Brownpage 99 About the Contributorspage 106 About the Editorspage 110https://thekeep.eiu.edu/vehicle/1093/thumbnail.jp

    The Vehicle, Spring 2009

    Get PDF
    Table of Contents Idyllic Has an EndJustine Fittonpage 28 The RemedyJosh Boykinpage 29 True NatureStephen Garciapage 30 We Are All Eaters of SoulsDan Davispage 31 Scarlet on the WindJustin Sudkamppage 34 IlluminatedRashelle McNairpage 35 Lightning RodKim Hunter-Perkinspage 36 TrialDan Davispage 49 Dear GodKristi Kohlenbergpage 50 A Cheap Metaphor Is What We Have for DeathKeith Stewartpage 51 Sad MoonJennifer O\u27Neilpage 52 The Transported ManStephen Garciapage 61 Divine InsanityGrace Lawrencepage 62 Moonglow MemoriesJustin Sudkamppage 63 Poetry The Habits of HusbandsKim Hunter-Perkinspage 4 Young AmericanMaria Rhodespage 5 Kevin Doesn\u27t Live Here AnymoreJustine Fittonpage 6 Summer VacationMary Lieskepage 8 PerfectChristie Cheatlepage 9 Hate for OneMiranda Whitepage 10 The Witch\u27s GraveDan Davispage 16 Medicine WomanLindsey Durbinpage 18 Epistle to a BombshellKim Hunter-Perkinspage 19 GuardedAaron Dillardpage 20 Lean and Hungry in YesteryearTim Ernstpage 21 Dirty TearsBrittany Morganpage 27 I Left the Radio OnSerena Heathpage 83 Untitled, for CourtneyKellen Fasnachtpage 84 Ermine DriveStephen Garciapage 85 Prose TwigDaniel Paquinpage 11 Coyote MoonDan Davispage 22 BloodGretchen Schaiblepage 32 IntroductionSam Sottosantopage 53 The Guitar ManDan Davispage 75 Art Picasso InspirationAlycia Rockeycover StageSarah Fairchildpage 37 ConnectedBrittany Morganpage 65 SpringAnthony Travis Shootpage 66 BodhisattvaSarah Fairchildpage 67 What About Love?Justin Sudkamppage 68 Angry MoonJennifer O\u27Neilpage 69 HauntedKellen Fasnachtpage 70 Haiku #1Justin Sudkamppage 72 ImmobileRashelle McNairpage 73 The ChurningJosh Boykinpage 74 The Old Boat DockJosh Boykinpage 79 Saltwater RaindropsTim Ernstpage 80 Slow MotionGrace Lawrencepage 81 Solid AdviceAnthony Travis Shootpage 82 TreeAlycia Rockeypage 38 TireSarah Fairchildpage 39 What to WearKristy Pearsonpage 40 Figure 1Sean Walkerpage 41 GreenhouseAlycia Rockeypage 42 RomeAlycia Rockeypage 43 Me at the Lamp PostElizabeth Surbeckpage 44 Little Miss LizKristy Pearsonpage 45 DoudnaAlycia Rockeypage 46 FlagAlycia Rockeypage 47 Flag ProtestAlycia Rockeypage 48 Features Note From the EditorRebecca Griffithpage 1 Fall 2008-Spring 2009 Vehicle Award Winnerspage 2 James K. Johnson Creative Writing Awardpage 86 Winning Entry (Nonfiction)Daniel Paquinpage 87 Winning Entries (Poetry)Anthony Travis Shootpage 98 Contributorspage 103https://thekeep.eiu.edu/vehicle/1091/thumbnail.jp

    Vector Stream Cipher Instant Key Recovery

    Get PDF
    Vector Stream Cipher (VSC) is a stream cipher designed by ChaosWare and patented by NICT (formerly CRL), Japanese patents 3030341 and 3455758, US patent 6,668,265. VSC is recommended by the Softbank Technology Corporation for use in high bandwidth and high security applications. In this paper we present a practical attack instantly recovering the entire secret key of the high-speed single-round VSC variants with only 4 known subsequent plaintext blocks showing how all single-round VSC variants can be trivially broken due to their simple algebraic nature. The algorithm presented in this paper cannot break the 8-round VSC, but it can be easily adapted to any particular high-speed single-round VSC variant and extended to break some of the multiple-round VSC variants with very little effort and it may help accelerate other attacks
    corecore