نتایج جستجو برای: 4 assurance

تعداد نتایج: 1321914  

Journal: :Otonomi: Jurnal Manajemen Sumber Daya Manusia 2022

Penelitian ini mengkaji kualitas pelayanan rekam medis terhadap tingkat kepuasan pasien di Rumah Sakit Gigi dan Mulut IIK Bhakti Wiyata Kediri. Tujuan penelitian menganalisis Metode menggunakan kuantitatif dengan wawancara kuisioner sebanyak 40 sampel. Hasil yaitu dimensi tangibles, reliability, responsiveness, assurance, emphaty berpengaruh secara simultan pasien. Hal terlihat dari besarnya ni...

1998

The LTPP program acknowledges that weigh-in-motion (WIM) and automatic vehicle classification (AVC) are not mature technologies. As such, participating agency and site-specific conditions may legitimately warrant the use of procedures other than those presented below. In addition, LTPP recognizes that participating agencies use a variety of types of traffic data collection equipment and have di...

2012
Yiyao Hu Rui Chen

For the H.264/MPEG-4 AVC, there are purely hardware codec and solely software solutions. They are known to have either the best performance in terms of energy and speed or the flexibility. This project aims at examine the possible partitions between HW/SW and evaluate its tradeoffs between the flexibility and performance. Keywords-H.264, bitstream, deblocking filter

ژورنال: بیمارستان 2017

Background: Because of the current population policies adopted in Iran followed by increasing the number of births, this study aimed to investigate the current situation of safe delivery and proposed a model based on clinical governance. Materials and Methods: This study is a combinatorial-exploratory research (Mixed Method) conducted in four hospitals in Qazvin and Semnan provinces includ...

2002
Susan Older Shiu-Kai Chin

Syracuse University is one of thirty-six National Security Agency designated Centers of Academic Excellence in Information Assurance Education. Our IA program was developed within the Center for Systems Assurance (CSA), whose mission is to promote improvement in systems and information assurance through research, education, and technology trans-

2003
Scott D. Lathrop Gregory J. Conti Daniel Ragsdale

With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven...

Journal: :JITE 2006
Melissa Jane Dark Joseph J. Ekstrom Barry M. Lunt

In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During this period three main efforts have proceeded in pa...

1999
Jeffrey R. Williams George F. Jelen

Assurance in the security of rapidly evolving enterprises depends on a complex set of evidence. This paper describes a method for structuring this body of evidence into a manageable framework called an “assurance argument.” The method is extremely flexible, and is capable of including all relevant claims and evidence. The structure allows the practitioner to compare the costs and benefits of di...

2015
Thomas A. Babbitt

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

2001
Jon Doyle Isaac Kohane William J. Long Peter Szolovits

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید