Get sober; stay sober

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Get sober; stay sober.

In the decades since alcoholism became widely recognized as a disease (Jellinek, 1960), evidence for alcohol-induced physical damage has accumulated both in quantity and in detail. Prominent amongst the affected organ systems at-risk is the brain, which responds to alcohol in a variety of ways. Free radicals formed during metabolism of alcohol damage the brain. Acetaldehyde, which is generated ...

متن کامل

Do the designated drivers of college students stay sober?

PROBLEM By numerous accounts, alcohol abuse is considered the number one drug problem facing young people today. Alcohol consumption and its negative consequences, especially those due to drinking and driving, continue to have devastating effects on the college student population. METHOD This field study examined the blood alcohol concentration (BAC) levels of male and female designated drive...

متن کامل

Cryptanalysis of SOBER-t32

Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 without the decimation of the key stream by the so-called stuttering phase. Also, two distinguishing attacks are mounted against full Sober-t32. These attacks are not practically feasible, but they are theoretically more effici...

متن کامل

Baire Spaces, Sober Spaces

In the article concepts and facts necessary to continue forma-lization of theory of continuous lattices according to [10] are introduced. The notation and terminology used here are introduced in the following papers:

متن کامل

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Brain

سال: 2006

ISSN: 0006-8950,1460-2156

DOI: 10.1093/brain/awl354