911 resultados para Technical requirements


Relevância:

20.00% 20.00%

Publicador:

Resumo:

AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE: To assess the change in non-compliant items in prescription orders following the implementation of a computerized physician order entry (CPOE) system named PreDiMed. SETTING: The department of internal medicine (39 and 38 beds) in two regional hospitals in Canton Vaud, Switzerland. METHOD: The prescription lines in 100 pre- and 100 post-implementation patients' files were classified according to three modes of administration (medicines for oral or other non-parenteral uses; medicines administered parenterally or via nasogastric tube; pro re nata (PRN), as needed) and analyzed for a number of relevant variables constitutive of medical prescriptions. MAIN OUTCOME MEASURE: The monitored variables depended on the pharmaceutical category and included mainly name of medicine, pharmaceutical form, posology and route of administration, diluting solution, flow rate and identification of prescriber. RESULTS: In 2,099 prescription lines, the total number of non-compliant items was 2,265 before CPOE implementation, or 1.079 non-compliant items per line. Two-thirds of these were due to missing information, and the remaining third to incomplete information. In 2,074 prescription lines post-CPOE implementation, the number of non-compliant items had decreased to 221, or 0.107 non-compliant item per line, a dramatic 10-fold decrease (chi(2) = 4615; P < 10(-6)). Limitations of the computerized system were the risk for erroneous items in some non-prefilled fields and ambiguity due to a field with doses shown on commercial products. CONCLUSION: The deployment of PreDiMed in two departments of internal medicine has led to a major improvement in formal aspects of physicians' prescriptions. Some limitations of the first version of PreDiMed were unveiled and are being corrected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document describes the methodology for examining inequalities in access to revascularisation in the NHS and in the independent sector. It is a technical report.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the data and methods used in the London health inequalities forecast: A briefing on inequalities in life expectancy and deaths from cancers, heart disease and stroke in London. Links to relevant data sources and further information are also provided where possible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document describes the technical detail behind the Spearhead Health Inequalities Intervention Tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report explores the factors that contribute to infant mortality in the capital and ways in which commissioners might monitor the contribution of their local NHS to the national infant mortality target as well as contributing to maternity policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the data and methods used in the Health inequalities intervention tool to calculate the effect of four interventions on life expectancy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El següent document recull la documentació tècnica generada durant el desenvolupament del Sistema gestor d'empresa d'excavacions amb tecnologia J2EE i el conjunt de decisions que s'han pres per a portar-lo a terme en el termini previst.Aquest, es divideix principalment en 9 capítols:El primer, en el que es defineixen les característiques principals per a la gestió del projecte.En el segon recull els requeriments, l'anàlisi i el disseny del mateix projecte,acompanyats dels respectius diagrames de casos d'ús i de seqüència.En el tercer es descriu el model de dades utilitzat.El quart està format pel model físic del sistema on es defineix la arquitectura, lescaracterístiques tècniques principals del sistema i de la seva implementació, i les decisions adoptades durant el desenvolupament.El cinquè és un recull dels canvis realitzats sobre el disseny original.El sisè està dedicat a les proves de testeig realitzades un cop finalitzat el desenvolupament.El setè, és un manual d'instal·lació, on es descriuen les especificacions necessàries i els passos a seguir per a poder-lo desplegar.En el vuitè es fa una breu valoració econòmica de l'aplicació conjuntament amb un estudi d'oportunitat.I el novè, on es descriuen les conclusions sobre la realització d'aquest treball de final de carrera.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Análisis funcional y técnico para la gestión de un club de pádel. El documento recoge todos los requisitos para poder llevar un club de pádel desde una página web, tanto para los gestores del club, como para usuarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On 9 October 1963 a catastrophic landslide suddenly occurred on the southern slope of the Vaiont dam reservoir. A mass of approximately 270 million m3 collapsed into the reservoir generating a wave that overtopped the dam and hit the town of Longarone and other villages nearby. Several investigations and interpretations of the slope collapse have been carried out during the last 45 years, however, a comprehensive explanation of both the triggering and the dynamics of the phenomenon has yet to be provided. In order to re-evaluate the currently existing information on the slide, an electronic bibliographic database and an ESRI-geodatabase have been developed. The chronology of the collected documentation showed that most of the studies for re-evaluating the failure mechanisms were conducted in the last decade, as a consequence of knowledge, methods and techniques recently acquired. The current contents of the geodatabase will improve definition of the structural setting that influenced the slide and led to the the propagation of the displaced rock mass. The objectives, structure and contents of the e-bibliography and Geodatabase are indicated, together with a brief description on the possible use of the alphanumeric and spatial contents of the databases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a charging scheme for cost distribution along a multicast tree when cost is the responsibility of the receivers. This scheme focuses on QoS considerations and it does not depend on any specific type of service. The scheme has been designed to be used as a bridge between unicast and multicast services, solving the problem of charging multicast services by means of unicast charging and existing QoS routing mechanisms. We also include a numerical comparison and discussions of the case of non-numerical or relative QoS and on the application to some service examples in order to give a better understanding of the proposal

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we consider the ATM networks in which the virtual path concept is implemented. The question of how to multiplex two or more diverse traffic classes while providing different quality of service requirements is a very complicated open problem. Two distinct options are available: integration and segregation. In an integration approach all the traffic from different connections are multiplexed onto one VP. This implies that the most restrictive QOS requirements must be applied to all services. Therefore, link utilization will be decreased because unnecessarily stringent QOS is provided to all connections. With the segregation approach the problem can be much simplified if different types of traffic are separated by assigning a VP with dedicated resources (buffers and links). Therefore, resources may not be efficiently utilized because no sharing of bandwidth can take place across the VP. The probability that the bandwidth required by the accepted connections exceeds the capacity of the link is evaluated with the probability of congestion (PC). Since the PC can be expressed as the CLP, we shall simply carry out bandwidth allocation using the PC. We first focus on the influence of some parameters (CLP, bit rate and burstiness) on the capacity required by a VP supporting a single traffic class using the new convolution approach. Numerical results are presented both to compare the required capacity and to observe which conditions under each approach are preferred