Comment: Meldonium and the WADA Prohibited List

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pharmacology of stimulants prohibited by the World Anti-Doping Agency (WADA).

This review examines the pharmacology of stimulants prohibited by the World Anti-Doping Agency (WADA). Stimulants that increase alertness/reduce fatigue or activate the cardiovascular system can include drugs like ephedrine available in many over-the-counter medicines. Others such as amphetamines, cocaine and hallucinogenic drugs, available on prescription or illegally, can modify mood. A total...

متن کامل

Meldonium use by athletes at the Baku 2015 European Games.

BACKGROUND The aim of this report was to estimate the prevalence of meldonium use in athletes competing in the Baku 2015 European Games to contribute to the surveillance of substances on the 2015 World Anti-Doping Agency (WADA) Monitoring Program. Meldonium is reported to be used by athletes to potentially enhance personal performance and shorten the recovery period after physical activity. M...

متن کامل

[Psychoactive plant species--actual list of plants prohibited in Poland].

According to the Act on Counteracting Drug Addiction (20-th of March, 2009, Dz. U. Nr 63 poz. 520.) the list of federally prohibited plants in Poland was expanded to include 16 new species. Until that time the only illegal plant materials were cannabis, papaver, coca and most of their products. The actual list of herbal narcotics includes species which significantly influence on the central ner...

متن کامل

TODAM and the list-strength and list-length effects: comment on Murdock and Kahana (1993a).

B. B. Murdock and M. J. Kahana (1993a) presented a continuous memory version of the theory of distributed associative memory (TODAM) model; they claimed that this model predicts list-strength and list-length findings, including those reported by R. Ratcliff, S. E. Clark, and R. M. Shiffrin (1990) and K. Murnane and R. M. Shiffrin (1991a). This model is quite similar to one discussed by R. M. Sh...

متن کامل

Replication Prohibited

Several attacks against physical pin-tumbler locks require access to one or more key blanks to perform. These attacks include bumping, impressioning, rightsamplification, and teleduplication. To mitigate these attacks, many lock systems rely on restricted keyways and use blanks that are not sold to the general public, making it harder for attackers to obtain them. Often the key blank designs th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Australian Prescriber

سال: 2016

ISSN: 0312-8008,1839-3942

DOI: 10.18773/austprescr.2016.032