"ARANA-DOCUMENTS" FROM EMAR

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection of Archival Documents from Photochemical Eects

Purpose: ­The purpose of this paper is to highlight the destructive effects of light on archival documents/paper materials. ­The research aims to explain the mechanism of photochemical degradation and the damaging effect of light on paper. It also tells us about the measures to be adopted to control the deteriorating effects of light on paper step by step. Design/Methodology/Approach: Th­e res...

متن کامل

METU-Emar: An Agent-Based Electronic Marketplace on the Web

In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketplace and electronic commerce is realized through buying agents representing the customers and the selling agents representing the resources like electronic catalogs. We propose a possible architecture which is based on the emerg...

متن کامل

Electromagnetic Induction of Ultrasonic Waves: Emat, Emus, Emar

Electromagnetic induction of ultrasonic waves is restricted to conducting materials – like eddy current testing – because it involves inducing eddy currents in the surface of the part by a nearby coil of wire. A magnetic field supplied by a nearby magnet interacts with this eddy current to produce a mechanical force on the surface to excite ultrasonic vibrations. The same configuration of coil ...

متن کامل

Usability Evaluation of An Electronic Medication Administration Record (eMAR) Application.

BACKGROUND Electronic medication administration records (eMARs) have been widely used in recent years. However, formal usability evaluations are not yet available for these vendor applications, especially from the perspective of nurses, the largest group of eMAR users. OBJECTIVE To conduct a formal usability evaluation of an implemented eMAR. METHODS Four evaluators examined a commercial ve...

متن کامل

Documents from malicious terminals

The user wishes to communicate with a remote partner over an insecure network using a terminal. Cryptographic algorithms running on the terminal may provide authenticity for the user’s messages. In this paper the problem of sending authentic messages from untrusted terminals is analyzed. If attackers are able to gain total control over the terminal, the user must consider the terminal a potenti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Orient

سال: 1993

ISSN: 1884-1392,0473-3851

DOI: 10.5356/orient1960.29.139