Comment: Meldonium and the WADA Prohibited List
نویسندگان
چکیده
منابع مشابه
Pharmacology of stimulants prohibited by the World Anti-Doping Agency (WADA).
This review examines the pharmacology of stimulants prohibited by the World Anti-Doping Agency (WADA). Stimulants that increase alertness/reduce fatigue or activate the cardiovascular system can include drugs like ephedrine available in many over-the-counter medicines. Others such as amphetamines, cocaine and hallucinogenic drugs, available on prescription or illegally, can modify mood. A total...
متن کاملMeldonium use by athletes at the Baku 2015 European Games.
BACKGROUND The aim of this report was to estimate the prevalence of meldonium use in athletes competing in the Baku 2015 European Games to contribute to the surveillance of substances on the 2015 World Anti-Doping Agency (WADA) Monitoring Program. Meldonium is reported to be used by athletes to potentially enhance personal performance and shorten the recovery period after physical activity. M...
متن کامل[Psychoactive plant species--actual list of plants prohibited in Poland].
According to the Act on Counteracting Drug Addiction (20-th of March, 2009, Dz. U. Nr 63 poz. 520.) the list of federally prohibited plants in Poland was expanded to include 16 new species. Until that time the only illegal plant materials were cannabis, papaver, coca and most of their products. The actual list of herbal narcotics includes species which significantly influence on the central ner...
متن کاملTODAM and the list-strength and list-length effects: comment on Murdock and Kahana (1993a).
B. B. Murdock and M. J. Kahana (1993a) presented a continuous memory version of the theory of distributed associative memory (TODAM) model; they claimed that this model predicts list-strength and list-length findings, including those reported by R. Ratcliff, S. E. Clark, and R. M. Shiffrin (1990) and K. Murnane and R. M. Shiffrin (1991a). This model is quite similar to one discussed by R. M. Sh...
متن کاملReplication Prohibited
Several attacks against physical pin-tumbler locks require access to one or more key blanks to perform. These attacks include bumping, impressioning, rightsamplification, and teleduplication. To mitigate these attacks, many lock systems rely on restricted keyways and use blanks that are not sold to the general public, making it harder for attackers to obtain them. Often the key blank designs th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Australian Prescriber
سال: 2016
ISSN: 0312-8008,1839-3942
DOI: 10.18773/austprescr.2016.032