نتایج جستجو برای: misuse

تعداد نتایج: 9970  

2003
ADAM S. SIKORA

Let a cyclic group G act either on a number field L or on a 3-manifold M. Let sL be the number of ramified primes in the extension L ⊂ L and sM be the number of components of the branching set of the branched covering M → M/G. In this paper, we prove several formulas relating sL and sM to the induced G-action on Cl(L) and H1(M), respectively. We observe that the formulas for 3-manifolds and num...

Journal: :JIP 2014
Takao Okubo Kenji Taguchi Haruhiko Kaiya Nobukazu Yoshioka

Misuse case model and its development process are useful and practical for security requirements analysis, but they require expertise especially about security assets and goals. To enable inexperienced requirements analysts to elicit and to analyse security requirements, we present an extension of misuse case model and its development process by incorporating new model elements, assets and secu...

2015
Nikki R Wooten Abbas S Tavakoli Marlene B Al-Barwani Naomi A Thomas Selina H McKinney Anna M Scheyett Kelly M Kaminski Alyssia C Woods Sue E Levkoff

Background Despite frequent primary care visits, older veterans may have unmet behavioral health needs regarding alcohol misuse. Identification of alcohol misuse and referral of older veterans seen in primary care to behavioral health care can decrease at-risk drinking and assist in determining effective interventions for older veterans with problem drinking. This study examined the effect of i...

Journal: :iranian journal of toxicology 0
ایرج صدیقی iraj sedighi department of pediatric,hamadan university of medical sciences, hamadan, iran. فیروزه حسین firozeh hossein department of pediatric,hamadan university of medical sciences, hamadan, iran. محمود رضایی mahmood rezaei anesthesiologist, hamadan university of medical sciences, hamadan, iran. روشنک بن عباس roshanak benabbas . md.tehran university of medical sciences, tehran, iran.

abstract background: acute opium intoxication is one of the most common causes of poisoning in children in iran. although most cases are accidental, traditional misuse of opium for symptomatic therapy of various childhood diseases also contributes to high rate of opium intoxication in iran. cases: here, we report two cases of opium intoxication in infants resulted from transdermal application o...

2011
Kevin W Chen Christine C Berger Darlene P Forde Christopher D'Adamo Eric Weintraub Devang Gandhi

BACKGROUND Benzodiazepines (BZD) misuse is a serious public health problem, especially among opiate-dependent patients with anxiety enrolled in methadone program because it puts patients at higher risk of life-threatening multiple drug overdoses. Both elevated anxiety and BZD misuse increase the risk for ex-addicts to relapse. However, there is no recent study to assess how serious the problem ...

Journal: :BMJ 1990
H Swadi B Wells R Power

Evidence of the misuse of dihydrocodeine preparations remains largely anecdotal,' 2consisting of case reports of dependence mainly among users of the proprietary form of dihydrocodeine tartrate DF 118. Recent estimates of the extent of dihydrocodeine misuse in the general population and among drug users are lacking. This paper reports the results of an investigation into the level of DF 118 mis...

2014
Saman Hedayatpour Nazri Kama Suriayati Chuprat

In recent years, concentration on software design phase for evaluating security into the developing software increased where the cost of fixing errors in design level is several times less than the cost of fixing errors in the coding or implementation levels. One of the main challenges in facing current models that evaluate security into the software design phase refers to the need for existenc...

2003
Jean-Paul M. G. Linnartz Pim Tuyls

In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method tha...

2012
George Magklaras

An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...

Journal: :Pain 2015
Pauline Voon

The recent review by Vowles et al. 5 on the rates of opioid misuse, abuse, and addiction in chronic pain is a sorely needed step in the right direction toward better defining and understanding the prevalence of opioid misuse, abuse, and addiction among individuals with chronic pain. The authors are to be applauded for both synthesizing and advocating for literature using explicit definitions of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید