Adverse effects of doping on human health: A sistematic review DOI Open Access

M. Taqwal Jumareng,

Wawan Sundawan Suherman, Yustinus Sukarmin

et al.

Published: Dec. 31, 2024

Drugs that fall into the category of doping are not only a problem in world sports but also for humans involved sports, namely athletes, especially problems their health. Currently, substances contained these dangerous drugs found supplements, food, and drinks. Consuming things poses risk to health athletes. The purpose this literature review is provide an explanation dangers effects preventing diseases can attack as result use drugs. research method used systematic (PRISMA) selection study sources Scopus, PubMed, Google Scholar. results several types most often obtained, such (1) Anabolic Androgenic Steroids (AAS), (2) Beta-2 Agonists, (3) Stimulants. conclusion researchers hope be education about or impacts caused by supplements included category.

Language: Английский

Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend DOI Creative Commons
Frimpong Twum,

James Benjamin Hayfron Acquah,

Yaw Marfo Missah

et al.

PLoS ONE, Journal Year: 2024, Volume and Issue: 19(4), P. e0301760 - e0301760

Published: April 16, 2024

Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without customer’s direct involvement. has developed dramatically among many organizations due its benefits such as cost savings, resource pooling, broad network access, ease management; nonetheless, security been a major concern. Researchers have proposed several cryptographic methods offer cloud data security; however, their execution times are linear longer. A Security Key 4 Optimization Algorithm (SK4OA) with non-linear run time is in this paper. The secret key SK4OA determines rather than size able transmit large volumes minimal bandwidth resist attacks like brute force since timings unpredictable. set from Kaggle was used determine algorithm’s mean standard deviation after thirty (30) execution. Data sizes 3KB, 5KB, 8KB, 12KB, 16 KB were study. There an empirical analysis done against RC4, Salsa20, Chacha20 based on encryption time, decryption throughput memory utilization. showed that generated lowest 5.545±2.785 when 16KB executed. Additionally, SK4OA’s greater, indicating observed varied far mean. However, smaller deviations making them more clustered around resulting predictable times.

Language: Английский

Citations

1

Securing the Cloud: An In-depth Exploration of Conceptual Models, Emerging Trends, and Forward-looking Insights DOI Creative Commons
Francis K. Mupila, Himanshu Gupta, Akashdeep Bhardwaj

et al.

Research Square (Research Square), Journal Year: 2023, Volume and Issue: unknown

Published: Oct. 19, 2023

Abstract The ascendancy of cloud computing, while praising scalability and flexibility, simultaneously unveils a convoluted security panorama. This review talks about the complicated ideas behind models in environments. It combines information from several studies to show how has changed, where it is now, what future holds. details change traditional more abstract, data-centric, user-access control models, showing people are trying balance new technologies cyber threats. Case like Capital One Data Breach add discussion by things work real world. then moves on summary findings that important have dynamic, proactive, multifaceted approaches. Challenges spanning technical, organisational, regulatory domains elucidated, spotlighting gaps beckoning deeper exploration into emerging technologies' implications ethical considerations security. paper culminates with strategic recommendations for varied stakeholders signals towards unexplored avenues research, particularly intertwining potential dimensions Quantum Computing Blockchain. seeks act as lighthouse, guiding organisations, researchers, policymakers through murky waters offering structured pathway secure, resilient, ethically sound future.

Language: Английский

Citations

2

Nature-based Natural-hazard Preparedness: A Cross Section of Categorized Examples DOI Open Access
Kyoo‐Man Ha

Journal of Environmental & Earth Sciences, Journal Year: 2024, Volume and Issue: 6(1), P. 33 - 44

Published: March 1, 2024

Despite prevailing interests, no rigorous research has been conducted to examine the role of nature in natural-hazard preparedness. This systematic review aimed describe how can reduce impacts natural hazards during preparedness stage. The study focuses on land, water, and air systems three types stakeholders: international organizations, developed countries, developing countries. Further, it provides supplementary strategies, such as immediate actions, local engagement, development, that stakeholders should apply enhance their nature-based We suggest integrating costs benefits analysis, culture, societal challenges, environmental justice into implementation solutions. Finally, this outlines framework by discussing relationship between society.

Language: Английский

Citations

0

THE CONCEPT OF AUTOMATED COMPLIANCE VERIFICATION AS THE FOUNDATION OF A FUNDAMENTAL CLOUD SECURITY MODEL DOI

Y. Matseniuk,

Andrii Partyka

Komp'ûternì sistemi ta merežì, Journal Year: 2024, Volume and Issue: 6(1), P. 108 - 123

Published: June 1, 2024

The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts subscriptions on prominent platforms such as AWS GCP Azure. This involves the application standardized configurations ensure optimal performance security compliance. A significant component methodology intermittent scanning infrastructure these subscriptions. meticulously designed identify address any deviations or non-compliance issues with globally recognized standards including NIST 800-53 ISO 27001 HIPAA PCIDSS. approach leverages cutting-edge automation technologies streamline deployment management resources. By automating aims reduce manual effort minimize likelihood human error enhance operational efficiency. extends continuous monitoring auditing processes enabling real-time detection configuration drifts vulnerabilities. Furthermore delves into development a dynamic responsive system capable adapting evolving requirements security. plays pivotal role in aspect providing ongoing assurance that environments adhere strictest protocols standards. Continuous compliance critical today's ever-changing digital landscape where threats data privacy are increasingly sophisticated. integrating proposed promises not only bolster posture but also offer scalable efficient solution management. poised set new standard aligning best practices IT paving way more secure manageable computing practices. Keywords: Hosting service models.

Language: Английский

Citations

0

Risk factors for injury in kabaddi players and prevention: A systematic review DOI Open Access

Hardiansyah Hardiansyah,

Ahmad Nasrulloh,

Sulistiyono Sulistiyono

et al.

Published: Dec. 30, 2024

Kabaddi is a sport prone to injury due the intense physical contact involved in game. Injuries are significant concerns for kabaddi players, and understanding both factors that cause injuries preventive measures essential minimizing future injuries. The purpose of this study analyze identify contributing ways prevent them players. Data collection systematic review employed several comprehensive strategies, following PRISMA (Preferred Reporting Items Systematic Reviews Meta-Analyses) framework. sources used were Scopus, PubMed, Google Scholar. Researchers searched identified four journals, published between 2017 2024, discuss risk prevention including improper technique, inadequate warm-up, insufficient equipment, contact-related accidents. Preventive include proper mouth protection, strength training thigh calf muscles. Strategies minimize occurrence adjusting frequency, using protective implementing biomechanical techniques.

Language: Английский

Citations

0

Adverse effects of doping on human health: A sistematic review DOI Open Access

M. Taqwal Jumareng,

Wawan Sundawan Suherman, Yustinus Sukarmin

et al.

Published: Dec. 31, 2024

Drugs that fall into the category of doping are not only a problem in world sports but also for humans involved sports, namely athletes, especially problems their health. Currently, substances contained these dangerous drugs found supplements, food, and drinks. Consuming things poses risk to health athletes. The purpose this literature review is provide an explanation dangers effects preventing diseases can attack as result use drugs. research method used systematic (PRISMA) selection study sources Scopus, PubMed, Google Scholar. results several types most often obtained, such (1) Anabolic Androgenic Steroids (AAS), (2) Beta-2 Agonists, (3) Stimulants. conclusion researchers hope be education about or impacts caused by supplements included category.

Language: Английский

Citations

0