نتایج جستجو برای: misuse

تعداد نتایج: 9970  

Journal: :Journal of studies on alcohol 1992
J T Shope T E Dielman A T Butchart P C Campanelli D D Kloska

An alcohol misuse prevention study (AMPS) curriculum for fifth- and sixth-grade students was developed, implemented and evaluated with over 5,000 students. The AMPS program emphasized social pressures resistance training, focusing on the immediate effects of alcohol, risks of alcohol misuse and social pressures to misuse alcohol. Schools were randomly assigned to curriculum, curriculum plus boo...

2011
Mansoor Alicherry Angelos D. Keromytis

Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc Networks (MANETs) require destination-based consent networking, where consent needs to be given to send to a destination in any path. These networks are susceptible to multipath misuses by misbehaving nodes. In this ...

2008
Alex H.S. Harris Madeleine S. Frey Anna F. DeBenedetti Katharine A. Bradley

We conducted a standardized review of research on the prevalence of alcohol use or misuse (including alcohol use disorders), and the association of alcohol use or misuse with post-operative surgical complications among US patients. Twenty seven studies that included a preoperative measure of alcohol use or misuse and included at least 50 US surgical patients were identified using a standardized...

2015
Beatrice Setnik Carl L Roland Kenneth W Sommerville Glenn C Pixton Robert Berke Anne Calkins Veeraindar Goli

OBJECTIVE To compare the investigator assessment of patient risk for prescription opioid misuse, abuse, and diversion with patient self-reports of these activities in a population with chronic pain. METHODS As a secondary objective of an open-label, multicenter, primary care-based clinical study to evaluate the success of converting opioid-experienced patients with chronic pain to morphine su...

Journal: :Information Security Journal: A Global Perspective 2012
Oluwasefunmi 'Tale Arogundade Adio T. Akinwale Z. Jin X. G. Yang

Preview Buy now DOI: 10.1080/19393555.2011.652290 O. T. Arogundadea*, A. T. Akinwaleb, Z. Jinc & X. G. Y anga pages 137-149 Version of record first published: 14 May 2012 Article Views: 66 Alert me TOC email alert TOC RSS feed Citation email alert Citation RSS feed ABSTRACT Misuse cases are currently used to identify safety and security threats and subsequently capture safety and security requi...

2012
Mohammad Saadatnia Neda Naghavi Farzad Fatehi Mohammad Zare Marzieh Tajmirriahi

BACKGROUND Consumption of oral contraceptive pills (OCP) is a known risk factor for cerebral venous and sinus thrombosis (CVST) among women. We determined whether misuse of OCP could increase the risk of CVST in women. METHODS A case-control study was conducted from 2003 to 2007 on 64 female patients with CVST admitted to Al- Zahra medical center and 232 healthy age-matched female OCP users a...

2008
SHUGUANG WANG

We study geometry on real gerbes in the spirit of CheegerSimons theory. The concepts of adaptations and holonomy forms are introduced for flat connections on real gerbes. Their relations to complex gerbes with connections are presented, as well as results in loop and map

2009
Pedro A. Diaz-Gomez Dean F. Hougen

It is widely accepted that there is a strong correlation between diversity in the initial population and Genetic Algorithms’ performance. One contribution of this paper is to show that there is not such a strong correlation between diversity and Genetic Algorithms’ performance, at least with the standard range of diversity measures used in a randomly generated population and with the misuse det...

2005
Joshua J. Pauli Dianxiang Xu

Based on the threat-driven architectural design of secure information systems, this paper introduces an approach for the tradeoff analysis of secure software architectures in order to determine the effects of security requirements on the system. We use a case study on a payroll information system (PIS) to show the approach from misuse case identification through the architecture tradeoff analys...

1966
Robert Hermann

The connection between analytic continuation of group representations and analytic continuation of their matrix elements is discussed, together with some related problems concerning the group-theoretic nature of the S-matrix, and the asymptotic behavior of the special functions of mathematical physics. (To be submitted to Comm. of Math. Phys.) Work supported by U. S. Atomic Energy Commission AN...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید