نتایج جستجو برای: first essential service
تعداد نتایج: 2019907 فیلتر نتایج به سال:
The ability to automatically compose services is one essential aspect of service oriented architecture. It can reduce time and cost in development and maintenance of complex services and software systems. We are developing a technique to realize this aim by combining the “planning as model checking” approach with Semantic Web Service concepts. We have modified a current planning as model checki...
An important factor in the successful deployment of federated web services-based business activities will be the ability to guarantee reliable distributed operation and execution under scalable conditions. For example advanced failure management is essential for any reliable distributed operation but especially for the target areas of web service architectures, where the activities can be const...
Ambulatory emergency care (AEC) is an essential component of any acute medical unit (AMU). This statement is predicated on the clinical and financial benefits it confers. In this article, the author outlines the implementation of the Ambulatory Care Unit at Derriford Hospital and the first 6 months of service provision. The initial data collated demonstrates the impact the service has had local...
The paper outlines, how financial service providers can generate competitive advantages through innovative IT-support for their financial advisory processes. Therefore a generic concept for individualised financial advisory processes is enhanced by the consideration of tax and social contribution effects. This concept is operationalised for the important field of private retirement planning. Th...
بررسی سرعت ارایه خدمات درمانی و عوامل مرتبط با آن در اورژانس مرکز آموزشی درمانی امام خمینی (ره) ساری
Background and purpose: Waiting time to receive appropriate services in emergency departments is considered as an important indicator for evaluating hospitals. Triage is the most important and the first stage of patient’s management at the time of arrival to hospital emergency department. This study aimed at determining the length of waiting time to receive treatment and diagnostic services and...
The aim of this paper is to analyze Bi-level threshold policy of M/(G1, G2)/1 with single vacation (SV) queue in a fuzzy environment. A mathematical Non linear programming (NLP) method is used to construct the membership function of the system characteristic in which the batch arrival-rate, expected group size, setup time, vacation time, service time for first essential service(FES), service ti...
We study an M/G/1 queueing system where the arrival follows Poisson Process. The server provides service in two stages, the first stage service is essential and the second stage of service is optional. If the system is empty then the server goes for a vacation of random duration and after returning from vacation the server decides to take a second vacation which is optional. When the server is ...
quality of service (qos) is an important issue in the design and management of web service composition. qos in web services consists of various non-functional factors, such as execution cost, execution time, availability, successful execution rate, and security. in recent years, the number of available web services has proliferated, and then offered the same services increasingly. the same web ...
service oriented enterprises (soes) are subject to constant change and variation. in this paper, the changes are considered from an economic perspective based on service culture notion. once a change is implemented, the costs of some member services may increase, whereas the costs of some other services may reduce. we construct a game theoretic model trying to capture the possible conflicting i...
vii 1 Survivable System Concepts 1 2 Service Traces for Survivability Specification 5 2.1 Essential-Service Workflows 5 2.2 Essential-Service Traces 6 2.3 Relational Specification of Trace Components 6 2.4 Computational Survivability 7 3 Intrusion Traces for Adverse Environment Specification 9 3.1 Intruder Workflows Organized Into Attack Trees 10 3.2 Attack Patterns Organized Into Attack Profil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید