Xem 1-20 trên 309 kết quả Reliable information
  • The most established nationwide medical registry in Germany is the Perinatal Registry, which collects maternal health records concerning pregnancy, delivery and perinatal outcome from now more than 1100 hospitals. Over the past 16 years, data collection was transformed from printed questionnaires to digital records. A special web-based information source of the German Perinatal Registry does not exist.

    pdf6p connicquy 20-12-2012 43 30   Download

  • objective or subjective, when making decisions under uncertainty. This is especially true when the consequences of the decisions can have a significant impact, financial or otherwise. Most of us make everyday personal decisions this way, using an intuitive process based on our experience and subjective judgments. Mainstream statistical analysis, however, seeks objectivity by generally restricting the information used in an analysis to that obtained from a current set of clearly relevant data.

    pdf240p lulanphuong 17-03-2012 32 8   Download

  • Bài giảng "Hệ thống thông tin kế toán - Chapter 3: Information system control for system reliability" presentation of content: Describe the framework for IS control, explain the factors that influence information systems reliability, apply control functions.

    pdf14p doinhugiobay_18 11-03-2016 9 4   Download

  • This raises the issue of the measurement of the informal sector, which is known to be substantial in transition and developing countries. In the former Soviet Union countries it is estimated to contribute between 20 and 40 per cent of GDP. Even in the European Union (EU) there is considerable informal activity: in Italy, for example, it has been estimated to contribute between 10 and 20 per cent of GDP. It has been estimated that the informal sector contributes some nine trillion ‘undetected’ dollars to global GDP.

    pdf67p bi_ve_sau 05-02-2013 20 3   Download

  • The proliferation of social-networks on the Internet, has allowed companies to collect information about social-network users and their social relationships. Social networks like MySpace, Facebook, and Orkut allow us to determine who is acquainted with whom, how frequently they interact online, what interests they have in common, etc. Users are spending increasing amounts of time on social network websites. For instance, a recent survey [11] that ranks websites based on ‘average time spent by a user’, identifies MySpace and Facebook among the top 10 websites.

    pdf0p doiroimavanchuadc 06-02-2013 25 3   Download

  • Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this information is not always directly accessible; subnetworks may not cooperate in releasing information and widespread local measurement can be prohibitively expensive. Network tomographic techniques obviate the need for network cooperation, but the majority assume probing from a single source, which imposes scalability limitations because sampling traffic is concentrated on network links close to the source.

    pdf13p doiroimavanchuadc 06-02-2013 14 2   Download

  • We have aligned Japanese and English news articles and sentences to make a large parallel corpus. We first used a method based on cross-language information retrieval (CLIR) to align the Japanese and English articles and then used a method based on dynamic programming (DP) matching to align the Japanese and English sentences in these articles. However, the results included many incorrect alignments.

    pdf8p bunbo_1 17-04-2013 25 2   Download

  • After studying this chapter, you should be able to: Explain how information security affects information systems reliability; describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security.

    ppt14p tangtuy17 05-07-2016 2 2   Download

  • Extraction of relations between entities is an important part of Information Extraction on free text. Previous methods are mostly based on statistical correlation and dependency relations between entities. This paper re-examines the problem at the multiresolution layers of phrase, clause and sentence using dependency and discourse relations. Our multi-resolution framework ARE (Anchor and Relation) uses clausal relations in 2 ways: 1) to filter noisy dependency paths; and 2) to increase reliability of dependency path extraction.

    pdf8p hongvang_1 16-04-2013 10 1   Download

  • Chapter 3 - Introduction to E-Business. Learning objectives of this chapter: Identify and explain the four principles of systems reliability and the three criteria used to evaluate whether the principles have been achieved, identify and explain the controls that apply to more than one principle of reliability, identify and explain the controls that help explain that a system is available to users when needed.

    ppt60p allbymyself_10 02-03-2016 14 1   Download

  • This chapter identify and explain the four principles of systems reliability and the three criteria used to evaluate whether the principles have been achieved; identify and explain the controls that apply to more than one principle of reliability; identify and explain the controls that help explain that a system is available to users when needed;…

    ppt53p allbymyself_10 02-03-2016 5 1   Download

  • Chapter 8: Information systems controls for system reliability - Part 1: Information security. This chapter explain how information security affects information systems reliability; describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security.

    ppt23p nhanmotchut_5 02-11-2016 0 0   Download

  • Chapter 9 - Information systems controls for system reliability— Part 2: Confidentiality and privacy. After studying this chapter, you should be able to: Identify and explain controls designed to protect the confidentiality of sensitive corporate information; identify and explain controls designed to protect the privacy of personal information collected from customers, employees, suppliers, or business partners; explain how the two basic types of encryption systems work.

    ppt16p nhanmotchut_5 02-11-2016 0 0   Download

  • Chapter 10 - Information systems controls for system reliability - Part 3: Processing integrity and availability. After studying this chapter, you should be able to: Identify and explain controls designed to ensure processing integrity; identify and explain controls designed to ensure systems availability.

    ppt14p nhanmotchut_5 02-11-2016 0 0   Download

  • After completing this chapter, students will be able to: Discuss accounting as the language of business and the role of accounting information in making economic decisions, discuss the significance of accounting systems in generating reliable accounting information and understand the five components of internal control, explain the importance of financial accounting information for external parties - primarily investors and creditors - in terms of the objectives and the characteristics of that information,...

    ppt16p luimotbuoc_4 11-11-2016 1 0   Download

  • As the control center of the Joomla website. Using elegant interface Admin Section to develop the structure and editorial content publishers. Admin Section is divided into four regions. Manual programming is a product drawing experience, curricula were collected from various sources with high accuracy, reliable. Ebook uses a lot of materials gathered from various sources so all can take a number of English, but most have been.

    pdf219p vusuakhongduong 05-05-2009 1477 802   Download

  • The information in this e book for educational and entertainmnent purposes oly. Although every effort has been made to provide accurate, complete, and reliable information, no warranties of any kind are expresses or implied

    pdf0p blue_dreams567 07-07-2009 375 79   Download

  • As a consultant, the process of designing and developing technology-based solutions is one that you get to know intimately, thanks to iteration. Having been involved in a dozen or more projects in the past few years, I came to realize that a common component exists at the center of every one of those solutions. That component is the data storage system.

    pdf753p mylinh 11-08-2009 164 69   Download

  • The information in this book is for education and entertainment purposes only. Although every effort has been made to provide accurate, complete, and reliable information, no warranties of many kind are expressed or implied.

    pdf0p daokim 22-07-2009 198 52   Download

  • The microprocessor is the core of computer systems. Nowadays many communication, digital entertainment, portable devices, are controlled by them. A designer should know what types of components he needs, ways to reduce production costs and product reliable. CPU is stand-alone, RAM, ROM, I/O, timer are separate.

    ppt63p anhkong 12-04-2010 129 51   Download

Đồng bộ tài khoản