نتایج جستجو برای: act misuse

تعداد نتایج: 189847  

2011
Tung-Yu Kao Li-Mei Chen

The present study aims to investigate genre influence on the use and misuse of conjunctive adverbials (hereafter CAs) by compiling a learner corpus annotated with discoursal information on CAs. To do so, an online interface is constructed to collect and annotate data, and an annotating system for identifying the use and misuse of CAs is developed. The results show that genre difference has no i...

Journal: :The Ceylon medical journal 2003
N P Gurugama S L Seneviratne D T Peiris H J de Silva

INTRODUCTION Alcohol misuse and related problems are common in Sri Lanka. The appropriateness of the primary care setting in dealing with alcohol misuse is well recognised, and general practitioners (GPs) constitute an important first contact setting. METHODS One hundred and fifty randomly selected GPs practising in the Colombo and Gampaha districts were given a questionnaire to assess how th...

2014
Ahmad Ali Eslami Farzad Jalilian Mari Ataee Mehdi Mirzaei Alavijeh Mohammad Mahboubi Ali Afsar Abbas Aghaei

Ritalin misuse can create powerful stimulant effects and serious health risks. The main aim of present study was compared that two cognitive construct (behavioral intention or behavioral willingness) for predicting Ritalin misuse. This cross-sectional study was conducted among 264 Iranian medical college students; participants selected in random sampling, and data were collected by using self-r...

2010
QInyu lIao

With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern for organizations. Research has demonstrated employee reactions to monitoring systems and how they are implemented. However, little is known about the impact of punishment-related policies on employee intention to misuse Internet. To extend this line of research beyond prior studies, this paper p...

Journal: :IACR Cryptology ePrint Archive 2016
Francesco Berti François Koeune Olivier Pereira Thomas Peters François-Xavier Standaert

Leakage-resilience and misuse-resistance are two important properties for the deployment of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due to side-channel leakages and misused randomness. In this paper, we discuss their interactions and incompatibilities. For this purpose, we first show a generic composition mode of a MAC with an encryption schem...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1392

قرآن کتاب آسمانی همه ی مسلمانان است و پژوهش بر روی این کتاب از اهمیت ویژه ای برخوردار است. در این پژوهش نگارنده برآن است تا یکی از موضوعات بحث برانگیز قرآن یعنی تفاوت آیات مکی و مدنی را براساس طبقه بندی سرل از کنش هاش گفتار مورد تحلیل و بررسی قرار دهد. برای این مقایسه دو پیکره ی زبانی یکی شامل 330 کنش به کار رفته در آیات مکی و دیگری شامل 330 کنش به کار رفته در آیات مدنی انتخاب شده است. در آیات ...

Journal: :CoRR 2009
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir Md. Sakhawat Hossen Razib Hayat Khan

In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we prop...

Journal: :The British journal of psychiatry : the journal of mental science 2014
Eric B Elbogen Sally C Johnson H Ryan Wagner Connor Sullivan Casey T Taft Jean C Beckham

BACKGROUND Violence towards others in the community has been identified as a significant problem for a subset of Iraq and Afghanistan veterans. AIMS To investigate the extent to which post-traumatic stress disorder (PTSD) and other risk factors predict future violent behaviour in military veterans. METHOD A national, multiwave survey enrolling a random sample of all US veterans who served i...

Journal: :Serbian Journal of Anesthesia and Intensive Therapy 2018

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید