ingestion of larger amounts of substance, declined life functioning, and persistent use of substance. Substance intoxication, substance withdrawal, substance abuse and substance dependence are the four substance-related conditions that are present in the DSM-IV-TR. Substance intoxication is a type of substance-induced disorder, consisting of reversible, substance-specific, maladaptive behavioral or psychological changes directly resulting from the physiologic effects on the central nervous system
Words: 2213 - Pages: 9
Statistical Databases Jaideep Srivastava and Hung Q. Ngo, Department of Computer Science, University of Minnesota, 200 Union street, EE/CS Building, room 4-192, Minneapolis, MN 55455 e-mail: srivasta, hngo @cs.umn.edu, ¡ 1 Introduction A statistical database management system (SDBMS) is a database management system that can model, store and manipulate data in a manner well suited to the needs of users who want to perform statistical analyses on the data. Statistical databases have some special
Words: 11702 - Pages: 47
three types of dreams Introduction Attention Getter: The world of imagination available to us in our sleep is probably taken for granted by many. However, no one can disagree to the mysteriousness of dreams. Roadmap: In this speech, I will describe four dreams and sleep walking. I will take you through the nightmare, the recurring dream, the flase awakning lucid dream and finally sleep walking body Main Point: First looking at nightmares, we all recognize that their mystery is first
Words: 764 - Pages: 4
Section A: Basic Microbiology 1 SCOPE AND HISTORICAL DEVELOPMENTS IN MICROBIOLOGY “Science contributes to our culture in many ways, as a creative intellectual activity in its own right, as a light which has served to illuminate man’s place in the uni-verse, and as the source of understanding of man’s own nature” —John F. Kennedy (1917–63) The President of America The bacterium Escherichia coli INTRODUCTION AND SCOPE MICROBIOLOGY is a specialized area of biology (Gr. bios-life+ logos-to
Words: 9515 - Pages: 39
I. ------------------------------------------------- Chapter 2: Context and Background I n this chapter, we introduce the main concepts related to the problem we are addressing, in order to provide the casual reader with the necessary background information for this dissertation. As the title of this thesis is “Analysis of Security and QoS in Network with time constraints”, it is clear that our work requires a deep understanding of three main topics: security, Quality of Service (QoS) and network
Words: 8305 - Pages: 34
the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection
Words: 6315 - Pages: 26
INT1: TASK 1 The Chernobyl Disaster The Chernobyl disaster occurred on 26 April 1984 in what was known as Ukrainian SSR. “Reactor Four” was hit with a catastrophic power surge that caused the core to explode. This disaster is considered to the worst nuclear power plant accident in history. Only two nuclear accidents have reached the level 7 classification, the Chernobyl Disaster and the Fukushima Daiichi Disaster in 2011. Belarus suffered the worst of the fallout, receiving
Words: 572 - Pages: 3
Springer 2007 The Dark Side of Authority: Antecedents, Mechanisms, and Outcomes of Organizational Corruption Ruth V. Aguilera Abhijeet K. Vadera ABSTRACT. Corruption poisons corporations in America and around the world, and has devastating consequences for the entire social fabric. In this article, we focus on organizational corruption, described as the abuse of authority for personal benefit, and draw on Weber’s three ideal-types of legitimate authority to develop a theoretical model to
Words: 11977 - Pages: 48
many examples, an area particularly demonstrating this inequality among classes, is exclusionary zoning. These local laws have been seen to detain lower-income individuals from residing in certain communities by mandating specifications on lot sizes, types of housing, and the number of buildings and occupants allowed. Consequently these factors trigger an increase in community housing costs, and thus drive away lower-income individuals. In the past few decades however, states’ tolerance for exclusionary
Words: 3358 - Pages: 14
NO. 3, MARCH 2000 535 Performance Analysis of the IEEE 802.11 Distributed Coordination Function Giuseppe Bianchi Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely
Words: 8526 - Pages: 35