نتایج جستجو برای: act misuse
تعداد نتایج: 189847 فیلتر نتایج به سال:
conclusions our results suggested that the prevalence of prescription drugs, alcohol and illicit substance use was relatively low, though still significant, among iranian students, which was strongly associated with family and friends’ use. the findings of this research can be used for planning and evaluating interventions by considering the risk factors and protective factors in universities. ...
Concurrent collections provide thread-safe, highly-scalable operations, and are widely used in practice. However, programmers can misuse these concurrent collections when composing two operations where a check on the collection (such as non-emptiness) precedes an action (such as removing an entry). Unless the whole composition is atomic, the program contains an atomicity violation bug. In this ...
Singapore is well known for its harsh stance against drug traffickers, with trafficking carrying some of the most severe penalties available in law. This includes mandatory death penalty where weight exceeds a statutory threshold. The act also broadly defined Misuse Drugs Act 1973 and can encompass wide range activities. In series authoritative decisions since 1994, this has included safekeepin...
BACKGROUND Prescription drug abuse is a critical problem in the USA and has been linked to more deaths than automobile accidents. Despite this growing epidemic, the USA lacks a timely early warning system. Poison centers (PCs) have the potential to act as sentinel reporting entities for prescription drug abuse and misuse due to near-real-time data reporting and abundant coverage in the USA. M...
Twelve years ago, Brian Powell and Lala Carr Steelman analyzed state SAT scores in a landmark article in the Harvard Educational Review. At the time, politicians and the media, among others, had been using raw state SAT scores to make inferences about the relative quality of education among the U.S. states. Powell and Steelman, however, found that more than 80 percent of the variation in averag...
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید