نتایج جستجو برای: drug misuses
تعداد نتایج: 590094 فیلتر نتایج به سال:
While the use of statistics (particularly survey methods) in copyright and trademark matters continues to grow, statistics has seen far less use in patent cases. However, elementary statistics can be a powerful tool in investigation of patent liability as well. Of course, as in other fields where applied statistics are used, statistics are just as often misused. Our analysis illustrates how sta...
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion or denial of service attacks. These intrusions may bring all kinds of misuses. Intrusion Detection Systems (IDS) play a very important role in the security of today's networks by detecting when an attack is happening. IDS have evolved into an integral part of network security which monitors the netwo...
The EU Data Retention Directive (2006/24/EC) provides an obligation for providers of publicly available electronic communications services and of public communications networks to retain traffic and location data for six months up to two years for the purpose of the investigation, detection, and prosecution of serious crime. Considering potential uses and misuses of retained data such as traffi...
This paper discusses some of the issues that appear on the creation and use of secure digital timestamps. From the timestamp creation side, it first introduces a review on the existing systems, giving a recommendation for the one we believe is more suitable for the general use. Afterwards, it deals with an extension of the basic scheme in order to be used in the enterprise environments. Finally...
Whether translating research findings for public consumption, or arguing for a policy position that reflects social work values, social workers engaged in cause advocacy need rhetorical skills. The author draws from the disciplines of linguistics, logic, and communications and provides a framework for making arguments in the public arena. The structure and components of arguments are analyzed, ...
DNA fingerprinting is a powerful technology that has revolutionized forensic science. No two individuals can have an identical DNA pattern except identical twins. Such DNA-based technologies have enormous social implications and can help in the fight against crime. This technology has experienced many changes over time with many advancements occurring. DNA testing is a matter of serious concern...
This empirical paper examines the time delays that occur between the publication of Common Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS) information attached to published CVEs. According to the empirical results based on regularized regression analysis of over eighty thousand archived vulnerabilities, (i) the...
In this paper we will demonstrate how one can model and analyse Intrusion Detection Systems (IDSs) and their environment using the process algebra Communicating Sequential Processes (CSP) [11, 21] and its model checker FDR [9]. An Intrusion Detection System (IDS) is a system that detects abuses, misuses and unauthorised uses in a network. We show that this analysis can be used to discover two a...
The quality of drug therapy is a major contributor to overall quality of health care. Drug therapy can increase quality, as when it stops a life-threatening infection. Medication use, however, also can cause toxicity, side effects or other adverse events. These are, in effect, new medical problems. They may lower quality of life and require additional expense to correct. Common examples include...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید