نتایج جستجو برای: criteria evaluation
تعداد نتایج: 1043569 فیلتر نتایج به سال:
This paper is the result of a research by which the level of observance of standards in medical records' section of hospitals managed by social security fund in Tehran, Iran is assessed based on evaluation criteria of American Medical Record Association and also based on national evaluation criteria. It is descriptive study and data are collected by questionnaires, check lists, interviews and o...
چکیده ندارد.
supplier selection is a multi-criteria problem. this study proposes a hybrid model for supporting the suppliers’ selection and ranking. this research is a two-stage model designed to fully rank the suppliers where each supplier has multiple inputs and outputs. first, the supplier evaluation problem is formulated by data envelopment analysis (dea), since the regarded decision deals with uncertai...
Within information hiding technology, digital watermarking is one of the most important technologies for copyright protection of digital content. Many digital watermarking schemes have been proposed in academia. However, these schemes are not used, because they are not practical; one reason for this is that the evaluation criteria are loosely defined. To make the evaluation more concrete and im...
evaluating and selecting alternatives investment projects needs considering all relevant and important aspects. in traditional methods, the focus is just on tangible monetary criteria. also in the traditional methods, either all the information’s about factors must be known precisely or sufficient objective data must be available for applying probability theory. in this paper, a combinative app...
Department of Defense (DoD) systems are required to be trusted and effective in a wide range of operational contexts with the ability to respond to new or changing conditions through modified tactics, appropriate reconfiguration, or replacement. As importantly, these systems are required to exhibit predictable and graceful degradation outside their designed performance envelope. For these syste...
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns
A majority of computer security breaches occur because internal employees of an organization subvert existing controls. While exploring the issue of violation of safeguards by trusted personnel, with specific reference to Barings Bank and the activities of Nicholas Leeson, this paper provides an understanding of related information security concerns. In a final synthesis, guidelines are provide...
Trusted Computing technology has been put forward as a potentially revolutionary addition to the field of information security. In this chapter we examine how Trusted Computing may be used to defend against the ever-growing threat posed by crimeware. We also highlight a counterintuitive but important use of Trusted Computing, as a possible facilitator
The main research object of the paper is investigation and proposal of the comprehensive Learning Object Repositories (LORs) quality evaluation tool suitable for their multiple criteria decision analysis, evaluation and optimisation. Both LORs ‘internal quality’ and ‘quality in use’ evaluation (decision making) criteria are analysed in the paper. The authors have analysed several well-known LOR...
Integration of assessment with planning process is one of the distinctive features of modern urban planning. In response to the need for comprehensive and integrated thinking, to evaluate and analyze complex and changing urban issues, assessment has become a basic issue in urban planning process aiming to explain the value of urban programs in terms of influencing urban development, formulate t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید