Sample records for file system abuse

  1. 75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-01

    ... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...

  2. Characteristics of Child Abuse in Immigrant Korean Families and Correlates of Placement Decisions

    ERIC Educational Resources Information Center

    Chang, Janet; Rhee, Siyon; Weaver, Dale

    2006-01-01

    Objective: This study examined the characteristics and patterns of child abuse among immigrant Korean families in Los Angeles and critical variables that contribute to the type of placement made by the child protective services (CPS) system. Method: Data were obtained from reviewing and analyzing 170 active Korean case files maintained by the…

  3. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    PubMed

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  4. 77 FR 22020 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... which they are acting (principal, agent, or riskless principal) into the System, the order will be... assist the Exchange in surveilling the markets for abusive or otherwise violative trading activity. \\7...

  5. Assault and abuse of health care workers in a large teaching hospital.

    PubMed Central

    Yassi, A

    1994-01-01

    OBJECTIVES: To determine the nature, extent and costs of injuries to health care workers caused by physical abuse. DESIGN: Retrospective study. SETTING: Large acute and tertiary care teaching hospital in Winnipeg. PARTICIPANTS: All health care workers at the hospital who filed reports of abuse-related injuries and of verbal abuse and threatening behaviour from Apr. 1, 1991, to Mar. 31, 1993. OUTCOME MEASURES: Frequency of physical and verbal abuse of hospital personnel according to job category, type of injury, hours of staff time lost and estimates of costs compensated for abuse-related injuries. RESULTS: Of the 242 reported abuse-related injuries 194 (80.2%) occurred among the nursing personnel. The nurses in the medical units filed most (33.1%) of the reports. Although the psychiatric nurses filed fewer reports (35 [14.5%]) they had the highest rate of injuries per 100,000 paid hours among the nursing staff. Not surprisingly, the security officers were at highest risk, 53.5% having reported an abuse-related injury for a rate of 16.8 such injuries per 100,000 paid hours. Male staff members had a higher injury rate than their female counterparts in all occupational groups. Bruising or crushing was the most frequent type of injury (in 126 cases); the next most frequent were cuts and lacerations (in 47) and human bites and exposures to blood or body fluids (in 23). However, the 36 sprains and strains resulted in the largest amount of time lost. In all, over 8000 hours were lost due to abuse-related injuries, and over $76,000 was paid in workers' compensation benefits. Concurrently, 646 incidents of verbal abuse and threatening behaviour were reported. Only three abuse-related injuries and two incidents of verbal abuse were reported by physicians. CONCLUSIONS: Abuse-related injuries to health care workers in an urban hospital are prevalent, serious and can be costly in terms of time off work and compensation. Underreporting is likely, especially among physicians. PMID:7954175

  6. Child Abuse and Mandated Reporting

    ERIC Educational Resources Information Center

    Woika, Shirley; Bowersox, Carissa

    2013-01-01

    Teachers and teachers-in-training are mandated reporters; they are legally required to report any suspected child abuse or neglect. This article describes: (1) How to file a report; (2) How prevalent child abuse is; (3) What abuse is; (4) What it means to be a mandated reporter; (5) When the report should be made; and (6) What to do if abuse is…

  7. Fact Retrieval for the 1980’s,

    DTIC Science & Technology

    1981-07-01

    System (SANSS) which is used to identify a chemical substance , given its name or its structure, and refer the user to all CIS files that contain data...Information Interchange Data Description File Format." In 1978, this draft became the substance for the ANSI X3L5 committee, which included several...34Encoding and Decodin!g of Facts" Communications in the 1980s will require protection from eavesdropping and abuse . It is against the law to tap a telephone

  8. Improving the Court Process for Alaska's Children in Need of Aid. Executive Summary.

    ERIC Educational Resources Information Center

    Carns, Teresa W.; DiPietro, Susanne D.; Connors, Joan F.; Cotton, William T.; Vandercook, Marcia

    An assessment was conducted to determine how well the Alaskan court system and other agencies in the child welfare system meet the needs of abused and neglected children, their families, and society's interests in these cases. Data were collected through analysis of 473 case files in four courts; interviews with 60 attorneys, judges, guardians ad…

  9. 34 CFR 86.405 - What are the requirements for filing written submissions?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Saturday, Sunday, or Federal holiday, the filing deadline is the next Federal business day. (e) A party... 34 Education 1 2010-07-01 2010-07-01 false What are the requirements for filing written... ABUSE PREVENTION Appeal Procedures § 86.405 What are the requirements for filing written submissions? (a...

  10. Therapist responses to recovered and never-forgotten memories of child sex abuse. A national survey of licensed psychologists.

    PubMed

    Tabachnick, B G; Pope, K S

    1997-08-01

    The credibility of recovered memories of child sexual abuse following a long period of repression remains controversial in the mental health field. Some have argued that recovered memories are the work of overzealous therapists who implant such material. To learn more about the steps clinicians follow when they encounter such reports, a questionnaire was mailed to 300 female and 300 male licensed psychologists randomly selected from the 1994 American Psychological Association Membership Register. The survey included 1 of 4 versions of a vignette in which a 14-year-old girl suddenly remembers (or always remembered and just decided to disclose) sexual abuse that occurred at age 2 or 8 years. Survey forms were returned by 49% (144 females and 140 males). Only 1 therapist reached a firm conclusion about the validity of the abuse report based on the vignette alone; the rest indicated a need for further information, disputing claims that therapists respond to allegations of abuse with reflexive certainty. Reports were more likely to be believed when the age at abuse was 8 years rather than 2 years, by younger therapists (45 years and under), and by women who were nonpsychoanalytically oriented. Whether the abuse memory had been repressed did not significantly affect beliefs about its likely occurrence. Respondents also were given a list of 12 possible responses to an abuse disclosure and asked to check those they were most likely to follow. The most commonly cited responses were: discuss the allegations further in the next session (80%), consult with other clinicians (52%), file a child abuse report (40%), consult with an attorney about legal responsibilities (36%), schedule a session with all family members (30%), and schedule psychological testing (28%). The finding that less than 50% of therapists would file a mandated report of suspected child abuse indicates a need for states to more clearly define the criteria for filing such reports.

  11. Near field communication (NFC) model for arduino uno based security systems office system

    NASA Astrophysics Data System (ADS)

    Chairunnas, A.; Abdurrasyid, I.

    2018-03-01

    Currently, many offices or companies that start growing rapidly in a company or office should have a very limited room to enter only people entitled to enter the room and use the facilities contained in it, for example, Files in it must have many files and documents very important because to reduce the abuse of files and irresponsible person. Because it will be made room door security system by using Near Field Communication on android smartphone. Software used is Arduino IDE. The tools used in this system are Arduino Uno R3, NFC shield, pear sensor, bell, led, servo, 16 × 2 LCD, and Near Field Communication (NFC) in android smartphone. This system runs based on 2 inputs of a new technology that is Near Field Communication (NFC) in android smartphone. And also use pear sensor to detect unauthorized person entering the room. If the correct password is entered then the door will open and the pear sensor will light off if wrong then the bell will light up.

  12. Sexual Abuse of Vulnerable Young and Old Men

    ERIC Educational Resources Information Center

    Roberto, Karen A.; Teaster, Pamela B.; Nikzad, Katherina A.

    2007-01-01

    During a 4-year period, aggregated data from Adult Protective Services case files in Virginia revealed 17 cases of sexually abused young, middle-age, and old men. The most common types of sexual abuse across age groups involved instances of sexualized kissing and fondling and unwelcome sexual interest in the individual men's bodies. The majority…

  13. [Drug abuse in adolescent offenders: analysis of the psychosocial variables involved].

    PubMed

    Contreras Martínez, Lourdes; Molina Banqueri, Virginia; Cano Lozano, Ma Carmen

    2012-01-01

    Research shows that drugs and delinquency are frequently linked, the abuse of various types of substance being a widespread practice among young offenders. At the same time, some psychosocial characteristics are associated with both drug abuse and criminal/antisocial behavior. To help us explore the relationship between young offenders' drug abuse and certain psychosocial variables, we examined closed judicial files on young offenders from the Juvenile Justice Service in Jaen (Spain) corresponding to the period 2001 to 2010. From the contents of these judicial files we analyzed demographic variables such as gender and age, as well as psychosocial variables such as drug abuse, peer group, violent behavior, self-control, tolerance to frustration and attributional style. The results show that most of the young offenders use some type of drug, as well as revealing differential patterns of use according to gender. Also observed is a link between drug abuse and deviant peer group, violent behavior and the above-mentioned psychological variables. Finally, we found some differences in these psychological variables depending on the type of drug used.

  14. 77 FR 15026 - Privacy Act of 1974; Farm Records File (Automated) System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... Mining Project, all program data collected and handled by either RMA or FSA will be treated with the full... data warehouse and data mining operation. RMA will use the information to search or ``mine'' existing... fraud, waste, and abuse. The data mining operation is authorized by the Agricultural Risk Protection Act...

  15. Screening for childhood physical and sexual abuse among outpatient substance abusers.

    PubMed

    Simpson, T L; Westerberg, V S; Little, L M; Trujillo, M

    1994-01-01

    Research demonstrates that substance-abusing individuals report substantially higher rates of childhood sexual and physical abuse than the general population. This study sought to test a method of identifying substance-abusing clients with histories of childhood sexual and/or physical abuse and to explore the differences between those reporting childhood abuse and those not. Files of substance abusing clients from two distinct time periods were examined for reports of childhood abuse. At Time 1 (n = 399) clients were not systematically asked about experiences of childhood abuse, and at Time 2 (n = 305) clients were routinely asked about this issue. Results indicate that significantly more male and female clients disclosed childhood abuse at Time 2. Additionally, male clients reporting childhood abuse appeared more distressed than those not reporting abuse; female clients reporting childhood abuse did not appear more distressed than their counterparts.

  16. Reentry into Out-of-Home Care: Implications of Child Welfare Workers' Assessments of Risk and Safety

    ERIC Educational Resources Information Center

    Wells, Melissa; Correia, Melissa

    2012-01-01

    This longitudinal analysis examined predictors of reentry to foster care among children and youths who entered foster care between 2001 and 2007. Three sources of administrative data (Chapin Hall Center for Children longitudinal files, National Child Abuse and Neglect Data System, and structured decision making) from one state were used to assess…

  17. Problems in Educating Abused and Neglected Children with Disabilities.

    ERIC Educational Resources Information Center

    Weinberg, Lois A.

    1997-01-01

    Interviews and review of case files investigated reasons for the common failure to meet the educational needs of abused and neglected children with disabilities in foster care. Agency dysfunctions which negatively affected appropriate educational provisions were identified in such categories as eligibility, timeline violation, inappropriate…

  18. Diagnostic cost groups (DCGs) and concurrent utilization among patients with substance abuse disorders.

    PubMed

    Rosen, Amy K; Loveland, Susan A; Anderson, Jennifer J; Hankin, Cheryl S; Breckenridge, James N; Berlowitz, Dan R

    2002-08-01

    To assess the performance of Diagnostic Cost Groups (DCGs) in explaining variation in concurrent utilization for a defined subgroup, patients with substance abuse (SA) disorders, within the Department of Veterans Affairs (VA). A 60 percent random sample of veterans who used health care services during Fiscal Year (FY) 1997 was obtained from VA administrative databases. Patients with SA disorders (13.3 percent) were identified from primary and secondary ICD-9-CM diagnosis codes. Concurrent risk adjustment models were fitted and tested using the DCG/HCC model. Three outcome measures were defined: (1) "service days" (the sum of a patient's inpatient and outpatient visit days), (2) mental health/substance abuse (MH/SA) service days, and (3) ambulatory provider encounters. To improve model performance, we ran three DCG/HCC models with additional indicators for patients with SA disorders. To create a single file of veterans who used health care services in FY 1997, we merged records from all VA inpatient and outpatient files. Adding indicators for patients with mild/moderate SA disorders did not appreciably improve the R-squares for any of the outcome measures. When indicators were added for patients with severe SA who were in the most costly category, the explanatory ability of the models was modestly improved for all three outcomes. Modifying the DCG/HCC model with additional markers for SA modestly improved homogeneity and model prediction. Because considerable variation still remained after modeling, we conclude that health care systems should evaluate "off-the-shelf" risk adjustment systems before applying them to their own populations.

  19. 76 FR 26737 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Substance Abuse and Mental Health Services Administration... Substance Abuse and Mental Health Services Administration (SAMHSA) will publish a summary of information... Operations. [FR Doc. 2011-11198 Filed 5-6-11; 8:45 am] BILLING CODE 4162-20-P ...

  20. Child Sexual Abuse: A Case Study in Community Collaboration.

    ERIC Educational Resources Information Center

    Faller, Kathleen Coulborn; Henry, James

    2000-01-01

    A study investigated the effectiveness of a collaborative approach to the case management of child sexual abuse. Data from 323 criminal court files found a sex offense confession rate of 64 percent and plea rate of 70 percent. Fifteen cases went to trial and in six the offender was convicted. (Contains references.) (Author/CR)

  1. Dialogic Reverberations: Police, Domestic Abuse, and the Discontinuance of Cases

    ERIC Educational Resources Information Center

    Lea, Susan J.; Lynn, Nick

    2012-01-01

    This study investigated the social construction of domestic abuse by police officers, specifically in the context of arguments presented to the prosecutor for a decision on whether to proceed with or discontinue the case. Nineteen police files were examined with a particular focus on the MG3, the "Report to Crown Prosecutors for Charging…

  2. Child Abuse and Neglect Among Mexican American Migrants: A Study of Cases.

    ERIC Educational Resources Information Center

    Berrios, Lex

    The exploratory study described the etiology of child abuse and neglect among Mexican American migrants and provided a brief assessment of services rendered to clients. The frequencies of specific traits and behaviors were tallied to trace some generalized social situations and trends. Data were obtained primarily from 140 files, most of which…

  3. Prosecuting Child Sexual Abuse: The Importance of Evidence Type

    ERIC Educational Resources Information Center

    Walsh, Wendy A.; Jones, Lisa M.; Cross, Theodore P.; Lippert, Tonya

    2010-01-01

    Corroborating evidence has been associated with a decrease in children's distress during the court process, yet few studies have empirically examined the impact of evidence type on prosecution rates. This study examined the types of evidence and whether charges were filed in a sample of child sexual abuse cases (n = 329). Cases with a child…

  4. 75 FR 18043 - Combating Noncompliance With Recovery Act Reporting Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ... tracking recovery dollars and to elimination of waste, fraud, and abuse by recipients of hard-earned...) identify every prime recipient under an obligation to file a report on FederalReporting.gov arising from... that every such recipient has filed a report. Any prime recipient that has failed to report is not...

  5. Predictors of Legal Intervention in Child Maltreatment Cases.

    ERIC Educational Resources Information Center

    Tjaden, Patricia G.; Thoennes, Nancy

    1992-01-01

    Analysis of records of dependency and criminal filings in 833 substantiated intrafamilial child abuse and neglect cases in 3 U.S. cities indicated that legal intervention was rare, with dependency filings and prosecutions in just 21% and 4% of the sample, respectively, although treatment plans and out-of-home placements occurred more frequently.…

  6. Characteristics of child abuse in immigrant Korean families and correlates of placement decisions.

    PubMed

    Chang, Janet; Rhee, Siyon; Weaver, Dale

    2006-08-01

    This study examined the characteristics and patterns of child abuse among immigrant Korean families in Los Angeles and critical variables that contribute to the type of placement made by the child protective services (CPS) system. Data were obtained from reviewing and analyzing 170 active Korean case files maintained by the Asian Pacific Unit (APU) of the Los Angeles County Department of Children and Family Services (LAC-DCFS) during July through September, 2001. Logistic regression analysis was employed to examine the odds of children being kept in or removed from the home. Some of the major findings from this study include: (1) immigrant Korean families are more likely to be charged with physical abuse (49.4%) and less likely to be charged with neglect (20.6%) in comparison with all other groups in Los Angeles (13.2% and 27.1%, respectively); (2) the circumstance under which physical abuse occurred most frequently was corporal punishment used by Korean parents with an intention to discipline their children; and (3) the context under which emotional abuse occurred among the Korean families was likely to be children's witnessing domestic violence. In addition, the logistic regression showed that response status, referral source, living arrangement, victim's relationship to perpetrator, and chronicity of abuse were significant in predicting out-of-home placement. An analysis of Korean child abuse cases reported to child protective service revealed that culture and child rearing practices shaped the patterns of child maltreatment. A culturally sensitive approach is strongly suggested for effective child abuse prevention and intervention services with this group by CPS agencies.

  7. How does the legal system respond when children with learning difficulties are victimized?

    PubMed

    Cederborg, Ann-Christin; Lamb, Michael E

    2006-05-01

    To understand how the Swedish legal system perceives and handles mentally handicapped children who may have been victimized. Twenty-two judicial districts in Sweden provided complete files on 39 District Court cases (including the Appeals Court files on 17 of these cases) involving children with learning difficulties or other handicaps as alleged victims of abuse, threat and neglect. The children (25 girls and 14 boys) averaged 11.8 years of age when first allegedly victimized. Sexual abuse was the most frequently alleged crime (33 cases). Court transcripts, court files and expert assessments of the alleged victims' handicaps and their possible consequences were examined to elucidate the ways in which courts evaluated the credibility of the alleged victims. The children's reports of their victimization were expected to have the characteristics emphasized by proponents of Statement Reality Analysis (SRA) and Criterion Based Content Analysis (CBCA) in order to be deemed credible. Expert reports were seldom available or adequate. Because many reports were poorly written or prepared by experts who lacked the necessary skills, courts were left to rely on their own assumptions and knowledge when evaluating children's capacities and credibility. Children with learning difficulties or other handicaps were expected to provide the same sort of reports as other children. To minimize the risk that judgments may be based on inaccurate assumptions courts need to require more thorough assessments of children's limitations and their implications. Assessments by competent mental health professionals could inform and strengthen legal decision-making. A standardized procedure that included psycho-diagnostic instruments would allow courts to understand better the abilities, capacities, and behavior of specific handicapped children.

  8. Automated Breast Ultrasound for Ductal Pattern Reconstruction: Ground Truth File Generation and CADe Evaluation

    NASA Astrophysics Data System (ADS)

    Manousaki, D.; Panagiotopoulou, A.; Bizimi, V.; Haynes, M. S.; Love, S.; Kallergi, M.

    2017-11-01

    The purpose of this study was the generation of ground truth files (GTFs) of the breast ducts from 3D images of the Invenia™ Automated Breast Ultrasound System (ABUS) system (GE Healthcare, Little Chalfont, UK) and the application of these GTFs for the optimization of the imaging protocol and the evaluation of a computer aided detection (CADe) algorithm developed for automated duct detection. Six lactating, nursing volunteers were scanned with the ABUS before and right after breastfeeding their infants. An expert in breast ultrasound generated rough outlines of the milk-filled ducts in the transaxial slices of all image volumes and the final GTFs were created by using thresholding and smoothing tools in ImageJ. In addition, a CADe algorithm automatically segmented duct like areas and its results were compared to the expert’s GTFs by estimating true positive fraction (TPF) or % overlap. The CADe output differed significantly from the expert’s but both detected a smaller than expected volume of the ducts due to insufficient contrast (ducts were partially filled with milk), discontinuities, and artifacts. GTFs were used to modify the imaging protocol and improve the CADe method. In conclusion, electronic GTFs provide a valuable tool in the optimization of a tomographic imaging system, the imaging protocol, and the CADe algorithms. Their generation, however, is an extremely time consuming, strenuous process, particularly for multi-slice examinations, and alternatives based on phantoms or simulations are highly desirable.

  9. Manual for Drug Abuse Treatment Program Self-Evaluation. Supplement II: CODAP Tables.

    ERIC Educational Resources Information Center

    Guess, L. Lynn; Tuchfeld, Barry S.

    This is the second of two supplements to a manual on the self-evaluation of drug abuse treatment programs. Data based on treatment outcome information that agencies and clinics routinely collect or have available in the files of individual clients are presented. While it is possible to use this volume without referring to the discussion of…

  10. Gender differences in abused children with and without disabilities.

    PubMed

    Sobsey, D; Randall, W; Parrila, R K

    1997-08-01

    Two questions were posed: (1) What are the proportions of boys and girls in various categories of substantiated child abuse? (2) Do the gender proportions differ for children with and without disabilities? Data collected by previous researchers from a demographically representative sample of U.S. child abuse reporting districts was analyzed. This included 1,249 case files involving 1,834 children. The number of girls and boys who did and did not have disabilities was identified for three age categories and for several categories of abuse. Chi-square analyses were used to determine whether there was a relationship between disability and gender for the various age and abuse categories. More boys were physically abused and neglected, but more girls were sexually abused. Boys with disabilities, however, were over-represented in all categories of abuse. Moreover, gender proportions among abused children with disabilities differed significantly from those found among other abused children. Although slightly more than half of abused children without disabilities were girls, 65% of abused children with disabilities were boys. Boys represented a significantly larger proportion of physically abused, sexually abused, and neglected children with disabilities than would be expected from their respective proportion of abused and neglected children without disabilities. Several possible explanations for the observed gender and disability status interaction are discussed.

  11. Ideal Police Oversight and Review: The Next Piece of the Community Policing Puzzle

    DTIC Science & Technology

    2015-12-01

    oversight. Included in that malpractice are instances of perceived physical and verbal abuse , perceived harassment, failure to take appropriate action...a kid from south Stockton. 1 I. INTRODUCTION A. PROBLEM STATEMENT—BACKGROUND Independent oversight boards are asked to make the complaint...communities with inclusion and investigative transparency when filing complaints of police misconduct and abuse of police powers. In his article “Race

  12. Use of VA and Medicare Services By Dually Eligible Veterans with Psychiatric Problems

    PubMed Central

    Carey, Kathleen; Montez-Rath, Maria E; Rosen, Amy K; Christiansen, Cindy L; Loveland, Susan; Ettner, Susan L

    2008-01-01

    Objective To examine how service accessibility measured by geographic distance affects service sector choices for veterans who are dually eligible for veterans affairs (VA) and Medicare services and who are diagnosed with mental health and/or substance abuse (MH/SA) disorders. Data Sources Primary VA data sources were the Patient Treatment (acute care), Extended Care (long-term care), and Outpatient Clinic files. VA cost data were obtained from (1) inpatient and outpatient cost files developed by the VA Health Economics and Resource Center and (2) outpatient VA Decision Support System files. Medicare data sources were the denominator, Medicare Provider Analysis Review (MEDPAR), Provider-of-Service, Outpatient Standard Analytic and Physician/Supplier Standard Analytic files. Additional sources included the Area Resource File and Census Bureau data. Study Design We identified dually eligible veterans who had either an inpatient or outpatient MH/SA diagnosis in the VA system during fiscal year (FY)'99. We then estimated one- and two-part regression models to explain the effects of geographic distance on both VA and Medicare total and MH/SA costs. Principal Findings Results provide evidence for substitution between the VA and Medicare, demonstrating that poorer geographic access to VA inpatient and outpatient clinics decreased VA expenditures but increased Medicare expenditures, while poorer access to Medicare-certified general and psychiatric hospitals decreased Medicare expenditures but increased VA expenditures. Conclusions As geographic distance to VA medical facility increases, Medicare plays an increasingly important role in providing mental health services to veterans. PMID:18355256

  13. Medicare

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... the U.S. Centers for Medicare & Medicaid Services. 7500 Security Boulevard, Baltimore, MD 21244 Sign Up / Change Plans ...

  14. Substance Abuse, Coping Strategies, Adaptive Skills and Behavioral and Emotional Problems in Clients with Mild to Borderline Intellectual Disability Admitted to a Treatment Facility: A Pilot Study

    ERIC Educational Resources Information Center

    Didden, Robert; Embregts, Petri; van der Toorn, Mirjam; Laarhoven, Nina

    2009-01-01

    Many clients with mild to borderline intellectual disability (ID) who are admitted to a treatment facility show serious problems in alcohol and/or drugs use. In the present case file study, we explored differences in coping strategies, adaptive skills and emotional and behavioral problems between clients who showed substance abuse and clients who…

  15. Do adult mental health services identify child abuse and neglect? A systematic review.

    PubMed

    Read, John; Harper, David; Tucker, Ian; Kennedy, Angela

    2018-02-01

    Child abuse and neglect play a causal role in many mental health problems. Knowing whether users of mental health services were abused or neglected as children could be considered essential for developing comprehensive formulations and effective treatment plans. In the present study we report the findings of a systematic review, using independent searches of three databases designed to discover how often mental health staff find out whether their clients were abused or neglected as children. Twenty-one relevant studies were identified. Most people who use mental health services are never asked about child abuse or neglect. The majority of cases of child abuse or neglect are not identified by mental health services. Only 28% of abuse or neglect cases identified by researchers are found in the clients' files: emotional abuse, 44%; physical abuse, 33%; sexual abuse, 30%; emotional neglect, 17%; and physical neglect, 10%. Between 0% and 22% of mental health service users report being asked about child abuse. Men and people diagnosed with psychotic disorders are asked less than other people. Male staff ask less often than female staff. Some improvement over time was found. Policies compelling routine enquiry, training, and trauma-informed services are required. © 2017 Australian College of Mental Health Nurses Inc.

  16. Family profile of victims of child abuse and neglect in the Kingdom of Saudi Arabia.

    PubMed

    Almuneef, Maha A; Alghamdi, Linah A; Saleheen, Hassan N

    2016-08-01

    To describe the family profile of child abuse and neglect (CAN) subjects in Saudi Arabia. Data were collected retrospectively between July 2009 and December 2013 from patients' files, which were obtained from the Child Protection Centre (CPC) based in King Abdulaziz Medical City, Riyadh, Saudi Arabia. Four main sets of variables were examined: demographics of victim, family profile, parental information, and information on perpetrator and forms of abuse.  The charts of 220 CAN cases were retrospectively reviewed. Physical abuse was the most common form of abuse (42%), followed by neglect (39%), sexual abuse (14%), and emotional abuse (4%). Children with unemployed fathers were 2.8 times as likely to experience physical abuse. Children living in single/step-parent households were 4 times as likely to experience physical abuse. Regarding neglect children living in larger households (≥6) were 1.5 times as likely to be neglected by their parents as were children living in smaller households (less than 6). Regarding sexual abuse, male children were 2.9 times as likely to be abused as were female children.  The recent acknowledgment of CAN as a public health problem in Saudi Arabia suggests that time will be needed to employ effective and culturally sensitive prevention strategies based on family risk factors.

  17. Speaking With and Without Words-An Analysis of Foster Children's Expressions and Behaviors That Are Suggestive of Prior Sexual Abuse.

    PubMed

    Wubs, Dorijn; Batstra, Laura; Grietens, Hans W E

    2018-01-01

    This exploratory study reports on foster children's informal self-disclosures of previously unknown histories of sexual abuse. Data were collected from 40 children's files, and an inductive thematic analysis of verbal and behavioral expressions was conducted. Findings suggest that foster children's self-disclosures can be fragmented, spontaneous, narrative, or triggered and often occur during everyday activities in the foster family. The children disclose their past by referring to the perpetrator or the severity of the abuse or by acting out, mostly by reenacting sexual abuse experiences. In addition, some children use childish vocabulary focusing on genitals or sexual acts they were involved in or want to be involved in. Last, some foster children seem to be linguistically challenged to disclose that a female person abused them or that they were forced to reciprocate sexually. This study adds to the understanding of the complex process of child sexual abuse disclosure in the context of foster care.

  18. Children and End-State Renal Disease (ERSD)

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... last 3 years by working and paying Social Security taxes. You (or your spouse) are getting, or ...

  19. Delay in disclosure of non-parental child sexual abuse in the context of emotional and physical maltreatment: A pilot study.

    PubMed

    Tashjian, Sarah M; Goldfarb, Deborah; Goodman, Gail S; Quas, Jodi A; Edelstein, Robin

    2016-08-01

    The present pilot study sought to identify predictors of delays in child sexual abuse (CSA) disclosure, specifically whether emotional and physical abuse by a parental figure contributes to predicting delays over and above other important victim factors. Alleged CSA victims (N=79), whose parental figures were not the purported sexual abuse perpetrators, were interviewed and their case files reviewed, across two waves of a longitudinal study. Regression analyses indicated that experiencing both emotional and physical abuse by a parental figure was uniquely predictive of longer delays in disclosure of CSA perpetrated by someone other than a parental figure. Victim-CSA perpetrator relationship type and sexual abuse duration also significantly predicted CSA disclosure delay, whereas victim age at the time of the police report, victim gender, and victims' feelings of complicity were not significant unique predictors. Child abuse victims' expectations of lack of parental support may underlie these findings. Parent-child relationships are likely crucial to timely disclosure of CSA, even when a parent is not the CSA perpetrator. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Child Abuse and Neglect in New York State Office of Mental Health and Office of Mental Retardation and Developmental Disabilities Residential Programs. A Review of Reports Filed October 1, 1986-September 30, 1989.

    ERIC Educational Resources Information Center

    New York State Commission on Quality of Care for the Mentally Disabled, Albany.

    This report summarizes a 3-year review of reports of child abuse and neglect in New York State's mental hygiene facilities. The study determined that greater efforts are required to ensure protection of those children who were "repeat" alleged victims and who, as a group, were involved in 400 of the 850 reports to the State Central…

  1. Diagnostics Cost Groups and Concurrent Utilization among Patients

    PubMed Central

    Rosen, Amy K; Loveland, Susan A; Anderson, Jennifer J; Hankin, Cheryl S; Breckenridge, James N; Berlowitz, Dan R

    2002-01-01

    Objective To assess the performance of Diagnostic Cost Groups (DCGs) in explaining variation in concurrent utilization for a defined subgroup, patients with substance abuse (SA) disorders, within the Department of Veterans Affairs (VA). Data Sources A 60 percent random sample of veterans who used health care services during Fiscal Year (FY) 1997 was obtained from VA administrative databases. Patients with SA disorders (13.3 percent) were identified from primary and secondary ICD-9-CM diagnosis codes. Study Design Concurrent risk adjustment models were fitted and tested using the DCG/HCC model. Three outcome measures were defined: (1) “service days” (the sum of a patient's inpatient and outpatient visit days), (2) mental health/substance abuse (MH/SA) service days, and (3) ambulatory provider encounters. To improve model performance, we ran three DCG/HCC models with additional indicators for patients with SA disorders. Data Collection To create a single file of veterans who used health care services in FY 1997, we merged records from all VA inpatient and outpatient files. Principal Findings Adding indicators for patients with mild/moderate SA disorders did not appreciably improve the R-squares for any of the outcome measures. When indicators were added for patients with severe SA who were in the most costly category, the explanatory ability of the models was modestly improved for all three outcomes. Conclusions Modifying the DCG/HCC model with additional markers for SA modestly improved homogeneity and model prediction. Because considerable variation still remained after modeling, we conclude that health care systems should evaluate “off-the-shelf” risk adjustment systems before applying them to their own populations. PMID:12236385

  2. "It Gave Me My Life Back": An Evaluation of a Specialist Legal Domestic Abuse Service.

    PubMed

    Lea, Susan J; Callaghan, Lynne

    2016-05-01

    Community-based advocacy services are important in enabling victims to escape domestic abuse and rebuild their lives. This study evaluated a domestic abuse service. Two phases of research were conducted following case-file analysis (n = 86): surveys (n = 22) and interviews (n = 12) with victims, and interviews with key individuals (n = 12) based in related statutory and community organizations. The findings revealed the holistic model of legal, practical, mental health-related, and advocacy components resulted in a range of benefits to victims and enhanced interagency partnership working. Core elements of a successful needs-led, victim-centered service could be distilled. © The Author(s) 2015.

  3. 75 FR 53975 - Advisory Committee for Women's Services; Amendment of Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-02

    ..., 1 Choke Cherry Road, Room 8-1016, Rockville, MD 20857, Telephone: 240.276.2331, FAX: 240.276.2251... Officer, Substance Abuse and Mental Health, Services Administration. [FR Doc. 2010-21917 Filed 9-1-10; 8...

  4. Abuse potential and psychoactive effects of δ-9-tetrahydrocannabinol and cannabidiol oromucosal spray (Sativex), a new cannabinoid medicine.

    PubMed

    Robson, Philip

    2011-09-01

    There is a growing consensus that cannabis dependence is a substantial and underappreciated problem. The key component responsible for the euphoric effects of cannabis and its dependence potential is δ-9-tetrahydrocannabinol (THC). THC-containing cannabinoid medicines theoretically pose a risk of abuse and dependence. In order to evaluate the potential of Sativex to cause cannabis-like psychoactivity, abuse or dependence relevant data from all published papers have been reviewed along with the integrated safety analysis for Sativex use in multiple sclerosis (MS) patients on file at GW Pharmaceuticals. In clinical trials, intoxication scores have been low and euphoria reported by only 2.2% of patients. Tolerance has not occurred, abrupt withdrawal has not resulted in a formal withdrawal syndrome, and no cases of abuse or diversion have been reported to date. A formal abuse liability study of Sativex in experienced cannabis smokers showed some abuse potential in comparison with placebo at higher doses, but scores were consistently lower than equivalent doses of THC. Evidence to date suggests that abuse or dependence on Sativex is likely to occur in only a very small proportion of recipients.

  5. Improving detection and quality of assessment of child abuse and partner abuse is achievable with a formal organisational change approach.

    PubMed

    Wills, Russell; Ritchie, Miranda; Wilson, Mollie

    2008-03-01

    To improve detection and quality of assessment of child and partner abuse within a health service. A formal organisational change approach was used to implement the New Zealand Family Violence Intervention Guidelines in a mid-sized regional health service. The approach includes obtaining senior management support, community collaboration, developing resources to support practice, research, evaluation and training. Formal pre-post evaluations were conducted of the training. Barriers and enablers of practice change were assessed through 85 interviews with 60 staff. More than 6000 clinical records were audited to assess rates of questioning for partner abuse. Identifications of partner abuse and referrals made were counted through the Family Violence Accessory File. Referrals to the Department of Child, Youth and Family Services (CYFS) were recorded routinely by the CYFS. Audits assessed quality of assessment of child and partner abuse, when identified. More than 700 staff were trained in dual assessment for child and partner abuse. Evaluations demonstrate improved confidence following training, though staff still need support. Barriers and enablers to asking about partner abuse were identified. Referrals from the health service to the CYFS increased from 10 per quarter to 70 per quarter. Identification of partner abuse increased from 30 to 80 per 6-month period. Routine questioning rates for partner abuse vary between services. Achieving and sustaining improved rates of identification and quality of assessment of child and partner abuse is possible with a formal organisational change approach.

  6. Child maltreatment in Puerto Rico: findings from the 2010 National Child Abuse and Neglect Data System.

    PubMed

    Ishida, Kanako; Klevens, Joanne; Rivera-García, Brenda; Mirabal, Brenda

    2013-09-01

    Child maltreatment can have long-term adverse effects. Quantifying the scope and characteristics of child maltreatment is necessary for effective prevention in Puerto Rico. The National Child Abuse and Neglect Data System Child File contains all the reports of child maltreatment from the United States (US) and Puerto Rico. A child maltreatment victim is defined as a child whose maltreatment was substantiated or indicated by the local child protective agency. We compared reporting and victimization rates and reporting sources in Puerto Rico, with those in the US and examined characteristics of child maltreatment in Puerto Rico. During 2006-2010, a total of 31,849-40,712 cases of child maltreatment were reported annually in Puerto Rico. Victimization rates are consistently higher in Puerto Rico than in the US (10.7/1,000-14.8/1,000 in Puerto Rico vs. 10.1/1,000-12.1/1,000 in the US), despite consistently lower reporting rates. In 2010, victimization rates were highest among children aged 1-6 years. In Puerto Rico, neglect is the most common form of maltreatment, followed by emotional abuse; however, the majority of victims suffered multiple types of abuse. Reporting was more commonly anonymous in Puerto Rico (29.8%) than in the US (9.4%) and less commonly provided by professionals in Puerto Rico (37.2%) than in the US (58.7%). We identified a high prevalence of child maltreatment in Puerto Rico. A lower reporting rate, higher victimization rate, and substantial percentage of anonymous reporting indicate potential underreporting of child maltreatment in Puerto Rico. Increasing the awareness and training professionals for improved child maltreatment identification could help alleviate the problem of underreporting.

  7. Community Poverty and Child Abuse Fatalities in the United States.

    PubMed

    Farrell, Caitlin A; Fleegler, Eric W; Monuteaux, Michael C; Wilson, Celeste R; Christian, Cindy W; Lee, Lois K

    2017-05-01

    Child maltreatment remains a problem in the United States, and individual poverty is a recognized risk factor for abuse. Children in impoverished communities are at risk for negative health outcomes, but the relationship of community poverty to child abuse fatalities is not known. Our objective was to evaluate the association between county poverty concentration and rates of fatal child abuse. This was a retrospective, cross-sectional analysis of child abuse fatalities in US children 0 to 4 years of age from 1999 to 2014 by using the Centers for Disease Control and Prevention Compressed Mortality Files. Population and poverty statistics were obtained from US Census data. National child abuse fatality rates were calculated for each category of community poverty concentration. Multivariate negative binomial regression modeling assessed the relationship between county poverty concentration and child abuse fatalities. From 1999 to 2014, 11 149 children 0 to 4 years old died of child abuse; 45% (5053) were <1 year old, 56% (6283) were boys, and 58% (6480) were white. The overall rate of fatal child abuse was 3.5 per 100 000 children 0 to 4 years old. In the multivariate model, counties with the highest poverty concentration had >3 times the rate of child abuse fatalities compared with counties with the lowest poverty concentration (adjusted incidence rate ratio, 3.03; 95% confidence interval, 2.4-3.79). Higher county poverty concentration is associated with increased rates of child abuse fatalities. This finding should inform public health officials in targeting high-risk areas for interventions and resources. Copyright © 2017 by the American Academy of Pediatrics.

  8. Child abuse and neglect in Cambodian refugee families: characteristics and implications for practice.

    PubMed

    Chang, Janet; Rhee, Siyon; Berthold, S Megan

    2008-01-01

    This study examines the characteristics and patterns of child maltreatment among Cambodian refugee families in Los Angeles and assesses the implications for child welfare practice with Cambodian refugee families. Data were extracted from 243 active Cambodian case files maintained by the Los Angeles County Department of Children and Family Services (LAC-DCFS). Some of the major findings include (1) Cambodian child maltreatment cases were most frequently reported to the LAC-DCFS among various Asian Pacific ethnic groups; (2) Cambodian refugee families were more likely to be charged with neglect, while their Asian Pacific counterparts were more likely charged with physical abuse; (3) the circumstances under which maltreatment occurred most frequently were parental substance abuse and mental illness; and (4) while fathers who maltreated their child were likely to use alcohol, mothers were also more likely to have a mental health problem such as depression. This study suggests the importance of collaboration between Child Protective Service agencies, substance abuse programs, traditional healers, mental health services, and other social service agencies for effective child abuse prevention and intervention efforts.

  9. 47 CFR 1.2003 - Applications affected.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Applications affected. 1.2003 Section 1.2003 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Implementation of the Anti-Drug Abuse Act of 1988 § 1.2003 Applications affected. The certification required by § 1.2002 must be filed...

  10. Epidemiological aspects of child abuse and neglect in Sousse, Tunisia: A 10-year retrospective study.

    PubMed

    Braham, Mohamed Yassine; Jedidi, Maher; Hmila, Imene; Masmoudi, Tasnim; Souguir, Mohamed Kamel; Ben Dhiab, Mohamed

    2018-02-01

    The aim of our study was to examine epidemiological aspects of child abuse and neglect in Tunisia. We conducted a retrospective and descriptive study over a period of 10 years (January 2006-December 2015), based on the files handled by the Child Protective Services (CPS) agency in the city of Sousse, Tunisia. During the study period, 3736 referrals were received by the CPS agency of Sousse. Of the total, 2212 (59.2%) were screened in and investigated. Of the investigated cases, 317 (14,3%) were substantiated as abuse or neglect. The reports of maltreatment came mostly from parents (37.8%). Neglect was the major type of maltreatment (51.4%) and an association of 2 types of maltreatment was found in 76 cases (24%). Parents were the perpetrators in 221 cases (69.7%). The average age of the victims was 10 years and boys accounted for 56%. In the 257 cases where the marital status of the parents was noted in the files, the parents were divorced in 62 cases (24.1%) and the child lived with a single mother in 35 cases (13.6%). Alcohol addiction was found in 21 parents (6.6%) and one of the parents was incarcerated in 39 cases (12.3%). As for the socio-economic status, it was evaluated in 188 families and was low in 123 cases (65.4%). In the absence of studies related to this scourge in Tunisia, we hope to raise awareness of the abuse and alert those who come into contact with the child on the importance of detecting and reporting early maltreatment and thus to introduce more appropriate care. A comprehensive prevention strategy needs to be established by addressing risk factors, cultural norms conducive to abuse and unwanted pregnancies. Copyright © 2018 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  11. Criminal investigation of child sexual abuse: a comparison of cases referred to the prosecutor to those not referred.

    PubMed

    Stroud, D D; Martens, S L; Barker, J

    2000-05-01

    The present study sought to identify characteristics of child sexual abuse cases which differentiate cases referred for criminal prosecution ("criminal-action") from those not referred ("dropped") by investigators. The study sample consisted of 1043 children who completed a forensic interview for sexual abuse that allegedly occurred at the hands of an adult between January 1, 1993 and December 31, 1996 in Bernalillo County of New Mexico. Data was systematically obtained from forensic interview files and offender records at the local prosecutor's office. Differences between criminal-action and dropped cases were found in relation to the children (age, sex and ethnicity), the alleged offenders (age, sex and relationship to child), and the case characteristics (disclosure and injury to the child). The present study provided insight into the characteristics of a previously ignored population (reported child sexual abuse cases that are not referred for prosecution). Recommendations are made to address the needs of these children and their families.

  12. 76 FR 54978 - Special Immigrant Juvenile Petitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... proposed rule would require that juvenile court dependency be in effect at the time of filing for SIJ... continued dependency. Aliens granted SIJ classification are eligible immediately to apply for adjustment of... eligibility by requiring that dependency be due to abuse, abandonment, neglect, or a similar basis under State...

  13. 49 CFR Appendix A to Part 355 - Guidelines for the Regulatory Review

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... COMPATIBILITY OF STATE LAWS AND REGULATIONS AFFECTING INTERSTATE MOTOR CARRIER OPERATIONS Pt. 355, App. A... drug and alcohol abuse; require a motor carrier to maintain a driver qualification file for each driver... Vehicles Prohibit possession, use, or driving under the influence of alcohol or other controlled substances...

  14. 49 CFR Appendix A to Part 355 - Guidelines for the Regulatory Review

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... COMPATIBILITY OF STATE LAWS AND REGULATIONS AFFECTING INTERSTATE MOTOR CARRIER OPERATIONS Pt. 355, App. A... drug and alcohol abuse; require a motor carrier to maintain a driver qualification file for each driver... Vehicles Prohibit possession, use, or driving under the influence of alcohol or other controlled substances...

  15. 49 CFR Appendix A to Part 355 - Guidelines for the Regulatory Review

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COMPATIBILITY OF STATE LAWS AND REGULATIONS AFFECTING INTERSTATE MOTOR CARRIER OPERATIONS Pt. 355, App. A... drug and alcohol abuse; require a motor carrier to maintain a driver qualification file for each driver... Vehicles Prohibit possession, use, or driving under the influence of alcohol or other controlled substances...

  16. 49 CFR Appendix A to Part 355 - Guidelines for the Regulatory Review

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMPATIBILITY OF STATE LAWS AND REGULATIONS AFFECTING INTERSTATE MOTOR CARRIER OPERATIONS Pt. 355, App. A... drug and alcohol abuse; require a motor carrier to maintain a driver qualification file for each driver... Vehicles Prohibit possession, use, or driving under the influence of alcohol or other controlled substances...

  17. Opioid abuse and hospitalization rates in patients with schizophrenia.

    PubMed

    Kivimies, Kristiina; Repo-Tiihonen, Eila; Kautiainen, Hannu; Maaranen, Päivi; Muhonen, Leea H; Heikkinen, Martti; Tiihonen, Jari

    2016-01-01

    Substance abuse worsens the course of schizophrenia, but it is not known whether or not there are differences between specific substances concerning their association with the hospitalizations of patients with schizophrenia. The primary aims of this study were to examine the possible associations between amphetamine, cannabis, and opioid abuse, and the risk of hospitalizations among patients with schizophrenia. The study population consisted of 146 patients with ICD-defined schizophrenia from two different geographical sites in Finland, and it included both inpatients and outpatients. Data were collected retrospectively from the patients' medical files. Substance abuse was defined as either harmful use or dependence according to ICD-10. The cumulative prevalence of substance abuse was 10.9% (16/146) for cannabis, 8.9% (13/146) for amphetamine, and 4.1% (6/146) for opioids. Among patients with schizophrenia and abuse of any substance, the number of hospitalizations was about 1.5-fold when compared to those without substance abuse. The incidence rate ratio for hospitalizations was 2.9 (95% CI 2.47-3.63) for opioids, 2.0 (1.71-2.41) for amphetamine, and 1.6 (1.33-1.84) for cannabis, when compared with no abuse of each substance. The risk of hospitalizations was significantly higher for opioids when compared with amphetamine (p < 0.001) or cannabis (p < 0.001). Harmful use or dependence of opioids among patients with schizophrenia is associated with significantly higher risk of hospitalizations than either harmful use or dependence of amphetamine or cannabis.

  18. Dialogic reverberations: police, domestic abuse, and the discontinuance of cases.

    PubMed

    Lea, Susan J; Lynn, Nick

    2012-10-01

    This study investigated the social construction of domestic abuse by police officers, specifically in the context of arguments presented to the prosecutor for a decision on whether to proceed with or discontinue the case. Nineteen police files were examined with a particular focus on the MG3, the "Report to Crown Prosecutors for Charging Decision." Access to such sensitive material is usually denied to researchers; therefore, this study offers unusual insights into the treatment of victims and perpetrators of interpersonal violence by the police. Discourse analysis revealed three dominant speech genres: impartiality, credibility, and the "real" victim. These genres separately and in interaction served to construct domestic abuse cases in ways that did not support the victim's account. The "dialogic reverberations" of these findings are discussed and the implications of the work for research and practice are considered.

  19. Credibility assessment in child sexual abuse investigations: A descriptive analysis.

    PubMed

    Melkman, Eran P; Hershkowitz, Irit; Zur, Ronit

    2017-05-01

    A major challenge in cases of child sexual abuse (CSA) is determining the credibility of children's reports. Consequently cases may be misclassified as false or deemed 'no judgment possible'. Based on a large national sample of reports of CSA made in Israel in 2014, the study examines child and event characteristics contributing to the probability that reports of abuse would be judged credible. National data files of all children aged 3-14, who were referred for investigation following suspected victimization of sexual abuse, and had disclosed sexual abuse, were analyzed. Cases were classified as either 'credible' or 'no judgment possible'. The probability of reaching a 'credible' judgment was examined in relation to characteristics of the child (age, gender, cognitive delay, marital status of the parents,) and of the abusive event (abuse severity, frequency, perpetrator-victim relationship, perpetrator's use of grooming, and perpetrator's use of coercion), controlling for investigator's identity at the cluster level of the analysis. Of 1563 cases analyzed, 57.9% were assessed as credible. The most powerful predictors of a credible judgment were older age and absence of a cognitive delay. Reports of children to married parents, who experienced a single abusive event that involved perpetrator's use of grooming, were also more likely to be judged as credible. Rates of credible judgments found are lower than expected suggesting under-identification of truthful reports of CSA. In particular, those cases of severe and multiple abuse involving younger and cognitively delayed children are the ones with the lowest chances of being assessed as credible. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Child sexual abuse: an Italian perspective.

    PubMed

    Cattaneo, Cristina; Ruspa, Marina; Motta, Tiziano; Gentilomo, Andrea; Scagnelli, Chiara

    2007-06-01

    The problem of child sexual abuse is a growing reality in Italy. The experience of over 200 children seen by the SVS (Soccorso Violenza Sessuale) Centre in Milan (the first Italian large-scale study) may give more information on the European situation. This study is a retrospective study based on information contained in the files of children beneath the age of 14 seen at the SVS Centre between May 1996 and May 2003, who arrived with a suspicion of child sexual abuse. Over 80% of all cases fell within the normal-aspecific category according to Adams' 2001 classification. This first Italian survey, though not based on substantiated cases but only on cases of suspected sexual abuse, supplies a perspective on a large northern European city such as Milan. Data seem similar to those published in other non-European studies, particularly as regards clinical signs observed. Thus, the results of this study, with all their limitations, start to give a perspective on the frequency and type of child population reaching this Italian center, what the scenarios are, what signs the children present and how infrequent it is to find clinical anogenital signs concerning for sexual abuse.

  1. Cannabis use and violent behaviour: a psychiatric patients cohort study in Southern Italy.

    PubMed

    Carabellese, Felice; Candelli, Chiara; Martinelli, Domenico; La Tegola, Donatella; Catanesi, Roberto

    2013-01-01

    An ample volume of research evidence supports the conclusion that drug use/abuse is correlated with violent behavior. Some studies have shown that co-morbidity also appears to be predictive of violent behavior. The research evidence indicates gender differences, while socio-economic and familial factors play a role, too. We conducted a retrospective study of the clinical files of four public psychiatric outpatient facilities during five years. The objectives of the research were to identify and analyze relationships between: a) cannabis use/abuse and violent behavior and b) cannabis use/abuse, psychopathology, and violent behavior. The study sample consisted of 1,582 subjects. The data, gathered in a dedicated database, were processed by applying univariate and multivariate analysis models. Subjects who used/abused cannabis showed a high prevalence of violent behavior, Regardless of the type of psychiatric disorder, the use of cannabis appears to be an evident risk factor. Significant correlations also emerged between cannabis use/abuse and the type of violent behavior, especially self-inflicted injury. Evidence also emerged that other factors are implicated. This is consistent with the current literature proposing multi-casual explanations of violent behavior.

  2. Child Abuse and Neglect in Cambodian Refugee Families: Characteristics and Implications for Practice

    ERIC Educational Resources Information Center

    Chang, Janet; Rhee, Siyon; Berthold, S. Megan

    2008-01-01

    This study examines the characteristics and patterns of child maltreatment among Cambodian refugee families in Los Angeles and assesses the implications for child welfare practice with Cambodian refugee families. Data were extracted from 243 active Cambodian case files maintained by the Los Angeles County Department of Children and Family Services…

  3. 49 CFR 1152.50 - Exempt abandonments and discontinuances of service and trackage rights.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...; and (2) That these transactions are of limited scope and continued regulation is unnecessary to protect shippers from abuse of market power. 49 U.S.C. 10502. A notice must be filed to use this class... and trackage rights. 1152.50 Section 1152.50 Transportation Other Regulations Relating to...

  4. 49 CFR 1152.50 - Exempt abandonments and discontinuances of service and trackage rights.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; and (2) That these transactions are of limited scope and continued regulation is unnecessary to protect shippers from abuse of market power. 49 U.S.C. 10502. A notice must be filed to use this class... and trackage rights. 1152.50 Section 1152.50 Transportation Other Regulations Relating to...

  5. 49 CFR 1152.50 - Exempt abandonments and discontinuances of service and trackage rights.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; and (2) That these transactions are of limited scope and continued regulation is unnecessary to protect shippers from abuse of market power. 49 U.S.C. 10502. A notice must be filed to use this class... and trackage rights. 1152.50 Section 1152.50 Transportation Other Regulations Relating to...

  6. 49 CFR 1152.50 - Exempt abandonments and discontinuances of service and trackage rights.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; and (2) That these transactions are of limited scope and continued regulation is unnecessary to protect shippers from abuse of market power. 49 U.S.C. 10502. A notice must be filed to use this class... and trackage rights. 1152.50 Section 1152.50 Transportation Other Regulations Relating to...

  7. 49 CFR 1152.50 - Exempt abandonments and discontinuances of service and trackage rights.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; and (2) That these transactions are of limited scope and continued regulation is unnecessary to protect shippers from abuse of market power. 49 U.S.C. 10502. A notice must be filed to use this class... and trackage rights. 1152.50 Section 1152.50 Transportation Other Regulations Relating to...

  8. 8 CFR 204.2 - Petitions for relatives, widows and widowers, and abused spouses and children.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-petition is filed. Employment records, utility receipts, school records, hospital or medical records, birth... common residence; (3) Documentation showing commingling of financial resources; (4) Birth certificate(s... must contain the full name and address, date and place of birth of the person making the affidavit; his...

  9. 8 CFR 204.2 - Petitions for relatives, widows and widowers, and abused spouses and children.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...-petition is filed. Employment records, utility receipts, school records, hospital or medical records, birth... common residence; (3) Documentation showing commingling of financial resources; (4) Birth certificate(s... must contain the full name and address, date and place of birth of the person making the affidavit; his...

  10. 8 CFR 204.2 - Petitions for relatives, widows and widowers, and abused spouses and children.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...-petition is filed. Employment records, utility receipts, school records, hospital or medical records, birth... common residence; (3) Documentation showing commingling of financial resources; (4) Birth certificate(s... must contain the full name and address, date and place of birth of the person making the affidavit; his...

  11. 8 CFR 1216.5 - Waiver of requirement to file joint petition to remove conditions by alien spouse.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... violence, including any forceful detention, which results or threatens to result in physical or mental injury. Psychological or sexual abuse or exploitation, including rape, molestation, incest (if the victim is a minor) or forced prostitution shall be considered acts of violence. (ii) A conditional resident...

  12. 8 CFR 216.5 - Waiver of requirement to file joint petition to remove conditions by alien spouse.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... act or threatened act of violence, including any forceful detention, which results or threatens to result in physical or mental injury. Psychological or sexual abuse or exploitation, including rape, molestation, incest (if the victim is a minor) or forced prostitution shall be considered acts of violence...

  13. 8 CFR 1216.5 - Waiver of requirement to file joint petition to remove conditions by alien spouse.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... violence, including any forceful detention, which results or threatens to result in physical or mental injury. Psychological or sexual abuse or exploitation, including rape, molestation, incest (if the victim is a minor) or forced prostitution shall be considered acts of violence. (ii) A conditional resident...

  14. 8 CFR 216.5 - Waiver of requirement to file joint petition to remove conditions by alien spouse.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... act or threatened act of violence, including any forceful detention, which results or threatens to result in physical or mental injury. Psychological or sexual abuse or exploitation, including rape, molestation, incest (if the victim is a minor) or forced prostitution shall be considered acts of violence...

  15. Experiences of immigrant women who self-petition under the Violence Against Women Act.

    PubMed

    Ingram, Maia; McClelland, Deborah Jean; Martin, Jessica; Caballero, Montserrat F; Mayorga, Maria Theresa; Gillespie, Katie

    2010-08-01

    Undocumented immigrant women who are abused and living in the United States are isolated in a foreign country, in constant fear of deportation, and feel at the mercy of their spouse to gain legal status. To ensure that immigration law does not trap women in abusive relationships, the Violence Against Women Act (VAWA, 1994) enabled immigrant women to self-petition for legal status. Qualitative research methods were used in this participatory action research to investigate the experiences of Mexican immigrant women filing VAWA self-petitions. Emotional, financial, and logistic barriers in applying are identified, and recommendations for practice research and policy are provided.

  16. Comparing Male and Female Juveniles Charged with Homicide: Child Maltreatment, Substance Abuse, and Crime Details

    ERIC Educational Resources Information Center

    Roe-Sepowitz, Dominique Eve

    2009-01-01

    This study examines a sample of 136 male and female juveniles charged with attempted homicide or homicide. The purpose of this study is to explore the differences between nondirect file male and female juvenile homicide offenders regarding individual, family, and crime circumstances. Findings suggest that compared to male juvenile offenders,…

  17. Analysis of the United States Defense and Civilian Contracting Workforce’s Training on Procurement Fraud, Waste and Abuse

    DTIC Science & Technology

    2013-09-01

    Federal Acquisition Institute. (2013a). FAC-C certification requirements. Retrieved from http://www.fai.gov/ drupal /certification/fac-c-certification...www.fai.gov/ drupal /sites/default/files/pdfs/FY%202011%20Annual%20Re port%20on%20the%20Federal%20Acquisition%20Workforce.pdf. Federal Acquisition

  18. Law & psychiatry: whistle-blowers and the first amendment: protecting public employees in psychiatric facilities.

    PubMed

    Appelbaum, Paul S

    2007-07-01

    This column describes a case in which a psychiatrist employed at a state psychiatric hospital wrote a series of memos to the hospital board, state officials, and a newspaper describing poor-quality care at the hospital. When his contract was not renewed soon thereafter, he filed suit against the state and two state officials alleging violation of his First Amendment rights of free speech. At a trial in 2004 a jury found that the director of the state's Division of Alcoholism, Drug Abuse, and Mental Health had retaliated against the psychiatrist by declining to renew his contract, thus violating his First Amendment rights. Implications of the case for staff in public mental health systems are discussed.

  19. TFA Systems: A Unique Group Treatment of Spouse Abusers.

    ERIC Educational Resources Information Center

    Clow, Daniel R.; And Others

    1992-01-01

    Presents a group treatment model using Thought-Feeling-Action (TFA) Systems, an offense- and offender-specific group treatment for abusers. Describes use of TFA Systems in group of court-referred male spouse-abusers. Reviews evolution of TFA Systems, then focuses on TFA Systems treatment of spouse abusers. Notes that system can be adapted to other…

  20. Parents of Minors Who Have Sexually Abused: Legal Liability and Clinical Interventions

    ERIC Educational Resources Information Center

    Oz, Sheri

    2013-01-01

    While children and adolescents generally do not have the right to vote, marry, or sign contracts independently, they are often held responsible for their crimes. In spite of this, some parents of minor victims file civil suits against parents of the youth responsible for the harm. The courts must then decide to what extent, if any, parents are…

  1. Sexual Offences in Police Reports and Court Dossiers: A Case-File Study

    ERIC Educational Resources Information Center

    van den Bergh, Peter M.; Hoekman, Joop

    2006-01-01

    Background: In many cases, sexual abuse involving a person with an intellectual disability (ID; as a victim and/or as a perpetrator) is not reported to the police. There are very few studies addressing police procedures in these cases, and even fewer addressing procedures at the Public Prosecutor level. The present study had two goals: (i) to…

  2. The impact of sexual abuse in the lives of young women involved or at risk of involvement with the juvenile justice system.

    PubMed

    Goodkind, Sara; Ng, Irene; Sarri, Rosemary C

    2006-05-01

    Girls in the juvenile justice system have high rates of past sexual abuse. To better understand the relationship between sexual abuse and justice system involvement, we analyzed survey interviews with 169 young women involved or at risk of involvement with juvenile justice, comparing girls who experienced sexual abuse with those who did not. Girls experiencing sexual abuse had more negative mental health, school, substance use, risky sexual behavior, and delinquency outcomes. These findings highlight a need for interventions to assist girls who have experienced abuse and efforts to prevent abuse and improve child welfare and social service systems.

  3. Reducing Homeland Insecurities: Ending Abuse of the Asylum and Credible Fear Program

    DTIC Science & Technology

    2015-03-01

    Operations FDNS Fraud Detection and National Security FEMA Federal Emergency Management Agency FY Fiscal Year GAO Government Accounting...file applications. A 2002 Government Accounting Office (GAO) study on benefit fraud found that fraud was pervasive and routinely used in furtherance... Government Accountability Office, 2002), http://www.gao.gov/assets/240/233515.pdf. 7 Mark Motivans, Immigration Offenders in the Federal Justice

  4. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... system of records titled, ``DHS/USCG-020 Substance Abuse Prevention and Treatment Program System of.../United States Coast Guard--020 Substance Abuse Prevention and Treatment Program System of Records. In... Substance Abuse Prevention and Treatment program, including to identify alcohol and drug abusers within the...

  5. The mental health needs of incarcerated youth in British Columbia, Canada.

    PubMed

    Gretton, Heather M; Clift, Robert J W

    2011-01-01

    The purpose of the study was to identify the current prevalence of mental disorders and mental health needs among incarcerated male and female youths in Canada, and to present these data in the context of rates found in other jurisdictions. One hundred forty male and 65 female incarcerated young offenders in British Columbia were screened with the Massachusetts Youth Screening Instrument Version 2 (MAYSI-2); provisional psychiatric diagnoses were assessed with the Diagnostic Interview Schedule for Children Version IV (DISC-IV); abuse history and aggressive symptoms of Conduct Disorder (CD) were coded from file information. Nearly all youths (91.9% of males and 100% of females) met the criteria for at least one mental disorder. Substance abuse and dependence disorders were highly prevalent (85.5% of males and 100% of females). Aggressive forms of CD were common (72.9% of males and 84.3% of females), as were exposure to physical abuse (60.8% of males and 54.3% of females) and sexual abuse (21.2% of males and 42.4% of females). Female youths had significantly higher odds of presenting with: (1) substance abuse/dependence disorders; (2) current suicide ideation; (3) sexual abuse; (4) PTSD; (5) symptoms of depression and anxiety; (6) Oppositional Defiant Disorder; and (7) multiple mental disorder diagnoses. Male youths had significantly higher odds of presenting with aggressive symptoms of CD. Overall, rates of mental disorder among this sample of serious and violent young offenders were higher than rates previously reported for incarcerated youths - both in Canada and in other jurisdictions. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  6. Trauma, Delinquency, and Substance Use: Co-occurring Problems for Adolescent Girls in the Juvenile Justice System.

    PubMed

    Smith, Dana K; Saldana, Lisa

    2013-07-02

    Girls in the juvenile justice system are known to have high rates of co-occurring childhood abuse, trauma, and substance abuse. Girls with this constellation of problems are at high risk for serious adverse outcomes, including problems with drug dependence and abuse. The relationship between childhood sexual abuse, childhood physical abuse, other types of childhood trauma, and rates of substance use during adolescence were examined for girls in the juvenile justice system. As expected, childhood sexual abuse was significantly related to girls' substance use during adolescence. In contrast to prior research, no link was found between physical abuse, lifetime trauma, and substance use. Limitations and future directions are discussed.

  7. 21 CFR 864.3260 - OTC test sample collection systems for drugs of abuse testing.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... abuse testing. 864.3260 Section 864.3260 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF... Instrumentation and Accessories § 864.3260 OTC test sample collection systems for drugs of abuse testing. (a) Identification. An over-the-counter (OTC) test sample collection system for drugs of abuse testing is a device...

  8. 21 CFR 864.3260 - OTC test sample collection systems for drugs of abuse testing.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... abuse testing. 864.3260 Section 864.3260 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF... Instrumentation and Accessories § 864.3260 OTC test sample collection systems for drugs of abuse testing. (a) Identification. An over-the-counter (OTC) test sample collection system for drugs of abuse testing is a device...

  9. 21 CFR 864.3260 - OTC test sample collection systems for drugs of abuse testing.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... abuse testing. 864.3260 Section 864.3260 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF... Instrumentation and Accessories § 864.3260 OTC test sample collection systems for drugs of abuse testing. (a) Identification. An over-the-counter (OTC) test sample collection system for drugs of abuse testing is a device...

  10. 21 CFR 864.3260 - OTC test sample collection systems for drugs of abuse testing.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... abuse testing. 864.3260 Section 864.3260 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF... Instrumentation and Accessories § 864.3260 OTC test sample collection systems for drugs of abuse testing. (a) Identification. An over-the-counter (OTC) test sample collection system for drugs of abuse testing is a device...

  11. The Other Side of Child Neglect Charges: What Happens when There Are No Standard Criteria for Charging a Non-Offending Mother with Neglect?

    ERIC Educational Resources Information Center

    Neustein, Amy; Lesher, Michael

    2006-01-01

    Coohey's (2006) valuable research demonstrates that Child Protective Service (CPS) investigators use generally consistent criteria in determining when to charge a non-offending mother for failing to protect a child from sexual abuse. She concludes that the most reliable predictor that a formal charge of child neglect will be filed against a mother…

  12. [Parricide, abuse and emotional processes: a review starting from some paradigmatic cases].

    PubMed

    Grattagliano, I; Greco, R; Di Vella, G; Campobasso, C P; Corbi, G; Romanelli, M C; Petruzzelli, N; Ostuni, A; Brunetti, V; Cassibba, R

    2015-01-01

    The authors of this study tackle the complex subject of parricide, which is a rare and often brutal form of homicide. Parricide has a high emotional impact on public opinion and on our collective imagination, especially in light of the fact that the perpetrators are often minors.. Three striking cases of parricide, taken from various documented sources and judicial files from the "N. Fornelli" Juvenile Penal Institute (Bari, Italy), are presented here. A review of the literature on the topic has revealed differences between parricides committed by adults and those committed by minors. In the end, the complex issues underlying such an unusual crime are connected to abuses and maltreatment that minor perpetrators of parricide have suffered, especially the emotional processes that are activated.

  13. Missed cases of multiple forms of child abuse and neglect.

    PubMed

    Koc, Feyza; Oral, Resmiye; Butteris, Regina

    2014-01-01

    Child abuse and neglect is a public health problem and usually associated with family dysfunction due to multiple psychosocial, individual, and environmental factors. The diagnosis of child abuse may be difficult and require a high index of suspicion on the part of the practitioners encountering the child and the family. System-related factors may also enable abuse or prevent the early recognition of abuse. Child abuse and neglect that goes undiagnosed may give rise to chronic abuse and increased morbidity-mortality. In this report, we present two siblings who missed early diagnosis and we emphasize the importance of systems issues to allow early recognition of child abuse and neglect.

  14. Characterization of Adolescent Prescription Drug Abuse and Misuse Using the Researched Abuse Diversion and Addiction-Related Surveillance (RADARS[R]) System

    ERIC Educational Resources Information Center

    Zosel, Amy; Bartelson, Becki Bucher; Bailey, Elise; Lowenstein, Steven; Dart, Rick

    2013-01-01

    Objective: To describe the characteristics and health effects of adolescent (age 13-19 years) prescription drug abuse and misuse using the Researched Abuse Diversion and Addiction-Related Surveillance (RADARS[R])) System. Method: Secondary analysis of data collected from RADARS System participating poison centers was performed. Data for all…

  15. What is the system of care for abused and neglected children in children's institutions?

    PubMed

    Tien, Irene; Bauchner, Howard; Reece, Robert M

    2002-12-01

    The objectives of this study were to describe the number of children with suspected abuse or neglect (CAN) cared for in selected children's hospitals, to determine how they are tracked and followed, and to better describe the composition, function, and financial support of child protection teams (CPTs). A self-administered survey was mailed to child abuse contact leaders at institutions that were members of the National Association of Children's Hospitals and Related Institutions in 2001. Responses from rehabilitation hospitals and those that did not indicate whether a CPT was present were excluded. One hundred thirty-four of 157 leaders responded. One hundred twenty-two (91%) met study criteria. Eighty-eight hospitals (72%) had a CPT-54% were pediatric facilities, 59% had >100 beds, and 89% had a pediatric residency. Compared with institutions without a CPT, institutions with a CPT were less likely to be located in the South (28% vs 70%) and more likely to have >200 beds (26% vs 1%), a medical school affiliation (92% vs 74%), and a pediatric residency (98% vs 68%). Sixty-one percent of institutions cared for <300 suspected CAN cases, and 66% had 5 or fewer CAN-associated deaths the previous year. Institutions with a CPT used more comprehensive documentation for CAN, including special CAN forms (55% vs 21%) and photographs (77% vs 53%). They also more commonly referred CAN cases to law enforcement (58% vs 35%) or a CAN clinic for follow-up (52% vs 26%). Fifty-two percent of CPTs had an annual budget of $500 000 or less. The most common primary source of financial support for CPTs was the hospital (51%), although funding was usually composed of a combination of funds from the hospital, patient fees, and state government. Functions performed by CPTs included consulting on cases of CAN (89%), functioning as a liaison with child protective services (85%), tracking cases of abuse or neglect (70%), providing quality assurance on CAN cases (63%), and filing reports with child protective services (61%). Twenty-four hour consultative coverage was provided by most CPTs (79%), for which 94% provided phone consultation and 81% provided in-person consultation when necessary. The institutions surveyed cared for many children suspected of abuse and neglect. Thirty-eight percent did >300 evaluations per year. In general, institutions with CPTs provided more comprehensive documentation and follow-up of children suspected of having been abused or neglected than institutions without CPTs. Whether this is associated with better outcomes for children suspected of abuse or neglect is unknown.

  16. A Criminological Perspective on the Prenatal Abuse of Substances during Pregnancy and the Link to Child Abuse in South Africa

    ERIC Educational Resources Information Center

    Ovens, Michelle

    2009-01-01

    The increase in drug abuse in South Africa has had major social implications in the country. Problems associated with drug dependency are poverty, unemployment, a heavier burden on the health care system, the disintegration of family systems and drug-related crimes. Another area of concern is the link between drug abuse and child abuse. While…

  17. [Sexual child abuse: correlation between medical certificates' conclusions and judiciary sanctions].

    PubMed

    Soumah, M M; Bah, H; Mbaye, I; Fall, M C; Yetognon, C; Sow, M L

    2005-01-01

    Sexual child abuse, comprises of indecency attitudes and physical misbehaviours, directed towards children are dominated by rape. The objective of our study was to assess in sexual child abuse the relation between the conclusion of medical certificates and court decision. It is a retrospective study carried out from 1994 to 1998 on the clerk's office correctional repertories in Dakar regional court. An overall number of 79 cases of child abuse were collected in 5 years period. Children under 18 years old of of both sex, were concerned. Data found were correlated with a review of requisition cases received by the of gynaecology and obstetrics clinic of Aristide Dantec Hospital. This facilitates the establishement of the relationship between the offences and the pronounced sanctions, as well as the initial medical certificate and these sanctions. The sanctions were severe whenever rape had been retained. Some cases were disqualified in indecent assault and were judged as such. The judge decision, which follow the medical certificate conclusions in 11 cases out of 14 shows the importance and reliability of this medical document. All files reviewed at the medical and legal level were incomplete. The difficulty of the materiality of the rape and the psychological consequences in the long run and especially HIV infection should invite to a multidisciplinary, specialized and organized management of sexual child abuse. This study has shown the importance of a correct and complete drafting of the medical certificate, to enable the establishment by the judge the materiality of the facts.

  18. 77 FR 42741 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ... OMB Review; Comment Request Title: National Child Abuse and Neglect Data System. OMB No. 0980-0229... abuse and neglect statistics through the National Child Abuse and Neglect Data System (NCANDS). NCANDS was established in response to the 1988 amendment (Pub. L. 100-294) to the Child Abuse Prevention and...

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doughty, Daniel Harvey; Crafts, Chris C.

    This manual defines a complete body of abuse tests intended to simulate actual use and abuse conditions that may be beyond the normal safe operating limits experienced by electrical energy storage systems used in electric and hybrid electric vehicles. The tests are designed to provide a common framework for abuse testing various electrical energy storage systems used in both electric and hybrid electric vehicle applications. The manual incorporates improvements and refinements to test descriptions presented in the Society of Automotive Engineers Recommended Practice SAE J2464 ''Electric Vehicle Battery Abuse Testing'' including adaptations to abuse tests to address hybrid electric vehiclemore » applications and other energy storage technologies (i.e., capacitors). These (possibly destructive) tests may be used as needed to determine the response of a given electrical energy storage system design under specifically defined abuse conditions. This manual does not provide acceptance criteria as a result of the testing, but rather provides results that are accurate and fair and, consequently, comparable to results from abuse tests on other similar systems. The tests described are intended for abuse testing any electrical energy storage system designed for use in electric or hybrid electric vehicle applications whether it is composed of batteries, capacitors, or a combination of the two.« less

  20. Where elder abuse and the justice system collide: police power, parens patriae, and 12 recommendations.

    PubMed

    Connolly, Marie-Therese

    2010-01-01

    This article discusses the intersection of the justice system and elder abuse, arguing for a multidisciplinary framework for approaching the problem. It concludes with 12 recommendations for enhancing the justice system's response to elder abuse.

  1. DMFS: A Data Migration File System for NetBSD

    NASA Technical Reports Server (NTRS)

    Studenmund, William

    1999-01-01

    I have recently developed dmfs, a Data Migration File System, for NetBSD. This file system is based on the overlay file system, which is discussed in a separate paper, and provides kernel support for the data migration system being developed by my research group here at NASA/Ames. The file system utilizes an underlying file store to provide the file backing, and coordinates user and system access to the files. It stores its internal meta data in a flat file, which resides on a separate file system. Our data migration system provides archiving and file migration services. System utilities scan the dmfs file system for recently modified files, and archive them to two separate tape stores. Once a file has been doubly archived, files larger than a specified size will be truncated to that size, potentially freeing up large amounts of the underlying file store. Some sites will choose to retain none of the file (deleting its contents entirely from the file system) while others may choose to retain a portion, for instance a preamble describing the remainder of the file. The dmfs layer coordinates access to the file, retaining user-perceived access and modification times, file size, and restricting access to partially migrated files to the portion actually resident. When a user process attempts to read from the non-resident portion of a file, it is blocked and the dmfs layer sends a request to a system daemon to restore the file. As more of the file becomes resident, the user process is permitted to begin accessing the now-resident portions of the file. For simplicity, our data migration system divides a file into two portions, a resident portion followed by an optional non-resident portion. Also, a file is in one of three states: fully resident, fully resident and archived, and (partially) non-resident and archived. For a file which is only partially resident, any attempt to write or truncate the file, or to read a non-resident portion, will trigger a file restoration. Truncations and writes are blocked until the file is fully restored so that a restoration which only partially succeed does not leave the file in an indeterminate state with portions existing only on tape and other portions only in the disk file system. We chose layered file system technology as it permits us to focus on the data migration functionality, and permits end system administrators to choose the underlying file store technology. We chose the overlay layered file system instead of the null layer for two reasons: first to permit our layer to better preserve meta data integrity and second to prevent even root processes from accessing migrated files. This is achieved as the underlying file store becomes inaccessible once the dmfs layer is mounted. We are quite pleased with how the layered file system has turned out. Of the 45 vnode operations in NetBSD, 20 (forty-four percent) required no intervention by our file layer - they are passed directly to the underlying file store. Of the twenty five we do intercept, nine (such as vop_create()) are intercepted only to ensure meta data integrity. Most of the functionality was concentrated in five operations: vop_read, vop_write, vop_getattr, vop_setattr, and vop_fcntl. The first four are the core operations for controlling access to migrated files and preserving the user experience. vop_fcntl, a call generated for a certain class of fcntl codes, provides the command channel used by privileged user programs to communicate with the dmfs layer.

  2. Different labour outcomes in primiparous women that have been subjected to childhood sexual abuse or rape in adulthood: a case–control study in a clinical cohort

    PubMed Central

    Nerum, H; Halvorsen, L; Straume, B; Sørlie, T; Øian, P

    2013-01-01

    Objective To compare the duration and outcome of the first labour in women who have been subjected to childhood sexual abuse (CSA) and women who have been raped in adulthood (RA). Design Case–control study in a clinical cohort. Setting University Hospital of North Norway. Sample In all, 373 primiparas: 185 subjected to CSA, 47 to RA and 141 controls without a history of abuse. Methods Data on birth outcomes were retrieved from the patient files. Information on sexual abuse was reported in consultation with specialised midwives in the mental health team. Birth outcomes were analysed by multinominal regression analysis. Main outcome measures Vaginal births, delivery by caesarean section, operative vaginal delivery and duration of labour. Results As compared with controls, the RA group showed a significantly higher risk for caesarean section (adjusted OR 9.9, 95% CI 3.4–29.4) and operative vaginal delivery (adjusted OR 12.2, 95% CI 4.4–33.7). There were no significant differences between the CSA and the control group. The RA group displayed significantly longer duration of labour in all phases as compared with the control and CSA groups. Conclusions There were major differences in the duration of labour and birth outcomes in the two abuse groups. Despite a higher proportion of obstetric risk factors at onset of labour in the CSA group, women subjected to CSA had shorter labours and less risk for caesarean section and operative vaginal deliveries than women subjected to RA. The best care for birthing women subjected to sexual abuse needs to be explored in further studies. PMID:23157417

  3. Accessing files in an Internet: The Jade file system

    NASA Technical Reports Server (NTRS)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  4. Accessing files in an internet - The Jade file system

    NASA Technical Reports Server (NTRS)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  5. Therapy for Childhood Sexual Abuse Survivors using Attachment and Family Systems Theory Orientations.

    PubMed

    Karakurt, Gunnur; Silver, Kristin E

    2014-01-01

    The aim of this paper is to understand the effects of childhood sexual abuse on a survivor's later life. For understanding and treating the emotional distress and interpersonal problems resulting from childhood sexual abuse, attachment theory provides a valuable framework. When this framework is combined with family systems theory, it can help therapists understand the family context where sexual abuse occurs and how this affects health and functioning throughout the lifespan. Case examples of female adult sexual abuse survivors are also explored, with insight from the intersection of systems and attachment theories.

  6. Conflicts between motivational systems related to attachment trauma: Key to understanding the intra-family relationship between abused children and their abusers.

    PubMed

    Liotti, Giovanni

    2017-01-01

    Research on disorganization of infant attachment provides evidence that it can be caused not only by violent aggression or very early sexual abuse, but also by covert maltreating behavior, which includes the abdication of the caregiver's responsibility to soothe the infant's distress. This paper argues that both overtly abusive caregivers and merely "abdicating" caregivers may cause disorganization of infant attachment through a simultaneous and conflicting activation of the motivational systems governing attachment and survival defense in the infant. Other inborn motivational systems-regulating caretaking, competitiveness, and sexuality-are disorderly activated, during personality development, within the intra-family relationships of children whose infant attachment has been disorganized. The paper argues that conflicts and abnormal tensions between different motivational systems explain some paradoxical features of the interactions between abusers and abused, and allow for a better understanding of the interpersonal processes involved in the surfacing and exacerbation of dissociative symptoms in the abused.

  7. The Jade File System. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Rao, Herman Chung-Hwa

    1991-01-01

    File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.

  8. Preventing Alcohol Abuse in the Greek System on a Commuter Campus: Prevention Contracts.

    ERIC Educational Resources Information Center

    Hunnicutt, David M.; And Others

    1991-01-01

    Provides an overview of alcohol use and abuse on the college campus. Discusses theory behind alcohol abuse prevention contracts. Presents an example of how to use contracts to address alcohol abuse in a commuter university Greek system. Concludes solving the problems associated with college students' drinking is now more critical than ever.…

  9. Please Move Inactive Files Off the /projects File System | High-Performance

    Science.gov Websites

    Computing | NREL Please Move Inactive Files Off the /projects File System Please Move Inactive Files Off the /projects File System January 11, 2018 The /projects file system is a shared resource . This year this has created a space crunch - the file system is now about 90% full and we need your help

  10. Gender and role-based perceptions of domestic abuse: does sexual orientation matter?

    PubMed

    Seelau, Eric P; Seelau, Sheila M; Poorman, Paula B

    2003-01-01

    Although it is estimated that domestic abuse is as common in gay male and lesbian intimate relationships as in heterosexual relationships, the legal system often fails to recognize or respond to same-gender cases. Empirical research examining the impact of sexual orientation on perceptions of abuse is virtually nonexistent. Undergraduates (N = 252) read a summary of a domestic abuse incident in which victims and perpetrators varied by gender and, by implication, sexual orientation. Victim and respondent gender, rather than the couple's sexual orientation, primarily affected responses to domestic abuse. Domestic abuse perpetrated against women was perceived to be more serious and in need of intervention than abuse against men. Women were more likely than men to believe the victim and to recommend criminal justice system interventions. Because they are inconsistent with gender role stereotypes, domestic abuse cases involving male victims or female perpetrators may not receive equitable treatment within the criminal justice system. Copyright 2003 John Wiley & Sons, Ltd.

  11. Benefits and costs of substance abuse treatment programs for state prison inmates: results from a lifetime simulation model.

    PubMed

    Zarkin, Gary A; Cowell, Alexander J; Hicks, Katherine A; Mills, Michael J; Belenko, Steven; Dunlap, Laura J; Houser, Kimberly A; Keyes, Vince

    2012-06-01

    Reflecting drug use patterns and criminal justice policies throughout the 1990s and 2000s, prisons hold a disproportionate number of society's drug abusers. Approximately 50% of state prisoners meet the criteria for a diagnosis of drug abuse or dependence, but only 10% receive medically based drug treatment. Because of the link between substance abuse and crime, treating substance abusing and dependent state prisoners while incarcerated has the potential to yield substantial economic benefits. In this paper, we simulate the lifetime costs and benefits of improving prison-based substance abuse treatment and post-release aftercare for a cohort of state prisoners. Our model captures the dynamics of substance abuse as a chronic disease; estimates the benefits of substance abuse treatment over individuals' lifetimes; and tracks the costs of crime and criminal justice costs related to policing, adjudication, and incarceration. We estimate net societal benefits and cost savings to the criminal justice system of the current treatment system and five policy scenarios. We find that four of the five policy scenarios provide positive net societal benefits and cost savings to the criminal justice system relative to the current treatment system. Our study demonstrates the societal gains to improving the drug treatment system for state prisoners. Copyright © 2011 John Wiley & Sons, Ltd.

  12. BENEFITS AND COSTS OF SUBSTANCE ABUSE TREATMENT PROGRAMS FOR STATE PRISON INMATES: RESULTS FROM A LIFETIME SIMULATION MODEL

    PubMed Central

    ZARKIN, GARY A.; COWELL, ALEXANDER J.; HICKS, KATHERINE A.; MILLS, MICHAEL J.; BELENKO, STEVEN; DUNLAP, LAURA J.; HOUSER, KIMBERLY A.; KEYES, VINCE

    2011-01-01

    SUMMARY Reflecting drug use patterns and criminal justice policies throughout the 1990s and 2000s, prisons hold a disproportionate number of society’s drug abusers. Approximately 50% of state prisoners meet the criteria for a diagnosis of drug abuse or dependence, but only 10% receive medically based drug treatment. Because of the link between substance abuse and crime, treating substance abusing and dependent state prisoners while incarcerated has the potential to yield substantial economic benefits. In this paper, we simulate the lifetime costs and benefits of improving prison-based substance abuse treatment and post-release aftercare for a cohort of state prisoners. Our model captures the dynamics of substance abuse as a chronic disease; estimates the benefits of substance abuse treatment over individuals’ lifetimes; and tracks the costs of crime and criminal justice costs related to policing, adjudication, and incarceration. We estimate net societal benefits and cost savings to the criminal justice system of the current treatment system and five policy scenarios. We find that four of the five policy scenarios provide positive net societal benefits and cost savings to the criminal justice system relative to the current treatment system. Our study demonstrates the societal gains to improving the drug treatment system for state prisoners. PMID:21506193

  13. Innovative Surveillance and Risk Reduction Systems for Family Maltreatment, Suicidality, and Substance Problems in USAF

    DTIC Science & Technology

    2005-03-01

    prevention, spouse 13 abuse, child abuse , suicide, alcohol, drug abuse 16. PRICE CODE 17. SECURITY CLASSIFICA TION 18. SECURITY CLASSIFICA TION 19...cohesion 9 Triple P Command) • Spouse emotional 0 Depressive 9 Common Sense Parenting abuse symptomatology * Child abuse & neglect e Relationship...and secretive problems Partner Physical Prescr. Illicit Child Abuse Abuse Partner Emo. Abuse Alcohol Drug Drug Suicid- c3-to- Problems Misuse Use ality

  14. Forensic, Cultural, and Systems Issues in Child Sexual Abuse Cases--Part 2: Research and Practitioner Issues

    ERIC Educational Resources Information Center

    Tishelman, Amy C.; Geffner, Robert

    2010-01-01

    This article introduces the second issue of the special double issue focusing on forensic, cultural, and systems issues in child sexual abuse cases. We briefly review the articles, which include a discussion of child sexual abuse myths, an empirical analysis of extended child sexual abuse evaluations, an article on the role of the medical provider…

  15. Substance-Abusing Parents in the Criminal Justice System: Does Substance Abuse Treatment Improve Their Children's Outcomes?

    ERIC Educational Resources Information Center

    Phillips, Susan D.; Gleeson, James P.; Waites-Garrett, Melissa

    2009-01-01

    The expansion of the criminal justice system over the last several decades helped to focus attention on children of incarcerated parents, many of whom have parents with substance abuse problems. Since the 1990's, a national grassroots campaign has been underway to make substance abuse treatment an alternative to incarceration for parents who…

  16. Preventing Elder Abuse: The Texas Plan for a Coordinated Service Delivery System. Collaborative Elder Abuse Prevention Project.

    ERIC Educational Resources Information Center

    McDaniel, Garry L.

    The Texas Department of Human Services, in collaboration with 13 other public and private organizations, co-sponsored a statewide Collaborative Elder Abuse Prevention project. The goal of this project is to develop a comprehensive, long-range plan for the prevention of elder abuse, a method for achieving a coordinated service delivery system for…

  17. Highway Safety Information System guidebook for the Minnesota state data files. Volume 1 : SAS file formats

    DOT National Transportation Integrated Search

    2001-02-01

    The Minnesota data system includes the following basic files: Accident data (Accident File, Vehicle File, Occupant File); Roadlog File; Reference Post File; Traffic File; Intersection File; Bridge (Structures) File; and RR Grade Crossing File. For ea...

  18. SNL Abuse Testing Manual.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orendorff, Christopher; Lamb, Joshua; Steele, Leigh Anna Marie

    This report describes recommended abuse testing procedures for rechargeable energy storage systems (RESSs) for electric vehicles. This report serves as a revision to the FreedomCAR Electrical Energy Storage System Abuse Test Manual for Electric and Hybrid Electric Vehicle Applications (SAND2005-3123).

  19. Long-Term file activity patterns in a UNIX workstation environment

    NASA Technical Reports Server (NTRS)

    Gibson, Timothy J.; Miller, Ethan L.

    1998-01-01

    As mass storage technology becomes more affordable for sites smaller than supercomputer centers, understanding their file access patterns becomes crucial for developing systems to store rarely used data on tertiary storage devices such as tapes and optical disks. This paper presents a new way to collect and analyze file system statistics for UNIX-based file systems. The collection system runs in user-space and requires no modification of the operating system kernel. The statistics package provides details about file system operations at the file level: creations, deletions, modifications, etc. The paper analyzes four months of file system activity on a university file system. The results confirm previously published results gathered from supercomputer file systems, but differ in several important areas. Files in this study were considerably smaller than those at supercomputer centers, and they were accessed less frequently. Additionally, the long-term creation rate on workstation file systems is sufficiently low so that all data more than a day old could be cheaply saved on a mass storage device, allowing the integration of time travel into every file system.

  20. 21 CFR 864.3260 - OTC test sample collection systems for drugs of abuse testing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false OTC test sample collection systems for drugs of... Instrumentation and Accessories § 864.3260 OTC test sample collection systems for drugs of abuse testing. (a) Identification. An over-the-counter (OTC) test sample collection system for drugs of abuse testing is a device...

  1. The national drug abuse treatment clinical trials network data share project: website design, usage, challenges, and future directions.

    PubMed

    Shmueli-Blumberg, Dikla; Hu, Lian; Allen, Colleen; Frasketi, Michael; Wu, Li-Tzy; Vanveldhuisen, Paul

    2013-01-01

    There are many benefits of data sharing, including the promotion of new research from effective use of existing data, replication of findings through re-analysis of pooled data files, meta-analysis using individual patient data, and reinforcement of open scientific inquiry. A randomized controlled trial is considered as the 'gold standard' for establishing treatment effectiveness, but clinical trial research is very costly, and sharing data is an opportunity to expand the investment of the clinical trial beyond its original goals at minimal costs. We describe the goals, developments, and usage of the Data Share website (http://www.ctndatashare.org) for the National Drug Abuse Treatment Clinical Trials Network (CTN) in the United States, including lessons learned, limitations, and major revisions, and considerations for future directions to improve data sharing. Data management and programming procedures were conducted to produce uniform and Health Insurance Portability and Accountability Act (HIPAA)-compliant de-identified research data files from the completed trials of the CTN for archiving, managing, and sharing on the Data Share website. Since its inception in 2006 and through October 2012, nearly 1700 downloads from 27 clinical trials have been accessed from the Data Share website, with the use increasing over the years. Individuals from 31 countries have downloaded data from the website, and there have been at least 13 publications derived from analyzing data through the public Data Share website. Minimal control over data requests and usage has resulted in little information and lack of control regarding how the data from the website are used. Lack of uniformity in data elements collected across CTN trials has limited cross-study analyses. The Data Share website offers researchers easy access to de-identified data files with the goal to promote additional research and identify new findings from completed CTN studies. To maximize the utility of the website, ongoing collaborative efforts are needed to standardize the core measures used for data collection in the CTN studies with the goal to increase their comparability and to facilitate the ability to pool data files for cross-study analyses.

  2. The National Drug Abuse Treatment Clinical Trials Network Data Share Project: Website Design, Usage, Challenges and Future Directions

    PubMed Central

    Shmueli-Blumberg, Dikla; Hu, Lian; Allen, Colleen; Frasketi, Michael; Wu, Li-Tzy; VanVeldhuisen, Paul

    2014-01-01

    Background The are many benefits of data sharing, including the promotion of new research from effective use of existing data, replication of findings through re-analysis of pooled data files, meta-analysis using individual patient data, and reinforcement of open scientific inquiry. A randomized controlled trial is considered as the “gold standard” for establishing treatment effectiveness, but clinical trial research is very costly and sharing data is an opportunity to expand the investment of the clinical trial beyond its original goals at minimal costs. Purpose We describe the goals, developments, and usage of the Data Share website (www.ctndatashare.org) for the National Drug Abuse Treatment Clinical Trials Network (CTN) in the US, including lessons learned, limitations and major revisions and considerations for future directions to improve data sharing. Methods Data management and programming procedures were conducted to produce uniform and Health Insurance Portability and Accountability Act (HIPAA)-compliant de-identified research data files from the completed trials of the CTN for archiving, managing, and sharing on the Data Share website. Results Since its inception in 2006 and through October 2012, nearly 1700 downloads from 27 clinical trials have been accessed from the Data Share website, with the use increasing over the years. Individuals from 31 countries have downloaded data from the website, and there have been at least 13 publications derived from analyzing data through the public Data Share website. Limitations Minimal control over data requests and usage has resulted in little information and lack of control regarding how the data from the website are used. Lack of uniformity in data elements collected across CTN trials has limited cross-study analyses. Conclusions The Data Share website offers researchers easy access to deidentified data files with the goal to promote additional research and identify new findings from completed CTN studies. To maximize the utility of the website, on-going collaborative efforts are needed to standardize the core measures used for data collection in the CTN studies with the goal to increase their comparability and to facilitate the ability to pool data files for cross-study analyses. PMID:24085772

  3. Supporting the need for an integrated system of care for youth with co-occurring traumatic stress and substance abuse problems.

    PubMed

    Suarez, Liza M; Belcher, Harolyn M E; Briggs, Ernestine C; Titus, Janet C

    2012-06-01

    Adolescents are at high risk for violence exposure and initiation of drug use. Co-occurring substance use and trauma exposure are associated with increased risk of mental health disorders, school underachievement, and involvement with multiple systems of care. Coordination and integration of systems of care are of utmost importance for these vulnerable youth. This study delineates the negative sequelae and increased service utilization patterns of adolescents with a history of trauma, substance abuse, and co-occurring trauma and substance abuse to support the need for integrated mental health and substance abuse services for youth. Data from two national sources, the National Child Traumatic Stress Network and Center for Substance Abuse Treatment demonstrate the increased clinical severity (measured by reports of emotional and behavioral problems), dysfunction, and service utilization patterns for youth with co-occurring trauma exposure and substance abuse. We conclude with recommendations for an integrated system of care that includes trauma-informed mental health treatment and substance abuse services aimed at reducing the morbidity and relapse probability of this high-risk group.

  4. Abusive behavior is barrier to high-reliability health care systems, culture of patient safety.

    PubMed

    Cassirer, C; Anderson, D; Hanson, S; Fraser, H

    2000-11-01

    Addressing abusive behavior in the medical workplace presents an important opportunity to deliver on the national commitment to improve patient safety. Fundamentally, the issue of patient safety and the issue of abusive behavior in the workplace are both about harm. Undiagnosed and untreated, abusive behavior is a barrier to creating high reliability service delivery systems that ensure patient safety. Health care managers and clinicians need to improve their awareness, knowledge, and understanding of the issue of workplace abuse. The available research suggests there is a high prevalence of workplace abuse in medicine. Both administrators at the blunt end and clinicians at the sharp end should consider learning new approaches to defining and treating the problem of workplace abuse. Eliminating abusive behavior has positive implications for preventing and controlling medical injury and improving organizational performance.

  5. Establishing a Computerized Substance Abuse Surveillance System for District Social Workers in the Western Cape Province, South Africa: Methods, Successes and Challenges

    ERIC Educational Resources Information Center

    Burnhams, Nadine Harker; Myers, Bronwyn; Fakier, Nuraan; Parry, Charles; Carelse, Jermaine

    2011-01-01

    The provision of accurate, in-depth data on substance abuse trends and service needs has become increasingly important in light of the growing wave of substance abuse in South Africa and particularly in the Western Cape Province. This article describes the design and implementation of an electronic substance abuse surveillance system (SASS)…

  6. Teachers' Knowledge and Beliefs About Child Sexual Abuse.

    PubMed

    Márquez-Flores, María Mercedes; Márquez-Hernández, Verónica V; Granados-Gámez, Genoveva

    2016-07-01

    Child sexual abuse is one of the main types of abuse still to be addressed within the field of education, yet the education system itself can serve as a primary tool for its prevention. A better understanding of teachers' knowledge and beliefs about child sexual abuse will allow us to establish key starting points from which to utilize the system for prevention. Four hundred and fifty teachers participated in this study, completing a questionnaire regarding their knowledge and beliefs about child sexual abuse. The study revealed that over half the teachers, 65.3% (n = 294), had never received any type of training in child sexual abuse education and that the majority were not familiar with methods of identifying child sexual abuse, 90.7% (n = 279). Various mistaken beliefs were identified among the participating teachers, such as pathological profiles of abusers, that the vast majority of child sexual abuse implies violent behavior, and that there cannot be abusers the same age as the victim. These results indicate that knowledge deficiencies do exist about child sexual abuse among teachers and highlight the need for training in this field.

  7. 10 CFR 13.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... identity when filing documents and serving participants electronically through the E-Filing system, and... transmitted electronically from the E-Filing system to the submitter confirming receipt of electronic filing... presentation of the docket and a link to its files. E-Filing System means an electronic system that receives...

  8. Active surveillance of abused and misused prescription opioids using poison center data: a pilot study and descriptive comparison.

    PubMed

    Hughes, Alice A; Bogdan, Gregory M; Dart, Richard C

    2007-01-01

    Prescription opioids are abused throughout the United States. Several monitoring programs are in existence, however, none of these systems provide up-to-date information on prescription opioid abuse. This article describes the use of poison centers as a real-time, geographically specific, surveillance system for prescription opioid abuse and compares our system with an existing prescription drug abuse monitoring program, the Drug Abuse Warning Network (DAWN). Data were collected from eight geographically dispersed poison centers for a period of twelve months. Any call involving buprenorphine, fentanyl, hydrocodone, hydromorphone, methadone, morphine, and oxycodone was considered a case. Any case coded as intentional exposure (abuse, intentional misuse, suicide, or intentional unknown) was regarded as misuse and abuse. Comparative data were obtained from DAWN. Poison center rates of abuse and misuse were highest for hydrocodone at 3.75 per 100,000 population, followed by oxycodone at 1.81 per 100,000 population. DAWN emergency department (ED) data illustrate a similar pattern of abuse with most mentions involving hydrocodone and oxycodone. Poison center data indicate that people aged 18 to 25 had the highest rates of abuse. DAWN reported the majority of ED mentions among 35 to 44-year-olds. Geographically, Kentucky had the uppermost rates of abuse and misuse for all opioids combined at 20.69 per 100,000 population. CONCLUSIONS. Comparing poison center data to DAWN yielded mostly comparable results, including hydrocodone as the most commonly mentioned drug. Our results suggest poison center data can be used as an indicator for prescription opioid abuse and misuse and can provide timely, geographically specific information on prescription drug abuse.

  9. Integrating Substance Abuse Treatment and Child Welfare Services: Findings from the Illinois Alcohol and Other Drug Abuse Waiver Demonstration

    ERIC Educational Resources Information Center

    Ryan, Joseph P.; Marsh, Jeanne C.; Testa, Mark F.; Louderman, Richard

    2006-01-01

    Alcohol and other drug abuse is a major problem for children and families involved with public child welfare. Substance abuse compromises appropriate parenting practices and increases the risk of child maltreatment. A substantial proportion of substantiated child abuse and neglect reports involve parental substance abuse. Once in the system,…

  10. 48 CFR 923.570 - Workplace substance abuse programs at DOE sites.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Workplace substance abuse... SAFETY, AND DRUG-FREE WORKPLACE Drug-Free Workplace 923.570 Workplace substance abuse programs at DOE... abuse programs are promulgated at 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites. ...

  11. 48 CFR 923.570 - Workplace substance abuse programs at DOE sites.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Workplace substance abuse... SAFETY, AND DRUG-FREE WORKPLACE Drug-Free Workplace 923.570 Workplace substance abuse programs at DOE... abuse programs are promulgated at 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites. ...

  12. 48 CFR 923.570 - Workplace substance abuse programs at DOE sites.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Workplace substance abuse... SAFETY, AND DRUG-FREE WORKPLACE Drug-Free Workplace 923.570 Workplace substance abuse programs at DOE... abuse programs are promulgated at 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites. ...

  13. 48 CFR 923.570 - Workplace substance abuse programs at DOE sites.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Workplace substance abuse... SAFETY, AND DRUG-FREE WORKPLACE Drug-Free Workplace 923.570 Workplace substance abuse programs at DOE... abuse programs are promulgated at 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites. ...

  14. [Community-based prevention of drug abuse in Japan].

    PubMed

    Shimane, Takuya

    2010-08-01

    The objective of this article is to review community-based drug abuse prevention and relapse prevention in Japan. Japan has a highly efficient system for the primary prevention of drug abuse; this system includes drug abuse education programs in schools and anti-drug abuse campaigns in communities. On the other hand, relapse prevention activities, such as counseling service at mental health welfare centers, self-help groups for drug addicts, and relapse prevention programs at outpatient clinics, are limited because of zero tolerance policies. Therefore, more relapse prevention activities are required in Japanese communities.

  15. Measuring driver satisfaction with an urban arterial before and after deployment of an adaptive timing signal system

    DOT National Transportation Integrated Search

    2001-02-01

    The Minnesota data system includes the following basic files: Accident data (Accident File, Vehicle File, Occupant File); Roadlog File; Reference Post File; Traffic File; Intersection File; Bridge (Structures) File; and RR Grade Crossing File. For ea...

  16. The development of a comprehensive risk-management program for prescription opioid analgesics: researched abuse, diversion and addiction-related surveillance (RADARS).

    PubMed

    Cicero, Theodore J; Dart, Richard C; Inciardi, James A; Woody, George E; Schnoll, Sidney; Muñoz, Alvaro

    2007-03-01

    OBJECTIVE. Beginning in the late 1990's a marked increase in abuse of OxyContin emerged, which led to the development and establishment of a proactive surveillance program to monitor and characterize abuse, named the Researched Abuse, Diversion and Addiction Related Surveillance (RADARS) System. The main goal of RADARS was to develop proactive, timely and geographically sensitive methods to assess the abuse and diversion of OxyContin, along with a number of other Schedule II and III opioids with the aim of using this information to guide risk reduction interventions. Thus, its major focus was the detection of abuse of OxyContin and other commonly prescribed opioid analgesics at the three-digit ZIP code level across the country utilizing a number of different detection systems. The detection systems selected were: (1) Quarterly-surveys of drug abuse experts who are knowledgeable about cases of prescription drug abuse; (2) Surveys of law enforcement agencies that detect diversion of prescription drugs; and (3) Poison Control Center reports of intentional misuse or abuse of prescription opioids. Collectively, the three systems provide overlapping coverage of over 80% of the nation's 973 three-digit ZIP codes. Preliminary results indicate that prescription drug abuse is prevalent nationwide, but it seems to be heavily localized in rural, suburban and small urban areas. Our results also indicate that hydrocodone and extended and immediate release oxycodone products are by far the most widely abused drugs in the country, but the abuse of all prescription opioids seems to have grown over the 14 quarters since the inception of RADARS. The next step in these studies is to develop regionally specific, risk-minimization-strategies, which is the goal of all risk-management programs. If successful, RADARS will serve as a prototype of such programs for any new drug approved that has measurable abuse potential.

  17. Spouse Abuse, Child Abuse, and Substance Abuse Among Army Facilities: Co-Occurrence, Correlations and Service Delivery Issues

    DTIC Science & Technology

    2006-03-01

    refer spouse abuse or child abuse offenders with identified alcohol or other drug involvement to the on-base counseling center for a substance...abuse assessment. The military’s response to combat substance abuse involves a combination of education, prevention, random testing for illicit drug ...data from three Army sources: the Army Central Registry (ACR), the Drug and Alcohol Management Information System (DAMIS), and Army personnel data

  18. Zebra: A striped network file system

    NASA Technical Reports Server (NTRS)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  19. An ecological systems examination of elder abuse: a week in the life of adult protective services.

    PubMed

    Wangmo, Tenzin; Teaster, Pamela B; Grace, James; Wong, Wilson; Mendiondo, Marta S; Blandford, Caitlin; Fisher, Steve; Fardo, David W

    2014-01-01

    Using Bronfenbrenner's ecological systems model, this study examined allegations of elder abuse made to Kentucky Adult Protective Services (APS) and the investigation that followed, in order to understand how APS addressed the needs of abused elders. Elder abuse allegations made to APS during the study week were collected using 3 study tools. Allegations and resulting investigations were analyzed. During the study week, APS received 1,002 calls alleging elder abuse. Of these, 483 were categorized as reports needing protective services, with 177 reports screened in for investigation and 167 actually investigated. Results describe characteristics of abuse calls, investigations, victims, perpetrators, and total investigation times. Substantiation ratio, recidivism, and whether investigation increased or decreased the risk of abuse were also assessed. An examination of APS casework through the lens of nested systems frames the study findings and discussion. Such an examination has the potential to improve the quality of services provided to older adults.

  20. Integration of physical abuse clinical decision support into the electronic health record at a Tertiary Care Children's Hospital.

    PubMed

    Suresh, Srinivasan; Saladino, Richard A; Fromkin, Janet; Heineman, Emily; McGinn, Tom; Richichi, Rudolph; Berger, Rachel P

    2018-04-12

    To evaluate the effect of a previously validated electronic health record-based child abuse trigger system on physician compliance with clinical guidelines for evaluation of physical abuse. A randomized controlled trial (RCT) with comparison to a preintervention group was performed. RCT-experimental subjects' providers received alerts with a direct link to a physical abuse-specific order set. RCT-control subjects' providers had no alerts, but could manually search for the order set. Preintervention subjects' providers had neither alerts nor access to the order set. Compliance with clinical guidelines was calculated. Ninety-nine preintervention subjects and 130 RCT subjects (73 RCT-experimental and 57 RCT-control) met criteria to undergo a physical abuse evaluation. Full compliance with clinical guidelines was 84% pre-intervention, 86% in RCT-control group, and 89% in RCT-experimental group. The physical abuse order set was used 43 times during the 7-month RCT. When the abuse order set was used, full compliance was 100%. The proportion of cases in which there was partial compliance decreased from 10% to 3% once the order set became available (P = .04). Male gender, having >10 years of experience and completion of a pediatric emergency medicine fellowship were associated with increased compliance. A child abuse clinical decision support system comprised of a trigger system, alerts and a physical abuse order set was quickly accepted into clinical practice. Use of the physical abuse order set always resulted in full compliance with clinical guidelines. Given the high baseline compliance at our site, evaluation of this alert system in hospitals with lower baseline compliance rates will be more valuable in assessing the efficacy in adherence to clinical guidelines for the evaluation of suspected child abuse.

  1. DMFS: A Data Migration File System for NetBSD

    NASA Technical Reports Server (NTRS)

    Studenmund, William

    2000-01-01

    I have recently developed DMFS, a Data Migration File System, for NetBSD. This file system provides kernel support for the data migration system being developed by my research group at NASA/Ames. The file system utilizes an underlying file store to provide the file backing, and coordinates user and system access to the files. It stores its internal metadata in a flat file, which resides on a separate file system. This paper will first describe our data migration system to provide a context for DMFS, then it will describe DMFS. It also will describe the changes to NetBSD needed to make DMFS work. Then it will give an overview of the file archival and restoration procedures, and describe how some typical user actions are modified by DMFS. Lastly, the paper will present simple performance measurements which indicate that there is little performance loss due to the use of the DMFS layer.

  2. Animal cruelty and psychiatric disorders.

    PubMed

    Gleyzer, Roman; Felthous, Alan R; Holzer, Charles E

    2002-01-01

    Animal cruelty in childhood, although generally viewed as abnormal or deviant, for years was not considered symptomatic of any particular psychiatric disorder. Although animal cruelty is currently used as a diagnostic criterion for conduct disorder, research establishing the diagnostic significance of this behavior is essentially nonexistent. In the current study, investigators tested the hypothesis that a history of substantial animal cruelty is associated with a diagnosis of antisocial personality disorder (APD) and looked for associations with other disorders commonly diagnosed in a population of criminal defendants. Forty-eight subjects, criminal defendants who had histories of substantial animal cruelty, were matched with defendants without this history. Data were systematically obtained from the files by using four specifically designed data retrieval outlines. A history of animal cruelty during childhood was significantly associated with APD, antisocial personality traits, and polysubstance abuse. Mental retardation, psychotic disorders, and alcohol abuse showed no such association.

  3. Childhood physical abuse and differential development of paranormal belief systems.

    PubMed

    Perkins, Stefanie L; Allen, Rhiannon

    2006-05-01

    This study compared paranormal belief systems in individuals with and without childhood physical abuse histories. The Revised Paranormal Belief Scale and the Assessing Environments III Questionnaire were completed by 107 University students. Psi, precognition, and spiritualism, which are thought to provide a sense of personal efficacy and control, were among the most strongly held beliefs in abused subjects, and were significantly higher in abused versus nonabused subjects. Superstition and extraordinary life forms, thought to have an inverse or no relation to felt control, were the least strongly held beliefs in abused subjects, and, along with religious beliefs, did not differ between the two abuse groups. Witchcraft was unexpectedly found to be the most strongly held belief among those with abuse histories. Results suggest that by providing a sense of control, certain paranormal beliefs may offer a powerful emotional refuge to individuals who endured the stress of physical abuse in childhood.

  4. Development and feasibility of the misuse, abuse, and diversion drug event reporting system (MADDERS®).

    PubMed

    Treister, Roi; Trudeau, Jeremiah J; Van Inwegen, Richard; Jones, Judith K; Katz, Nathaniel P

    2016-12-01

    Inappropriate use of analgesic drugs has become increasingly pervasive over the past decade. Currently, drug abuse potential is primarily assessed post-marketing; no validated tools are available to assess this potential in phase II and III clinical trials. This paper describes the development and feasibility testing of a Misuse, Abuse, and Diversion Drug Event Reporting System (MADDERS), which aims to identify potentially abuse-related events and classify them according to a recently developed classification scheme, allowing the quantification of these events in clinical trials. The system was initially conceived and designed with input from experts and patients, followed by field-testing to assess its feasibility and content validity in both completed and ongoing clinical trials. The results suggest that MADDERS is a feasible system with initial validity. It showed higher rates of the triggering events in subjects taking medications with known abuse potential than in patients taking medications without abuse potential. Additionally, experts agreed on the classification of most abuse-related events in MADDERS. MADDERS is a new systematic approach to collect information on potentially abuse-related events in clinical trials and classify them. The system has demonstrated feasibility for implementation. Additional research is ongoing to further evaluate its validity. Currently, there are no validated tools to assess drug abuse potential during clinical trials. Because of its ease of implementation, its systematic approach, and its preliminary validation results, MADDERS could provide such a tool for clinical trials. (Am J Addict 2016;25:641-651). © 2016 American Academy of Addiction Psychiatry.

  5. [Post-marketing surveillance systems for psychoactive prescription drug abuse].

    PubMed

    Nordmann, Sandra; Frauger, Elisabeth; Pauly, Vanessa; Rouby, Frank; Mallaret, Michel; Micallef, Joëlle; Thirion, Xavier

    2011-01-01

    Drugs affecting the central nervous system form a unique group of products for surveillance because they could be misused, abused or diverted. Considering the characteristics of this behaviour that is often concealed, specific post-marketing surveillance systems have been developed to monitor abuse of prescription drugs in some countries. The purpose of this review is to list and to describe post-marketing surveillance systems, according their methodology, in France and in foreign countries. These programs are based on adverse effect notifications, medical or legal consequences of abuse, general or specific population-based survey, professional networks or medication databases. Some programs use simultaneously several information sources. In conclusion, the multifaceted nature, the diversity and the inventiveness of post-marketing surveillance systems reflects the complexity of the abuse issue. © 2011 Société Française de Pharmacologie et de Thérapeutique.

  6. Lifetime Prevalence of Investigating Child Maltreatment Among US Children.

    PubMed

    Kim, Hyunil; Wildeman, Christopher; Jonson-Reid, Melissa; Drake, Brett

    2017-02-01

    To estimate the lifetime prevalence of official investigations for child maltreatment among children in the United States. We used the National Child Abuse and Neglect Data System Child Files (2003-2014) and Census data to develop synthetic cohort life tables to estimate the cumulative prevalence of reported childhood maltreatment. We extend previous work, which explored only confirmed rates of maltreatment, and we add new estimations of maltreatment by subtype, age, and ethnicity. We estimate that 37.4% of all children experience a child protective services investigation by age 18 years. Consistent with previous literature, we found a higher rate for African American children (53.0%) and the lowest rate for Asians/Pacific Islanders (10.2%). Child maltreatment investigations are more common than is generally recognized when viewed across the lifespan. Building on other recent work, our data suggest a critical need for increased preventative and treatment resources in the area of child maltreatment.

  7. Patterns and correlates of illicit drug selling among youth in the USA

    PubMed Central

    Vaughn, Michael G; Shook, Jeffrey J; Perron, Brian E; Abdon, Arnelyn; Ahmedani, Brian

    2011-01-01

    Purpose Despite the high rates of drug selling among youth in juvenile justice and youth residing in disadvantage neighborhoods, relatively little is known about the patterns of illicit drug selling among youth in the general population. Methods Using the public-use data file from the adolescent sample (N = 17 842) in the 2008 National Survey on Drug Use and Health (NSDUH), this study employed multiple logistic regression to compare the behavioral, parental involvement, and prevention experiences of youth who sold and did not sell illicit drugs in the past year. Results Findings from a series of logistic regression models indicated youth who sold drugs were far more likely to use a wide variety of drugs and engage in delinquent acts. Drug-selling youth were significantly less likely to report having a parent involved in their life and have someone to talk to about serious problems but were more likely to report exposure to drug prevention programming. Conclusion Selling of drugs by youth appears to be a byproduct of substance abuse and deviance proneness, and the prevention programs these youth experience are likely a result of mandated exposure derived from contact with the criminal justice system. Assuming no major drug supply side reductions, policies, and practices associated with increasing drug abuse treatment, parental involvement and supervision, and school engagement are suggested. PMID:22375100

  8. Substance abuse treatment management information systems: balancing federal, state, and service provider needs.

    PubMed

    Camp, J M; Krakow, M; McCarty, D; Argeriou, M

    1992-01-01

    There is increased interest in documenting the characteristics and treatment outcomes of clients served with Alcohol, Drug Abuse, and Mental Health Block Grant funds. The evolution of federal client-based management systems for substance abuse treatment services demonstrates that data collection systems are important but require continued support. A review of the Massachusetts substance abuse management information system illustrates the utility of a client-based data set. The development and implementation of a comprehensive information system require overcoming organizational barriers and project delays, fostering collaborative efforts among staff from diverse agencies, and employing considerable resources. In addition, the need to develop mechanisms for increasing the reliability of the data and ongoing training for the users is presented. Finally, three applications of the management information system's role in shaping policy are reviewed: developing services for special populations (communities of color, women, and pregnant substance abusers, and injection drug users), utilizing MIS data for evaluation purposes, and determining funding allocations.

  9. Child Abuse and Autonomic Nervous System Hyporesponsivity among Psychiatrically Impaired Children

    ERIC Educational Resources Information Center

    Ford, Julian D.; Fraleigh, Lisa A.; Albert, David B.; Connor, Daniel F.

    2010-01-01

    Objective: Sexually or physically abused children are at risk for neurobiological dysregulation as well as for internalizing and disruptive behavior disorders. Stress-related autonomic nervous system (ANS) down-regulation has been proposed as a sequela of abuse and was investigated in the present study. Methods: Child Protective Services…

  10. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 7.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of recent drug abuse literature, derived from scanning the major publications media in the area. This includes scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports.…

  11. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 8.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of recent drug abuse literature, derived from scanning the major publications media in the area. This includes scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports.…

  12. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 6.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  13. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 2.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  14. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 1.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  15. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 9.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  16. Drug Abuse Awareness System (DACAS), Volume 1 Number 5.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  17. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 4.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature, derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  18. Drug Abuse Current Awareness System (DACAS), Volume 1 Number 3.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHEW/PHS), Rockville, MD. National Clearinghouse for Drug Abuse Information.

    The Drug Abuse Current Awareness System (DACAS) is a comprehensive biweekly listing of citations of the recent drug abuse literature derived from scanning the major publications media in the area, including scientific and technical journals, popular magazines, underground newspapers, books, legal journals, and government project reports. The…

  19. Profile of inhalant users seeking treatment at a de-addiction centre in north India.

    PubMed

    Gupta, Sunil; Nebhinani, Naresh; Basu, Debasish; Mattoo, Surendra Kumar

    2014-05-01

    Inhalants are substances whose chemical vapors are inhaled to produce euphoric, disinhibiting, and exciting effects. Data on inhalant abuse in India are relatively scarce. We report the demographic and clinical profile of inhalant users among the treatment seekers at a Drug De-addiction and Treatment Centre in north India. The records of treatment seekers at the Drug De-addiction and Treatment Centre, over 10 years (2002-2011) were scanned to identify 92 cases reporting inhalant use. Of these 92 cases, the complete record files were available for 87 (94.6%) cases. These case files were reviewed and the relevant data were collected and analyzed. Over the study period of 10 years, the number of cases with inhalant abuse per year rose steadily to peak at 20 cases (4.08% of new cases) in 2006 and then stabilized at 1-3 per cent of new cases annually. Of the 87 cases studied, all were males with a mean age of 18.9±4.12 yr, mean education of 9.8±3.42 yr and mean family income of Rs. 7676±7343.15 (median: Rs. 5000). Majority of subjects were unmarried (89.7%), urban resident (79.3%), and from a nuclear family (78.2%). About half of the subjects were students (50.6%). The most common inhalant used was typewriter correction fluid (73.6%) followed by typewriter diluent fluid (19.5%) and glue (6.9%). The most common reason for initiation was curiosity. The mean age of onset of inhalant use was 16.3±4.22 yr. Most subjects fulfilled the criteria for inhalant dependence (85.1%). Psychiatric co-morbidity and the family history of substance dependence were present in 26.4 and 32.9 per cent subjects, respectively. Majority of the subjects reported drug related problems, occupation and finance being the worst affected. Interpretations & conclusions: Our results showed that the inhalant users were mostly urban youth belonging to middle socio-economic class families. The principal sources of inhalant abuse were the commonly available substances like typewriter correction fluids and majority of the subjects initiated it out of curiosity. Nearly three-fourth of the subjects used some other substance of abuse in addition, tobacco being the most common. In view of associated drug related problems, there is a need for strategies to prevent this emerging health care problem.

  20. Small file aggregation in a parallel computing system

    DOEpatents

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  1. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  2. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  3. Design and Implementation of a Metadata-rich File System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ames, S; Gokhale, M B; Maltzahn, C

    2010-01-19

    Despite continual improvements in the performance and reliability of large scale file systems, the management of user-defined file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and semantic metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address thesemore » problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, user-defined attributes, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS incorporates Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the de facto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.« less

  4. Prevention of Child Sexual Abuse within the Family System: Guidelines for an Educational Social Group Work Program.

    PubMed

    Masilo, Daniel Tuelo

    2018-02-28

    Children have the right to be brought up in safe environments. However, this right is often infringed by people who are supposed to provide love, care, and protection to children. These people can include biological fathers, step-fathers, brothers, cousins, aunts, mothers, and uncles. Violation of children takes place in a variety of ways, however, for the purpose of this paper, the focus is on child sexual abuse within the family system. A literature review is adopted as the methodology for the discussions in this paper. The purpose of this paper is firstly to demonstrate that child sexual abuse happens within the family system in South Africa, and secondly, to argue that the prevention of child sexual abuse should start within the family system and this can be achieved by conducting educational social group work sessions on child sexual abuse with the family members.

  5. The Value of a Checklist for Child Abuse in Out-of-Hours Primary Care: To Screen or Not to Screen.

    PubMed

    Schouten, Maartje Cm; van Stel, Henk F; Verheij, Theo Jm; Houben, Michiel L; Russel, Ingrid Mb; Nieuwenhuis, Edward Es; van de Putte, Elise M

    2017-01-01

    To assess the diagnostic value of the screening instrument SPUTOVAMO-R2 (checklist, 5 questions) for child abuse at Out-of-hours Primary Care locations (OPC), by comparing the test outcome with information from Child Protection Services (CPS). Secondary, to determine whether reducing the length of the checklist compromises diagnostic value. All children (<18 years) attending one of the participating OPCs in the region of Utrecht, the Netherlands, in a year time, were included. The checklist is an obligatory field in the electronic patient file. CPS provided data on all checklist positives and a sample of 5500 checklist negatives (dataset). The checklist outcome was compared with a report to CPS in 10 months follow up after the OPC visit. The checklist was filled in for 50671 children; 108 (0.2%) checklists were positive. Within the dataset, 61 children were reported to CPS, with emotional neglect as the most frequent type of abuse (32.8%). The positive predictive value (PPV) of the checklist for child abuse was 8.3 (95% CI 3.9-15.2). The negative predictive value (NPV) was 99.1 (98.8-99.3), with 52 false negatives. When the length of the checklist was reduced to two questions closely related to the medical process (SPUTOVAMO-R3), the PPV was 9.1 (3.7-17.8) and the NPV 99.1 (98.7-99.3). These two questions are on the injury in relation to the history, and the interaction between child and parents. The checklist SPUTOVAMO-R2 has a low detection rate of child abuse within the OPC setting, and a high false positive rate. Therefore, we recommend to use the shortened checklist only as a tool to increase the awareness of child abuse and not as a diagnostic instrument.

  6. The Value of a Checklist for Child Abuse in Out-of-Hours Primary Care: To Screen or Not to Screen

    PubMed Central

    van Stel, Henk F.; Verheij, Theo JM; Houben, Michiel L.; Russel, Ingrid MB; Nieuwenhuis, Edward ES; van de Putte, Elise M.

    2017-01-01

    Objectives To assess the diagnostic value of the screening instrument SPUTOVAMO-R2 (checklist, 5 questions) for child abuse at Out-of-hours Primary Care locations (OPC), by comparing the test outcome with information from Child Protection Services (CPS). Secondary, to determine whether reducing the length of the checklist compromises diagnostic value. Methods All children (<18 years) attending one of the participating OPCs in the region of Utrecht, the Netherlands, in a year time, were included. The checklist is an obligatory field in the electronic patient file. CPS provided data on all checklist positives and a sample of 5500 checklist negatives (dataset). The checklist outcome was compared with a report to CPS in 10 months follow up after the OPC visit. Results The checklist was filled in for 50671 children; 108 (0.2%) checklists were positive. Within the dataset, 61 children were reported to CPS, with emotional neglect as the most frequent type of abuse (32.8%). The positive predictive value (PPV) of the checklist for child abuse was 8.3 (95% CI 3.9–15.2). The negative predictive value (NPV) was 99.1 (98.8–99.3), with 52 false negatives. When the length of the checklist was reduced to two questions closely related to the medical process (SPUTOVAMO-R3), the PPV was 9.1 (3.7–17.8) and the NPV 99.1 (98.7–99.3). These two questions are on the injury in relation to the history, and the interaction between child and parents. Conclusions The checklist SPUTOVAMO-R2 has a low detection rate of child abuse within the OPC setting, and a high false positive rate. Therefore, we recommend to use the shortened checklist only as a tool to increase the awareness of child abuse and not as a diagnostic instrument. PMID:28045904

  7. Methods and apparatus for multi-resolution replication of files in a parallel computing system using semantic information

    DOEpatents

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Torres, Aaron

    2015-10-20

    Techniques are provided for storing files in a parallel computing system using different resolutions. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a sub-file. The method comprises the steps of obtaining semantic information related to the file; generating a plurality of replicas of the file with different resolutions based on the semantic information; and storing the file and the plurality of replicas of the file in one or more storage nodes of the parallel computing system. The different resolutions comprise, for example, a variable number of bits and/or a different sub-set of data elements from the file. A plurality of the sub-files can be merged to reproduce the file.

  8. Reciproc versus Twisted file for root canal filling removal: assessment of apically extruded debris.

    PubMed

    Altunbas, Demet; Kutuk, Betul; Toyoglu, Mustafa; Kutlu, Gizem; Kustarci, Alper; Er, Kursat

    2016-01-01

    The aim of this study was to evaluate the amount of apically extruded debris during endodontic retreatment with different file systems. Sixty extracted human mandibular premolar teeth were used in this study. Root canals of the teeth were instrumented and filled before being randomly assigned to three groups. Guttapercha was removed using the Reciproc system, the Twisted File system (TF), and Hedström-files (H-file). Apically extruded debris was collected and dried in pre-weighed Eppendorf tubes. The amount of extruded debris was assessed with an electronic balance. Data were statistically analyzed using one-way ANOVA, Kruskal-Wallis, and Mann-Whitney U tests. The Reciproc and TF systems extruded significantly less debris than the H-file (p<0.05). However, no significant difference was found between the Reciproc and TF systems. All tested file systems caused apical extrusion of debris. Both the rotary file (TF) and the reciprocating single-file (Reciproc) systems were associated with less apical extrusion compared with the H-file.

  9. Prevention of Child Abuse: Possibilities for Educational Systems.

    ERIC Educational Resources Information Center

    Holmes, Christine P.

    1987-01-01

    Educators' roles in identification of abused/neglected children, subsequent reporting, and techniques for interviewing suspected abused children are discussed. Educators' expanded role in abuse prevention, involving such activities as offering courses in parenting, child safety/protection, and human sexuality, is examined, followed by a…

  10. Oxytocin Receptor Genetic and Epigenetic Variations: Association with Child Abuse and Adult Psychiatric Symptoms

    ERIC Educational Resources Information Center

    Smearman, Erica L.; Almli, Lynn M.; Conneely, Karen N.; Brody, Gene H.; Sales, Jessica M.; Bradley, Bekh; Ressler, Kerry J.; Smith, Alicia K.

    2016-01-01

    Childhood abuse can alter biological systems and increase risk for adult psychopathology. Epigenetic mechanisms, alterations in DNA structure that regulate the gene expression, are a potential mechanism underlying this risk. While abuse associates with methylation of certain genes, particularly those in the stress response system, no study to date…

  11. Cloud object store for checkpoints of high performance computing applications using decoupling middleware

    DOEpatents

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-04-19

    Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  12. Distributed PACS using distributed file system with hierarchical meta data servers.

    PubMed

    Hiroyasu, Tomoyuki; Minamitani, Yoshiyuki; Miki, Mitsunori; Yokouchi, Hisatake; Yoshimi, Masato

    2012-01-01

    In this research, we propose a new distributed PACS (Picture Archiving and Communication Systems) which is available to integrate several PACSs that exist in each medical institution. The conventional PACS controls DICOM file into one data-base. On the other hand, in the proposed system, DICOM file is separated into meta data and image data and those are stored individually. Using this mechanism, since file is not always accessed the entire data, some operations such as finding files, changing titles, and so on can be performed in high-speed. At the same time, as distributed file system is utilized, accessing image files can also achieve high-speed access and high fault tolerant. The introduced system has a more significant point. That is the simplicity to integrate several PACSs. In the proposed system, only the meta data servers are integrated and integrated system can be constructed. This system also has the scalability of file access with along to the number of file numbers and file sizes. On the other hand, because meta-data server is integrated, the meta data server is the weakness of this system. To solve this defect, hieratical meta data servers are introduced. Because of this mechanism, not only fault--tolerant ability is increased but scalability of file access is also increased. To discuss the proposed system, the prototype system using Gfarm was implemented. For evaluating the implemented system, file search operating time of Gfarm and NFS were compared.

  13. Toward information management in corporations (2)

    NASA Astrophysics Data System (ADS)

    Shibata, Mitsuru

    If construction of inhouse information management systems in an advanced information society should be positioned along with the social information management, its base making begins with reviewing current paper filing systems. Since the problems which inhere in inhouse information management systems utilizing OA equipments also inhere in paper filing systems, the first step toward full scale inhouse information management should be to grasp and solve the fundamental problems in current filing systems. This paper describes analysis of fundamental problems in filing systems, making new type of offices and analysis of improvement needs in filing systems, and some points in improving filing systems.

  14. Development of the System on the Internet for Pre-Assessment of Child Abuse Prevention

    NASA Astrophysics Data System (ADS)

    Honma, Satoru; Wakamatsu, Hidetoshi; Ueda, Reiko

    Some assessments have been applied to find possible factors that might lead to child abuse. PACAP is a new method proposed by Ueda and others as a pre-assessment of the concerning child abuse, which reduces its false-positive misclassification. The Internet PACAP is developed to reduce the laborious work of nurses and health care workers for the necessary processing and classifying the scores of the pre-assessment. The present system is expected to prevent the child abuse more effectively.

  15. American Telephone and Telegraph System V/MLS Release 1.1.2 Running on Unix System V Release 3.1.1

    DTIC Science & Technology

    1989-10-18

    Evaluation Report AT&T System V/MLS SYSTEM OVERVIEW what is specified in the /mls/ passwd file. For a complete description of how this works, see page 62...from the publicly readable files /etc/ passwd and /etclgroup, to the protected files /mlslpasswd and /mls/group. These protected files are ASCII...files which are referred to as "shadow files". October 18, 1989 62 Final Evaluation Report AT&T System V/MLS SYSTEM OVERVIEW Imls/ passwd contains the

  16. 78 FR 21930 - Aquenergy Systems, Inc.; Notice of Intent To File License Application, Filing of Pre-Application...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Systems, Inc.; Notice of Intent To File License Application, Filing of Pre-Application Document, and Approving Use of the Traditional Licensing Process a. Type of Filing: Notice of Intent to File License...: November 11, 2012. d. Submitted by: Aquenergy Systems, Inc., a fully owned subsidiaries of Enel Green Power...

  17. Storing files in a parallel computing system based on user-specified parser function

    DOEpatents

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Manzanares, Adam; Torres, Aaron

    2014-10-21

    Techniques are provided for storing files in a parallel computing system based on a user-specified parser function. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a parser from the distributed application for processing the plurality of files prior to storage; and storing one or more of the plurality of files in one or more storage nodes of the parallel computing system based on the processing by the parser. The plurality of files comprise one or more of a plurality of complete files and a plurality of sub-files. The parser can optionally store only those files that satisfy one or more semantic requirements of the parser. The parser can also extract metadata from one or more of the files and the extracted metadata can be stored with one or more of the plurality of files and used for searching for files.

  18. Methods and apparatus for capture and storage of semantic information with sub-files in a parallel computing system

    DOEpatents

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Torres, Aaron

    2015-02-03

    Techniques are provided for storing files in a parallel computing system using sub-files with semantically meaningful boundaries. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a plurality of sub-files. The method comprises the steps of obtaining a user specification of semantic information related to the file; providing the semantic information as a data structure description to a data formatting library write function; and storing the semantic information related to the file with one or more of the sub-files in one or more storage nodes of the parallel computing system. The semantic information provides a description of data in the file. The sub-files can be replicated based on semantically meaningful boundaries.

  19. Registered File Support for Critical Operations Files at (Space Infrared Telescope Facility) SIRTF

    NASA Technical Reports Server (NTRS)

    Turek, G.; Handley, Tom; Jacobson, J.; Rector, J.

    2001-01-01

    The SIRTF Science Center's (SSC) Science Operations System (SOS) has to contend with nearly one hundred critical operations files via comprehensive file management services. The management is accomplished via the registered file system (otherwise known as TFS) which manages these files in a registered file repository composed of a virtual file system accessible via a TFS server and a file registration database. The TFS server provides controlled, reliable, and secure file transfer and storage by registering all file transactions and meta-data in the file registration database. An API is provided for application programs to communicate with TFS servers and the repository. A command line client implementing this API has been developed as a client tool. This paper describes the architecture, current implementation, but more importantly, the evolution of these services based on evolving community use cases and emerging information system technology.

  20. Understanding abuse of buprenorphine/naloxone film versus tablet products using data from ASI-MV® substance use disorder treatment centers and RADARS® System Poison Centers.

    PubMed

    Butler, Stephen F; Black, Ryan A; Severtson, Stevan Geoffrey; Dart, Richard C; Green, Jody L

    2018-01-01

    The objectives were to examine the abuse prevalence and route-of-administration (ROA) profiles of sublingual buprenorphine/naloxone combination (BNX) film in comparison with the BNX tablet and to identify clinically-relevant subgroups of patients or geographic patterns. Between Q1 2015 through Q3 2015, data were collected from two major surveillance systems: (1) assessment of individuals in substance use disorder (SUD) treatment collected from the National Addictions Vigilance Intervention and Prevention Program (NAVIPPRO®) ASI-MV® system and (2) intentional abuse/misuse exposures in the RADARS® System Poison Center Program. Poisson regression models were tailored to each system's data characteristics by population (all SUD treatment patients, US census) and adjusted for prescription volume. Effects of gender, race, age and US region as well as ROA profile were examined. For the ASI-MV study, 45,695 assessments of unique adults evaluated for substance use problems were collected. The abuse rate unadjusted for prescription volume of BNX tablet formulation was 2.64 cases/100 ASI-MV respondents versus 7.01 cases for the film formulation (RR=0.390, p<0.001). Prescription-adjusted abuse, however, was greater for the tablet version (0.47 abuse cases/100 ASI-MV respondents/100,000 dosage units compared with 0.38 for the film) (RR=1.25, p<0.001). Results among the US population from the RADARS System Poison Center Program data revealed a similar pattern; population rates for film abuse (0.0364) were greater than for tablet (0.0161), while prescription-adjusted rates were greater for tablet (0.2114) than for film (0.1703) per 100,000 prescriptions. ASI-MV ROA analyses indicated less abuse of the film by any alternate route, insufflation or injection than the tablet. Poison center data found more injection of tablets than film, although insufflation was not significantly different. On a prescription-adjusted basis, overall abuse of the BNX tablet is greater than that of the sublingual film formulation. For those who continue to abuse BNX, use by alternate ROAs was, in general, lower for the film. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Storing files in a parallel computing system using list-based index to identify replica files

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value formore » one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.« less

  2. [Dutch Health Care Inspectorate (IGZ) abuses its inspection authority in patient files].

    PubMed

    van Lessen Kloeke, Koosje

    2014-01-01

    For its investigation regarding the transfer of data after discharge of vulnerable elderly patients from hospital to nursing homes, care homes or home care, the Dutch Health Care Inspectorate (IGZ) demands access to patients' files, without their explicit consent. Doctors who do not cooperate run the risk of penalty payments. Since it concerns a limited number of patients per practice, it would not be unreasonably onerous for the Inspectorate to allow doctors to ask their patients' consent. Other reasons mentioned by the Inspectorate, such as possible "inappropriate correction" of data and the capability of vulnerable elderly patients to give their consent seem improper grounds to breach patients' right to privacy and to demand that doctors breach professional confidentiality. The legality of the Inspectorate's actions could be addressed in a test case and should be discussed more widely in light of the Inspectorate's work plan for 2014.

  3. Cloud object store for archive storage of high performance computing data using decoupling middleware

    DOEpatents

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-06-30

    Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  4. Methamphetamine abuse and “meth mouth” in Europe

    PubMed Central

    Boyd, Geraldine-A.; Mancinelli, Luca; Pagano, Stefano; Eramo, Stefano

    2015-01-01

    With easy chemical synthesis from its precursor, methamphetamine (MA) is now widespread in many countries. The abuse of methamphetamine is associated with several negative effects on health, because MA is a neurotoxin and a dangerous central nervous system stimulant. It changes levels of neurotransmitters in the brain, releasing dopamine and inhibiting nor epinephrine uptake which increases sympathetic nervous system activity and can lead to cardiac arrhythmia, hypertension and tachypnea. The consequences of MA abuse are clearly manifested in oral diseases (like “meth mouth”) which is characterised by extensive caries, teeth grinding with ensuing dental wear and trismus. The present review was designed to fill the gap in knowledge about methamphetamine abuse in the European Union (EU) and to illustrate the main clinical effects of prolonged use. After describing the pharmacology and systemic effects of methamphetamine and concentrating on its effects on the mouth, the present review compares the epidemiology and incidence of abuse in the world, particularly the USA and the EU. Key words:Methamphetamine, “Meth mouth”, drug abuse, oral health. PMID:25662544

  5. Storing files in a parallel computing system based on user or application specification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Faibish, Sorin; Bent, John M.; Nick, Jeffrey M.

    2016-03-29

    Techniques are provided for storing files in a parallel computing system based on a user-specification. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a specification from the distributed application indicating how the plurality of files should be stored; and storing one or more of the plurality of files in one or more storage nodes of a multi-tier storage system based on the specification. The plurality of files comprise a plurality of complete files and/or a plurality of sub-files. The specification can optionally be processed by a daemon executing on onemore » or more nodes in a multi-tier storage system. The specification indicates how the plurality of files should be stored, for example, identifying one or more storage nodes where the plurality of files should be stored.« less

  6. Elder Physical Abuse and Failure to Report Cases: Similarities and Differences in Case Type and the Justice System's Response

    ERIC Educational Resources Information Center

    Payne, Brian K.

    2013-01-01

    Treated initially as a social problem, elder abuse has only recently been criminalized. The criminalization of elder abuse involves penalizing offenders for actively abusing offenders as well as for violating mandatory reporting laws. Mandatory reporting laws exist to encourage professionals to report suspected cases of elder abuse. In this study,…

  7. The computerized OMAHA system in microsoft office excel.

    PubMed

    Lai, Xiaobin; Wong, Frances K Y; Zhang, Peiqiang; Leung, Carenx W Y; Lee, Lai H; Wong, Jessica S Y; Lo, Yim F; Ching, Shirley S Y

    2014-01-01

    The OMAHA System was adopted as the documentation system in an interventional study. To systematically record client care and facilitate data analysis, two Office Excel files were developed. The first Excel file (File A) was designed to record problems, care procedure, and outcomes for individual clients according to the OMAHA System. It was used by the intervention nurses in the study. The second Excel file (File B) was the summary of all clients that had been automatically extracted from File A. Data in File B can be analyzed directly in Excel or imported in PASW for further analysis. Both files have four parts to record basic information and the three parts of the OMAHA System. The computerized OMAHA System simplified the documentation procedure and facilitated the management and analysis of data.

  8. 48 CFR 923.570 - Workplace substance abuse programs at DOE sites.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Workplace substance abuse... Workplace 923.570 Workplace substance abuse programs at DOE sites. (a) The Department of Energy (DOE), as...) Regulations concerning DOE's contractor workplace substance abuse programs are promulgated at 10 CFR part 707...

  9. 48 CFR 970.5223-4 - Workplace Substance Abuse Programs at DOE Sites.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Workplace Substance Abuse... and Contract Clauses for Management and Operating Contracts 970.5223-4 Workplace Substance Abuse... 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites, incorporated herein by reference...

  10. 48 CFR 970.5223-4 - Workplace Substance Abuse Programs at DOE Sites.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Workplace Substance Abuse... and Contract Clauses for Management and Operating Contracts 970.5223-4 Workplace Substance Abuse... 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites, incorporated herein by reference...

  11. 48 CFR 970.5223-4 - Workplace Substance Abuse Programs at DOE Sites.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Workplace Substance Abuse... and Contract Clauses for Management and Operating Contracts 970.5223-4 Workplace Substance Abuse... 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites, incorporated herein by reference...

  12. 48 CFR 970.5223-4 - Workplace Substance Abuse Programs at DOE Sites.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Workplace Substance Abuse... and Contract Clauses for Management and Operating Contracts 970.5223-4 Workplace Substance Abuse... 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites, incorporated herein by reference...

  13. 48 CFR 970.5223-4 - Workplace Substance Abuse Programs at DOE Sites.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Workplace Substance Abuse... and Contract Clauses for Management and Operating Contracts 970.5223-4 Workplace Substance Abuse... 10 CFR part 707, Workplace Substance Abuse Programs at DOE Sites, incorporated herein by reference...

  14. 75 FR 42104 - National Institute on Drug Abuse; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-20

    ... personal privacy. Name of Committee: National Institute on Drug Abuse Special Emphasis Panel Systems... Administrator, Office of Extramural Affairs, National Institute on Drug Abuse, NIH, DHHS, Room 220, MSC 8401... review and funding cycle. Name of Committee: National Institute on Drug Abuse Special Emphasis Panel 2010...

  15. Epidemiology and clinical analysis of critical patients with child maltreatment admitted to the intensive care units.

    PubMed

    Lee, En-Pei; Hsia, Shao-Hsuan; Huang, Jing-Long; Lin, Jainn-Jim; Chan, Oi-Wa; Lin, Chia-Ying; Lin, Kuang-Lin; Chang, Yu-Ching; Chou, I-Jun; Lo, Fu-Song; Lee, Jung; Hsin, Yi-Chen; Chan, Pei-Chun; Hu, Mei-Hua; Chiu, Cheng-Hsun; Wu, Han-Ping

    2017-06-01

    Children with abuse who are admitted to the intensive care unit (ICU) may have high mortality and morbidity and commonly require critical care immediately. It is important to understand the epidemiology and clinical characteristics of these critical cases of child maltreatment.We retrospectively evaluated the data for 355 children with maltreatments admitted to the ICU between 2001 and 2015. Clinical factors were analyzed and compared between the abuse and the neglect groups, including age, gender, season of admission, identifying settings, injury severity score (ISS), etiologies, length of stay (LOS) in the ICU, clinical outcomes, and mortality. In addition, neurologic assessments were conducted with the Pediatric Cerebral Performance Category (PCPC) scale.The most common type of child maltreatments was neglect (n = 259), followed by physical abuse (n = 96). The mean age of the abuse group was less than that of the neglect group (P < .05). Infants accounted for the majority of the abuse group, and the most common etiology of abuse was injury of the central nervous system (CNS). In the neglect group, most were of the preschool age and the most common etiologies of abuse were injury of the CNS and musculoskeletal system (P < .001). The mortality rate in the ICU was 9.86%. The ISS was significantly associated with mortality in both the 2 groups (both P < .05), whereas the LOS in the ICU and injuries of the CNS, musculoskeletal system, and respiratory system were all associated with mortality in the neglect group (all P < .05). The PCPC scale showed poor prognosis in the abuse group as compared to the neglect group (P < .01).In the ICU, children in the abuse group had younger age, higher ISS, and worse neurologic outcome than those in the neglect group. The ISS was a predictor for mortality in the abuse and neglect groups but the LOS in the ICUs, injuries of the CNS, musculoskeletal system, and respiratory system were indicators for mortality in the neglect group. Most importantly, identifying the epidemiological information may provide further strategies to reduce the harm, lower the medical costs, and improve clinical care quality and outcomes in children with abuse.

  16. Abused Women's Perspectives on the Criminal Justice System's Response to Domestic Violence

    ERIC Educational Resources Information Center

    Barata, Paula C.

    2007-01-01

    This study used Q methodology to better understand battered women's views about the criminal justice system (CJS). Fifty-eight abused and formerly abused women, representing a broad range of experiences, were involved in the study. Participants sorted 72 statements about domestic violence and the CJS according to how strongly they agreed with each…

  17. Preventing Internal Computer Abuse

    DTIC Science & Technology

    1986-12-01

    abusers of computer systems are individuals who are -’’internal" to and working for the victim organization (these include full-time employees , part...Moonlighting * Organizational Property * Nonuse/nondisclosure * Substance Abuse * Gambling Employee Assistance Program "Whistle Blower" Policy EDP Auditor 1...sensitive computer systems. Of all the controls discussed so far. the Employee Assistance Program ’ EAP

  18. Permanent-File-Validation Utility Computer Program

    NASA Technical Reports Server (NTRS)

    Derry, Stephen D.

    1988-01-01

    Errors in files detected and corrected during operation. Permanent File Validation (PFVAL) utility computer program provides CDC CYBER NOS sites with mechanism to verify integrity of permanent file base. Locates and identifies permanent file errors in Mass Storage Table (MST) and Track Reservation Table (TRT), in permanent file catalog entries (PFC's) in permit sectors, and in disk sector linkage. All detected errors written to listing file and system and job day files. Program operates by reading system tables , catalog track, permit sectors, and disk linkage bytes to vaidate expected and actual file linkages. Used extensively to identify and locate errors in permanent files and enable online correction, reducing computer-system downtime.

  19. 76 FR 66695 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-27

    .... DWHS P04 System name: Reduction-In-Force Case Files (February 11, 2011, 76 FR 7825). Changes....'' * * * * * DWHS P04 System name: Reduction-In-Force Case Files. System location: Human Resources Directorate... system: Storage: Paper file folders. Retrievability: Filed alphabetically by last name. Safeguards...

  20. Preliminary Clinical Experience with a Combined Automated Breast Ultrasound and Digital Breast Tomosynthesis System.

    PubMed

    Larson, Eric D; Lee, Won-Mean; Roubidoux, Marilyn A; Goodsitt, Mitchell M; Lashbrook, Chris; Davis, Cynthia E; Kripfgans, Oliver D; Carson, Paul L

    2018-03-01

    We analyzed the performance of a mammographically configured, automated breast ultrasound (McABUS) scanner combined with a digital breast tomosynthesis (DBT) system. The GE Invenia ultrasound system was modified for integration with GE DBT systems. Ultrasound and DBT imaging were performed in the same mammographic compression. Our small preliminary study included 13 cases, six of whom had contained invasive cancers. From analysis of these cases, current limitations and corresponding potential improvements of the system were determined. A registration analysis was performed to compare the ease of McABUS to DBT registration for this system with that of two systems designed previously. It was observed that in comparison to data from an earlier study, the McABUS-to-DBT registration alignment errors for both this system and a previously built combined system were smaller than those for a previously built standalone McABUS system. Copyright © 2018 World Federation for Ultrasound in Medicine and Biology. Published by Elsevier Inc. All rights reserved.

  1. Personal File Management for the Health Sciences.

    ERIC Educational Resources Information Center

    Apostle, Lynne

    Written as an introduction to the concepts of creating a personal or reprint file, this workbook discusses both manual and computerized systems, with emphasis on the preliminary groundwork that needs to be done before starting any filing system. A file assessment worksheet is provided; considerations in developing a personal filing system are…

  2. [Pathology of the nervous system in conscripts with drug abuse in past medical history: symptomatology, diagnostics methods].

    PubMed

    Litvintsev, B S; Odinak, M M; Kovalenko, A P; Efimtsev, A Iu; Tarumov, D A; Petrov, A D; Lisianskiĭ, D A

    2014-08-01

    Authors examined 60 female and male patients (average age 25.8±2.7 years) with confirmed diagnosis - drug abuse. Average duration of drug abuse was approximately 9±3.3 years. At the moment of examination patients had been fully in remission for 3 weeks. The following non-invasive procedures were undertaken: stimulation electroneuromyogrphy and brain MRI. Received results showed that drug abuse leads to diffuse lesion of the nervous system, which manifests itself as vegetative disorders, scattered neurological symptoms, polyneuropathy. Authors gave recommendations in the field of military examination with the aim of detection of nervous disorders caused by drug abuse.

  3. 47 CFR 1.10008 - What are IBFS file numbers?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Random Selection International Bureau Filing System § 1.10008 What are IBFS file numbers? (a) We assign...) For a description of file number information, see The International Bureau Filing System File Number... 47 Telecommunication 1 2013-10-01 2013-10-01 false What are IBFS file numbers? 1.10008 Section 1...

  4. 47 CFR 1.10008 - What are IBFS file numbers?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Bureau Filing System § 1.10008 What are IBFS file numbers? (a) We assign file numbers to electronic... information, see The International Bureau Filing System File Number Format Public Notice, DA-04-568 (released... 47 Telecommunication 1 2010-10-01 2010-10-01 false What are IBFS file numbers? 1.10008 Section 1...

  5. 47 CFR 1.10008 - What are IBFS file numbers?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Random Selection International Bureau Filing System § 1.10008 What are IBFS file numbers? (a) We assign...) For a description of file number information, see The International Bureau Filing System File Number... 47 Telecommunication 1 2012-10-01 2012-10-01 false What are IBFS file numbers? 1.10008 Section 1...

  6. 47 CFR 1.10008 - What are IBFS file numbers?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Bureau Filing System § 1.10008 What are IBFS file numbers? (a) We assign file numbers to electronic... information, see The International Bureau Filing System File Number Format Public Notice, DA-04-568 (released... 47 Telecommunication 1 2011-10-01 2011-10-01 false What are IBFS file numbers? 1.10008 Section 1...

  7. 47 CFR 1.10008 - What are IBFS file numbers?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Random Selection International Bureau Filing System § 1.10008 What are IBFS file numbers? (a) We assign...) For a description of file number information, see The International Bureau Filing System File Number... 47 Telecommunication 1 2014-10-01 2014-10-01 false What are IBFS file numbers? 1.10008 Section 1...

  8. Collecting Self-Reported Data on Dating Abuse Perpetration From a Sample of Primarily Black and Hispanic, Urban-Residing, Young Adults: A Comparison of Timeline Followback Interview and Interactive Voice Response Methods.

    PubMed

    Rothman, Emily F; Heeren, Timothy; Winter, Michael; Dorfman, David; Baughman, Allyson; Stuart, Gregory

    2016-12-01

    Dating abuse is a prevalent and consequential public health problem. However, relatively few studies have compared methods of collecting self-report data on dating abuse perpetration. This study compares two data collection methods-(a) the Timeline Followback (TLFB) retrospective reporting method, which makes use of a written calendar to prompt respondents' recall, and (b) an interactive voice response (IVR) system, which is a prospective telephone-based database system that necessitates respondents calling in and entering data using their telephone keypads. We collected 84 days of data on young adult dating abuse perpetration using IVR from a total of 60 respondents. Of these respondents, 41 (68%) completed a TLFB retrospective report pertaining to the same 84-day period after that time period had ended. A greater number of more severe dating abuse perpetration events were reported via the IVR system. Participants who reported any dating abuse perpetration were more likely to report more frequent abuse perpetration via the IVR than the TLFB (i.e., may have minimized the number of times they perpetrated dating abuse on the TLFB). The TLFB method did not result in a tapering off of reported events past the first week as it has in prior studies, but the IVR method did result in a tapering off of reported events after approximately the sixth week. We conclude that using an IVR system for self-reports of dating abuse perpetration may not have substantial advantages over using a TLFB method, but researchers' choice of mode may vary by research question, resources, sample, and setting.

  9. NEURODEVELOPMENTAL BIOLOGY ASSOCIATED WITH CHILDHOOD SEXUAL ABUSE

    PubMed Central

    De Bellis, Michael D.; Spratt, Eve G.; Hooper, Stephen R.

    2013-01-01

    Child maltreatment appears to be the single most preventable cause of mental illness and behavioral dysfunction in the US. There are few published studies examining the developmental and the psychobiological consequences of sexual abuse. There are multiple mechanisms through which sexual abuse can cause PTSD, activate biological stress response systems, and contribute to adverse brain development. This article will critically review the psychiatric problems associated with maltreatment and the emerging biologic stress system research with a special emphasis on what is known about victimization by sexual abuse. PMID:21970646

  10. A File Archival System

    NASA Technical Reports Server (NTRS)

    Fanselow, J. L.; Vavrus, J. L.

    1984-01-01

    ARCH, file archival system for DEC VAX, provides for easy offline storage and retrieval of arbitrary files on DEC VAX system. System designed to eliminate situations that tie up disk space and lead to confusion when different programers develop different versions of same programs and associated files.

  11. 48 CFR 352.237-71 - Crime Control Act-reporting of child abuse.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... mental injury, sexual abuse or exploitation, or negligent treatment of a child. (c) Accordingly, any...-reporting of child abuse. 352.237-71 Section 352.237-71 Federal Acquisition Regulations System HEALTH AND... Clauses 352.237-71 Crime Control Act—reporting of child abuse. As prescribed in 337.103-70(b), the...

  12. Using in vitro models for expression profiling studies on ethanol and drugs of abuse.

    PubMed

    Thibault, Christelle; Hassan, Sajida; Miles, Michael

    2005-03-01

    The use of expression profiling with microarrays offers great potential for studying the mechanisms of action of drugs of abuse. Studies with the intact nervous system seem likely to be most relevant to understanding the mechanisms of drug abuse-related behaviours. However, the use of expression profiling with in vitro culture models offers significant advantages for identifying details of cellular signalling actions and toxicity for drugs of abuse. This study discusses general issues of the use of microarrays and cell culture models for studies on drugs of abuse. Specific results from existing studies are also discussed, providing clear examples of relevance for in vitro studies on ethanol, nicotine, opiates, cannabinoids and hallucinogens such as LSD. In addition to providing details on signalling mechanisms relevant to the neurobiology of drugs of abuse, microarray studies on a variety of cell culture systems have also provided important information on mechanisms of cellular/organ toxicity with drugs of abuse. Efforts to integrate genomic studies on drugs of abuse with both in vivo and in vitro models offer the potential for novel mechanistic rigor and physiological relevance.

  13. The iatrogenic epidemic of prescription drug abuse: county-level determinants of opioid availability and abuse.

    PubMed

    Wright, Eric R; Kooreman, Harold E; Greene, Marion S; Chambers, R Andrew; Banerjee, Aniruddha; Wilson, Jeffrey

    2014-05-01

    Opioid use and abuse in the United States continues to expand at an alarming rate. In this study, we examine the county-level determinants of the availability and abuse of prescription opioids to better understand the socio-ecological context, and in particular the role of the healthcare delivery system, on the prescription drug abuse epidemic. We use community-level information, data from Indiana's prescription drug monitoring program in 2011, and geospatial regression methods to identify county-level correlates of the availability and abuse of prescription opioids among Indiana's 92 counties. The findings suggest that access to healthcare generally, and to dentists and pharmacists in particular, increases the availability of prescription opioids in communities, which, in turn, is associated with higher rates of opioid abuse. The results suggest that the structure of the local healthcare system is a major determinant of community-level access to opioids adding to a growing body of evidence that the problem of prescription opioid abuse is, at least in part, an "iatrogenic epidemic." Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  14. 75 FR 65467 - Combined Notice of Filings No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ...: Venice Gathering System, L.L.C. Description: Venice Gathering System, L.L.C. submits tariff filing per 154.203: Venice Gathering System Rate Settlement Compliance Filing to be effective 11/1/2010. Filed...

  15. Disparities in systems development for elder abuse prevention among municipalities in Japan: implications for strategies to help municipalities develop community systems.

    PubMed

    Nakanishi, Miharu; Nakashima, Taeko; Honda, Tatsuo

    2010-07-01

    In April 2006, a national elder abuse prevention and caregiver support law was enacted in Japan, where elder abuse prevention is carried out by municipalities, and caregiver support and intervention are provided by a public long-term care insurance program. The aims of this study were (1) to examine factors at baseline affecting disparities in the progress of systems development for elder abuse prevention among municipalities, and (2) to determine what kind of support municipalities request from prefectural or national governments to help municipalities develop systems for elder abuse prevention. Written questionnaires were administered to the most knowledgeable person in the department responsible for reporting elder abuse in each municipal government between December 2006 and October 2008. The final sample for analysis consisted of 489 (26.6% of 1840) municipalities that provided complete information. Municipalities that achieved a high level of implementation originally had a higher rate of reports of abuse per 1000 elderly persons and greater involvement by police and advocacy groups at baseline. Since cities were the largest type of municipality, they had the greatest number of activities as of 2 years after implementation of the law. The results highlight that the prefectural or national government should offer different types of support according to the kind of municipality: sharing and using experts in an extended association for municipalities with limited resources and smaller size (towns and villages) and aggregating information on difficult cases for larger municipalities (cities). Further research should investigate specific strategies that the prefectural or national government can implement to help promote systems development for municipalities with low rates of reported cases of elder abuse, such as training programs to ensure that all care providers can recognize the signs and symptoms of elder abuse. Copyright 2010 Elsevier Ltd. All rights reserved.

  16. Register file soft error recovery

    DOEpatents

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  17. 48 CFR 304.803-70 - Contract/order file organization and use of checklists.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Contract/order file organization and use of checklists. 304.803-70 Section 304.803-70 Federal Acquisition Regulations System HEALTH... content of HHS contract and order files, OPDIVs shall use the folder filing system and accompanying file...

  18. 48 CFR 304.803-70 - Contract/order file organization and use of checklists.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Contract/order file organization and use of checklists. 304.803-70 Section 304.803-70 Federal Acquisition Regulations System HEALTH... content of HHS contract and order files, OPDIVs shall use the folder filing system and accompanying file...

  19. 48 CFR 304.803-70 - Contract/order file organization and use of checklists.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Contract/order file organization and use of checklists. 304.803-70 Section 304.803-70 Federal Acquisition Regulations System HEALTH... content of HHS contract and order files, OPDIVs shall use the folder filing system and accompanying file...

  20. 48 CFR 304.803-70 - Contract/order file organization and use of checklists.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Contract/order file organization and use of checklists. 304.803-70 Section 304.803-70 Federal Acquisition Regulations System HEALTH... content of HHS contract and order files, OPDIVs shall use the folder filing system and accompanying file...

  1. 48 CFR 304.803-70 - Contract/order file organization and use of checklists.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Contract/order file organization and use of checklists. 304.803-70 Section 304.803-70 Federal Acquisition Regulations System HEALTH... content of HHS contract and order files, OPDIVs shall use the folder filing system and accompanying file...

  2. To evaluate and compare the efficacy, cleaning ability of hand and two rotary systems in root canal retreatment.

    PubMed

    Shivanand, Sunita; Patil, Chetan R; Thangala, Venugopal; Kumar, Pabbati Ravi; Sachdeva, Jyoti; Krishna, Akash

    2013-05-01

    To evaluate and compare the efficacy, cleaning ability of hand and two rotary systems in root canal retreatment. Sixty extracted premolars were retreated with following systems: Group -ProTaper Universal retreatment files, Group 2-ProFile system, Group 3-H-file. Specimens were split longitudinally and amount of remaining gutta-percha on the canal walls was assessed using direct visual scoring with the aid of stereomicroscope. Results were statistically analyzed using ANOVA test. Completely clean root canal walls were not achieved with any of the techniques investigated. However, all three systems proved to be effective for gutta-percha removal. Significant difference was found between ProTaper universal retreatment file and H-file, and also between ProFile and H-file. Under the conditions of the present study, ProTaper Universal retreatment files left significantly less guttapercha and sealer than ProFile and H-file. Rotary systems in combination with gutta-percha solvents can perform superiorly as compared to the time tested traditional hand instrumentation in root canal retreatment.

  3. The effect of an abuse‐deterrent opioid formulation (OxyContin) on opioid abuse‐related outcomes in the postmarketing setting

    PubMed Central

    Chilcoat, HD; Butler, SF; Sellers, EM; Kadakia, A; Harikrishnan, V; Haddox, JD; Dart, RC

    2016-01-01

    An extended‐release opioid analgesic (OxyContin, OC) was reformulated with abuse‐deterrent properties to deter abuse. This report examines changes in abuse through oral and nonoral routes, doctor‐shopping, and fatalities in 10 studies 3.5 years after reformulation. Changes in OC abuse from 1 year before to 3 years after OC reformulation were calculated, adjusted for prescription changes. Abuse of OC decreased 48% in national poison center surveillance systems, decreased 32% in a national drug treatment system, and decreased 27% among individuals prescribed OC in claims databases. Doctor‐shopping for OC decreased 50%. Overdose fatalities reported to the manufacturer decreased 65%. Abuse of other opioids without abuse‐deterrent properties decreased 2 years later than OC and with less magnitude, suggesting OC decreases were not due to broader opioid interventions. Consistent with the formulation, decreases were larger for nonoral than oral abuse. Abuse‐deterrent opioids may mitigate abuse and overdose risks among chronic pain patients. PMID:27170195

  4. Mission Operations Center (MOC) - Precipitation Processing System (PPS) Interface Software System (MPISS)

    NASA Technical Reports Server (NTRS)

    Ferrara, Jeffrey; Calk, William; Atwell, William; Tsui, Tina

    2013-01-01

    MPISS is an automatic file transfer system that implements a combination of standard and mission-unique transfer protocols required by the Global Precipitation Measurement Mission (GPM) Precipitation Processing System (PPS) to control the flow of data between the MOC and the PPS. The primary features of MPISS are file transfers (both with and without PPS specific protocols), logging of file transfer and system events to local files and a standard messaging bus, short term storage of data files to facilitate retransmissions, and generation of file transfer accounting reports. The system includes a graphical user interface (GUI) to control the system, allow manual operations, and to display events in real time. The PPS specific protocols are an enhanced version of those that were developed for the Tropical Rainfall Measuring Mission (TRMM). All file transfers between the MOC and the PPS use the SSH File Transfer Protocol (SFTP). For reports and data files generated within the MOC, no additional protocols are used when transferring files to the PPS. For observatory data files, an additional handshaking protocol of data notices and data receipts is used. MPISS generates and sends to the PPS data notices containing data start and stop times along with a checksum for the file for each observatory data file transmitted. MPISS retrieves the PPS generated data receipts that indicate the success or failure of the PPS to ingest the data file and/or notice. MPISS retransmits the appropriate files as indicated in the receipt when required. MPISS also automatically retrieves files from the PPS. The unique feature of this software is the use of both standard and PPS specific protocols in parallel. The advantage of this capability is that it supports users that require the PPS protocol as well as those that do not require it. The system is highly configurable to accommodate the needs of future users.

  5. A Systemic Approach to the Development of a Sexual Abuse Protocol in a Rural Community: An Examination of Social Work Leadership Theory and Practice. Issues in Clinical Practice.

    ERIC Educational Resources Information Center

    Catalano, Stephen

    The paper presents the multi-factorial problem of sexual abuse of children within their families, provides definitions of relevant terms (incest, sexual abuse, sexual misuse, molestation, sexual assault, rape), reviews the epidemiology of sexual abuse and its effects, and traces development of a Sexual Abuse Resource Team in a rural/resort New…

  6. 47 CFR 1.10006 - Is electronic filing mandatory?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Is electronic filing mandatory? 1.10006 Section... International Bureau Filing System § 1.10006 Is electronic filing mandatory? Electronic filing is mandatory for... System (IBFS) form is available. Applications for which an electronic form is not available must be filed...

  7. Externalizing Behavior among Adopted Boys with Preadoptive Histories of Child Sexual Abuse

    ERIC Educational Resources Information Center

    Nalavany, Blace Arthur; Ryan, Scott D.; Hinterlong, Jim

    2009-01-01

    This study examined the severity of externalizing symptomology among adopted boys with preadoptive histories of child sexual abuse, physical abuse, neglect/abandonment, or no abuse. The study was based on data collected across a three-year period from parents who adopted children from Florida's child welfare system. The sample consisted of 1,136…

  8. Outrages Against Personal Dignity: Rationalizing Abuse and Torture in the War on Terror

    ERIC Educational Resources Information Center

    Gregory Hooks; Clayton Mosher

    2005-01-01

    The outrage over revelations of torture and abuse at Abu Ghraib prison has faded from public discourse, but a number of questions remain unanswered. This paper criticizes official rationalizations offered for the abuse. We make the case that these abuses are systemic, resulting from dehumanization of the enemy and the long reliance on and…

  9. Emotional security in the family system and psychological distress in female survivors of child sexual abuse.

    PubMed

    Cantón-Cortés, David; Cantón, José; Cortés, María Rosario

    2016-01-01

    The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotional security was investigated through the interactive effects of a number of factors including the type of abuse, the continuity of abuse, the relationship with the perpetrator and the existence of disclosure for the abuse. Participants were 167 female survivors of CSA. Information about the abuse was obtained from a self-reported questionnaire. Emotional security was assessed with the Security in the Family System (SIFS) Scale, and the Symptom Checklist-90-Revised (SCL-90-R) was used to assess psychological distress. In the total sample, insecurity (preoccupation and disengagement) was correlated with high psychological distress scores, whereas no relationship was found between security and psychological distress. The relationship between emotional insecurity and psychological distress was stronger in cases of continued abuse and non-disclosure, while the relationship between emotional security and distress was stronger in cases of extrafamilial abuse and especially isolated or several incidents and when a disclosure had been made. No interactive effect was found between any of the three emotional variables and the type of abuse committed. The results of the current study suggest that characteristics of CSA such as relationship with the perpetrator and, especially, continuity of abuse and whether or not disclosure had been made, can affect the impact of emotional security on psychological distress of CSA survivors. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. National addictions vigilance intervention and prevention program (NAVIPPRO): a real-time, product-specific, public health surveillance system for monitoring prescription drug abuse.

    PubMed

    Butler, Stephen F; Budman, Simon H; Licari, Andrea; Cassidy, Theresa A; Lioy, Katherine; Dickinson, James; Brownstein, John S; Benneyan, James C; Green, Traci Craig; Katz, Nathaniel

    2008-12-01

    The National Addictions Vigilance Intervention and Prevention Program (NAVIPPRO) is a scientific, comprehensive risk management program for scheduled therapeutics. NAVIPPRO provides post-marketing surveillance, signal detection, signal verification and prevention and intervention programs. Here we focus on one component of NAVIPPRO surveillance, the Addiction Severity Index-Multimedia Version (ASI-MV) Connect, a continuous, real-time, national data stream that assesses pharmaceutical abuse by patients entering substance abuse treatment by collecting product-specific, geographically-detailed information. We evaluate population characteristics for data collected through the ASI-MV Connect in 2007 and 2008 and assess the representativeness, geographic coverage, and timeliness of report of the data. Analyses based on 41,923 admissions to 265 treatment centers in 29 states were conducted on product-specific opioid abuse rates, source of drug, and route of administration. ASI-MV Connect data revealed that 11.5% of patients reported abuse of at least one opioid analgesic product in the 30 days prior to entering substance abuse treatment; differences were observed among sub-populations of prescription opioid abusers, among products, and also within various geographic locations. The ASI-MV Connect component of NAVIPPRO represents a potentially valuable data stream for post-marketing surveillance of prescription drugs. Analyses conducted with data obtained from the ASI-MV Connect allow for the characterization of product-specific and geospatial differences for drug abuse and can serve as a tool to monitor responses of the abuse population to newly developed "abuse deterrent" drug formulations. Additional data, evaluation, and comparison to other systems are important next steps in establishing NAVIPPRO as a comprehensive, post-marketing surveillance system for prescription drugs. Copyright (c) 2008 John Wiley & Sons, Ltd.

  11. OPPIDUM surveillance program: 20 years of information on drug abuse in France.

    PubMed

    Frauger, Elisabeth; Moracchini, Christophe; Le Boisselier, Reynald; Braunstein, David; Thirion, Xavier; Micallef, Joëlle

    2013-12-01

    It is important to assess drug abuse liability in 'real life' using different surveillance systems. Some are based on specific population surveys, such as individuals with drug abuse or dependence, or under opiate maintenance treatment, because this population is very familiar with drugs and is more likely to divert or abuse them. In France, an original surveillance system based on this specific population and called 'Observation of illegal drugs and misuse of psychotropic medications (OPPIDUM) survey' was set up in 1990 as the first of its kind. The aim of this article is to describe this precursor of French drug abuse surveillance using different examples, to demonstrate its ability to effectively give health authorities and physicians interesting data on drug abuse. OPPIDUM is an annual, cross-sectional survey that anonymously collects information on abuse and dependence observed in patients recruited in specialized care centers dedicated to drug dependence. From 1990 to 2010, a total of 50,734 patients were included with descriptions of 102,631 psychoactive substance consumptions. These data have outlined emergent behaviors such as the misuse of buprenorphine by intravenous or nasal administration. It has contributed to assess abuse liability of emergent drugs such as clonazepam or methylphenidate. This surveillance system was also able to detect the decrease of flunitrazepam abuse following implementation of regulatory measures. OPPIDUM's twenty years of experience clearly demonstrate that collection of valid and useful data on drug abuse is possible and can provide helpful information for physicians and health authorities. © 2013 The Authors Fundamental and Clinical Pharmacology © 2013 Société Française de Pharmacologie et de Thérapeutique.

  12. Assessment of Tapentadol API Abuse Liability With the Researched Abuse, Diversion and Addiction-Related Surveillance System.

    PubMed

    Vosburg, Suzanne K; Severtson, S Geoffrey; Dart, Richard C; Cicero, Theodore J; Kurtz, Steven P; Parrino, Mark W; Green, Jody L

    2018-04-01

    Tapentadol, a Schedule II opioid with a combination of µ-opioid activity and norepinephrine reuptake inhibition, is used for the management of moderate to severe acute and chronic pain. Its dual mechanism of action is thought to reduce opioid-related side effects that can complicate pain management. Since approval, tapentadol has been tracked across multiple outcomes suggesting abuse liability, and a pattern of relatively low, although not absent, abuse liability has been found. This retrospective cohort study further details the abuse liability of tapentadol as an active pharmaceutical ingredient (API) when immediate-release as well as extended-release formulations were on the market together (fourth quarter of 2011 to second quarter of 2016). Tapentadol (API) was compared with tramadol, hydrocodone, morphine, oxycodone, hydromorphone, and oxymorphone across Poison Center, Drug Diversion, and Treatment Center Programs Combined data streams from the Researched Abuse, Diversion and Addiction-Related Surveillance system. Findings suggest the public health burden related to tapentadol to date is low, but present. Event rates of abuse per population-level denominators were significantly lower than all other opioids examined. However, when adjusted for drug availability, event rates of abuse were lower than most Schedule II opioids studied, but were not the lowest. Disentangling these 2 sets of findings further by examining various opioid formulations, such as extended-release and the role of abuse-deterrent formulations, is warranted. This article presents the results from an examination of tapentadol API across the Researched Abuse, Diversion and Addiction-Related Surveillance System: a broad and carefully designed postmarketing mosaic. Data to date from Poison Center, Drug Diversion, and Treatment Centers combined suggest a low, but present public health burden related to tapentadol. Copyright © 2018. Published by Elsevier Inc.

  13. Checkpoint-Restart in User Space

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CRUISE implements a user-space file system that stores data in main memory and transparently spills over to other storage, like local flash memory or the parallel file system, as needed. CRUISE also exposes file contents fo remote direct memory access, allowing external tools to copy files to the parallel file system in the background with reduced CPU interruption.

  14. An Ephemeral Burst-Buffer File System for Scientific Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Teng; Moody, Adam; Yu, Weikuan

    BurstFS is a distributed file system for node-local burst buffers on high performance computing systems. BurstFS presents a shared file system space across the burst buffers so that applications that use shared files can access the highly-scalable burst buffers without changing their applications.

  15. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  16. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  17. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  18. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  19. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  20. A Systems Dynamic Model for Drug Abuse and Drug-Related Crime in the Western Cape Province of South Africa

    PubMed Central

    Coetzee, Lezanie

    2017-01-01

    The complex problem of drug abuse and drug-related crimes in communities in the Western Cape province cannot be studied in isolation but through the system they are embedded in. In this paper, a theoretical model to evaluate the syndemic of substance abuse and drug-related crimes within the Western Cape province of South Africa is constructed and explored. The dynamics of drug abuse and drug-related crimes within the Western Cape are simulated using STELLA software. The simulation results are consistent with the data from SACENDU and CrimeStats SA, highlighting the usefulness of such a model in designing and planning interventions to combat substance abuse and its related problems. PMID:28555161

  1. Quantitative evaluation of apically extruded debris with different single-file systems: Reciproc, F360 and OneShape versus Mtwo.

    PubMed

    Bürklein, S; Benten, S; Schäfer, E

    2014-05-01

    To assess in a laboratory setting the amount of apically extruded debris associated with different single-file nickel-titanium instrumentation systems compared to one multiple-file rotary system. Eighty human mandibular central incisors were randomly assigned to four groups (n = 20 teeth per group). The root canals were instrumented according to the manufacturers' instructions using the reciprocating single-file system Reciproc, the single-file rotary systems F360 and OneShape and the multiple-file rotary Mtwo instruments. The apically extruded debris was collected and dried in pre-weighed glass vials. The amount of debris was assessed with a micro balance and statistically analysed using anova and post hoc Student-Newman-Keuls test. The time required to prepare the canals with the different instruments was also recorded. Reciproc produced significantly more debris compared to all other systems (P < 0.05). No significant difference was noted between the two single-file rotary systems and the multiple-file rotary system (P > 0.05). Instrumentation with the three single-file systems was significantly faster than with Mtwo (P < 0.05). Under the condition of this study, all systems caused apical debris extrusion. Rotary instrumentation was associated with less debris extrusion compared to reciprocal instrumentation. © 2013 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  2. Income inequality and child maltreatment in the United States.

    PubMed

    Eckenrode, John; Smith, Elliott G; McCarthy, Margaret E; Dineen, Michael

    2014-03-01

    To examine the relation between county-level income inequality and rates of child maltreatment. Data on substantiated reports of child abuse and neglect from 2005 to 2009 were obtained from the National Child Abuse and Neglect Data System. County-level data on income inequality and children in poverty were obtained from the American Community Survey. Data for additional control variables were obtained from the American Community Survey and the Health Resources and Services Administration Area Resource File. The Gini coefficient was used as the measure of income inequality. Generalized additive models were estimated to explore linear and nonlinear relations among income inequality, poverty, and child maltreatment. In all models, state was included as a fixed effect to control for state-level differences in victim rates. Considerable variation in income inequality and child maltreatment rates was found across the 3142 US counties. Income inequality, as well as child poverty rate, was positively and significantly correlated with child maltreatment rates at the county level. Controlling for child poverty, demographic and economic control variables, and state-level variation in maltreatment rates, there was a significant linear effect of inequality on child maltreatment rates (P < .0001). This effect was stronger for counties with moderate to high levels of child poverty. Higher income inequality across US counties was significantly associated with higher county-level rates of child maltreatment. The findings contribute to the growing literature linking greater income inequality to a range of poor health and well-being outcomes in infants and children.

  3. Usage analysis of user files in UNIX

    NASA Technical Reports Server (NTRS)

    Devarakonda, Murthy V.; Iyer, Ravishankar K.

    1987-01-01

    Presented is a user-oriented analysis of short term file usage in a 4.2 BSD UNIX environment. The key aspect of this analysis is a characterization of users and files, which is a departure from the traditional approach of analyzing file references. Two characterization measures are employed: accesses-per-byte (combining fraction of a file referenced and number of references) and file size. This new approach is shown to distinguish differences in files as well as users, which cam be used in efficient file system design, and in creating realistic test workloads for simulations. A multi-stage gamma distribution is shown to closely model the file usage measures. Even though overall file sharing is small, some files belonging to a bulletin board system are accessed by many users, simultaneously and otherwise. Over 50% of users referenced files owned by other users, and over 80% of all files were involved in such references. Based on the differences in files and users, suggestions to improve the system performance were also made.

  4. 48 CFR 204.802 - Contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Contract files. 204.802 Section 204.802 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.802 Contract files. Official contract...

  5. 48 CFR 204.802 - Contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Contract files. 204.802 Section 204.802 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.802 Contract files. Official contract...

  6. 48 CFR 204.802 - Contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contract files. 204.802 Section 204.802 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.802 Contract files. Official contract...

  7. 48 CFR 204.802 - Contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Contract files. 204.802 Section 204.802 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.802 Contract files. Official contract...

  8. 48 CFR 204.802 - Contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Contract files. 204.802 Section 204.802 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.802 Contract files. Official contract...

  9. Twin-tailed fail-over for fileservers maintaining full performance in the presence of a failure

    DOEpatents

    Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.

    2008-02-12

    A method for maintaining full performance of a file system in the presence of a failure is provided. The file system having N storage devices, where N is an integer greater than zero and N primary file servers where each file server is operatively connected to a corresponding storage device for accessing files therein. The file system further having a secondary file server operatively connected to at least one of the N storage devices. The method including: switching the connection of one of the N storage devices to the secondary file server upon a failure of one of the N primary file servers; and switching the connections of one or more of the remaining storage devices to a primary file server other than the failed file server as necessary so as to prevent a loss in performance and to provide each storage device with an operating file server.

  10. RAMA: A file system for massively parallel computers

    NASA Technical Reports Server (NTRS)

    Miller, Ethan L.; Katz, Randy H.

    1993-01-01

    This paper describes a file system design for massively parallel computers which makes very efficient use of a few disks per processor. This overcomes the traditional I/O bottleneck of massively parallel machines by storing the data on disks within the high-speed interconnection network. In addition, the file system, called RAMA, requires little inter-node synchronization, removing another common bottleneck in parallel processor file systems. Support for a large tertiary storage system can easily be integrated in lo the file system; in fact, RAMA runs most efficiently when tertiary storage is used.

  11. 10 CFR 110.89 - Filing and service.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...: Rulemakings and Adjudications Staff or via the E-Filing system, following the procedure set forth in 10 CFR 2.302. Filing by mail is complete upon deposit in the mail. Filing via the E-Filing system is completed... residence with some occupant of suitable age and discretion; (2) Following the requirements for E-Filing in...

  12. Privacy Act of 1974; altered system of records--PHS. Notification of altered system of records: 09-30-0036, "Alcohol, Drug Abuse, and Mental Health Epidemiologic and Biometric Research Data, HHS/ADAMHA/OA".

    PubMed

    1984-10-23

    In accordance with the requirements of the Privacy Act, the Public Health Service (OHS) is publishing a notice of proposal to alter the system of records in the Alcohol, Drug Abuse, and Mental Health Administration (ADAMHA), National Institute of Mental Health (NIMH), entitled, "Mental Health Epidemiologic and Biometric Research Data, HHS/ADAMHA/NIMH," to create an umbrella system of records to include epidemiologic and biometric research data in the areas of alcohol and drug abuse in addition to data already collected and maintained for mental health research. The system is to be retitled, "Alcohol, Drug Abuse, and Mental Health Epidemiologic and Biometric Research Data, HHS/ADAMHA/OA." PHS invites interested persons to submit comments on the proposed alteration on or before November 23, 1984.

  13. Healthcare Professionals’ Perspectives on Barriers to Elder Abuse Detection and Reporting in Primary Care Settings

    PubMed Central

    SCHMEIDEL, AMY N.; DALY, JEANETTE M.; ROSENBAUM, MARCY E.; SCHMUCH, GRETCHEN A.; JOGERST, GERALD J.

    2012-01-01

    The purpose of this study was to explore through interviews of healthcare professionals their perspectives on elder abuse to achieve a better understanding of the problems of reporting and generate ideas for improving the process. Through a mailed survey, nurses, physicians, and social workers were invited to participate in an interview. Nine nurses, 8 physicians, and 6 social workers were interviewed and thematic analysis was used to identify the following core themes: professional orientation, assessment, interpretation, systems, and knowledge and education. The impact by healthcare professionals in recognizing and reporting elder abuse and obtaining resources for those mistreated can be profound. Nurses tended to perceive elder abuse as uncommon and generally did not feel it was their role nor did they have time to assess patients for potential abuse. Physicians felt that other patient care issues, time limitations and maintaining trust in the clinician-patient relationship outweighed the importance of detecting and pursuing suspected cases of elder abuse. Social workers, although having the most knowledge and experience related to elder abuse, relied on nurses and physicians to detect potential abusive situations and to work with them in making appropriate referrals. The three disciplines acknowledged the need for more and better education about elder abuse detection and reporting. Participants suggested a reorganization of the external reporting system. More frequent and pragmatic education is necessary to strengthen practical knowledge about elder abuse. PMID:22206510

  14. Abuse of anabolic-androgenic steroids and bodybuilding acne: an underestimated health problem.

    PubMed

    Melnik, Bodo; Jansen, Thomas; Grabbe, Stephan

    2007-02-01

    Abuse of anabolic-androgenic steroids (AAS) by members of fitness centers and others in Germany has reached alarming dimensions. The health care system provides the illegal AAS to 48.1 % of abusers. Physicians are involved in illegal prescription of AAS and monitoring of 32.1 % of AAS abusers. Besides health-threatening cardiovascular, hepatotoxic and psychiatric long-term side effects of AAS, acne occurs in about 50 % of AAS abusers and is an important clinical indicator of AAS abuse, especially in young men 18-26 years of age. Both acne conglobata and acne fulminans can be induced by AAS abuse. The dermatologist should recognize bodybuilding acne, address the AAS abuse, and warn the patient about other potential hazards.

  15. The social ecology of adolescent-initiated parent abuse: a review of the literature.

    PubMed

    Hong, Jun Sung; Kral, Michael J; Espelage, Dorothy L; Allen-Meares, Paula

    2012-06-01

    This article provides an ecological framework for understanding adolescent-initiated parent abuse. We review research on adolescent-initiated parent abuse, identifying sociodemographic characteristics of perpetrators and victims (e.g., gender, age, race/ethnicity, and socioeconomic status [SES]). Bronfenbrenner's [1] ecological systems theory is applied, which examines the risk and protective factors for adolescent-initiated parent abuse within micro- (maltreatment, domestic violence, parenting behavior and disciplinary strategies), meso- (peer influence), exo- (media influence), macro- (gender role socialization), and chronosystem (change in family structure) levels. Findings from our review suggest that older and White children are significantly more likely to abuse their parents. Females are selective in the target of their aggression, while males target family members in general. Mothers are significantly more likely to be abused than fathers. However, researchers also report variations in the association between SES and parent abuse. Domestic violence and child maltreatment are risk factors, while findings on parenting behavior and disciplinary strategies are mixed. Peer influence, exposure to media violence, gender role socialization, and change in family structure can potentially increase the risk of parent abuse. Practice and research implications are also discussed. An ecological systems framework allows for an examination of how various contexts interact and influence parent abuse behavior, and can provide needed directions for further research.

  16. Childhood sexual abuse and substance abuse treatment utilization among substance-dependent incarcerated women.

    PubMed

    Peltan, Jessica R; Cellucci, Tony

    2011-10-01

    Incarcerated women have high rates of substance abuse problems and trauma. A variety of variables may influence whether these women seek help or are referred for substance abuse problems. This study reports an exploratory project on service utilization among incarcerated substance-dependent women (N = 40) in southeastern Idaho. Using self-report and interview tools, most participants reported some substance abuse treatment history, although extent and types of treatment varied. Most of the women also reported some type of childhood abuse. Age, income, and consequences of alcohol and other drug use related positively to substance abuse treatment. However, severity of childhood sexual abuse and current trauma symptoms were negatively correlated with substance abuse treatment episodes. These women may use substances to cope with childhood trauma or may not perceive the substance abuse system as responsive to their co-occurring trauma symptoms. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. Substance Abuse and Prison Recidivism: Themes from Qualitative Interviews

    ERIC Educational Resources Information Center

    Phillips, Lindsay A.

    2010-01-01

    This qualitative analysis explores the role of substance abuse in reentry from prison to society. Participants who recidivated (N = 20) in an urban prison system identified substance abuse as their primary reason for recidivism. Treatment implications are discussed.

  18. 75 FR 27986 - Electronic Filing System-Web (EFS-Web) Contingency Option

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ...] Electronic Filing System--Web (EFS-Web) Contingency Option AGENCY: United States Patent and Trademark Office... availability of its patent electronic filing system, Electronic Filing System--Web (EFS-Web) by providing a new contingency option when the primary portal to EFS-Web has an unscheduled outage. Previously, the entire EFS...

  19. 29 CFR 102.119 - Privacy Act Regulations: notification as to whether a system of records contains records...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Regional Office Files (NLRB-25), Regional Advice and Injunction Litigation System (RAILS) and Associated Headquarters Files (NLRB-28), and Appeals Case Tracking System (ACTS) and Associated Headquarters Files (NLRB... Judicial Case Management Systems-Pending Case List (JCMS-PCL) and Associated Headquarters Files (NLRB-21...

  20. 29 CFR 102.119 - Privacy Act Regulations: notification as to whether a system of records contains records...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Regional Office Files (NLRB-25), Regional Advice and Injunction Litigation System (RAILS) and Associated Headquarters Files (NLRB-28), and Appeals Case Tracking System (ACTS) and Associated Headquarters Files (NLRB... Judicial Case Management Systems-Pending Case List (JCMS-PCL) and Associated Headquarters Files (NLRB-21...

  1. 29 CFR 102.119 - Privacy Act Regulations: notification as to whether a system of records contains records...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Regional Office Files (NLRB-25), Regional Advice and Injunction Litigation System (RAILS) and Associated Headquarters Files (NLRB-28), and Appeals Case Tracking System (ACTS) and Associated Headquarters Files (NLRB... Judicial Case Management Systems-Pending Case List (JCMS-PCL) and Associated Headquarters Files (NLRB-21...

  2. 29 CFR 102.119 - Privacy Act Regulations: notification as to whether a system of records contains records...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regional Office Files (NLRB-25), Regional Advice and Injunction Litigation System (RAILS) and Associated Headquarters Files (NLRB-28), and Appeals Case Tracking System (ACTS) and Associated Headquarters Files (NLRB... Judicial Case Management Systems-Pending Case List (JCMS-PCL) and Associated Headquarters Files (NLRB-21...

  3. The Galley Parallel File System

    NASA Technical Reports Server (NTRS)

    Nieuwejaar, Nils; Kotz, David

    1996-01-01

    As the I/O needs of parallel scientific applications increase, file systems for multiprocessors are being designed to provide applications with parallel access to multiple disks. Many parallel file systems present applications with a conventional Unix-like interface that allows the application to access multiple disks transparently. The interface conceals the parallelism within the file system, which increases the ease of programmability, but makes it difficult or impossible for sophisticated programmers and libraries to use knowledge about their I/O needs to exploit that parallelism. Furthermore, most current parallel file systems are optimized for a different workload than they are being asked to support. We introduce Galley, a new parallel file system that is intended to efficiently support realistic parallel workloads. We discuss Galley's file structure and application interface, as well as an application that has been implemented using that interface.

  4. Deceit: A flexible distributed file system

    NASA Technical Reports Server (NTRS)

    Siegel, Alex; Birman, Kenneth; Marzullo, Keith

    1989-01-01

    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness.

  5. Sibling Sexual Abuse: An Empirical Analysis of Offender, Victim, and Event Characteristics in National Incident-Based Reporting System (NIBRS) Data, 2000-2007

    ERIC Educational Resources Information Center

    Krienert, Jessie L.; Walsh, Jeffrey A.

    2011-01-01

    Sibling sexual abuse is identified as the most common form of familial sexual abuse. Extant literature is plagued by definitional inconsistencies, data limitations, and inadequate research methodology. Trivialized as "normal" sexual exploration, sibling sexual abuse has been linked to psychosocial/psychosexual dysfunction. Research has relied on…

  6. Evaluation of Drug Abuse Treatment Effectiveness: Summary of the DARP Followup Research. Treatment Research Report.

    ERIC Educational Resources Information Center

    Simpson, D. Dwayne; Sells, S. B.

    The Drug Abuse Reporting Program (DARP) was initiated in 1969 as a federally supported client reporting system for community-based drug abuse treatment programs. Posttreatment follow-up interviews were conducted with over 4,000 persons from 34 treatment agencies to describe major findings from the drug abuse treatment research of the DARP relating…

  7. 48 CFR 204.805 - Disposal of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Disposal of contract files. 204.805 Section 204.805 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.805 Disposal of contract files. (1...

  8. 48 CFR 204.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Closeout of contract files. 204.804 Section 204.804 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.804 Closeout of contract files. (1...

  9. 48 CFR 204.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Closeout of contract files. 204.804 Section 204.804 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.804 Closeout of contract files...

  10. 48 CFR 204.805 - Disposal of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Disposal of contract files. 204.805 Section 204.805 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.805 Disposal of contract files. (1...

  11. 48 CFR 204.805 - Disposal of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Disposal of contract files. 204.805 Section 204.805 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.805 Disposal of contract files. (1...

  12. 48 CFR 204.805 - Disposal of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Disposal of contract files. 204.805 Section 204.805 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.805 Disposal of contract files. (1...

  13. 48 CFR 204.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Closeout of contract files. 204.804 Section 204.804 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.804 Closeout of contract files...

  14. 48 CFR 204.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Closeout of contract files. 204.804 Section 204.804 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.804 Closeout of contract files. (1...

  15. 48 CFR 204.805 - Disposal of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Disposal of contract files. 204.805 Section 204.805 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.805 Disposal of contract files. (1...

  16. 48 CFR 204.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Closeout of contract files. 204.804 Section 204.804 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Files 204.804 Closeout of contract files. (1...

  17. Risk for Intimate Partner Violence and Child Physical Abuse: Psychosocial Characteristics of Multirisk Male and Female Navy Recruits

    DTIC Science & Technology

    2004-02-01

    Abuse Scale of the Child Abuse Potential (CAP) In- ventory. The CAP is a 160-item, forced-choice (i.e., agree or disagree), self-report questionnaire... child abuse (Milner, Gold, Ayoub, & Jacewitz, 1984). Even when CAP scores are obtained before a child is born, they predict later negative child out...integrating domes- tic violence and child abuse prevention services may be exacerbated by the fact that these systems tend to converge around cases in

  18. pcircle - A Suite of Scalable Parallel File System Tools

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    WANG, FEIYI

    2015-10-01

    Most of the software related to file system are written for conventional local file system, they are serialized and can't take advantage of the benefit of a large scale parallel file system. "pcircle" software builds on top of ubiquitous MPI in cluster computing environment and "work-stealing" pattern to provide a scalable, high-performance suite of file system tools. In particular - it implemented parallel data copy and parallel data checksumming, with advanced features such as async progress report, checkpoint and restart, as well as integrity checking.

  19. Optimizing Input/Output Using Adaptive File System Policies

    NASA Technical Reports Server (NTRS)

    Madhyastha, Tara M.; Elford, Christopher L.; Reed, Daniel A.

    1996-01-01

    Parallel input/output characterization studies and experiments with flexible resource management algorithms indicate that adaptivity is crucial to file system performance. In this paper we propose an automatic technique for selecting and refining file system policies based on application access patterns and execution environment. An automatic classification framework allows the file system to select appropriate caching and pre-fetching policies, while performance sensors provide feedback used to tune policy parameters for specific system environments. To illustrate the potential performance improvements possible using adaptive file system policies, we present results from experiments involving classification-based and performance-based steering.

  20. Apically extruded dentin debris by reciprocating single-file and multi-file rotary system.

    PubMed

    De-Deus, Gustavo; Neves, Aline; Silva, Emmanuel João; Mendonça, Thais Accorsi; Lourenço, Caroline; Calixto, Camila; Lima, Edson Jorge Moreira

    2015-03-01

    This study aims to evaluate the apical extrusion of debris by the two reciprocating single-file systems: WaveOne and Reciproc. Conventional multi-file rotary system was used as a reference for comparison. The hypotheses tested were (i) the reciprocating single-file systems extrude more than conventional multi-file rotary system and (ii) the reciprocating single-file systems extrude similar amounts of dentin debris. After solid selection criteria, 80 mesial roots of lower molars were included in the present study. The use of four different instrumentation techniques resulted in four groups (n = 20): G1 (hand-file technique), G2 (ProTaper), G3 (WaveOne), and G4 (Reciproc). The apparatus used to evaluate the collection of apically extruded debris was typical double-chamber collector. Statistical analysis was performed for multiple comparisons. No significant difference was found in the amount of the debris extruded between the two reciprocating systems. In contrast, conventional multi-file rotary system group extruded significantly more debris than both reciprocating groups. Hand instrumentation group extruded significantly more debris than all other groups. The present results yielded favorable input for both reciprocation single-file systems, inasmuch as they showed an improved control of apically extruded debris. Apical extrusion of debris has been studied extensively because of its clinical relevance, particularly since it may cause flare-ups, originated by the introduction of bacteria, pulpal tissue, and irrigating solutions into the periapical tissues.

  1. Sacramento-Watt Avenue transit priority and mobility enhancement demonstration project: phase III evaluation report

    DOT National Transportation Integrated Search

    2001-02-01

    The Minnesota data system includes the following basic files: Accident data (Accident File, Vehicle File, Occupant File); Roadlog File; Reference Post File; Traffic File; Intersection File; Bridge (Structures) File; and RR Grade Crossing File. For ea...

  2. On-Board File Management and Its Application in Flight Operations

    NASA Technical Reports Server (NTRS)

    Kuo, N.

    1998-01-01

    In this paper, the author presents the minimum functions required for an on-board file management system. We explore file manipulation processes and demonstrate how the file transfer along with the file management system will be utilized to support flight operations and data delivery.

  3. 47 CFR 1.10006 - Is electronic filing mandatory?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Is electronic filing mandatory? 1.10006 Section... Random Selection International Bureau Filing System § 1.10006 Is electronic filing mandatory? Electronic... International Bureau Filing System (IBFS) form is available. Applications for which an electronic form is not...

  4. 47 CFR 1.10006 - Is electronic filing mandatory?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Is electronic filing mandatory? 1.10006 Section... Random Selection International Bureau Filing System § 1.10006 Is electronic filing mandatory? Electronic... International Bureau Filing System (IBFS) form is available. Applications for which an electronic form is not...

  5. 47 CFR 1.10006 - Is electronic filing mandatory?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Is electronic filing mandatory? 1.10006 Section... Random Selection International Bureau Filing System § 1.10006 Is electronic filing mandatory? Electronic... International Bureau Filing System (IBFS) form is available. Applications for which an electronic form is not...

  6. 10 CFR 2.302 - Filing of documents.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... this part shall be electronically transmitted through the E-Filing system, unless the Commission or... all methods of filing have been completed. (e) For filings by electronic transmission, the filer must... digital ID certificates, the NRC permits participants in the proceeding to access the E-Filing system to...

  7. 48 CFR 1404.805 - Disposal of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Disposal of contract files. 1404.805 Section 1404.805 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.805 Disposal of contract files. Disposition of files shall be...

  8. 48 CFR 1404.802 - Contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  9. 48 CFR 1404.802 - Contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  10. 48 CFR 1404.802 - Contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  11. 48 CFR 1404.805 - Disposal of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Disposal of contract files. 1404.805 Section 1404.805 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.805 Disposal of contract files. Disposition of files shall be...

  12. 48 CFR 1404.805 - Disposal of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Disposal of contract files. 1404.805 Section 1404.805 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.805 Disposal of contract files. Disposition of files shall be...

  13. 48 CFR 1404.805 - Disposal of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Disposal of contract files. 1404.805 Section 1404.805 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.805 Disposal of contract files. Disposition of files shall be...

  14. 48 CFR 1404.802 - Contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  15. 48 CFR 1404.805 - Disposal of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Disposal of contract files. 1404.805 Section 1404.805 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.805 Disposal of contract files. Disposition of files shall be...

  16. 48 CFR 1404.802 - Contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  17. The Galley Parallel File System

    NASA Technical Reports Server (NTRS)

    Nieuwejaar, Nils; Kotz, David

    1996-01-01

    Most current multiprocessor file systems are designed to use multiple disks in parallel, using the high aggregate bandwidth to meet the growing I/0 requirements of parallel scientific applications. Many multiprocessor file systems provide applications with a conventional Unix-like interface, allowing the application to access multiple disks transparently. This interface conceals the parallelism within the file system, increasing the ease of programmability, but making it difficult or impossible for sophisticated programmers and libraries to use knowledge about their I/O needs to exploit that parallelism. In addition to providing an insufficient interface, most current multiprocessor file systems are optimized for a different workload than they are being asked to support. We introduce Galley, a new parallel file system that is intended to efficiently support realistic scientific multiprocessor workloads. We discuss Galley's file structure and application interface, as well as the performance advantages offered by that interface.

  18. Medicaid Disenrollment Patterns Among Children Coming into Contact with Child Welfare Agencies.

    PubMed

    Raghavan, Ramesh; Allaire, Benjamin T; Brown, Derek S; Ross, Raven E

    2016-06-01

    Objectives To examine retention of Medicaid coverage over time for children in the child welfare system. Methods We linked a national survey of children with histories of abuse and neglect to their Medicaid claims files from 36 states, and followed these children over a 4 year period. We estimated a Cox proportional hazards model on time to first disenrollment from Medicaid. Results Half of our sample (50 %) retained Medicaid coverage across 4 years of follow up. Most disenrollments occurred in year 4. Being 3-5 years of age and rural residence were associated with increased hazard of insurance loss. Fee-for-service Medicaid and other non-managed insurance arrangements were associated with a lower hazard of insurance loss. Conclusions for Practice A considerable number of children entering child environments seem to retain Medicaid coverage over multiple years. Finding ways to promote entry of child welfare-involved children into health insurance coverage will be critical to assure services for this highly vulnerable population.

  19. Units of Instruction for Vocational Office Education. Volume 1. Filing, Office Machines, and General Office Clerical Occupations. Teacher's Guide.

    ERIC Educational Resources Information Center

    East Texas State Univ., Commerce. Occupational Curriculum Lab.

    Nineteen units on filing, office machines, and general office clerical occupations are presented in this teacher's guide. The unit topics include indexing, alphabetizing, and filing (e.g., business names); labeling and positioning file folders and guides; establishing a correspondence filing system; utilizing charge-out and follow-up file systems;…

  20. DRUG ABUSE WARNING NETWORK (DAWN) DATABASE

    EPA Science Inventory

    The Drug Abuse Warning Network (DAWN) is an ongoing drug abuse data collection system sponsored by SAMHSA's Office of Applied Studies. DAWN collects data from: (1) hospital emergency departments (EDs) and (2) medical examiners (MEs). The DAWN ED component relies on a nationally r...

  1. 78 FR 77692 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Substance Abuse and Mental Health Services Administration... proposed collections of information, the Substance Abuse and Mental Health Services Administration (SAMHSA... Systems--NEW The Substance Abuse and Mental Health Services Administration (SAMHSA), Center for Behavioral...

  2. Sex differences in disinhibition and its relationship to physical abuse in a sample of stimulant-dependent patients.

    PubMed

    Winhusen, Theresa; Lewis, Daniel

    2013-04-01

    Research suggests that impulsivity is a vulnerability factor for developing stimulant dependence, that women develop dependence more quickly than men, and that physical abuse can increase impulsivity and may have greater adverse health consequences in women. This study sought to tie these findings together by evaluating: (1) sex differences in disinhibition prior to lifetime initiation of stimulant abuse and (2) the relationship between physical abuse and disinhibition in stimulant-dependent patients. The Frontal Systems Behavior Scale (FrSBe) is a reliable and valid self-report assessment of three neurobehavioral domains associated with frontal systems functioning (Apathy, Disinhibition, and Executive Dysfunction, summed for a Total), that assesses pre-morbid functioning and has a specific cutoff for defining clinically significant abnormalities. Six sites evaluating 12-step facilitation for stimulant abusers obtained the FrSBe from 118 methamphetamine- and/or cocaine-dependent participants. Lifetime physical abuse was measured by the Addiction Severity Index (ASI). The proportion reporting clinically significant disinhibition was significantly higher in women (64.9%) than in men (45.0%, p=0.04), with no significant difference on the other FrSBe scales. Physical abuse in women, but not men, was associated with worse functioning, with physically abused, relative to non-abused, women having a significantly greater proportion with clinically significant disinhibition (p<0.01) and total neurobehavioral abnormalities (p<0.01). These findings suggest that women may have significantly greater disinhibition than men prior to lifetime initiation of stimulant abuse and that physical abuse in women is associated with greater disinhibition. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  3. LVFS: A Scalable Petabye/Exabyte Data Storage System

    NASA Astrophysics Data System (ADS)

    Golpayegani, N.; Halem, M.; Masuoka, E. J.; Ye, G.; Devine, N. K.

    2013-12-01

    Managing petabytes of data with hundreds of millions of files is the first step necessary towards an effective big data computing and collaboration environment in a distributed system. We describe here the MODAPS LAADS Virtual File System (LVFS), a new storage architecture which replaces the previous MODAPS operational Level 1 Land Atmosphere Archive Distribution System (LAADS) NFS based approach to storing and distributing datasets from several instruments, such as MODIS, MERIS, and VIIRS. LAADS is responsible for the distribution of over 4 petabytes of data and over 300 million files across more than 500 disks. We present here the first LVFS big data comparative performance results and new capabilities not previously possible with the LAADS system. We consider two aspects in addressing inefficiencies of massive scales of data. First, is dealing in a reliable and resilient manner with the volume and quantity of files in such a dataset, and, second, minimizing the discovery and lookup times for accessing files in such large datasets. There are several popular file systems that successfully deal with the first aspect of the problem. Their solution, in general, is through distribution, replication, and parallelism of the storage architecture. The Hadoop Distributed File System (HDFS), Parallel Virtual File System (PVFS), and Lustre are examples of such file systems that deal with petabyte data volumes. The second aspect deals with data discovery among billions of files, the largest bottleneck in reducing access time. The metadata of a file, generally represented in a directory layout, is stored in ways that are not readily scalable. This is true for HDFS, PVFS, and Lustre as well. Recent experimental file systems, such as Spyglass or Pantheon, have attempted to address this problem through redesign of the metadata directory architecture. LVFS takes a radically different architectural approach by eliminating the need for a separate directory within the file system. The LVFS system replaces the NFS disk mounting approach of LAADS and utilizes the already existing highly optimized metadata database server, which is applicable to most scientific big data intensive compute systems. Thus, LVFS ties the existing storage system with the existing metadata infrastructure system which we believe leads to a scalable exabyte virtual file system. The uniqueness of the implemented design is not limited to LAADS but can be employed with most scientific data processing systems. By utilizing the Filesystem In Userspace (FUSE), a kernel module available in many operating systems, LVFS was able to replace the NFS system while staying POSIX compliant. As a result, the LVFS system becomes scalable to exabyte sizes owing to the use of highly scalable database servers optimized for metadata storage. The flexibility of the LVFS design allows it to organize data on the fly in different ways, such as by region, date, instrument or product without the need for duplication, symbolic links, or any other replication methods. We proposed here a strategic reference architecture that addresses the inefficiencies of scientific petabyte/exabyte file system access through the dynamic integration of the observing system's large metadata file.

  4. Oxytocin Receptor Genetic and Epigenetic Variations: Association With Child Abuse and Adult Psychiatric Symptoms.

    PubMed

    Smearman, Erica L; Almli, Lynn M; Conneely, Karen N; Brody, Gene H; Sales, Jessica M; Bradley, Bekh; Ressler, Kerry J; Smith, Alicia K

    2016-01-01

    Childhood abuse can alter biological systems and increase risk for adult psychopathology. Epigenetic mechanisms, alterations in DNA structure that regulate the gene expression, are a potential mechanism underlying this risk. While abuse associates with methylation of certain genes, particularly those in the stress response system, no study to date has evaluated abuse and methylation of the oxytocin receptor (OXTR). However, studies support a role for OXTR in the link between abuse and adverse adult outcomes, showing that abuse can confer greater risk for psychiatric symptoms in those with specific OXTR genotypes. This study therefore sought to (a) assess the role of epigenetics in the link between abuse and psychopathology and (b) begin to integrate the genetic and epigenetic literature by exploring associations between OXTR genotypes and DNA CpG methylation. Data on 18 OXTR CpG sites, 44 single nucleotide polymorphisms, childhood abuse, and adult depression and anxiety symptoms were assessed in 393 African American adults (age = 41 ± 12.8 years). Overall, 68% of genotypes were associated with methylation of nearby CpG sites, with a subset surviving multiple test correction. Child abuse associated with higher methylation of two CpG sites yet did not survive correction or serve as a mediator of psychopathology. However, abuse interacted with CpG methylation to predict psychopathology. These findings suggest a role for OXTR in understanding the influence of early environments on adult psychiatric symptoms. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  5. Workplace violence. A focus on verbal abuse and intent to leave the organization.

    PubMed

    Sofield, Laura; Salmond, Susan W

    2003-01-01

    To describe the experience of verbal abuse in a large multihospital system and determine the relationship of verbal abuse with intent to leave the organization. Descriptive correlational design using mailed questionnaires. Randomized sample of 1000 nurses received questionnaire; 46% response rate, with a final useable sample of 461 surveys. Of the respondents, 91% had experienced verbal abuse in the past month. The physician was the most frequent source of verbal abuse, followed by patients, patient families, peers, supervisors, and subordinates. More than 50% of the sample did not feel competent in responding to verbal abuse. Amount of abuse and intent to leave were significantly related (r = .211, p < .01). Organizations must adopt zero-tolerance policies for professional verbal abuse. Education and coaching are needed to help nurses to improve their skills when responding to patient-to-nurse and professional-to-professional verbal abuse.

  6. Emotional functioning, attachment style, and attributions as predictors of child abuse potential in domestic violence victims.

    PubMed

    Rodriguez, Christina M

    2006-04-01

    To explore cognitive and emotional factors that may exacerbate child-abuse potential among domestic violence victims, 80 participants reported on their depression, hopelessness, anxiety, and anger as well as their attachment style and attributional style. Increased emotional difficulties as well as insecure attachment styles were significantly positively correlated with child abuse potential, although depression and anxiety were the strongest predictors. Externalizing blame for the spousal abuse was not associated with abuse risk. Women residing in shelters demonstrated significantly greater abuse risk than those in transitional housing programs, suggesting that greater temporal proximity to the spousal abuse may in part account for the increased abuse potential. Depression and hopelessness, however, appeared particularly relevant to increased abuse risk in domestic violence victims in the transitional housing system. Implications of these findings for working with battered women in terms of their emotional functioning and attachment style are discussed.

  7. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  8. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  9. Dynamic Non-Hierarchical File Systems for Exascale Storage

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Long, Darrell E.; Miller, Ethan L

    This constitutes the final report for “Dynamic Non-Hierarchical File Systems for Exascale Storage”. The ultimate goal of this project was to improve data management in scientific computing and high-end computing (HEC) applications, and to achieve this goal we proposed: to develop the first, HEC-targeted, file system featuring rich metadata and provenance collection, extreme scalability, and future storage hardware integration as core design goals, and to evaluate and develop a flexible non-hierarchical file system interface suitable for providing more powerful and intuitive data management interfaces to HEC and scientific computing users. Data management is swiftly becoming a serious problem in themore » scientific community – while copious amounts of data are good for obtaining results, finding the right data is often daunting and sometimes impossible. Scientists participating in a Department of Energy workshop noted that most of their time was spent “...finding, processing, organizing, and moving data and it’s going to get much worse”. Scientists should not be forced to become data mining experts in order to retrieve the data they want, nor should they be expected to remember the naming convention they used several years ago for a set of experiments they now wish to revisit. Ideally, locating the data you need would be as easy as browsing the web. Unfortunately, existing data management approaches are usually based on hierarchical naming, a 40 year-old technology designed to manage thousands of files, not exabytes of data. Today’s systems do not take advantage of the rich array of metadata that current high-end computing (HEC) file systems can gather, including content-based metadata and provenance1 information. As a result, current metadata search approaches are typically ad hoc and often work by providing a parallel management system to the “main” file system, as is done in Linux (the locate utility), personal computers, and enterprise search appliances. These search applications are often optimized for a single file system, making it difficult to move files and their metadata between file systems. Users have tried to solve this problem in several ways, including the use of separate databases to index file properties, the encoding of file properties into file names, and separately gathering and managing provenance data, but none of these approaches has worked well, either due to limited usefulness or scalability, or both. Our research addressed several key issues: High-performance, real-time metadata harvesting: extracting important attributes from files dynamically and immediately updating indexes used to improve search; Transparent, automatic, and secure provenance capture: recording the data inputs and processing steps used in the production of each file in the system; Scalable indexing: indexes that are optimized for integration with the file system; Dynamic file system structure: our approach provides dynamic directories similar to those in semantic file systems, but these are the native organization rather than a feature grafted onto a conventional system. In addition to these goals, our research effort will include evaluating the impact of new storage technologies on the file system design and performance. In particular, the indexing and metadata harvesting functions can potentially benefit from the performance improvements promised by new storage class memories.« less

  10. A Filing System for Medical Literature

    PubMed Central

    Cumming, Millie

    1988-01-01

    The author reviews the types of systems available for personal literature files and makes specific recommendations for filing systems for family physicians. A personal filing system can be an integral part of family practice, and need not require time out of proportion to the worth of the system. Because it is a personal system, different types will suit different users; some systems, however, are more reliable than others for use in family practice. (Can Fam Physician 1988; 34:425-433.) PMID:21253062

  11. 76 FR 20356 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... details State responsibilities to report specific information related to child abuse and neglect. CFR 1355...) of the Social Security Act; the National Child Abuse and Neglect Data System (NCANDS); Child Abuse... DEPARTMENT OF HEALTH AND HUMAN SERVICES Administration for Children and Families Submission for...

  12. 76 FR 28438 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... details State responsibilities to report specific information related to child abuse and neglect. CFR 1355...) of the Social Security Act; the National Child Abuse and Neglect Data System (NCANDS); Child Abuse... DEPARTMENT OF HEALTH AND HUMAN SERVICES Administration for Children and Families Submission for...

  13. 48 CFR 970.2305 - Workplace substance abuse programs-management and operating contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Workplace substance abuse programs-management and operating contracts. 970.2305 Section 970.2305 Federal Acquisition Regulations... Work Place 970.2305 Workplace substance abuse programs—management and operating contracts. ...

  14. 48 CFR 970.2305 - Workplace substance abuse programs-management and operating contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Workplace substance abuse programs-management and operating contracts. 970.2305 Section 970.2305 Federal Acquisition Regulations... Work Place 970.2305 Workplace substance abuse programs—management and operating contracts. ...

  15. 48 CFR 970.2305 - Workplace substance abuse programs-management and operating contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Workplace substance abuse programs-management and operating contracts. 970.2305 Section 970.2305 Federal Acquisition Regulations... Work Place 970.2305 Workplace substance abuse programs—management and operating contracts. ...

  16. 48 CFR 970.2305 - Workplace substance abuse programs-management and operating contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Workplace substance abuse programs-management and operating contracts. 970.2305 Section 970.2305 Federal Acquisition Regulations... Work Place 970.2305 Workplace substance abuse programs—management and operating contracts. ...

  17. Child Maltreatment and Delinquency Onset Among African American Adolescent Males

    PubMed Central

    Williams, James Herbert; Van Dorn, Richard A.; Bright, Charlotte Lyn; Jonson-Reid, Melissa; Nebbitt, Von E.

    2013-01-01

    Child welfare and criminology research have increasingly sought to better understand factors that increase the likelihood that abused and neglected children will become involved in the juvenile justice system. However, few studies have addressed this relationship among African American male adolescents. The current study examines the relationship between child maltreatment (i.e., neglect, physical abuse, sexual abuse, and other/mixed abuse) and the likelihood of a delinquency petition using a sample of African American males (N = 2,335) born before 1990. Multivariable logistic regression models compared those with a delinquency-based juvenile justice petition to those without. Results indicate that African American males with a history of neglect, physical abuse, or other/mixed abuse were more likely to be involved in the juvenile justice system than those without any child maltreatment. Additionally, multiple maltreatment reports, a prior history of mental health treatment, victimization, and having a parent who did not complete high school also increased the likelihood of a delinquency petition. Implications for intervention and prevention are discussed. PMID:23730121

  18. Possible Barriers to Enrollment in Substance Abuse Treatment among a Diverse Sample of Asian Americans and Pacific Islanders: Opinions of Treatment Clients

    PubMed Central

    Masson, Carmen L.; Shopshire, Michael S.; Sen, Soma; Hoffman, Kim; Hengl, Nicholas; Bartolome, John; McCarty, Dennis; Sorensen, James L.; Iguchi, Martin

    2012-01-01

    This mixed methods study examined motivations and barriers to substance abuse treatment entry and treatment continuation among Asian American and Pacific Islander (AAPI) substance users. AAPI substance users (N = 61) were recruited from substance abuse treatment programs in California and Hawaii. Semi-structured interviews and interviewer-administered surveys assessed barriers and facilitators to entering substance abuse treatment. Barriers included peer pressure, family influences, and face loss concerns. Facilitators included peer support, involvement in the criminal justice system, a perceived need for treatment, and culturally competent substance abuse treatment services. Family and peer influences may act as both facilitators and impediments. AAPI substance using populations face many of the same individual-level and structural and systems barriers to entry to treatment as other substance using populations. However, similar to other racial/ethnic minority groups, it is important to address cultural differences and develop culturally competent substance abuse treatments for the AAPI population. PMID:22985677

  19. Child Maltreatment and Delinquency Onset Among African American Adolescent Males.

    PubMed

    Williams, James Herbert; Van Dorn, Richard A; Bright, Charlotte Lyn; Jonson-Reid, Melissa; Nebbitt, Von E

    2010-05-01

    Child welfare and criminology research have increasingly sought to better understand factors that increase the likelihood that abused and neglected children will become involved in the juvenile justice system. However, few studies have addressed this relationship among African American male adolescents. The current study examines the relationship between child maltreatment (i.e., neglect, physical abuse, sexual abuse, and other/mixed abuse) and the likelihood of a delinquency petition using a sample of African American males ( N = 2,335) born before 1990. Multivariable logistic regression models compared those with a delinquency-based juvenile justice petition to those without. Results indicate that African American males with a history of neglect, physical abuse, or other/mixed abuse were more likely to be involved in the juvenile justice system than those without any child maltreatment. Additionally, multiple maltreatment reports, a prior history of mental health treatment, victimization, and having a parent who did not complete high school also increased the likelihood of a delinquency petition. Implications for intervention and prevention are discussed.

  20. Possible barriers to enrollment in substance abuse treatment among a diverse sample of Asian Americans and Pacific Islanders: opinions of treatment clients.

    PubMed

    Masson, Carmen L; Shopshire, Michael S; Sen, Soma; Hoffman, Kim A; Hengl, Nicholas S; Bartolome, John; McCarty, Dennis; Sorensen, James L; Iguchi, Martin Y

    2013-03-01

    This mixed methods study examined motivations and barriers to substance abuse treatment entry and treatment continuation among Asian American and Pacific Islander (AAPI) substance users. AAPI substance users (N = 61) were recruited from substance abuse treatment programs in California and Hawaii. Semi-structured interviews and interviewer-administered surveys assessed barriers and facilitators to entering substance abuse treatment. Barriers included peer pressure, family influences, and face loss concerns. Facilitators included peer support, involvement in the criminal justice system, a perceived need for treatment, and culturally competent substance abuse treatment services. Family and peer influences may act as both facilitators and impediments. AAPI substance using populations face many of the same individual-level and structural and systems barriers to entry to treatment as other substance using populations. However, similar to other racial/ethnic minority groups, it is important to address cultural differences and develop culturally competent substance abuse treatments for the AAPI population. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. Use and abuse of prescribed opioids, central nervous system depressants, and stimulants among U.S. active duty military personnel in FY 2010.

    PubMed

    Jeffery, Diana D; May, Laurie; Luckey, Bill; Balison, Barbara M; Klette, Kevin L

    2014-10-01

    This study establishes rates of use/abuse of Schedule II-IV prescription medications in U.S. active duty military personnel, and characterizes correlates of such use/abuse. All active duty personnel serving for 12 months during fiscal year 2010 were included. Data were obtained from medical and pharmacy claims and drug screening results. Logistic regression models were used to examine predictors of drug use, along with bivariate analyses to compare abuse of prescribed and illegal drugs. Nearly one-third of active duty service members received at least one prescription for opioids, central nervous system depressants, or stimulants, with 26.4% having received at least one prescription for opioids. About 0.7%, 1.4%, and 0.6% of the total force received >90-day prescriptions for opioids, central nervous system depressants, or stimulants, respectively. Battlefield injury, receipt of psychotropic medications, and substance abuse adverse events were predictive of >90-day supply of opioids. About 0.7% of the total force had documented known drug abuse for prescribed drugs compared to 0.4% for illegal drug abuse. We recommend systematic monitoring of prescriptions for controlled substances which may carry serious consequences, evaluation of the impact of controlled substances on military readiness, and examination of the rationale for prescribing controlled drugs. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  2. Abuse-resistant drug delivery.

    PubMed

    DuPont, Robert L; Bensinger, Peter B

    2006-08-01

    In attempting to reduce the nonmedical use of controlled substances, a reasonable step is to educate the physicians prescribing controlled substances, including the prescription stimulants used to treat ADHD, as well as patients and family members, about the risks of nonmedical use and the dangers of giving or selling these medicines to persons for whom they were not prescribed. Patients who find benefits in the use of such medicines have a significant interest in protecting their continued access to them. Such access is potentially threatened by concerns about widespread nonmedical use. Physicians can help protect the appropriate medical use of prescription stimulants by considering the abuse potential of various medicines used to treat patients with ADHD, especially when these patients also have a history of nonmedical substance use. In addition, we suggest that today there is an opportunity to add a new and perhaps more hopeful paradigm: the wider use of drug delivery systems that make products less attractive to drug abusers. This new drug abuse prevention paradigm holds great promise for efforts to reduce the nonmedical use of prescription controlled substances, including the prescription stimulants used to treat ADHD. To achieve the full potential of this new paradigm to reduce prescription drug abuse, it will be necessary to develop standards to assess the relative abuse resistance of various drug formulations and delivery systems, as well as meaningful incentives to foster the development of these abuse-resistant delivery systems for controlled substances.

  3. An overview of the National Space Science data Center Standard Information Retrieval System (SIRS)

    NASA Technical Reports Server (NTRS)

    Shapiro, A.; Blecher, S.; Verson, E. E.; King, M. L. (Editor)

    1974-01-01

    A general overview is given of the National Space Science Data Center (NSSDC) Standard Information Retrieval System. A description, in general terms, the information system that contains the data files and the software system that processes and manipulates the files maintained at the Data Center. Emphasis is placed on providing users with an overview of the capabilities and uses of the NSSDC Standard Information Retrieval System (SIRS). Examples given are taken from the files at the Data Center. Detailed information about NSSDC data files is documented in a set of File Users Guides, with one user's guide prepared for each file processed by SIRS. Detailed information about SIRS is presented in the SIRS Users Guide.

  4. 29 CFR 4902.11 - Specific exemptions: Office of Inspector General Investigative File System.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Investigative File System. 4902.11 Section 4902.11 Labor Regulations Relating to Labor (Continued) PENSION... General Investigative File System. (a) Criminal Law Enforcement. (1) Exemption. Under the authority... Inspector General Investigative File System—PBGC” from the provisions of 5 U.S.C. 552a (c)(3), (c)(4), (d)(1...

  5. 29 CFR 4902.11 - Specific exemptions: Office of Inspector General Investigative File System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Investigative File System. 4902.11 Section 4902.11 Labor Regulations Relating to Labor (Continued) PENSION... General Investigative File System. (a) Criminal Law Enforcement. (1) Exemption. Under the authority... Inspector General Investigative File System—PBGC” from the provisions of 5 U.S.C. 552a (c)(3), (c)(4), (d)(1...

  6. 29 CFR 4902.11 - Specific exemptions: Office of Inspector General Investigative File System.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Investigative File System. 4902.11 Section 4902.11 Labor Regulations Relating to Labor (Continued) PENSION... General Investigative File System. (a) Criminal Law Enforcement. (1) Exemption. Under the authority... Inspector General Investigative File System—PBGC” from the provisions of 5 U.S.C. 552a (c)(3), (c)(4), (d)(1...

  7. 29 CFR 4902.11 - Specific exemptions: Office of Inspector General Investigative File System.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Investigative File System. 4902.11 Section 4902.11 Labor Regulations Relating to Labor (Continued) PENSION... General Investigative File System. (a) Criminal Law Enforcement. (1) Exemption. Under the authority... Inspector General Investigative File System—PBGC” from the provisions of 5 U.S.C. 552a (c)(3), (c)(4), (d)(1...

  8. 29 CFR 4902.11 - Specific exemptions: Office of Inspector General Investigative File System.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Investigative File System. 4902.11 Section 4902.11 Labor Regulations Relating to Labor (Continued) PENSION... General Investigative File System. (a) Criminal Law Enforcement. (1) Exemption. Under the authority... Inspector General Investigative File System—PBGC” from the provisions of 5 U.S.C. 552a (c)(3), (c)(4), (d)(1...

  9. 75 FR 61741 - Combined Notice of Filings No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Refund Report filings: Docket Numbers: RP10-1305-000. Applicants: Venice Gathering System, L.L.C. Description: Venice Gathering System, L.L.C. submits tariff filing per 154.203: NAESB 1.9 Compliance Filing to...

  10. What were they thinking? Men who murder an intimate partner.

    PubMed

    Dobash, R Emerson; Dobash, Russell P

    2011-01-01

    The focus is on cognitions of men who murder an intimate partner and includes thinking prior to and after the murder. Based on the Murder in Britain Study, the qualitative accounts of various professionals included in the case-files of 104 men convicted of murdering a woman partner are used to examine beliefs about intimate relationships, orientations toward violence and previous violence to the victim, as well as subsequent denials, rationalizations, and justifications. We conclude that these and other cognitions are important elements of intimate partner murder and must be challenged and changed in efforts to eliminate nonlethal abuse and murder.

  11. Transforming the Army Central Registry Family Violence File into a Relational Database for the Purpose of Facilitating Epidemiological Research

    DTIC Science & Technology

    2005-07-01

    child abuse events. ACR data were originally collected for administrative purposes and, without significant adaptation, are not immediately suitable for epidemiological analyses. Our ultimate research goal is to link ACR data for individuals involved in single or multiple events as victims, perpetrators, or both to health behavior, health outcome and demographic data. This will allow us to identity precipitating factors,follow individuals after an event, and understand how different events are related. This report details the steps taken to transform the ACR data into a

  12. Efficacy of ProTaper universal retreatment files in removing filling materials during root canal retreatment.

    PubMed

    Giuliani, Valentina; Cocchetti, Roberto; Pagavino, Gabriella

    2008-11-01

    The aim of this study was to evaluate the efficacy of the ProTaper Universal System rotary retreatment system and of Profile 0.06 and hand instruments (K-file) in the removal of root filling materials. Forty-two extracted single-rooted anterior teeth were selected. The root canals were enlarged with nickel-titanium (NiTi) rotary files, filled with gutta-percha and sealer, and randomly divided into 3 experimental groups. The filling materials were removed with solvent in conjunction with one of the following devices and techniques: the ProTaper Universal System for retreatment, ProFile 0.06, and hand instruments (K-file). The roots were longitudinally sectioned, and the image of the root surface was photographed. The images were captured in JPEG format; the areas of the remaining filling materials and the time required for removing the gutta-percha and sealer were calculated by using the nonparametric one-way Kruskal-Wallis test and Tukey-Kramer tests, respectively. The group that showed better results for removing filling materials was the ProTaper Universal System for retreatment files, whereas the group of ProFile rotary instruments yielded better root canal cleanliness than the hand instruments, even though there was no statistically significant difference. The ProTaper Universal System for retreatment and ProFile rotary instruments worked significantly faster than the K-file. The ProTaper Universal System for retreatment files left cleaner root canal walls than the K-file hand instruments and the ProFile Rotary instruments, although none of the devices used guaranteed complete removal of the filling materials. The rotary NiTi system proved to be faster than hand instruments in removing root filling materials.

  13. Validez Convergente de la Version Espanola Preliminar del Child Abuse Potential Inventory: Depresion y Aduste Marital (Convergent Validity of the Preliminary Spanish Version of the Child Abuse Potential Inventory: Depression and Marital Adjustment).

    ERIC Educational Resources Information Center

    Arruabarrena, M. Ignacia; de Paul, Joaquin

    1992-01-01

    "Convergent validity" of preliminary Spanish version of Child Abuse Potential (CAP) Inventory was studied. CAP uses ecological-systemic model of child maltreatment to evaluate individual, family, and social factors facilitating physical child abuse. Depression and marital adjustment were measured in three groups of mothers. Results found…

  14. Improving File System Performance by Striping

    NASA Technical Reports Server (NTRS)

    Lam, Terance L.; Kutler, Paul (Technical Monitor)

    1998-01-01

    This document discusses the performance and advantages of striped file systems on the SGI AD workstations. Performance of several striped file system configurations are compared and guidelines for optimal striping are recommended.

  15. The Many Victims of Substance Abuse

    PubMed Central

    2007-01-01

    Substance abuse is a complicated disorder and has far reaching consequences. The victims of substance abuse extend beyond the unfortunate ones suffering from this disorder and often include family and friends. Treatment options for substance abuse are many; however, positive outcomes are not always guaranteed. Many factors play into the potential for successful treatment. Some of these include the adherence and motivation of the substance abusing patients as well as patients' surrounding environments and support systems. In this article, we present a clinical case of opioid dependence and discuss various treatment options and modalities. We will discuss different variables that may maximize positive treatment outcomes. Also a review of the current literature regarding substance abuse treatment, psychotherapy with the drug abuser, and grief therapy should the substance abusing patient die for the surviving family members will be presented. PMID:20532120

  16. Drugs of abuse and Parkinson's disease.

    PubMed

    Mursaleen, Leah R; Stamford, Jonathan A

    2016-01-04

    The term "drug of abuse" is highly contextual. What constitutes a drug of abuse for one population of patients does not for another. It is therefore important to examine the needs of the patient population to properly assess the status of drugs of abuse. The focus of this article is on the bidirectional relationship between patients and drug abuse. In this paper we will introduce the dopaminergic systems of the brain in Parkinson's and the influence of antiparkinsonian drugs upon them before discussing this synergy of condition and medication as fertile ground for drug abuse. We will then examine the relationship between drugs of abuse and Parkinson's, both beneficial and deleterious. In summary we will draw the different strands together and speculate on the future merit of current drugs of abuse as treatments for Parkinson's disease. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. A multicenter hospital-based diagnosis study of automated breast ultrasound system in detecting breast cancer among Chinese women.

    PubMed

    Zhang, Xi; Lin, Xi; Tan, Yanjuan; Zhu, Ying; Wang, Hui; Feng, Ruimei; Tang, Guoxue; Zhou, Xiang; Li, Anhua; Qiao, Youlin

    2018-04-01

    The automated breast ultrasound system (ABUS) is a potential method for breast cancer detection; however, its diagnostic performance remains unclear. We conducted a hospital-based multicenter diagnostic study to evaluate the clinical performance of the ABUS for breast cancer detection by comparing it to handheld ultrasound (HHUS) and mammography (MG). Eligible participants underwent HHUS and ABUS testing; women aged 40-69 years additionally underwent MG. Images were interpreted using the Breast Imaging Reporting and Data System (BI-RADS). Women in the BI-RADS categories 1-2 were considered negative. Women classified as BI-RADS 3 underwent magnetic resonance imaging to distinguish true- and false-negative results. Core aspiration or surgical biopsy was performed in women classified as BI-RADS 4-5, followed by a pathological diagnosis. Kappa values and agreement rates were calculated between ABUS, HHUS and MG. A total of 1,973 women were included in the final analysis. Of these, 1,353 (68.6%) and 620 (31.4%) were classified as BI-RADS categories 1-3 and 4-5, respectively. In the older age group, the agreement rate and Kappa value between the ABUS and HHUS were 94.0% and 0.860 (P<0.001), respectively; they were 89.2% and 0.735 (P<0.001) between the ABUS and MG, respectively. Regarding consistency between imaging and pathology results, 78.6% of women classified as BI-RADS 4-5 based on the ABUS were diagnosed with precancerous lesions or cancer; which was 7.2% higher than that of women based on HHUS. For BI-RADS 1-2, the false-negative rates of the ABUS and HHUS were almost identical and were much lower than those of MG. We observed a good diagnostic reliability for the ABUS. Considering its performance for breast cancer detection in women with high-density breasts and its lower operator dependence, the ABUS is a promising option for breast cancer detection in China.

  18. Adding Data Management Services to Parallel File Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brandt, Scott

    2015-03-04

    The objective of this project, called DAMASC for “Data Management in Scientific Computing”, is to coalesce data management with parallel file system management to present a declarative interface to scientists for managing, querying, and analyzing extremely large data sets efficiently and predictably. Managing extremely large data sets is a key challenge of exascale computing. The overhead, energy, and cost of moving massive volumes of data demand designs where computation is close to storage. In current architectures, compute/analysis clusters access data in a physically separate parallel file system and largely leave it scientist to reduce data movement. Over the past decadesmore » the high-end computing community has adopted middleware with multiple layers of abstractions and specialized file formats such as NetCDF-4 and HDF5. These abstractions provide a limited set of high-level data processing functions, but have inherent functionality and performance limitations: middleware that provides access to the highly structured contents of scientific data files stored in the (unstructured) file systems can only optimize to the extent that file system interfaces permit; the highly structured formats of these files often impedes native file system performance optimizations. We are developing Damasc, an enhanced high-performance file system with native rich data management services. Damasc will enable efficient queries and updates over files stored in their native byte-stream format while retaining the inherent performance of file system data storage via declarative queries and updates over views of underlying files. Damasc has four key benefits for the development of data-intensive scientific code: (1) applications can use important data-management services, such as declarative queries, views, and provenance tracking, that are currently available only within database systems; (2) the use of these services becomes easier, as they are provided within a familiar file-based ecosystem; (3) common optimizations, e.g., indexing and caching, are readily supported across several file formats, avoiding effort duplication; and (4) performance improves significantly, as data processing is integrated more tightly with data storage. Our key contributions are: SciHadoop which explores changes to MapReduce assumption by taking advantage of semantics of structured data while preserving MapReduce’s failure and resource management; DataMods which extends common abstractions of parallel file systems so they become programmable such that they can be extended to natively support a variety of data models and can be hooked into emerging distributed runtimes such as Stanford’s Legion; and Miso which combines Hadoop and relational data warehousing to minimize time to insight, taking into account the overhead of ingesting data into data warehousing.« less

  19. Flexibility and Performance of Parallel File Systems

    NASA Technical Reports Server (NTRS)

    Kotz, David; Nieuwejaar, Nils

    1996-01-01

    As we gain experience with parallel file systems, it becomes increasingly clear that a single solution does not suit all applications. For example, it appears to be impossible to find a single appropriate interface, caching policy, file structure, or disk-management strategy. Furthermore, the proliferation of file-system interfaces and abstractions make applications difficult to port. We propose that the traditional functionality of parallel file systems be separated into two components: a fixed core that is standard on all platforms, encapsulating only primitive abstractions and interfaces, and a set of high-level libraries to provide a variety of abstractions and application-programmer interfaces (API's). We present our current and next-generation file systems as examples of this structure. Their features, such as a three-dimensional file structure, strided read and write interfaces, and I/O-node programs, are specifically designed with the flexibility and performance necessary to support a wide range of applications.

  20. Feasibility of Implementing an Opioid Risk Mitigation System

    DTIC Science & Technology

    2016-05-20

    System 7. FUNDING RECEIVED FOR THIS STUDY? 181 YES 0 NO FUNDING SOURCE: JPC-5 Substance Abuse Working Group 8. DO YOU NEED FUNDING SUPPORT FOR...Perceptions •Provider ro I e Isett in g •Education/training ° Forma l training in pain or substance abuse relatively rare •Prior POMP experience ° Few...Active duty, retirees, dependents, injured, polytrauma •Opioid abuse /misuse/diversion •Patient needs and vulnerabilities 0 Let me make a comment on

  1. Reliable file sharing in distributed operating system using web RTC

    NASA Astrophysics Data System (ADS)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  2. Demographic characteristics of chronic pancreatitis patients in the era of endosonography: Experience of a single tertiary referral center in Turkey.

    PubMed

    Şişman, Gürhan; Köroğlu, Emine; Erzin, Yusuf; Hatemi, İbrahim; Tuncer, Murat; Şentürk, Hakan

    2016-05-01

    There are no clinical data available about chronic pancreatitis (CP) on a series of patients of sufficient number in Turkey. In this study, the etiology and clinical features of CP were evaluated in one center, which is a tertiary referral hospital. The files of 168 patients who had been diagnosed with CP in our Medical Faculty between October 2007 and May 2013 were retrospectively analyzed. The etiological factors, symptoms, complications, and treatment methods were analyzed. The most common etiological factor was alcohol abuse (39%). The average age±SD was 46±15.2 years, and the male:female ratio was 4.2:1 (it was 2.6:1 for other etiologies except alcohol abuse and 15.5:1 in alcoholic CP patients, p<0.05). The most frequent complication was diabetes mellitus (44%). The smoking rate was significantly higher in CP patients with pancreatic calcification (p<0.05). One-third of the patients received various types of endoscopic treatment. During a mean follow-up period of 42±13 months (range, 6-55), pancreatic cancer was detected in four patients (2.3%). In majority of the CP patients, the etiology is alcohol abuse in Turkey. The development of diabetes is the most frequent complication of CP, which is independent of the etiology.

  3. Risk Factors for School Dropout in a Sample of Juvenile Offenders

    PubMed Central

    Fernández-Suárez, Asunción; Herrero, Juan; Pérez, Beatriz; Juarros-Basterretxea, Joel; Rodríguez-Díaz, Francisco J.

    2016-01-01

    Backgrounds: The high rates of school dropout worldwide and their relevance highlight the need for a close study of its causes and consequences. Literature has suggested that school dropout might be explained by multiple causes at different levels (individual, family, school, and neighborhood). The aim of the current study is to examine the relation between individual (defiant attitude, irresponsibility, alcohol abuse, and illegal drugs use), family (educational figure absent and parental monitoring), school factors (truancy and school conflict) and school dropout. Method: Judicial files of all juvenile offenders (218 males and 46 females) with a judicial penal measure in Asturias (Spain) in the year 2012 were examined. Multivariate logistic regression analyses were performed to estimate the relationships between school dropout and individual, family and school variables. Results: As for the individual characteristics, results showed that school dropouts were more irresponsible than non-dropouts. Also they had higher rates of illegal drug use and alcohol abuse. Moreover, lack of parental monitoring emerged as a key predictive factor of school dropout, beyond the type of family structure in terms of the presence of both or only one educational figure. Finally, school factors did not show a significant relationship to school dropout. Conclusions: These findings indicate that school dropout is a multidimensional process. School and family policies that emphasize the role of parental monitoring and prevent alcohol and substance abuse are recommended. PMID:28082934

  4. Risk Factors for School Dropout in a Sample of Juvenile Offenders.

    PubMed

    Fernández-Suárez, Asunción; Herrero, Juan; Pérez, Beatriz; Juarros-Basterretxea, Joel; Rodríguez-Díaz, Francisco J

    2016-01-01

    Backgrounds: The high rates of school dropout worldwide and their relevance highlight the need for a close study of its causes and consequences. Literature has suggested that school dropout might be explained by multiple causes at different levels (individual, family, school, and neighborhood). The aim of the current study is to examine the relation between individual (defiant attitude, irresponsibility, alcohol abuse, and illegal drugs use), family (educational figure absent and parental monitoring), school factors (truancy and school conflict) and school dropout. Method: Judicial files of all juvenile offenders (218 males and 46 females) with a judicial penal measure in Asturias (Spain) in the year 2012 were examined. Multivariate logistic regression analyses were performed to estimate the relationships between school dropout and individual, family and school variables. Results: As for the individual characteristics, results showed that school dropouts were more irresponsible than non-dropouts. Also they had higher rates of illegal drug use and alcohol abuse. Moreover, lack of parental monitoring emerged as a key predictive factor of school dropout, beyond the type of family structure in terms of the presence of both or only one educational figure. Finally, school factors did not show a significant relationship to school dropout. Conclusions : These findings indicate that school dropout is a multidimensional process. School and family policies that emphasize the role of parental monitoring and prevent alcohol and substance abuse are recommended.

  5. 76 FR 71574 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-18

    ... safety, permanency and well-being of children affected by methamphetamine or other substance abuse who... Federal National Child Abuse and Neglect Data System (NCANDS). Therefore, most child welfare data elements... partners are able to download information from these existing State child welfare and substance abuse...

  6. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  7. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  8. 29 CFR 1602.43 - Commission's remedy for school systems' or districts' failure to file report.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...' failure to file report. Any school system or district failing or refusing to file report EEO-5 when... 29 Labor 4 2013-07-01 2013-07-01 false Commission's remedy for school systems' or districts' failure to file report. 1602.43 Section 1602.43 Labor Regulations Relating to Labor (Continued) EQUAL...

  9. 29 CFR 1602.43 - Commission's remedy for school systems' or districts' failure to file report.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...' failure to file report. Any school system or district failing or refusing to file report EEO-5 when... 29 Labor 4 2011-07-01 2011-07-01 false Commission's remedy for school systems' or districts' failure to file report. 1602.43 Section 1602.43 Labor Regulations Relating to Labor (Continued) EQUAL...

  10. 76 FR 9780 - Notification of Deletion of System of Records; EPA Parking Control Office File (EPA-10) and EPA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-22

    ... System of Records; EPA Parking Control Office File (EPA-10) and EPA Transit and Guaranteed Ride Home Program Files (EPA-35) AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency (EPA) is deleting the systems of records for EPA Parking Control Office File...

  11. 29 CFR 1602.43 - Commission's remedy for school systems' or districts' failure to file report.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...' failure to file report. Any school system or district failing or refusing to file report EEO-5 when... 29 Labor 4 2012-07-01 2012-07-01 false Commission's remedy for school systems' or districts' failure to file report. 1602.43 Section 1602.43 Labor Regulations Relating to Labor (Continued) EQUAL...

  12. 29 CFR 1602.43 - Commission's remedy for school systems' or districts' failure to file report.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...' failure to file report. Any school system or district failing or refusing to file report EEO-5 when... 29 Labor 4 2014-07-01 2014-07-01 false Commission's remedy for school systems' or districts' failure to file report. 1602.43 Section 1602.43 Labor Regulations Relating to Labor (Continued) EQUAL...

  13. 29 CFR 1602.43 - Commission's remedy for school systems' or districts' failure to file report.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...' failure to file report. Any school system or district failing or refusing to file report EEO-5 when... 29 Labor 4 2010-07-01 2010-07-01 false Commission's remedy for school systems' or districts' failure to file report. 1602.43 Section 1602.43 Labor Regulations Relating to Labor (Continued) EQUAL...

  14. Geographic information systems and pharmacoepidemiology: using spatial cluster detection to monitor local patterns of prescription opioid abuse.

    PubMed

    Brownstein, John S; Green, Traci C; Cassidy, Theresa A; Butler, Stephen F

    2010-06-01

    Understanding the spatial distribution of opioid abuse at the local level may facilitate public health interventions. Using patient-level data from addiction treatment facilities in New Mexico from ASI-MV Connect, we applied geographic information system (GIS) in combination with a spatial scan statistic to generate risk maps of prescription opioid abuse and identify clusters of product- and compound-specific abuse. Prescribed opioid volume data was used to determine whether identified clusters are beyond geographic differences in availability. Data on 24 452 patients residing in New Mexico were collected. Among those patients, 1779 (7.3%) reported abusing any prescription opioid (past 30 days). According to opioid type, 979 patients (4.0%) reported abuse of any hydrocodone, 1007 (4.1%) for any oxycodone, 108 (0.4%) for morphine, 507 (2.1%) for Vicodin or generic equivalent, 390 (1.6%) for OxyContin, and 63 (0.2%) for MS Contin or generic equivalent. Highest rates of abuse were found in the area surrounding Albuquerque with 8.6 patients indicating abuse per 100 interviewed patients. We found clustering of abuse around Albuquerque (P = 0.001; Relative Risk = 1.35, and a radius of 146 km). At the compound level, we found that drug availability was partly responsible for clustering of prescription opioid abuse. After accounting for drug availability, we identified a second foci of Vicodin abuse in the southern rural portion of the state near Las Cruces, NM and El Paso, Texas and bordering Mexico (RR = 2.1; P = 0.001). A better understanding of local risk distribution may have implications for response strategies to future introductions of prescription opioids.

  15. Geographic Informations Systems and Pharmacoepidemiology: Using spatial cluster detection to monitor local patterns of prescription opioid abuse

    PubMed Central

    Brownstein, John S.; Green, Traci C.; Cassidy, Theresa A.; Butler, Stephen F.

    2010-01-01

    Purpose Understanding the spatial distribution of opioid abuse at the local level may facilitate public health interventions. Methods Using patient-level data from addiction treatment facilities in New Mexico from ASI-MV® Connect, we applied geographic information system in combination with a spatial scan statistics to generate risk maps of prescription opioid abuse and identify clusters of product- and compound-specific abuse. Prescribed opioid volume data was used to determine whether identified clusters are beyond geographic differences in availability. Results Data on 24,452 patients residing in New Mexico was collected. Among those patients, 1779 (7.3%) reported abusing any prescription opioid (past 30 days). According to opioid type, 979 patients (4.0%) reported abuse of any hydrocodone, 1007 (4.1%) for any oxycodone, 108 (0.4%) for morphine, 507 (2.1%) for Vicodin® or generic equivalent, 390 (1.6%) for OxyContin®, and 63 (0.2%) for MS Contin® or generic equivalent. Highest rates of abuse were found in the area surrounding Albuquerque with 8.6 patients indicating abuse per 100 interviewed patients. We found clustering of abuse around Albuquerque (P=0.001; Relative Risk=1.35 and a radius of 146 km). At the compound level, we found that drug availability was partly responsible for clustering of prescription opioid abuse. After accounting for drug availability, we identified a second foci of Vicodin® abuse in the southern rural portion of the state near Las Cruces, NM and El Paso, Texas and bordering Mexico (RR=2.1; P=0.001). Conclusions A better understanding of local risk distribution may have implications for response strategies to future introductions of prescription opioids. PMID:20535759

  16. 77 FR 14507 - Privacy Act of 1974 System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... Complaint and Reasonable Accommodation Files, from its inventory of record systems because the relevant... Employment Discrimination Complaint and Reasonable Accommodation Files. The Commission is retiring the system... government-wide system of records notice entitled OPM/GOV-10, Employee Medical File System Records (71 FR...

  17. 48 CFR 4.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Closeout of contract files. 4.804 Section 4.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.804 Closeout of contract files. ...

  18. 48 CFR 1404.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Closeout of contract files. 1404.804 Section 1404.804 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.804 Closeout of contract files. ...

  19. 48 CFR 904.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Closeout of contract files. 904.804 Section 904.804 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.804 Closeout of contract files. ...

  20. 48 CFR 904.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Closeout of contract files. 904.804 Section 904.804 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.804 Closeout of contract files. ...

  1. 48 CFR 904.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Closeout of contract files. 904.804 Section 904.804 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.804 Closeout of contract files. ...

  2. 48 CFR 1504.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Closeout of contract files. 1504.804 Section 1504.804 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL ADMINISTRATIVE MATTERS Contract Files 1504.804 Closeout of contract files. ...

  3. 48 CFR 1304.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Closeout of contract files. 1304.804 Section 1304.804 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL ADMINISTRATIVE MATTERS Government Contract Files 1304.804 Closeout of contract files. ...

  4. 48 CFR 1504.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Closeout of contract files. 1504.804 Section 1504.804 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL ADMINISTRATIVE MATTERS Contract Files 1504.804 Closeout of contract files. ...

  5. 48 CFR 4.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Closeout of contract files. 4.804 Section 4.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.804 Closeout of contract files. ...

  6. 48 CFR 4.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Closeout of contract files. 4.804 Section 4.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.804 Closeout of contract files. ...

  7. 48 CFR 4.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Closeout of contract files. 4.804 Section 4.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.804 Closeout of contract files. ...

  8. 48 CFR 1304.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Closeout of contract files. 1304.804 Section 1304.804 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL ADMINISTRATIVE MATTERS Government Contract Files 1304.804 Closeout of contract files. ...

  9. 48 CFR 1404.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Closeout of contract files. 1404.804 Section 1404.804 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.804 Closeout of contract files. ...

  10. 48 CFR 1304.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Closeout of contract files. 1304.804 Section 1304.804 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL ADMINISTRATIVE MATTERS Government Contract Files 1304.804 Closeout of contract files. ...

  11. 48 CFR 1404.804 - Closeout of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Closeout of contract files. 1404.804 Section 1404.804 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.804 Closeout of contract files. ...

  12. 48 CFR 1504.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Closeout of contract files. 1504.804 Section 1504.804 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL ADMINISTRATIVE MATTERS Contract Files 1504.804 Closeout of contract files. ...

  13. 48 CFR 1304.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Closeout of contract files. 1304.804 Section 1304.804 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL ADMINISTRATIVE MATTERS Government Contract Files 1304.804 Closeout of contract files. ...

  14. 48 CFR 1504.804 - Closeout of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Closeout of contract files. 1504.804 Section 1504.804 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL ADMINISTRATIVE MATTERS Contract Files 1504.804 Closeout of contract files. ...

  15. 48 CFR 4.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Closeout of contract files. 4.804 Section 4.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.804 Closeout of contract files. ...

  16. 48 CFR 1504.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Closeout of contract files. 1504.804 Section 1504.804 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL ADMINISTRATIVE MATTERS Contract Files 1504.804 Closeout of contract files. ...

  17. 48 CFR 1304.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Closeout of contract files. 1304.804 Section 1304.804 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL ADMINISTRATIVE MATTERS Government Contract Files 1304.804 Closeout of contract files. ...

  18. 48 CFR 904.804 - Closeout of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Closeout of contract files. 904.804 Section 904.804 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.804 Closeout of contract files. ...

  19. 48 CFR 1404.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Closeout of contract files. 1404.804 Section 1404.804 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.804 Closeout of contract files. ...

  20. 48 CFR 1404.804 - Closeout of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Closeout of contract files. 1404.804 Section 1404.804 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.804 Closeout of contract files. ...

  1. 48 CFR 904.804 - Closeout of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Closeout of contract files. 904.804 Section 904.804 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.804 Closeout of contract files. ...

  2. File concepts for parallel I/O

    NASA Technical Reports Server (NTRS)

    Crockett, Thomas W.

    1989-01-01

    The subject of input/output (I/O) was often neglected in the design of parallel computer systems, although for many problems I/O rates will limit the speedup attainable. The I/O problem is addressed by considering the role of files in parallel systems. The notion of parallel files is introduced. Parallel files provide for concurrent access by multiple processes, and utilize parallelism in the I/O system to improve performance. Parallel files can also be used conventionally by sequential programs. A set of standard parallel file organizations is proposed, organizations are suggested, using multiple storage devices. Problem areas are also identified and discussed.

  3. Distinguishing neglect from abuse and accident: analysis of the case files of a hospital child protection team in Israel.

    PubMed

    Davidson-Arad, Bilha; Benbenishty, Rami; Chen, Wendy; Glasser, Saralee; Zur, Shmuel; Lerner-Geva, Liat

    2010-11-01

    The study compares the characteristics of children assessed as neglected, physically abused, or accident victims by a hospital child protection team (CPT) and identifies the information on which the CPT based its assessments. The comparison is based on content analysis of records of 414 children examined by the CPT in a major hospital in Israel between 1991 and 2006, of whom 130 (31.4%) were neglected, 54 (13.0%) were physically abused, and 230 (55.6%) were accident victims. Findings of three hierarchical logistic regressions show that the children classified as neglected had the most early development problems, but were the least likely to have received psychological treatment, and that that their families were the most likely to be receiving state financial support and to have had prior contact with the social services. They also show that the CPT had received the least information indicative of maltreatment about these children from the community and that their medical and physical examinations aroused the least suspicion. Finally, they show that the impressions the hospital staff and CPT had of the parents during the hospital visit had greater power to distinguish between the groups than the children's characteristics or the parents' socio-demographic background. The findings attest to the ability of the CPT to differentiate between neglect victims and physical abuse or accident victims. With this, they also point to ambiguities in the classification process that should be addressed by further research and training and to the need for detailed and thorough documentation of the information and observations on which the CPT's assessments are based. © 2010 Blackwell Publishing Ltd.

  4. Construction of the radiation oncology teaching files system for charged particle radiotherapy.

    PubMed

    Masami, Mukai; Yutaka, Ando; Yasuo, Okuda; Naoto, Takahashi; Yoshihisa, Yoda; Hiroshi, Tsuji; Tadashi, Kamada

    2013-01-01

    Our hospital started the charged particle therapy since 1996. New institutions for charged particle therapy are planned in the world. Our hospital are accepting many visitors from those newly planned medical institutions and having many opportunities to provide with the training to them. Based upon our experiences, we have developed the radiation oncology teaching files system for charged particle therapy. We adopted the PowerPoint of Microsoft as a basic framework of our teaching files system. By using our export function of the viewer any physician can create teaching files easily and effectively. Now our teaching file system has 33 cases for clinical and physics contents. We expect that we can improve the safety and accuracy of charged particle therapy by using our teaching files system substantially.

  5. Characterizing parallel file-access patterns on a large-scale multiprocessor

    NASA Technical Reports Server (NTRS)

    Purakayastha, A.; Ellis, Carla; Kotz, David; Nieuwejaar, Nils; Best, Michael L.

    1995-01-01

    High-performance parallel file systems are needed to satisfy tremendous I/O requirements of parallel scientific applications. The design of such high-performance parallel file systems depends on a comprehensive understanding of the expected workload, but so far there have been very few usage studies of multiprocessor file systems. This paper is part of the CHARISMA project, which intends to fill this void by measuring real file-system workloads on various production parallel machines. In particular, we present results from the CM-5 at the National Center for Supercomputing Applications. Our results are unique because we collect information about nearly every individual I/O request from the mix of jobs running on the machine. Analysis of the traces leads to various recommendations for parallel file-system design.

  6. Prescription Drugs: Abuse and Addiction. National Institute on Drug Abuse Research Report Series.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHHS/PHS), Rockville, MD.

    This publication answers questions about the consequences of abusing commonly prescribed medications including opioids, central nervous system depressants, and stimulants. In addition to offering information on what research says about how certain medications affect the brain and body, this publication also discusses treatment options. It examines…

  7. 75 FR 28264 - Privacy Act of 1974; Report of Systems of Record Notices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ...: Research, Research Training, Research Scientist Development, Service, Education, Demonstration, Prevention... Substance Abuse Prevention, Section 515-8 (42 U.S.C. 290bb-21 et seq.). CMHS: Center for Mental Health... for Substance Abuse Prevention, Substance Abuse and Mental Health Services Administration, 1 Choke...

  8. Neurocognitive Defects and Their Impact on Substance Abuse Treatment.

    ERIC Educational Resources Information Center

    Fals-Stewart, William

    1993-01-01

    Examined prevalence of cognitive deficits in substance abusers (n=108) referred by criminal justice system to complete treatment in drug-free therapeutic community. Findings revealed that substance abusers with neuropsychological deficits were more likely to be removed from program for failure to follow rules and ultimately stayed in residence…

  9. Telling Tales--Cruelty and Abuse in Schooling in Ireland

    ERIC Educational Resources Information Center

    Jeffers, Gerry

    2016-01-01

    The report of the Commission to Inquire into Child Abuse (Government of Ireland, 2009)--the Ryan Report--shocked Ireland and the wider world with its chilling descriptions of abuse that was systemic, pervasive, chronic, excessive, arbitrary and endemic. Subsequent debate has, rightly, centred on the "religious" arena, highlighting the…

  10. Ask These Key Questions When You Review Child Abuse Reporting Policies.

    ERIC Educational Resources Information Center

    Rogers, Joy J.

    1988-01-01

    Urges policymakers to examine and update their school system's child abuse reporting policy. Such policies must be adequate to help endangered children, protect their right to privacy, and avoid overprotection. Advises on ways to protect staff against unnecessary accusations and develop inservice training programs discussing child abuse, state…

  11. The Social Ecology of Adolescent-Initiated Parent Abuse: A Review of the Literature

    ERIC Educational Resources Information Center

    Hong, Jun Sung; Kral, Michael J.; Espelage, Dorothy L.; Allen-Meares, Paula

    2012-01-01

    This article provides an ecological framework for understanding adolescent-initiated parent abuse. We review research on adolescent-initiated parent abuse, identifying sociodemographic characteristics of perpetrators and victims (e.g., gender, age, race/ethnicity, and socioeconomic status [SES]). Bronfenbrenner's [1] ecological systems theory is…

  12. Preventing Second-Generation Child Abuse: Applying Chaos Theory to Reframe Interventions.

    ERIC Educational Resources Information Center

    VanderVen, Karen

    1994-01-01

    Describes needs and characteristics of abused and neglected children; ideologies and interventions guiding the current human services system and contributing to second-generation child abuse; the linear thinking underlying these approaches; concepts of chaos theory that can provide a new framework for analyzing intervention issues; and…

  13. Toxicities of topical ophthalmic anesthetics.

    PubMed

    McGee, Hall T; Fraunfelder, F W

    2007-11-01

    Topical ocular anesthesia has been part of ophthalmology for more than a century. The most commonly used drugs today are proparacaine, tetracaine, benoxinate (oxybuprocaine) cocaine and lidocaine. Although generally well tolerated, all these can be toxic, particularly when abused. The most common toxicities are to the ocular surface, but abuse can cause deep corneal infiltrates, ulceration and even perforation. Fortunately, systemic side effects are rare. Cocaine is unique for its higher incidence of systemic side effects and high abuse potential, both of which impede its clinical use. When used appropriately, all these drugs are remarkably safe. They are generally not prescribed for home use, as prolonged abuse of these drugs can be expected to result in serious complications.

  14. Use, indications and distribution in different countries of the stimulant and hallucinogenic amphetamine derivatives under consideration by WHO.

    PubMed

    Keup, W

    1986-06-01

    Information is presented on legal manufacture, distribution, medical uses and in various countries of the stimulants and hallucinogens under consideration by the World Health Organization (WHO). Data are reported from the Substance Abuse Warning System (SAWS) in the F.R.G. and other surveillance systems regarding illicit manufacture, trafficking and abuse of these compounds internationally. In addition, it is pointed out that assessment of the liability of these compounds for abuse must consider not only the substance itself but also its potential metabolic products. These data, collectively, indicate that the substances currently of most concern with respect to abuse are fenetylline and norpseudoephedrine.

  15. Treating the drug-abusing offender.

    PubMed

    Leukefeld, C; Matthews, T; Clayton, R

    1992-01-01

    The association between drug abuse treatment and criminal justice control is examined in this article. A framework is presented for mental health administrators and policy-makers to examine and appreciate the use of authority derived from the criminal justice system for drug abusers involved in community treatment. In addition, an overview of relevant literature is provided to encapsulate the literature related to the drug-abusing criminal offender which is most useful for mental health administrators and policy-makers.

  16. Information retrieval system

    NASA Technical Reports Server (NTRS)

    Berg, R. F.; Holcomb, J. E.; Kelroy, E. A.; Levine, D. A.; Mee, C., III

    1970-01-01

    Generalized information storage and retrieval system capable of generating and maintaining a file, gathering statistics, sorting output, and generating final reports for output is reviewed. File generation and file maintenance programs written for the system are general purpose routines.

  17. Parallel file system with metadata distributed across partitioned key-value store c

    DOEpatents

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-09-19

    Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).

  18. Final Report for File System Support for Burst Buffers on HPC Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, W.; Mohror, K.

    Distributed burst buffers are a promising storage architecture for handling I/O workloads for exascale computing. As they are being deployed on more supercomputers, a file system that efficiently manages these burst buffers for fast I/O operations carries great consequence. Over the past year, FSU team has undertaken several efforts to design, prototype and evaluate distributed file systems for burst buffers on HPC systems. These include MetaKV: a Key-Value Store for Metadata Management of Distributed Burst Buffers, a user-level file system with multiple backends, and a specialized file system for large datasets of deep neural networks. Our progress for these respectivemore » efforts are elaborated further in this report.« less

  19. [Epidemioclinical and legal aspects and cost management of sexual abuse among minors in Dakar, Senegal].

    PubMed

    Cisse, C T; Niang, M M; Sy, A K; Faye, E H O; Moreau, J-C

    2015-11-01

    Specify epidemioclinical and legal aspects of sexual abuse among minors and evaluate the cost of care in Dakar. This is a retrospective multicenter cross-sectional study on sexual abuse among minors over a period of four years from 1st January 2006 to 31st December 2009. Four maternities were targeted: the Social Hygiene Institute of Medina, health center Roi-Baudouin Guédiawaye, the Pikine hospital and health center Youssou-Mbargane-Diop of Rufisque. During the study period, 252 child victims of sexual abuse were supported at four health facilities on a total of 272 sexual abuses of all ages, a frequency of 92.64%. The epidemiological profile of our patients was a child of 11 years old on average, female (100%) and living in the suburbs of Dakar (68.1%). Children were often abused during working hours (31.7%), outside the family environment and often by someone known to the victim (72.6%). Genito-genital contact was the most common mode of sexual contact (80.9%) with vaginal penetration in 61% of cases. Almost all of the victims (92.1%) came to consult, accompanied by their parents, between the 1st and 4th day after the sexual abuse (70%). The examination usually revealed a hymenal trauma (59.9%) of which nearly half (49%) consisted of old lesions. 56.9% of victims had a post-traumatic stress disorder and 31.1%, mutism. We recorded six (6) pregnancies, 2% of our sample. A case of HIV infection was recorded on a sample taken 72hours after sexual abuse. Control of three months HIV serology was requested in 7.1% of cases and only 20% of children had received antiretroviral prophylaxis. Antibiotic prophylaxis had been performed in 13.7% of cases using doxycycline as drug of choice (75%). Only 29% of our patients had received emergency contraception progestin and psychological care concerned only 22% of children. On the legal aspects, 46% of our patients had filed a complaint. Prosecutions were 38%, 45% of which were convicted and 21% were acquitted. The rate of out-of-court settlement was 35% and the time limit for settlement by the justice was on average 6 months with extremes of one month and 24 months. The average cost of care was estimated at 17,010 CFA francs (26 euros) taking into account the consumables used for clinical examination (sterile gloves, catheter, syringe), analysis and prescription drugs. The sexual abuse of minors is a disturbing reality that raises rightly universal reprobation. In Senegal, this mainly affects children and its magnitude is increasing over the years. Improved support for victims necessarily involves raising public awareness through the media and the development of specialized structures in the management of sexual abuse. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  20. SU-E-T-99: Design and Development of Isocenter Parameter System for CT Simulation Laser Based On DICOM RT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luo, G

    2014-06-01

    Purpose: In order to receive DICOM files from treatment planning system and generate patient isocenter positioning parameter file for CT laser system automatically, this paper presents a method for communication with treatment planning system and calculation of isocenter parameter for each radiation field. Methods: Coordinate transformation and laser positioning file formats were analyzed, isocenter parameter was calculated via data from DICOM CT Data and DICOM RTPLAN file. An in-house software-DicomGenie was developed based on the object-oriented program platform-Qt with DCMTK SDK (Germany OFFIS company DICOM SDK) . DicomGenie was tested for accuracy using Philips CT simulation plan system (Tumor LOC,more » Philips) and A2J CT positioning laser system (Thorigny Sur Marne, France). Results: DicomGenie successfully established DICOM communication between treatment planning system, DICOM files were received by DicomGenie and patient laser isocenter information was generated accurately. Patient laser parameter data files can be used for for CT laser system directly. Conclusion: In-house software DicomGenie received and extracted DICOM data, isocenter laser positioning data files were created by DicomGenie and can be use for A2J laser positioning system.« less

  1. Methylphenidate Abuse and Psychiatric Side Effects

    PubMed Central

    Morton, W. Alexander; Stockton, Gwendolyn G.

    2000-01-01

    Methylphenidate is a central nervous system stimulant drug that has become the primary drug of choice in treating attention-deficit/hyperactivity disorder in children. Side effects are usually mild and are generally well tolerated by patients. Along with increases in prescribing frequency, the potential for abuse has increased. Intranasal abuse produces effects rapidly that are similar to the effects of cocaine in both onset and type. The clinical picture of stimulant abuse produces a wide array of psychiatric symptoms. There is little in the literature to differentiate methylphenidate from other stimulants when they are abused. The need for education of all involved with the use of methylphenidate is discussed to help prevent an increasing pattern of methylphenidate abuse. PMID:15014637

  2. Interns’ perceived abuse during their undergraduate training at King Abdul Aziz University

    PubMed Central

    Iftikhar, Rahila; Tawfiq, Razaz; Barabie, Salem

    2014-01-01

    Background and objectives Abuse occurs in all workplaces, including the medical field. The aim of this study was to determine the prevalence of perceived abuse among medical students, the types of abuse experienced during medical training, the source of abuse, and the perceived barriers to reporting abuse. Method This cross-sectional survey was conducted between September 2013 and January 2014 among medical graduates of King Abdul Aziz University, Jeddah. The survey questionnaire was designed to gather information regarding the frequency with which participants perceived themselves to have experienced abuse, the type of abuse, the source of abuse, and the reasons for nonreporting of perceived abuse. Data were analyzed using the Statistical Package for the Social Sciences. Result Of the 186 students enrolled in this study, 169 (90.9%) reported perceiving some form of abuse during medical school training. Perceived abuse was most often verbal (86.6%), although academic abuse (73.1%), sex discrimination (38.7%), racial or ethnic discrimination (29.0%), physical abuse (18.8%), religious discrimination (15.1%), and sexual harassment (8.6%) were also reported. Professors were most often cited as the sources of perceived abuse, followed by associate professors, demonstrators (or assistant teaching staff), and assistant professors. The Internal Medicine Department was the most frequently cited department where students perceived themselves to have experienced abuse. Only 14.8% of the students reported the abuse to a third party. Conclusion The self-reported prevalence of medical student abuse at King Abdul Aziz University is high. A proper system for reporting abuse and for supporting victims of abuse should be set up, to promote a good learning environment. PMID:24904225

  3. Advocacy Journey Promoting Child Sexual Abuse Prevention in Hong Kong.

    PubMed

    Cheung, Monit; Leung, Carol A; Liu, Elaine Suk-Ching

    2017-01-01

    In a country without a mandatory child abuse reporting system, advocacy for child welfare law can be a tedious and difficult process. This article documents a 10-year advocacy journey based on the capacity-building concept in social sustainability theory which aims to: raise public awareness of child sexual abuse, provide an idea for branding an inquiry column, and connect advocacy efforts to law reforms. Over the past decade in Hong Kong, a total of 336 public inquiries were anonymously sent to Wu Miu Column and published in three local major newspapers. Among these inquiries, 131 inquiries involved child sexual abuse that the "affected individuals" were molested in school or at home and knew the abusers but did not report their cases to child protection services. Inquirers reported more male than female abusers. Proportionally and significantly, female abusers tended to abuse younger children, compared to male abusers who tended to abuse older children. Many abusers were minors who abused younger children, which explains people's reluctance to report the abuse to child protection services. The discovery of this underage phenomenon motivated child advocates to challenge the common law presumption that a boy under the age of 14 is incapable of sexual intercourse. Social workers in this advocacy journey must sustain continuous efforts to prevent youth from becoming future perpetrators.

  4. Comparative evaluation of effect of rotary and reciprocating single-file systems on pericervical dentin: A cone-beam computed tomography study.

    PubMed

    Zinge, Priyanka Ramdas; Patil, Jayaprakash

    2017-01-01

    The aim of this study is to evaluate and compare the effect of one shape, Neolix rotary single-file systems and WaveOne, Reciproc reciprocating single-file systems on pericervical dentin (PCD) using cone-beam computed tomography (CBCT). A total of 40 freshly extracted mandibular premolars were collected and divided into two groups, namely, Group A - Rotary: A 1 - Neolix and A 2 - OneShape and Group B - Reciprocating: B 1 - WaveOne and B 2 - Reciproc. Preoperative scans of each were taken followed by conventional access cavity preparation and working length determination with 10-k file. Instrumentation of the canal was done according to the respective file system, and postinstrumentation CBCT scans of teeth were obtained. 90 μm thick slices were obtained 4 mm apical and coronal to the cementoenamel junction. The PCD thickness was calculated as the shortest distance from the canal outline to the closest adjacent root surface, which was measured in four surfaces, i.e., facial, lingual, mesial, and distal for all the groups in the two obtained scans. There was no significant difference found between rotary single-file systems and reciprocating single-file systems in their effect on PCD, but in Group B 2 , there was most significant loss of tooth structure in the mesial, lingual, and distal surface ( P < 0.05). Reciproc single-file system removes more PCD as compared to other experimental groups, whereas Neolix single file system had the least effect on PCD.

  5. Comparison of abuse, suspected suicidal intent, and fatalities related to the 7-day buprenorphine transdermal patch versus other opioid analgesics in the National Poison Data System.

    PubMed

    Coplan, Paul M; Sessler, Nelson E; Harikrishnan, Venkatesh; Singh, Richa; Perkel, Charles

    2017-01-01

    Prescription opioid related abuse, suicide and death are significant public health problems. This study compares rates of poison center calls categorized as intentional abuse, suspected suicidal intent or fatality for the 7-day buprenorphine transdermal system/patch (BTDS) with other extended-release and long-acting (ER/LA) opioids indicated for chronic pain. Retrospective 24-month cohort study using National Poison Data System data from July 2012 through June 2014. BTDS was introduced in the United States in January 2011. Numbers and rates of calls of intentional abuse, suspected suicidal intent and fatalities were evaluated for BTDS, ER morphine, ER oxycodone, fentanyl patch, ER oxymorphone and methadone tablets/capsules, using prescription adjustment to account for community availability. Rate ratios (RR) and 95% confidence intervals (CI) were calculated. Absolute numbers and prescription-adjusted rates of intentional abuse and suspected suicidal intent with BTDS were significantly lower (p < .0001) than for all other ER/LA opioid analgesics examined. No fatalities associated with BTDS exposure were reported. This post-marketing evaluation of BTDS indicates infrequent poison center calls for intentional abuse and suspected suicidal intent events, suggesting lower rates of these risks with BTDS compared to other ER/LA opioids.

  6. 75 FR 3493 - Notice of Acceptance for Docketing of the Application, Notice of Opportunity for Hearing for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-21

    ...), Rockville, Maryland 20852 and is accessible from the NRC's Agencywide Documents Access and Management System... receipt of the document. The E-Filing system also distributes an e-mail notice that provides access to the... intervene is filed so that they can obtain access to the document via the E-Filing system. A person filing...

  7. 75 FR 42462 - Notice of Acceptance for Docketing of the Application and Notice of Opportunity for Hearing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-21

    ... NRC's Agencywide Documents Access and Management System (ADAMS) Public Electronic Reading Room on the... receipt of the document. The E-Filing system also distributes an e-mail notice that provides access to the... intervene is filed so that they can obtain access to the document via the E-Filing system. A person filing...

  8. A New System for Improving the Care of Neglected and Abused Children

    ERIC Educational Resources Information Center

    Burt, Marvin R.; Balyeat, Ralph

    1974-01-01

    A demonstration program of a system coordinating the wide variety of services provided for neglected and abused children in a metropolitan area has produced many gains in the handling of such cases: notably, avoidance of institutionalization. (Author/CS)

  9. Introduction of a Data System at the Universite Paul Sabatier, Toulouse (France). Programme on Institutional Management in Higher Education.

    ERIC Educational Resources Information Center

    Prineau, J. P.

    The data system and its branches, computerized in 1970, provide information from the following: student records file, accountancy file, an experimental-stage personnel file, and a planning-stage facilities file. The files not only cope with the university's daily management duties but also supply the French Ministry with statistics. Two types of…

  10. 76 FR 11465 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... separate systems of records: ``FHFA-OIG Audit Files Database,'' ``FHFA-OIG Investigative & Evaluative Files Database,'' ``FHFA-OIG Investigative & Evaluative MIS Database,'' and ``FHFA-OIG Hotline Database.'' These... Audit Files Database. FHFA-OIG-2: FHFA-OIG Investigative & Evaluative Files Database. FHFA-OIG-3: FHFA...

  11. Generation and use of the Goddard trajectory determination system SLP ephemeris files

    NASA Technical Reports Server (NTRS)

    Armstrong, M. G.; Tomaszewski, I. B.

    1973-01-01

    Information is presented to acquaint users of the Goddard Trajectory Determination System Solar/Lunar/Planetary ephemeris files with the details connected with the generation and use of these files. In particular, certain sections constitute a user's manual for the ephemeris files.

  12. National Automotive Sampling System (NASS) Crashworthiness Data System : analytical user's manual 2007 file

    DOT National Transportation Integrated Search

    2008-01-01

    Comparing the 1988-2007 files with files from years prior to 1988 is not recommended. The : principal attributes of the NASS CDS 1988-2007 files include: focusing on crashes involving : automobiles and automobile derivatives, light trucks and vans wi...

  13. Digital Libraries: The Next Generation in File System Technology.

    ERIC Educational Resources Information Center

    Bowman, Mic; Camargo, Bill

    1998-01-01

    Examines file sharing within corporations that use wide-area, distributed file systems. Applications and user interactions strongly suggest that the addition of services typically associated with digital libraries (content-based file location, strongly typed objects, representation of complex relationships between documents, and extrinsic…

  14. Childhood Predictors of Adult Substance Abuse

    PubMed Central

    Arteaga, Irma; Chen, Chin-Chih; Reynolds, Arthur J.

    2016-01-01

    Identification of the early determinants of substance abuse is a major focus of life course research. In this study, we investigated the child, family, and school-related antecedents of the onset and prevalence of substance abuse by age 26 for a cohort of 1,208 low-income minority children in the Chicago Longitudinal Study. Data onon well-being have been collected prospectively since birth from administrative records, parents, teachers, and children. Results indicated that the prevalence of substance abuse by age 26 was 32 percent (self reports or criminal justice system records) with a median age of first use of 17. Probit regression analysis indicated that substance abuse prevalence was primarily determined by gender (males had a higher rate), trouble making behavior by age 12, school mobility, and previous substance use. Family and peer predictors included involvement in the child welfare system by age 9, parent expectations for school success at age 9, parent substance abuse by children's age 15, and deviant peer affiliation by age 16. Age of first substance use was predicted by gender and race/ethnicity (males and Blacks had earlier incidence), involvement in the child welfare system, and family risk status at age 8. As with prevalence, the pattern of predictors for males was similar to the overall sample but the magnitude of effects was stronger.. The predictors of the timing of substance use dependency were gender, family conflict by age 5, involvement in the child welfare system, social maturity at age 9, adolescent school mobility, and school dropout by age 16. Findings indicate that the promotion of family involvement and positive school and social behavior can reduce the risk of substance abuse. PMID:27867242

  15. Reunifying abused or neglected children: Decision-making and outcomes.

    PubMed

    Biehal, Nina; Sinclair, Ian; Wade, Jim

    2015-11-01

    Little is known about decision-making regarding the reunification of children in care, or about the consequences of these decisions for the children concerned. This study compared decision-making and outcomes for 149 maltreated children in seven English authorities (68 reunified, 81 who remained in care). Children were followed up six months after their return home or, for those who were not reunified, six months after the 'effective decision' that they should remain in care. They were followed up again four years (on average) after the return or effective decision. Data were extracted from case files at baseline and six month follow-up and were gathered from surveys of social workers and teachers at final follow-up. The two key predictors of reunification were assessments that parental problems had improved and that risks to the child were not unacceptably high. Two-thirds returned to improved family circumstances, sometimes due to a change in the household they returned to, but others were reunified despite persisting concerns. However 35% re-entered care within six months and 63% re-entered at some point during the four-year follow-up period, often due to recurring abuse or neglect. At final follow-up remaining in care was the strongest predictor of positive outcomes on a range of dimensions, even once children's characteristics and histories were taken into account. Outcomes were especially poor for neglected children who were reunified, irrespective of whether reunification was stable or unstable. Results show the potential of the care system to produce positive outcomes for maltreated children. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Child sexual abuse is largely hidden from the adult society. An epidemiological study of adolescents' disclosures.

    PubMed

    Priebe, Gisela; Svedin, Carl Göran

    2008-12-01

    The aim of this study was to investigate disclosure rates and disclosure patterns and to examine predictors of non-disclosure in a sample of male and female adolescents with self-reported experiences of sexual abuse. A sample of 4,339 high school seniors (2,324 girls, 2,015 boys) was examined with a questionnaire concerning sexual experiences in this study with a focus on disclosure of sexual abuse (non-contact, contact or penetrating abuse, and including peer abuse). Of the sample, 1,505 girls (65%) and 457 boys (23%) reported experience of sexual abuse. The disclosure rate was 81% (girls) and 69% (boys). Girls and boys disclosed most often to a friend of their own age. Few had disclosed to professionals. Even fewer said that the incident had been reported to the authorities. Logistic regression showed that it was less likely for girls to disclose if they had experienced contact sexual abuse with or without penetration, abuse by a family member, only a single abuse occasion or if they had perceived their parents as non-caring. Boys were less likely to disclose if they studied a vocational program, lived with both parents or had perceived their parents as either caring and overprotective or non-caring and not overprotective. Disclosing sexual abuse is a complex process. Much is hidden from the adult society, especially from professionals and the legal system. Since peers are the most common receivers of abuse information, programs for supporting peers ought to be developed. Differences in disclosure patterns for girls and boys indicate that a gender perspective is helpful when developing guidelines for professionals. Professionals, especially in the school system, need to be more aware of the finding that few sexually abused children seek help from professionals or other adults and that support offers should be directly addressed not only to the vulnerable young persons themselves but also to peers who wish to help a friend.

  17. A new approach to the film library: time-unit filing.

    PubMed

    Palmucci, J A

    2000-01-01

    The installation of a new radiology information system (RIS) at Children's Hospital Medical Center of Akron in Akron, Ohio, took the radiology department into a new world of technology, but raised issues we never anticipated. The major problem the new RIS forced the department to overcome was how to eliminate the film file's reliance on a proprietary radiology numbering system. Previously, the department had used its own numbering system--a proprietary x-ray number--to file film jackets and had used the hospital-issued medical record number to access patient and payer information from the hospital information system. It became clear that we should use a single number--the medical record number--to access all data, but we wondered how that would affect our film file room. An RIS consultant suggested that we consider filing films by last date of service, a system called "time-unit filing." Time-unit filing means keeping the most recent two-weeks worth of films in the main file room. They are organized by gender in blue or pink jackets and marked alphabetically by the patient's last name in a way that makes mis-files easy to see. If a patient's film jacket is activated again, it is refiled in the current two-week time unit. Inactive jackets remain in their two-week time unit indefinitely. Time-unit filing has had many benefits for the radiology department at Children's Hospital Medical Center of Akron: fewer mis-files, less time needed for filing and searching, and successful implementation of the new RIS.

  18. Emergency department-based interventions for women suffering domestic abuse: a critical literature review.

    PubMed

    Ansari, Sereena; Boyle, Adrian

    2017-02-01

    Domestic abuse represents a serious public health and human rights concern. Interventions to reduce the risk of abuse include staff training and standardized documentation improving detection and adherence to referral pathways. Interventional studies have been conducted in primary care, maternity and outpatient settings. Women disclosing abuse in emergency departments differ from women attending other healthcare settings, and it is unclear whether these interventions can be transferred to the emergency care setting. This review examines interventional studies to evaluate the effectiveness of emergency department-based interventions in reducing domestic abuse-related morbidity. Medline, EMBASE, CINAHL, PsycINFO and Cochrane Library were searched, according to prespecified selection criteria. Study quality was assessed using the Jadad scale. Of 273 search results, nine were eligible for review. Interventions involving staff training demonstrated benefits in subjective measures, such as staff knowledge regarding abuse, but no changes in clinical practice, based on detection and referral rates. When staff training was implemented in conjunction with supporting system changes - for example, standardized documentation for assessment and referral - clinically relevant improvements were noted. Interventions centred around staff training are insufficient to bring about improvements in the management and, thus, outcome of patients suffering abuse. Instead, system changes, such as standardized documentation and referral pathways, supported by training, may bring about beneficial changes. It remains uncertain whether surrogate outcomes employed by most studies translate to changes in abuse-related morbidity: the ultimate goal.

  19. Adult Disclosure of Sexual Abuse: A Primary Cause of Psychological Distress?

    ERIC Educational Resources Information Center

    McNulty, Craig; Wardle, Jane

    1994-01-01

    This paper surveys research evidence relating to the disclosure of childhood sexual abuse by adults and argues that, for some adults, the disclosure of sexual abuse may be a primary cause of psychological distress, resulting in the dissolution of social support systems and increasing the individual's vulnerability to psychiatric disorder.…

  20. Trust and Betrayal in the Treatment of Child Abuse.

    ERIC Educational Resources Information Center

    MacKinnon, Laurie K.

    Therapists working with child abuse in public agencies are positioned between the family and the larger welfare systems and between parent and child. A practical examination of the personal and therapeutic problems and social issues that surround child abuse intervention is presented in this monograph. Therapy must address the values and premises…

  1. The Duke Endowment Child Abuse Prevention Initiative: A Midpoint Assessment

    ERIC Educational Resources Information Center

    Daro, Deborah; Huang, Lee Ann; English, Brianna

    2009-01-01

    The Duke Endowment launched its Child Abuse Prevention Initiative in 2002 by funding two program sites, the Durham Family Initiative in Durham, North Carolina, and Strong Communities in Greenville, South Carolina. Both sites aimed to reduce rates of child abuse, improve parenting practices and behaviors, strengthen community service systems, and…

  2. Group Therapy for Abused and Neglected Youth: Therapeutic and Child Advocacy Challenges

    ERIC Educational Resources Information Center

    Wanlass, Janine; Moreno, J. Kelly; Thomson, Hannah M.

    2006-01-01

    Although group therapy for abused and neglected youth is a viable and efficacious treatment option, facilitation is challenging. Group leaders must contain intense affect, manage multiple transferences, and advocate for their clients within the larger social welfare system. Using a case study of a group for sexually abused girls, this paper…

  3. Abuse and Young Children with Disabilities: A Review of the Literature

    ERIC Educational Resources Information Center

    Corr, Catherine; Santos, Rosa Milagros

    2017-01-01

    Legislation in the United States, such as the Child Abuse Prevention and Treatment Act and the Individuals With Disabilities Education Improvement Act, mandates service system collaboration to meet the complex needs of young children with disabilities who have experienced abuse. This literature review examines extant literature related to young…

  4. 78 FR 64488 - Combined Notice of Filings #2

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-29

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 2 Take notice that the Commission received the following electric rate filings: Docket Numbers: ER13-1999-001. Applicants: Midcontinent Independent System Operator, Inc. Description: Midcontinent Independent System Operator, Inc. submits tariff filing per 35: 10...

  5. 48 CFR 3004.804-5 - Procedures for closing out contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Procedures for closing out contract files. 3004.804-5 Section 3004.804-5 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... Contract Files 3004.804-5 Procedures for closing out contract files. ...

  6. 48 CFR 904.803 - Contents of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Contents of contract files. 904.803 Section 904.803 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.803 Contents of contract files. (a) (29) The record copy of...

  7. 48 CFR 3004.804-5 - Procedures for closing out contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Procedures for closing out contract files. 3004.804-5 Section 3004.804-5 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... Contract Files 3004.804-5 Procedures for closing out contract files. ...

  8. 48 CFR 4.803 - Contents of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Contents of contract files. 4.803 Section 4.803 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.803 Contents of contract files. The following are examples of...

  9. 48 CFR 3004.804-5 - Procedures for closing out contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Procedures for closing out contract files. 3004.804-5 Section 3004.804-5 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... Contract Files 3004.804-5 Procedures for closing out contract files. ...

  10. 48 CFR 4.803 - Contents of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contents of contract files. 4.803 Section 4.803 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Government Contract Files 4.803 Contents of contract files. The following are examples of...

  11. 48 CFR 904.803 - Contents of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Contents of contract files. 904.803 Section 904.803 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.803 Contents of contract files. (a) (29) The record copy of...

  12. 48 CFR 3004.804-5 - Procedures for closing out contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Procedures for closing out contract files. 3004.804-5 Section 3004.804-5 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... Contract Files 3004.804-5 Procedures for closing out contract files. ...

  13. 48 CFR 3004.804-5 - Procedures for closing out contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Procedures for closing out contract files. 3004.804-5 Section 3004.804-5 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... Contract Files 3004.804-5 Procedures for closing out contract files. ...

  14. 48 CFR 904.803 - Contents of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Contents of contract files. 904.803 Section 904.803 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.803 Contents of contract files. (a) (29) The record copy of...

  15. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  16. Evaluation of family drawings of physically and sexually abused children.

    PubMed

    Piperno, Francesca; Di Biasi, Stefania; Levi, Gabriel

    2007-09-01

    The aim of this study is to analyse the family drawings of two groups of physically and/or sexually abused children as compared to the drawings of non-abused children of a matched control group. The drawings by 12 physically abused, 12 sexually abused and 12 non-abused children, all aged between 5 years-old and 10 years-old, were assessed and compared. Family drawings were analysed using a specific Screening Inventory (FDI-Family Drawing Inventory). This Inventory takes into consideration such qualitative and quantitative variables as the quality of drawing, the children's perception of their family members and their own perception of themselves within the family system. The results have shown significant differences between the abused minors and the control group. Abused children are more likely to draw distorted bodies, the human figure is usually represented devoid of details, their drawings generally show clear signals of trauma and the majority of the abused children are likely to exclude their primary caregiver from the drawings. The "drawings of the family" of physically and/or sexually abused children significantly evidence a greater emotional distress then the drawings of the non-abused children of the matched control group.

  17. ANABOLIC-ANDROGENIC STEROID DEPENDENCE? INSIGHTS FROM ANIMALS AND HUMANS

    PubMed Central

    Wood, Ruth I.

    2008-01-01

    Anabolic-androgenic steroids (AAS) are drugs of abuse. They are taken in large quantities by athletes and others to increase performance, with negative health consequences. As a result, in 1991 testosterone and related AAS were declared controlled substances. However, the relative abuse and dependence liability of AAS have not been fully characterized. In humans, it is difficult to separate the direct psychoactive effects of AAS from reinforcement due to their systemic anabolic effects. However, using conditioned place preference and self-administration, studies in animals have demonstrated that AAS are reinforcing in a context where athletic performance is irrelevant. Furthermore, AAS share brain sites of action and neurotransmitter systems in common with other drugs of abuse. In particular, recent evidence links AAS with opioids. In humans, AAS abuse is associated with prescription opioid use. In animals, AAS overdose produces symptoms resembling opioid overdose, and AAS modify the activity of the endogenous opioid system. PMID:18275992

  18. [Treatment program for dual-diagnosis substance abusers].

    PubMed

    Kandel, Isack

    2007-01-01

    Dual-diagnosis mentally ill patients, i.e. those characterized with substance abuse problems combined with mental health problems, are a challenge both for systems treating substance abusers and for mental health services. These patients are not easily integrated in either of these healthcare systems and/or are treated only for one aspect of their problem by each of these systems. For such patients it is necessary to create a separate treatment model, combining care of the problem of substance abuse and attention to the patient's mental pathology, according to his individual personality traits. For purposes of this programme a treatment setting operating on the model of a therapeutic community is proposed. This setting will open an affiliated treatment programme for dual-diagnosed patients in a separate treatment programme that is not part of the therapeutic community but will be affiliated with it and will accept dual-diagnosis patients.

  19. Tuning HDF5 subfiling performance on parallel file systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byna, Suren; Chaarawi, Mohamad; Koziol, Quincey

    Subfiling is a technique used on parallel file systems to reduce locking and contention issues when multiple compute nodes interact with the same storage target node. Subfiling provides a compromise between the single shared file approach that instigates the lock contention problems on parallel file systems and having one file per process, which results in generating a massive and unmanageable number of files. In this paper, we evaluate and tune the performance of recently implemented subfiling feature in HDF5. In specific, we explain the implementation strategy of subfiling feature in HDF5, provide examples of using the feature, and evaluate andmore » tune parallel I/O performance of this feature with parallel file systems of the Cray XC40 system at NERSC (Cori) that include a burst buffer storage and a Lustre disk-based storage. We also evaluate I/O performance on the Cray XC30 system, Edison, at NERSC. Our results show performance benefits of 1.2X to 6X performance advantage with subfiling compared to writing a single shared HDF5 file. We present our exploration of configurations, such as the number of subfiles and the number of Lustre storage targets to storing files, as optimization parameters to obtain superior I/O performance. Based on this exploration, we discuss recommendations for achieving good I/O performance as well as limitations with using the subfiling feature.« less

  20. Design of a steganographic virtual operating system

    NASA Astrophysics Data System (ADS)

    Ashendorf, Elan; Craver, Scott

    2015-03-01

    A steganographic file system is a secure file system whose very existence on a disk is concealed. Customarily, these systems hide an encrypted volume within unused disk blocks, slack space, or atop conventional encrypted volumes. These file systems are far from undetectable, however: aside from their ciphertext footprint, they require a software or driver installation whose presence can attract attention and then targeted surveillance. We describe a new steganographic operating environment that requires no visible software installation, launching instead from a concealed bootstrap program that can be extracted and invoked with a chain of common Unix commands. Our system conceals its payload within innocuous files that typically contain high-entropy data, producing a footprint that is far less conspicuous than existing methods. The system uses a local web server to provide a file system, user interface and applications through a web architecture.

  1. [Acute poisonings in Poland during the period 1997-1999. An analysis of files from the Krakow Poison Information Center].

    PubMed

    Kotwica, Małgorzata; Rogaczewska, Anna

    2002-01-01

    This work analyses the 1997-1999 data received from Polish poison units at Gdańsk, Kraków, Lublin, Łódź, Poznań, Rzeszów, Tarnów, Sosnowiec, Warszawa, Wrocław on patients hospitalised there and patients treated at other hospitals but consulted by specialists of those centres. The analysis shows that drugs constituted the most frequent cause of the poisonings (over 45% all poisonings). Poisonings with: alcohols accounted for 17.6%, gases (primarily by carbon monoxide) for 5.3%, pesticides for 4.5%, substances of abuse for 4.1%, and with organic solvents for 4.0% total poisonings. Suicidal poisonings constituted about 36% total poisonings, accidental over 25%, poisonings resulting for street-drugs and alcohol abuse over 23%, chemical emergency or fire 1%, while occupational poisonings constituted only 0.9% total poisonings. In 1997-1999, the highest numbers of deaths were recorded after intake of: drugs (102), ethylene glycol (39), alcohols (49, including 16 after intake of methanol and 33 after intake of ethanol), pesticides (15 deaths).

  2. Paternal and sibling incest: a case report.

    PubMed

    Celbis, Osman; Ozcan, M Erkan; Ozdemir, Bora

    2006-01-01

    A case is reported of a female victim of paternal incest, who had also been raped repeatedly by her elder brother for two years. A survey of the literature showed no other report of such a case from Turkey. This does not necessarily mean that the incidence of paternal and sibling incest does not happen, but may indicate that incestuous abuse is not reported or handled without making it known to legal authorities. The victim was first raped by her 16 year-old brother when she was 9 years old. He raped her repeatedly over a period of two years, until he left home. Her father began raping the victim when she was 13 year-old, leaving her pregnant at age 15. He took her to a doctor for a termination of pregnancy. The father continued abuse after the termination. The victim left home to marry a man. The father filed a lawsuit against the man for taking the victim away from home. More openness and awareness of incest in Turkey may encourage the victims to seek help from medical and legal authorities.

  3. Francis Galton: and eugenics today.

    PubMed Central

    Galton, D J; Galton, C J

    1998-01-01

    Eugenics can be defined as the use of science applied to the qualitative and quantitative improvement of the human genome. The subject was initiated by Francis Galton with considerable support from Charles Darwin in the latter half of the 19th century. Its scope has increased enormously since the recent revolution in molecular genetics. Genetic files can be easily obtained for individuals either antenatally or at birth; somatic gene therapy has been introduced for some rare inborn errors of metabolism; and gene manipulation of human germ-line cells will no doubt occur in the near future to generate organs for transplantation. The past history of eugenics has been appalling, with gross abuses in the USA between 1931 and 1945 when compulsory sterilization was practised; and in Germany between 1933 and 1945 when mass extermination and compulsory sterilization were performed. To prevent such abuses in the future statutory bodies, such as a genetics commission, should be established to provide guidance and rules of conduct for use of the new information and technologies as applied to the human genome. PMID:9602996

  4. 77 FR 43592 - System Energy Resources, Inc.; Notice of Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. EL12-52-001] System Energy Resources, Inc.; Notice of Filing Take notice that on July 18, 2012, System Energy Resources, Inc. (System Energy Resources), submitted a supplement to its petition filed on March 28, 2012 (March 28 petition...

  5. 14 CFR 1212.501 - Record systems determined to be exempt.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Act from which exempted. (i) The Inspector General Investigations Case Files system of records is... criminal laws. (ii) To the extent that noncriminal investigative files may exist within this system of records, the Inspector General Investigations Case Files system of records is exempt from the following...

  6. 14 CFR 1212.501 - Record systems determined to be exempt.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Act from which exempted. (i) The Inspector General Investigations Case Files system of records is... extent that there may exist noncriminal investigative files within this system of records, the Inspector General Investigations Case Files system of records is exempt from the following sections of the Privacy...

  7. 14 CFR 1212.501 - Record systems determined to be exempt.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Act from which exempted. (i) The Inspector General Investigations Case Files system of records is... extent that there may exist noncriminal investigative files within this system of records, the Inspector General Investigations Case Files system of records is exempt from the following sections of the Privacy...

  8. 14 CFR § 1212.501 - Record systems determined to be exempt.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Act from which exempted. (i) The Inspector General Investigations Case Files system of records is... criminal laws. (ii) To the extent that noncriminal investigative files may exist within this system of records, the Inspector General Investigations Case Files system of records is exempt from the following...

  9. P2P watch: personal health information detection in peer-to-peer file-sharing networks.

    PubMed

    Sokolova, Marina; El Emam, Khaled; Arbuckle, Luk; Neri, Emilio; Rose, Sean; Jonker, Elizabeth

    2012-07-09

    Users of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health information custodians. Automated PHI detection tools that crawl the P2P networks can identify PHI and alert custodians. While there has been previous work on the detection of personal information in electronic health records, there has been a dearth of research on the automated detection of PHI in heterogeneous user files. To build a system that accurately detects PHI in files sent through P2P file-sharing networks. The system, which we call P2P Watch, uses a pipeline of text processing techniques to automatically detect PHI in files exchanged through P2P networks. P2P Watch processes unstructured texts regardless of the file format, document type, and content. We developed P2P Watch to extract and analyze PHI in text files exchanged on P2P networks. We labeled texts as PHI if they contained identifiable information about a person (eg, name and date of birth) and specifics of the person's health (eg, diagnosis, prescriptions, and medical procedures). We evaluated the system's performance through its efficiency and effectiveness on 3924 files gathered from three P2P networks. P2P Watch successfully processed 3924 P2P files of unknown content. A manual examination of 1578 randomly selected files marked by the system as non-PHI confirmed that these files indeed did not contain PHI, making the false-negative detection rate equal to zero. Of 57 files marked by the system as PHI, all contained both personally identifiable information and health information: 11 files were PHI disclosures, and 46 files contained organizational materials such as unfilled insurance forms, job applications by medical professionals, and essays. PHI can be successfully detected in free-form textual files exchanged through P2P networks. Once the files with PHI are detected, affected individuals or data custodians can be alerted to take remedial action.

  10. 78 FR 38710 - Combined Notice of Filings #2

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-27

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 2 Take notice that the Commission received the following electric rate filings: Docket Numbers: ER12-360-003. Applicants: New York Independent System Operator, Inc. Description: New York Independent System Operator, Inc. submits NYISO compliance filing in...

  11. 78 FR 67137 - Combined Notice of Filings #2

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-08

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 2 Take notice that the Commission received the following electric rate filings: Docket Numbers: ER14-263-000. Applicants: Midcontinent Independent System Operator, Inc. Description: Midcontinent Independent System Operator, Inc. submits tariff filing per 35.13(a...

  12. 48 CFR 2904.800-70 - Contents of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Contents of contract files. 2904.800-70 Section 2904.800-70 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL ADMINISTRATIVE MATTERS Government Contract Files 2904.800-70 Contents of contract files. (a) The reports listed...

  13. 48 CFR 2904.800-70 - Contents of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Contents of contract files. 2904.800-70 Section 2904.800-70 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL ADMINISTRATIVE MATTERS Government Contract Files 2904.800-70 Contents of contract files. (a) The reports listed...

  14. 48 CFR 2904.800-70 - Contents of contract files.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Contents of contract files. 2904.800-70 Section 2904.800-70 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL ADMINISTRATIVE MATTERS Government Contract Files 2904.800-70 Contents of contract files. (a) The reports listed...

  15. 47 CFR 76.1716 - Subscriber records and public inspection file.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... § 76.1716 Subscriber records and public inspection file. The operator of a cable television system shall make the system, its public inspection file, and its records of subscribers available for... 47 Telecommunication 4 2014-10-01 2014-10-01 false Subscriber records and public inspection file...

  16. 47 CFR 76.1716 - Subscriber records and public inspection file.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... § 76.1716 Subscriber records and public inspection file. The operator of a cable television system shall make the system, its public inspection file, and its records of subscribers available for... 47 Telecommunication 4 2013-10-01 2013-10-01 false Subscriber records and public inspection file...

  17. 48 CFR 2904.800-70 - Contents of contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Contents of contract files. 2904.800-70 Section 2904.800-70 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL ADMINISTRATIVE MATTERS Government Contract Files 2904.800-70 Contents of contract files. (a) The reports listed...

  18. 48 CFR 2904.800-70 - Contents of contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Contents of contract files. 2904.800-70 Section 2904.800-70 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL ADMINISTRATIVE MATTERS Government Contract Files 2904.800-70 Contents of contract files. (a) The reports listed...

  19. Drug Abuse & the Criminal Justice System. Chapter 7.

    ERIC Educational Resources Information Center

    Acampora, Alfonso P., Ed.; Nebelkopf, Ethan, Ed.

    This document contains seven papers from the ninth World Conference of Therapeutic Communities (TCs) that deal with drug abuse and the criminal justice system. Papers include: (1) "Some Characteristics of the Social Structure & Social Organization of the TCs" (Lewis Yablonsky); (2) "Therapeutics & Incarceration: They Said It…

  20. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  1. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  2. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  3. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  4. Identifying perceived barriers to monitoring service quality among substance abuse treatment providers in South Africa

    PubMed Central

    2014-01-01

    Background A performance measurement system is planned for South African substance abuse treatment services. Provider-level barriers to implementing these systems have been identified in the United States, but little is known about the nature of these barriers in South Africa. This study explored the willingness of South African substance abuse treatment providers’ to adopt a performance measurement system and perceived barriers to monitoring service quality that would need to be addressed during system development. Methods Three focus group discussions were held with treatment providers from two of the nine provinces in South Africa. These providers represented the diverse spread of substance abuse treatment services available in the country. The final sample comprised 21 representatives from 12 treatment facilities: eight treatment centres in the Western Cape and four in KwaZulu-Natal. Content analysis was used to extract core themes from these discussions. Results Participants identified barriers to the monitoring of service quality that included outdated modes of collecting data, personnel who were already burdened by paperwork, lack of time to collect data, and limited skills to analyse and interpret data. Participants recommended that developers engage with service providers in a participatory manner to ensure that service providers are invested in the proposed performance measurement system. Conclusion Findings show that substance abuse treatment providers are willing to adopt a performance measurement system and highlight several barriers that need to be addressed during system development in order to enhance the likelihood that this system will be successfully implemented. PMID:24499037

  5. Electronic hand-drafting and picture management system.

    PubMed

    Yang, Tsung-Han; Ku, Cheng-Yuan; Yen, David C; Hsieh, Wen-Huai

    2012-08-01

    The Department of Health of Executive Yuan in Taiwan (R.O.C.) is implementing a five-stage project entitled Electronic Medical Record (EMR) converting all health records from written to electronic form. Traditionally, physicians record patients' symptoms, related examinations, and suggested treatments on paper medical records. Currently when implementing the EMR, all text files and image files in the Hospital Information System (HIS) and Picture Archiving and Communication Systems (PACS) are kept separate. The current medical system environment is unable to combine text files, hand-drafted files, and photographs in the same system, so it is difficult to support physicians with the recording of medical data. Furthermore, in surgical and other related departments, physicians need immediate access to medical records in order to understand the details of a patient's condition. In order to address these problems, the Department of Health has implemented an EMR project, with the primary goal of building an electronic hand-drafting and picture management system (HDP system) that can be used by medical personnel to record medical information in a convenient way. This system can simultaneously edit text files, hand-drafted files, and image files and then integrate these data into Portable Document Format (PDF) files. In addition, the output is designed to fit a variety of formats in order to meet various laws and regulations. By combining the HDP system with HIS and PACS, the applicability can be enhanced to fit various scenarios and can assist the medical industry in moving into the final phase of EMR.

  6. 48 CFR 4.802 - Contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contract files. 4.802 Section 4.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE... locator system should be established to ensure the ability to locate promptly any contract files. (e...

  7. 48 CFR 4.802 - Contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Contract files. 4.802 Section 4.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE... locator system should be established to ensure the ability to locate promptly any contract files. (e...

  8. 48 CFR 4.802 - Contract files.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Contract files. 4.802 Section 4.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE... locator system should be established to ensure the ability to locate promptly any contract files. (e...

  9. 48 CFR 4.802 - Contract files.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Contract files. 4.802 Section 4.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE... locator system should be established to ensure the ability to locate promptly any contract files. (e...

  10. Temperature increases on the external root surface during endodontic treatment using single file systems.

    PubMed

    Özkocak, I; Taşkan, M M; Gökt Rk, H; Aytac, F; Karaarslan, E Şirin

    2015-01-01

    The aim of this study is to evaluate increases in temperature on the external root surface during endodontic treatment with different rotary systems. Fifty human mandibular incisors with a single root canal were selected. All root canals were instrumented using a size 20 Hedstrom file, and the canals were irrigated with 5% sodium hypochlorite solution. The samples were randomly divided into the following three groups of 15 teeth: Group 1: The OneShape Endodontic File no.: 25; Group 2: The Reciproc Endodontic File no.: 25; Group 3: The WaveOne Endodontic File no.: 25. During the preparation, the temperature changes were measured in the middle third of the roots using a noncontact infrared thermometer. The temperature data were transferred from the thermometer to the computer and were observed graphically. Statistical analysis was performed using the Kruskal-Wallis analysis of variance at a significance level of 0.05. The increases in temperature caused by the OneShape file system were lower than those of the other files (P < 0.05). The WaveOne file showed the highest temperature increases. However, there were no significant differences between the Reciproc and WaveOne files. The single file rotary systems used in this study may be recommended for clinical use.

  11. Individual and system influences on waiting time for substance abuse treatment.

    PubMed

    Carr, Carey J A; Xu, Jiangmin; Redko, Cristina; Lane, D Timothy; Rapp, Richard C; Goris, John; Carlson, Robert G

    2008-03-01

    Waiting time is a contemporary reality of many drug abuse treatment programs, resulting in substantial problems for substance users and society. Individual and system factors that influence waiting time are diverse and may vary at different points in the treatment continuum. This study assessed waiting time preceding clinical assessment at a centralized intake unit and during the period after the assessment but before treatment entry. The present study included 577 substance abusers who were enrolled in a large clinical trial of two brief treatment interventions in a midsize metropolitan area in Ohio. Bivariate analyses identified individual and system factors that influenced preassessment and postassessment waiting time, as well as total wait to treatment services. Multivariate analyses demonstrated that longer wait time for an assessment is influenced by being court referred, less belief in having a substance abuse problem, and less desire for change. A shorter wait to actually enter treatment is predicted by having a case manager, being more ready for treatment, and having less severe employment and alcohol problems. The different influences present during the two waiting periods suggest that assessment and treatment programs need to implement system changes and entry enhancement interventions that are specific to the needs of substance abusers at each waiting period.

  12. Trend Analysis of Substance Abuse Treatment Admissions in New Orleans From 2000-2012: A Population-Based Comparison Pre- and Post-Hurricane Katrina.

    PubMed

    Shuler, Monique N; Wallington, Sherrie F; Qualls-Hampton, Raquel Y; Podesta, Arwen E; Suzuki, Sumihiro

    2016-10-14

    Substance abuse treatment following a natural disaster is often met with challenges. If treatment is available, facilities may be unequipped to service an influx of patients or provide specialized care for unique populations. This paper seeks to evaluate trends in substance abuse treatment over time and assess changes pre- and post-Hurricane Katrina. Substance abuse treatment admission data (N = 42,678) from New Orleans, Louisiana, for years 2000 through 2012 were obtained from the Treatment Episode Data Set. Admissions were examined to evaluate demographic, socioeconomic, psychiatric, and criminality trends in substance abuse treatment and assess changes following Hurricane Katrina. Treatment admissions have decreased from 2000 to 2012. About one in five admissions had a psychiatric illness in addition to a substance abuse problem. A staggering 76% of admissions with a psychiatric illness were referred by the criminal justice system post-Katrina as compared to pre-Katrina. Rates of alcohol and marijuana admissions have remained stable from 2000 to 2012. Cocaine/crack admissions have declined and admissions who abused heroin have increased over time. Treatment admissions stabilized following Hurricane Katrina; however, since 2009, they have begun to decline. Targeted exploration of factors affecting admission to treatment in New Orleans with populations such as the homeless, those with a psychiatric illness in addition to a substance abuse problem, and those referred by the criminal justice system is essential. The results of this study assist in identifying variations in substance abuse treatment characteristics for those admitted to treatment in New Orleans.

  13. Lessons Learned in Deploying the World s Largest Scale Lustre File System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dillow, David A; Fuller, Douglas; Wang, Feiyi

    2010-01-01

    The Spider system at the Oak Ridge National Laboratory's Leadership Computing Facility (OLCF) is the world's largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF's diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF's diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x - 240 GB/sec, and 17x - 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing themore » file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.« less

  14. Early Intervention and Maltreated Children: A Current Look at the Child Abuse Prevention and Treatment Act and Part C

    ERIC Educational Resources Information Center

    Moxley, Kathleen M.; Squires, Jane; Lindstrom, Lauren

    2012-01-01

    Current literature regarding the prevalence of child abuse and neglect, resulting developmental impacts on children, and early intervention services for children and families involved in the child welfare system is summarized. While early intervention eligibility referrals are mandated for this population under the Child Abuse Prevention and…

  15. Counselor Meaning-Making: Working with Childhood Sexual Abuse Survivors

    ERIC Educational Resources Information Center

    Viviani, Anna Michele

    2011-01-01

    Childhood sexual abuse is a prevalent but taboo topic in society. Conservatively 80,000 new cases are reported each year with many more either unreported or unsubstantiated within the legal system. Survivors of childhood sexual abuse often times seek counseling assistance to manage the variety of short-and long-term emotional issues that may arise…

  16. Mothers in Substance Abuse Treatment: Differences in Characteristics Based on Involvement with Child Welfare Services

    ERIC Educational Resources Information Center

    Grella, Christine E.; Hser, Yih-Ing; Huang; Yu-Chuang

    2006-01-01

    Problem: Greater awareness of the role of parental substance abuse in child maltreatment makes it imperative that the substance abuse treatment and child welfare systems coordinate services for these parents. Yet little is known about the characteristics of child-welfare involved parents (primarily mothers) who enter into substance abuse…

  17. Bullying in Schools: A Form of Child Abuse in Schools

    ERIC Educational Resources Information Center

    Aluedse, Oyaziwo

    2006-01-01

    Child abuse is largely recognized as a significant issue within the school system and the larger society. In the schools, incidents of child abuse can take any of physical, sexual and psychological forms. This paper would restrict itself to bullying, by more specifically providing a clearer understanding of the concept of bullying, its prevalence,…

  18. 76 FR 21373 - Privacy Act of 1974; Report of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...

  19. "SPECDA"-A Comprehensive Approach to the Delivery of Substance Abuse Prevention Services in the New York City School Systems.

    ERIC Educational Resources Information Center

    Blotner, Roberta; Lilly, Levander

    1986-01-01

    Evaluates SPECDA (School Program to Educate and Control Drug Abuse) a comprehensive substance abuse prevention program which links drug counselors and police officers in teams to provide drug education. Results indicated significant positive changes in children's knowledge about drugs, attitudes toward drugs, and attitudes toward polic officers…

  20. The Child-Centered Social Worker and the Sexually Abused Child: Pathway to Healing.

    ERIC Educational Resources Information Center

    Anderson, Lorie Elizabeth; Weston, Elisabeth A.; Doueck, Howard J.; Krause, Denise J.

    2002-01-01

    In an effort to assist the sexually abused child throughout the court process, the authors propose the concept of a child-centered social worker committed to minimizing the potential for system-induced trauma by assisting the sexually abused child through the judicial process and providing clinical treatment as well. (Contains 68 references.) (GCP)

  1. 75 FR 67363 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-02

    ... proceeding were required to file system security statements under the Commission's rules. (Security systems..., including broadband Internet access and interconnected VoIP providers, must file updates to their systems... Commission's rules, the information in the CALEA security system filings and petitions will not be made...

  2. 14 CFR 1212.501 - Record systems determined to be exempt.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... exempted. (i) The Inspector General Investigations Case Files system of records is exempt from all sections... there may exist noncriminal investigative files within this system of records, the Inspector General Investigations Case Files system of records is exempt from the following sections of the Privacy Act (5 U.S.C...

  3. [Sociodemographic profile of femicide in Spain and its association with domestic abuse reporting].

    PubMed

    Sanz-Barbero, Belén; Heras-Mosterio, Julio; Otero-García, Laura; Vives-Cases, Carmen

    2016-01-01

    To analyse the characteristics associated with the risk of femicide in Spain among women exposed to domestic violence or similar aggression, and the possible association with filing judicial complaints against the aggressors. A case-control study was carried out for the period 2010-2011. The cases included 135 adult women killed by their partners (or similar) during the period, identified through the webpage of the Federación de Asociaciones de Mujeres Separadas y Divorciadas (Association of Separated and Divorced Women), and from the reports of the General Council of the Judiciary. The control cases included 185 women exposed to domestic violence in the past year, from the Macrosurvey of Gender Violence 2011. The association between filing a complaint and the risk of femicide was estimated through multivariate logistic regression models. There was no association found between the filing of a complaint against the aggressor and the risk of murder (OR: 1.38; 95% CI: 0.68-2.79). Immigrant women exposed to domestic violence were at greater risk of being murdered (ref.: Spanish women; OR: 5.38; 95% CI: 2.41-11.99). This association was also observed in women living in rural areas (ref.: urban areas; OR: 2.94; 95% CI: 1.36-6.38). Filing a judicial complaint against the aggressor does not seem to affect the risk of murder among women exposed to domestic violence. Protection measures for women should be strengthened among immigrant women and women living in rural areas. Copyright © 2016 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. The use of children's drawings in the evaluation and treatment of child sexual, emotional, and physical abuse.

    PubMed

    Peterson, L W; Hardin, M; Nitsch, M J

    1995-05-01

    Primary care physicians can be instrumental in the initial identification of potential sexual, emotional, and physical abuse of children. We reviewed the use of children's artwork as a method of communicating individual and family functioning. A quantitative method of analyzing children's artwork provides more reliability and validity than some methods used previously. A new scoring system was developed that uses individual human figure drawings and kinetic family drawings. This scoring system was based on research with 842 children (341 positively identified as sexually molested, 252 positively not sexually molested but having emotional or behavioral problems, and 249 "normal" public school children). This system is more comprehensive than previous systems of assessment of potential abuse.

  5. A computerized faculty time-management system in an academic family medicine department.

    PubMed

    Daugird, Allen J; Arndt, Jane E; Olson, P Richard

    2003-02-01

    The authors describe the development, implementation, and evaluation of a computerized faculty time-management system (FTMS) in the Department of Family Medicine at the University of North Carolina-Chapel Hill. The FTMS is presented as an integrated set of computerized spreadsheets used annually to allocate faculty time across all mission activities of the department. It was first implemented in 1996 and has been continuously developed since then. An iterative approach has been used to gain consensus among faculty about time resources needed for various tasks of all missions of the department. These time-resource assumptions are used in the computerized system. Faculty time is allocated annually by the department vice chair in negotiation with individual faculty, making sure that the activities planned do not exceed the work time each faculty member has available for the year. During this process, faculty preferences are balanced against department aggregate needs to meet mission commitments and obligations. The authors describe how the computerized FTMS is used for faculty time management and career development, department planning, budget planning, clinical scheduling, and mission cost accounting. They also describe barriers and potential abuses and the challenge of building an organizational culture willing to discuss faculty time openly and committed to developing a system perceived as fair and accurate. The spreadsheet file is available free from the authors for use in other departments.

  6. Evaluation of a new filing system's ability to maintain canal morphology.

    PubMed

    Thompson, Matthew; Sidow, Stephanie J; Lindsey, Kimberly; Chuang, Augustine; McPherson, James C

    2014-06-01

    The manufacturer of the Hyflex CM endodontic files claims the files remain centered within the canal, and if unwound during treatment, they will regain their original shape after sterilization. The purpose of this study was to evaluate and compare the canal centering ability of the Hyflex CM and the ProFile ISO filing systems after repeated uses in simulated canals, followed by autoclaving. Sixty acrylic blocks with a canal curvature of 45° were stained with methylene blue, photographed, and divided into 2 groups, H (Hyflex CM) and P (ProFile ISO). The groups were further subdivided into 3 subgroups: H1, H2, H3; P1, P2, P3 (n = 10). Groups H1 and P1 were instrumented to 40 (.04) with the respective file system. Used files were autoclaved for 26 minutes at 126°C. After sterilization, the files were used to instrument groups H2 and P2. The same sterilization and instrumentation procedure was repeated for groups H3 and P3. Post-instrumentation digital images were taken and superimposed over the pre-instrumentation images. Changes in the location of the center of the canal at predetermined reference points were recorded and compared within subgroups and between filing systems. Statistical differences in intergroup and intragroup transportation measures were analyzed by using the Kruskal-Wallis analysis of variance of ranks with the Bonferroni post hoc test. There was a difference between Hyflex CM and ProFile ISO groups, although it was not statistically significant. Intragroup differences for both Hyflex CM and ProFile ISO groups were not significant (P < .05). The Hyflex CM and ProFile ISO files equally maintained the original canal's morphology after 2 sterilization cycles. Published by Elsevier Inc.

  7. 49 CFR 1507.3 - Exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... exempt from the access provisions of subsection (d). (c) Personnel Background Investigation File System (DHS/TSA 004). The Personnel Background Investigation File System (PBIFS) (DHS/TSA 004) enables TSA to... Traveler Operations Files (DHS/TSA 015). The purpose of this system is to pre-screen and positively...

  8. 49 CFR 1507.3 - Exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... exempt from the access provisions of subsection (d). (c) Personnel Background Investigation File System (DHS/TSA 004). The Personnel Background Investigation File System (PBIFS) (DHS/TSA 004) enables TSA to... Traveler Operations Files (DHS/TSA 015). The purpose of this system is to pre-screen and positively...

  9. 49 CFR 1507.3 - Exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... exempt from the access provisions of subsection (d). (c) Personnel Background Investigation File System (DHS/TSA 004). The Personnel Background Investigation File System (PBIFS) (DHS/TSA 004) enables TSA to... Traveler Operations Files (DHS/TSA 015). The purpose of this system is to pre-screen and positively...

  10. 49 CFR 1507.3 - Exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... exempt from the access provisions of subsection (d). (c) Personnel Background Investigation File System (DHS/TSA 004). The Personnel Background Investigation File System (PBIFS) (DHS/TSA 004) enables TSA to... Traveler Operations Files (DHS/TSA 015). The purpose of this system is to pre-screen and positively...

  11. Total Parenteral Nutrition

    MedlinePlus

    ... Boolean useRights, FileShare share, Int32 bufferSize, FileOptions options, SECURITY_ATTRIBUTES secAttrs, String msgPath, Boolean bFromProxy) at System.IO.FileStream..ctor(String path, FileMode mode, FileAccess ...

  12. 48 CFR 904.803 - Contents of contract files.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Contents of contract files. 904.803 Section 904.803 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.803 Contents of contract files. (a) (29) The record copy of the Individual Acquisition Action Report...

  13. 78 FR 69983 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... Immigration Services, Immigration and Customs Enforcement, Customs and Border Protection--001 Alien File... Alien File, Index, and National File Tracking System of Records'' from certain provisions of the Privacy... administrative enforcement requirements. The system of records is the DHS/USCIS-ICE-CBP-001 Alien File, Index...

  14. 48 CFR 904.803 - Contents of contract files.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Contents of contract files. 904.803 Section 904.803 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL ADMINISTRATIVE MATTERS Government Contract Files 904.803 Contents of contract files. (a) (29) The record copy of the Individual Acquisition Action Report...

  15. ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog

    NASA Technical Reports Server (NTRS)

    Gray, F. P., Jr. (Editor)

    1979-01-01

    A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.

  16. Performance of the Galley Parallel File System

    NASA Technical Reports Server (NTRS)

    Nieuwejaar, Nils; Kotz, David

    1996-01-01

    As the input/output (I/O) needs of parallel scientific applications increase, file systems for multiprocessors are being designed to provide applications with parallel access to multiple disks. Many parallel file systems present applications with a conventional Unix-like interface that allows the application to access multiple disks transparently. This interface conceals the parallism within the file system, which increases the ease of programmability, but makes it difficult or impossible for sophisticated programmers and libraries to use knowledge about their I/O needs to exploit that parallelism. Furthermore, most current parallel file systems are optimized for a different workload than they are being asked to support. We introduce Galley, a new parallel file system that is intended to efficiently support realistic parallel workloads. Initial experiments, reported in this paper, indicate that Galley is capable of providing high-performance 1/O to applications the applications that rely on them. In Section 3 we describe that access data in patterns that have been observed to be common.

  17. Flexible Reporting Options for Skilled Child Abuse Professionals.

    ERIC Educational Resources Information Center

    Finkelhor, David; Zellman, Gail L.

    1991-01-01

    Proposed is a system of flexible options for the mandated reporting of child abuse and neglect, to improve compliance with and reduce burdens on the child protective system. Potential benefits and drawbacks of the plan, which would identify and train "registered reporters" and offer the option of explicit deferred investigation, are…

  18. Stop Contributing to Our People's Genocide. The Role of Community Prevention.

    ERIC Educational Resources Information Center

    New Breast, Theda

    1990-01-01

    Outlines a community action process that American Indian communities could use to develop their own drug and alcohol abuse prevention programs. Describes a community prevention system framework developed by the Office of Substance Abuse Prevention. Compares the community empowerment system with the agency-directed service delivery model. (SV)

  19. Home Interactive Media: An Analysis of Potential Abusers of Privacy.

    ERIC Educational Resources Information Center

    Wegner, John M.

    1985-01-01

    Examines potential threats to privacy posed by development of unified interaction systems in the home. Applicability of existing federal laws, constitutional provisions, and regulatory actions, and the possible technical and legislative actions that may be useful in curtailing possible privacy abuses in these systems are analyzed. (Author/MBR)

  20. 76 FR 55375 - Combined Notice of Filings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-07

    ..., September 12, 2011. Docket Numbers: RP11-2454-000. Applicants: Venice Gathering System, LLC. Description: Venice Gathering System, LLC submits tariff filing per 154.402: 2011 ACA Surcharge Filing to be effective...

Top