نتایج جستجو برای: all assessment information
تعداد نتایج: 3205324 فیلتر نتایج به سال:
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
introducrion: self and peer a ssessment provides important information about the individual’s performance and behavior in all aspects of their professional environment work. the aim of this study is to evaluate the professional behavior and performance in medical students in the form of team based assessment. methods: in a cross-sectional study, 100 medical students in the 7th year of education...
threat assessment in the computer networks of organizations can reduce damage caused by attacks and unexpected events. data fusion models such as the jdl model provide efficient and adequate sensors to gather the right information at the right time from the right components. this information then is refined and normalized to provide situational awareness and assess events that may be intended a...
since its introduction in 1959, translation quality assessment (tqa) has been among the most addressed research topics in translation studies. during recent years, there has been a crucial increase on the study of tqa. various methods have come on scene. although these methods are based on scientific theories, most of them have remained at the level of theory. juliane house’s model is among tho...
The discussion about accessibility and usability for all is usually focused on the special needs of disabled people. We would like to argue for broadening the perspective to the variability of user needs in general, including disabled users as well as all people who have special needs without being disabled. Individual differences concerning information needs and modes of interaction with the d...
In today’s knowledge environment, individuals and groups who gather relevant information about the organization’s external environment and distribute that information for use by their colleagues receive increasing attention and are viewed with great importance. These individuals have been named Information Gatekeepers. Thus far, researchers have not established a unanimous and interdisciplinary...
background: short golden time is important to save the injured in earthquake and to start search and rescue (sar) operation as soon as possible in affected regions. this study evaluated application of geographic information system (gis) for sar operation in rigan town, kerman province, which was hit by an earthquake of 6.3 richter scale on december 12, 2010 at 22:12. materials and methods: a gi...
Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for acceptance objectives relevant the organization. Risk refers a process consists identification, management, elimination or reduction likelihood events can negatively affect resources information system reduce potentially have ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید