Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
8241por OECDTabla de Contenidos: “…Governments - together with other stakeholders - are closing the gap by encouraging the disclosure of standardised information and indicators on health and well-being at the workplace -- 5.5. Other financing mechanisms, such as social impact bonds, are a tool for governments to raise finances dedicated to health promotion at the workplace -- 5.6. …”
Publicado 2022
Libro electrónico -
8242Publicado 1992Tabla de Contenidos: “…2 Methods for Priority Setting -- PRIORITY-SETTING PROCESSES USED BY ORGANIZATIONS -- Example 1: Health Care Financing Administration -- Bureau of Policy Development -- Health Care Financing Administration Physicians Panel -- Reevaluation or Assessment of Established Technologies -- Example 2: Private Sector-Pharmaceutical Industry -- Criteria for Assessment -- Criteria for Reassessment -- Internal Process of Priority Setting -- Example 3: Health Care Provider Organizations -- Example 4: Institute of Medicine/Council on Health Care Technology Pilot Study -- Example 5: Food and Drug Administration -- QUANTITATIVE MODELS FOR SETTING PRIORITIES -- Example 6: Technology Assessment Priority-Setting System -- Example 7: The Phelps-Parente Model -- SETTING PRIORITIES FOR SPENDING ON HEALTH SERVICES -- Example 8: Oregon Basic Health Services Act -- DISCUSSION -- Reactive and Implicit Processes -- Strengths and Weaknesses of Reactive Mechanisms -- The IOM/CHCT Process Compared with This IOM Study -- Analytic Models -- Strengths and Weaknesses of Analytic Models -- Need for a Comprehensive, Proactive Process for Priority Setting -- SUMMARY -- APPENDIX: MEDICARE COVERAGE DECISION MAKING -- 3 Guiding Principles -- BUILDING A MODEL PROCESS FOR SETTING PRIORITIES -- PROCESS BUILDING FOR OHTA -- The Process Must Reflect the Mission of OHTA -- Potential to Reduce Pain, Suffering, and Premature Death -- Potential to Reduce Inappropriate Health Care Expenditures -- Potential to Reduce Inequity and Inform Other Social Issues -- The Product of the Process Should Be Consistent with the Needs of Users -- The Process Must Be Efficient -- The Process Must Be Sensitive to the Environment in Which OHTA Operates -- SUMMARY -- 4 Recommendations for a Priority-Setting Process -- PREVIEW OF THE QUANTITATIVE MODEL -- ELEMENTS OF THE PROPOSED PRIORITY-SETTING PROCESS…”
Libro electrónico -
8243Publicado 1991Tabla de Contenidos: “…-- INTRODUCTION -- 25 Where Do We Go From Here? -- CURRENT MECHANISMS FOR ASSURING QUALITY CARE -- Medical Education and Board Certification -- Hospital Accreditation -- COMMENTS ON THE INSTITUTE OF MEDICINE RECOMMENDATIONS -- SUMMARY -- REFERENCE -- 26 Where Do We Go From Here? …”
Libro electrónico -
8244Publicado 1995Tabla de Contenidos: “…Governmental Organizations -- Nongovernmental Organizations -- Implications -- THE ADVANTAGES OF MARGINAL THINKING -- Lookback and Notification -- Removal of Untreated AHF Concentrate -- Use of Screened Whole Blood -- Destruction of Potentially Contaminated Cryoprecipitate -- Innovative Techniques for Pooling Plasma -- Testing Previously Untested Blood and Plasma for HIV -- SUMMARY -- REFERENCES -- 7 Risk Communication to Physicians and Patients -- INTRODUCTION -- FRAMEWORK FOR ANALYSIS -- Critical Questions -- Critical Factors -- The Role of the National Hemophilia Foundation -- RISK REDUCTION OPTIONS -- Specific Options -- The Process for Developing NHF Guidelines -- CASE STUDIES -- Case Study One: Conviction and Change -- Case Study Two: Reduction in Use of AHF Concentrate -- Case Study Three: Continue AHF Concentrate Treatment -- Case Study Four: Prescribing Cryoprecipitate for a Newborn and Continuing AHF Concentrate Treatment For a Four-Year-Old -- Case Study Five: A Transfusion Case -- Summary of the Case Studies -- OBSTACLES TO COMMUNICATION -- Institutional Obstacles -- Resources and Expertise of the NHF -- The NHF and the Plasma Fractionation Industry -- Communication Style of the NHF -- Social and Cultural Obstacles -- CONCLUSIONS -- REFERENCES -- 8 Conclusions and Recommendations -- GENERAL CONCLUSIONS -- Decisionmaking Under Uncertainty -- Risk Perception -- Risk Assessment Versus Risk Management -- Consider the Full Range of Possibilities -- Risk Reduction Versus Zero Risk -- Risk Communication -- Bureaucratic Management of Potential Crises -- Coordination and Leadership -- Advisory Mechanisms -- Analytic Capability and Long-Range Vision -- Presumptive Regulatory and Public Health Triggers -- Product Treatment -- Donor Screening -- Recall -- Communication to Patients and Providers -- RECOMMENDATIONS -- The Public Health Service…”
Libro electrónico -
8245por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- Lists of Procedures -- Exceptions Criteria -- Hospitalization Criteria -- Length-Of-Stay Norms -- Necessity of a Procedure -- How Criteria Are Adopted and Modified -- How Organizations Use Criteria -- Appeals Processes -- Reporting and Feedback Mechanisms -- SECOND-OPINION REQUIREMENTS -- LEGAL ISSUES -- CONCLUSION -- REFERENCES -- 4 Impact of Prior Review Programs -- DIRECTION OF AVAILABLE EVIDENCE: IMPACT ON UTILIZATION AND COST -- Before-and-After Studies -- Comparative Studies -- Multivariate Studies -- Impact of Second-Opinion Programs -- WEAKNESSES IN THE EVIDENCE ON EFFECTS OF PRIOR REVIEW -- EFFECTS OF PRIOR REVIEW ON SPECIFIC PARTIES -- Effects on Enrollees and Patients -- Quality of Care -- Navigating Health Care and Health Benefits -- Patient Costs, Comfort, and Convenience -- Effects on Health Care Practitioners and Institutions -- Physician-Patient Relationship -- Physician-Hospital Relations -- Provider-Purchaser Relations -- Effects of Prior Review on Purchasers -- CONCLUSION -- APPENDIX SOME METHODOLOGICAL ISSUES IN ASSESSING THE EFFECTS OF UTILIZATION MANAGEMENT PROGRAMS -- Claims Data -- Group Data -- Program Data -- Savings Calculations -- Other Interventions -- Medical Care Prices -- Noneconomic effects -- REFERENCES -- 5 High-Cost Case Management -- FOCUS OF HIGH-COST CASE MANAGEMENT -- ROLE OF THE PURCHASER -- HOW HIGH-COST CASE MANAGEMENT WORKS…”
Publicado 1989
Libro electrónico -
8246por OECDTabla de Contenidos: “…The foreign investment screening mechanism -- 2.2.5. Measures to combat foreign digital interference -- 2.2.6. …”
Publicado 2024
Libro electrónico -
8247Publicado 2024Tabla de Contenidos: “…The role of effective communication in cybersecurity success -- Strategies for successful collaboration between technical and non-technical stakeholders -- Translating technical concepts for non-technical stakeholders -- Simplifying complex cybersecurity terminology -- Contextualizing cybersecurity in business terms -- Effective visualization and presentation of cybersecurity data -- Strategies for successful collaboration -- Building cross-functional cybersecurity teams -- Establishing regular cybersecurity workshops and training sessions -- Implementing collaborative cybersecurity decision-making processes -- Summary -- Chapter 11: Building a Cybersecurity-Aware Organizational Culture -- The importance of a cybersecurity-aware organizational culture -- Understanding cybersecurity as a business imperative -- Assessing the risks and costs of cyber threats -- The role of leadership in shaping cybersecurity culture -- Roles and responsibilities of different stakeholders -- Defining stakeholder roles in cybersecurity -- Interdepartmental collaboration in cybersecurity -- Engaging external stakeholders in cybersecurity efforts -- Promoting shared responsibility for cybersecurity -- Creating a culture of cybersecurity awareness -- Building cross-functional cybersecurity teams -- Measuring and reinforcing cybersecurity culture -- Summary -- Chapter 12: Collaborating with Industry Partners and Sharing Threat Intelligence -- The importance of collaboration and threat intelligence sharing -- The imperative for collaborative defense -- Mechanisms of threat intelligence sharing -- Best practices in collaboration and sharing -- Building trust and maintaining confidentiality in information sharing -- Establishing trust among partners -- Maintaining confidentiality in information sharing -- Balancing transparency and confidentiality…”
Libro electrónico -
8248
-
8249
-
8250Publicado 2018Tabla de Contenidos: “…5.4 Energy Efficient Resource Allocation 113 -- 5.4.1 Hybrid FBS and MBS Based Schemes 113 -- 5.4.2 Link Adaptation Schemes 114 -- 5.4.3 Cross Layer Resource Allocation Schemes 115 -- 5.4.4 MBSFN Resource Allocation Scheme 115 -- 5.5 Bandwidth Expansion Schemes 117 -- 5.5.1 CoMP Based Coverage Expansion 117 -- 5.5.2 Time Compression (TCoM) Scheme 118 -- 5.5.3 Bandwidth Expansion Mode (BEM) Scheme 119 -- 5.5.4 Component Carrier Based Schemes 121 -- 5.5.5 Scheduling Based Schemes 122 -- 5.6 Load Balancing Schemes 123 -- 5.6.1 Distance Aware Schemes 123 -- 5.6.2 Coverage Expansion Based Schemes 125 -- 5.6.3 Distributed Schemes 125 -- 5.6.4 Shared Relay Based Schemes 127 -- 5.6.5 CRN Adopted Switching Off of a BS 128 -- 5.6.6 Reduced Early Handover (REHO) Scheme 129 -- 5.7 Comparative Analysis 130 -- 5.8 Open Research Issues 135 -- 5.9 Summary 139 -- References 140 -- 6 Spectrum Sensing Mechanisms in Cognitive Radio Based LTE Femtocells 150 /Tazeen S. …”
Libro electrónico -
8251Publicado 2023Tabla de Contenidos: “…5.5.4.1 Open Source -- 5.5.4.2 Private and Confidential -- 5.5.4.3 Access Control -- 5.5.4.4 Chaincode Functionality -- 5.5.4.5 Performance -- 5.5.4.6 Modular Design -- 5.6 Ethereum Versus Hyperledger -- 5.6.1 Purpose -- 5.6.2 Cryptocurrency -- 5.6.3 Participation -- 5.6.4 Privacy -- 5.6.5 Governance -- 5.6.6 Computer Code -- 5.6.7 Smart Contracts -- 5.6.8 Consensus Mechanism -- 5.6.9 Rate of Transactions -- 5.6.10 Use-cases -- 5.7 Decentralized Applications -- 5.7.1 Merits of Decentralized Applications -- 5.7.1.1 Zero Downtime -- 5.7.1.2 Privacy -- 5.7.1.3 Resistance to Censorship -- 5.7.1.4 Absolute Data Integrity -- 5.7.2 Demerits of Decentralized Applications -- 5.7.2.1 Maintenance -- 5.7.2.2 Performance Overhead -- 5.7.2.3 Network Congestion -- 5.7.2.4 User Experience -- 5.7.2.5 Centralization -- 5.8 Tokens -- 6 Identity as a Panacea for the Real World -- 6.1 Identity Systems -- 6.1.1 Contemporary ID Systems -- 6.2 Centralized Model -- 6.2.1 A Case Study of World's Largest Biometric ID System - Aadhaar -- 6.2.1.1 Salient Features of Aadhaar -- 6.2.1.2 Biometric and Demographic Standards -- 6.2.1.3 Enrollment Set-up -- 6.2.1.4 Entities and Their Roles -- 6.2.1.5 Process of Authentication -- 6.2.1.6 Budget and Outlay -- 6.2.1.7 Enrollment Status and Saturation -- 6.3 Cost and Benefits -- 6.3.1 Merits -- 6.3.2 Demerits -- 6.3.2.1 Waste of Resources -- 6.3.2.2 Lack of Neutrality -- 6.3.2.3 Technical Glitches -- 6.3.2.4 Security Procedures -- 6.3.2.5 Unauthorized Access -- 6.3.2.6 Absence of Data Protection Act -- 6.3.2.7 Involvement of Private Players -- 6.3.2.8 Freedom of Choice as an Illusion -- 6.3.2.9 Implicit Coercion -- 6.4 Quest for One World - One Identity -- 7 Decentralized Identities -- 7.1 Identity Models -- 7.1.1 Centralized Identity -- 7.1.2 Federated Identity -- 7.1.3 User-centric Identity -- 7.1.4 Self-sovereign Identity…”
Libro electrónico -
8252
-
8253Publicado 2002“…This phenomenal new type of business asset can be realized by two major mechanisms: the components managing mechanism and the services delivery mechanism. …”
Libro electrónico -
8254
-
8255Publicado 2018Tabla de Contenidos: “…5.2 Overview of the Turkish Agricultural Sector Model -- 5.3 Integration into the International Trade Environment -- 5.3.1 Basic Approach -- 5.3.2 The Generation of Border Prices and the Link to the Domestic Price Level in the Base Situation -- 5.3.3 The Generation of Border Prices and the Link to the Domestic Price Level in Simulations -- 5.4 Farm Supply Model -- 5.4.1 Plant Products -- 5.4.1.1 Basic Mechanisms -- 5.4.1.2 Additional Irrigation Area -- 5.4.2 Animal Products -- 5.5 Feed Model -- 5.6 Processing Model -- 5.7 Demand Model -- 5.8 Welfare Calculations -- 5.8.1 Welfare Changes at Farm Level -- 5.8.2 Welfare Changes at the Consumer Level -- 5.8.3 Welfare Changes at the Level of the Processing Industry -- 5.8.4 Budgetary Effects -- 6 BEHAVIORAL PARAMETERS -- 6.1 Basic Approach -- 6.2 Supply Side -- 6.2.1 Plant Products -- 6.2.1.1 Determination of Own Price Elasticities and Cost Shares of Variable Inputs -- 6.2.1.2 Determination of Cross Price Elasticities -- 6.2.2 Animal Products -- 6.3 Demand Side -- 6.3.1 Estimation of Income Elasticities from Expenditure Survey Data -- 6.3.1.1 Basic Considerations on the Use of Income Elasticity Estimates Based on Cross-Section Expenditure Data for Agricultural Sector Models -- 6.3.1.2 Data Set -- 6.3.1.3 Estimation Method and Results -- 6.3.2 Development of Elasticity-Matrices of Human Demand for Each Income Quintile -- 6.3.2.1 Determination of Income and Own Price Elasticities -- 6.3.2.2 Determination of Cross Price Elasticities -- 6.3.3 Development of Elasticity-Matrices of Feed Demand -- 6.3.4 Determination of Processing Demand Elasticities -- 6.4 Estimation of Price Transmission Elasticities for Animal Products -- 7 DATA SET FOR MODEL CALIBRATION -- 7.1 Supply, Trade, and Demand -- 7.1.1 Supply -- 7.1.1.1 Standard Approach -- 7.1.1.2 Specific Cases -- 7.1.2 Trade -- 7.1.3 Demand…”
Libro electrónico -
8256Tabla de Contenidos: “…-- Introduction to the Key Sensing Modalities -- Mechanical Sensors -- MEMS Sensors -- Accelerometers -- Gyroscopes -- Optical Sensors -- Photodetectors -- Infrared (IR) -- Fiber Optic -- Interferometers -- Semiconductor Sensors -- Gas Sensors -- Temperature Sensors -- Magnetic Sensors -- Optical Sensors -- Ion-Sensitive Field-Effect Transistors (ISFETs) -- Electrochemical Sensors -- Potentiometric Sensors -- Amperometric Sensors -- Coulometric -- Conductometric Sensors -- Biosensors -- Transducers for Biosensors -- Key Characteristics of Biosensors -- Application Domains -- Environmental Monitoring -- Air -- Water -- Sound (Noise Pollution) -- Soil -- Healthcare -- Wellness -- Monitoring Recreational Activity -- Personal Safety -- Activity and Location Detection -- Sensor Characteristics -- Range -- Transfer Function -- Linear Transfer Functions -- Linearization -- Non-Linear Transfer Functions -- Linearity and Nonlinearity -- Sensitivity -- Environmental Effects -- Modifying Inputs -- Interfering Inputs -- Hysteresis -- Resolution -- Accuracy -- Precision -- Error -- Systematic Errors -- Random Errors (Noise) -- Error Bands -- Statistical Characteristics -- Repeatability -- Tolerance -- Dynamic Characteristics -- Response Time…”
Libro electrónico -
8257por Supalov, Alexander. author, Semin, Andrey. author, Dahnken, Christopher. author, Klemm, Michael. authorTabla de Contenidos: “…Optimizing MPI Performance -- Classifying the MPI Performance Issues -- Addressing MPI Performance Issues -- Mapping Application onto the Platform -- Understanding Communication Paths -- Selecting Proper Communication Fabrics -- Using Scalable Datagrams -- Specifying a Network Provider -- Using IP over IB -- Controlling the Fabric Fallback Mechanism -- Using Multirail Capabilities -- Detecting and Classifying Improper Process Layout and Pinning Issues -- Controlling Process Layout -- Controlling the Global Process Layout -- Controlling the Detailed Process Layout -- Setting the Environment Variables at All Levels -- Controlling the Process Pinning -- Controlling Memory and Network Affinity -- Example 4: MiniMD Performance Investigation on Xeon Phi -- Example 5: MiniGhost Performance Investigation -- Tuning the Intel MPI Library -- Tuning Intel MPI for the Platform -- Tuning Point-to-Point Settings -- Adjusting the Eager and Rendezvous Protocol Thresholds -- Changing DAPL and DAPL UD Eager Protocol Threshold -- Bypassing Shared Memory for Intranode Communication -- Bypassing the Cache for Intranode Communication -- Choosing the Best Collective Algorithms -- Tuning Intel MPI Library for the Application -- Using Magical Tips and Tricks -- Disabling the Dynamic Connection Mode -- Applying the Wait Mode to Oversubscribed Jobs -- Fine-Tuning the Message-Passing Progress Engine -- Reducing the Pre-reserved DAPL Memory Size -- What Else? …”
Publicado 2014
Libro electrónico -
8258Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Brief Contents -- Contents -- Preface -- PART I Consumers, Marketers, and Technology -- 1 Consumer Behavior and Technology -- The Marketing Concept -- Market Segmentation, Targeting, and Positioning -- Technology Benefits Consumers and Marketers -- The Value Exchange -- Lower Prices, More Information, and Customized Products -- More Precise Targeting -- Interactive Communications -- Customer Value, Satisfaction, and Retention -- Technology and Customer Relationships -- Emotional Bonds versus Transaction‐Based Relationships -- Satisfaction and Customer Loyalty -- Customer Loyalty and Profitability -- Measures of Customer Retention -- Social Responsibility and Ethics -- Consumer Decision‐Making -- This Book -- Employability -- Brand Management -- Advertising -- Consumer Research -- Summary -- Review and Discussion Questions -- Hands‐on Assignments -- Key Terms -- 2 Market Segmentation and Real‐Time Bidding -- Market Segmentation -- Demographics -- Age -- Gender -- Households -- Social Standing -- Ethnicity -- Lifestyles -- Demographics and Geography -- Product Benefits -- Media Exposure -- Product Usage -- Selecting Target Markets -- The Targeted Segment Must Be Identifiable -- The Targeted Segment Must Be Profitable -- The Targeted Segment Must Be Reachable -- Mobile Targeting -- Real‐Time Bidding -- Profiling Impressions -- The Real‐Time Bidding Operation -- Data Brokers -- Advantages of Real‐Time Bidding -- Summary -- Review and Discussion Questions -- Hands‐on Assignments -- Key Terms -- PART II The Consumer as an Individual -- 3 Consumer Motivation and Personality -- The Dynamics of Motivation -- Needs -- Need Arousal -- Goals -- Needs and Goals are Interdependent -- Frustration and Defense Mechanisms -- Systems of Needs -- Murray's Psychogenic Needs -- Maslow's Hierarchy of Needs…”
Libro electrónico -
8259Publicado 2018Tabla de Contenidos: “…Continuous action space algorithms -- Trust region policy optimization -- Deterministic policy gradients -- Scoring mechanism in sequential models in NLP -- BLEU -- What is BLEU score and what does it do? …”
Libro electrónico -
8260Publicado 2018Tabla de Contenidos: “…-- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
Libro electrónico