نتایج جستجو برای: public
تعداد نتایج: 381305 فیلتر نتایج به سال:
BACKGROUND Patient safety climate has been recognized as a core determinant for improving safety in hospitals. Describing workforce perceptions of patient safety climate is an important part of safety climate management. This study aimed to describe staff's perceptions of patient safety climate in public hospitals in Shanghai, China and to determine how perceptions of patient safety climate dif...
چکیده ندارد.
In a distributed system, the principle of separation of policy and mechanism provides the flexibility to revise policies without altering mechanisms and vice versa. This separation can be achieved by devising a language for specifying policy and an engine for interpreting policy. In the Condor [14] high throughput distributed system the ClassAd language [16] is used to specify resource selectio...
although public policy analysis is essential for public policy systems, the lack of public policy analysis is one of the most important problems of public policy making system in iran. thus, this research implemented to achieve a model for analyzing public policies, using multiple grounded theory method, to create theories and models compatible with the country`s conditions. for this purpose, p...
The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...
Public-key cryptography is fast becoming the foundation for those applications that require security and authentication in open networks. But the widespread use of a global public-key cryptosystem requires that public-key certificates are always available and up-to-date. Problems associated to digital certificates management, like storage, retrieval, maintenance, and, specially, revocation, req...
We introduce the notion of certificate-based encryption. In this model, a certificate – or, more generally, a signature – acts not only as a certificate but also as a decryption key. To decrypt a message, a keyholder needs both its secret key and an up-to-date certificate from its CA (or a signature from an authorizer). Certificate-based encryption combines the best aspects of identity-based en...
P2P network is open, anonymous and dynamical in contrast with conventional network. It’s full of dishonesty, deceit, selfishness. It’s necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In our algorithm, the peer generates their ...
OBJECTIVES THIS STUDY SOUGHT TO FIND ANSWERS TO THE FOLLOWING QUESTIONS: 1) Can we predict whether a patient will revisit a healthcare center? 2) Can we anticipate diseases of patients who revisit the center? METHODS For the first question, we applied 5 classification algorithms (decision tree, artificial neural network, logistic regression, Bayesian networks, and Naïve Bayes) and the stackin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید