نتایج جستجو برای: misuse
تعداد نتایج: 9970 فیلتر نتایج به سال:
An alcohol misuse prevention study (AMPS) curriculum for fifth- and sixth-grade students was developed, implemented and evaluated with over 5,000 students. The AMPS program emphasized social pressures resistance training, focusing on the immediate effects of alcohol, risks of alcohol misuse and social pressures to misuse alcohol. Schools were randomly assigned to curriculum, curriculum plus boo...
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc Networks (MANETs) require destination-based consent networking, where consent needs to be given to send to a destination in any path. These networks are susceptible to multipath misuses by misbehaving nodes. In this ...
We conducted a standardized review of research on the prevalence of alcohol use or misuse (including alcohol use disorders), and the association of alcohol use or misuse with post-operative surgical complications among US patients. Twenty seven studies that included a preoperative measure of alcohol use or misuse and included at least 50 US surgical patients were identified using a standardized...
OBJECTIVE To compare the investigator assessment of patient risk for prescription opioid misuse, abuse, and diversion with patient self-reports of these activities in a population with chronic pain. METHODS As a secondary objective of an open-label, multicenter, primary care-based clinical study to evaluate the success of converting opioid-experienced patients with chronic pain to morphine su...
Preview Buy now DOI: 10.1080/19393555.2011.652290 O. T. Arogundadea*, A. T. Akinwaleb, Z. Jinc & X. G. Y anga pages 137-149 Version of record first published: 14 May 2012 Article Views: 66 Alert me TOC email alert TOC RSS feed Citation email alert Citation RSS feed ABSTRACT Misuse cases are currently used to identify safety and security threats and subsequently capture safety and security requi...
BACKGROUND Consumption of oral contraceptive pills (OCP) is a known risk factor for cerebral venous and sinus thrombosis (CVST) among women. We determined whether misuse of OCP could increase the risk of CVST in women. METHODS A case-control study was conducted from 2003 to 2007 on 64 female patients with CVST admitted to Al- Zahra medical center and 232 healthy age-matched female OCP users a...
We study geometry on real gerbes in the spirit of CheegerSimons theory. The concepts of adaptations and holonomy forms are introduced for flat connections on real gerbes. Their relations to complex gerbes with connections are presented, as well as results in loop and map
It is widely accepted that there is a strong correlation between diversity in the initial population and Genetic Algorithms’ performance. One contribution of this paper is to show that there is not such a strong correlation between diversity and Genetic Algorithms’ performance, at least with the standard range of diversity measures used in a randomly generated population and with the misuse det...
Based on the threat-driven architectural design of secure information systems, this paper introduces an approach for the tradeoff analysis of secure software architectures in order to determine the effects of security requirements on the system. We use a case study on a payroll information system (PIS) to show the approach from misuse case identification through the architecture tradeoff analys...
The connection between analytic continuation of group representations and analytic continuation of their matrix elements is discussed, together with some related problems concerning the group-theoretic nature of the S-matrix, and the asymptotic behavior of the special functions of mathematical physics. (To be submitted to Comm. of Math. Phys.) Work supported by U. S. Atomic Energy Commission AN...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید