Search Results - (( Defined (contribution OR contributions) ((pensions plans) OR (pension plans)) ) OR ((( Defined distribution ((((operation plan) OR (operation part))) OR (((operating plan) OR (operating a)))) ) OR ( Defined distribution erosion plans ))))

Refine Results
  1. 1

    Operation of distributed energy resources in smart distribution networks by ScienceDirect (Online service)

    Published: Academic Press, an imprint of Elsevier, 2018
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  2. 2

    Decentralized frameworks for future power systems operation, planning and control perspectives by ScienceDirect (Online service)

    Published: Academic Press, 2022
    Description: 1 online resource.
    Elsevier - Click here for access
    Electronic eBook
  3. 3

    The HAZOP leader's handbook how to plan and conduct successful HAZOP studies by Eames, Phil

    Published: Elsevier, 2022
    Description: 1 online resource.
    Contents: “…-- 3.3.8 Schedule and deliverables -- 3.3.9 Report content and distribution -- 3.4 The HAZOP team -- 3.4.1 The core HAZOP roles -- 3.4.2 Additional roles (if you must) -- 3.4.3 Independent process engineer -- 3.4.4 Safety manager -- 3.4.5 Preparing the team -- 3.5 Node selection -- 3.5.1 Node selection for a continuous process -- 3.5.2 Nodes for complex systems -- 3.5.3 Different operating modes -- 3.5.4 Parallel trains -- 3.5.5 Study boundaries or interfaces -- 3.5.6 Node selection for batch and procedural HAZOP -- 3.6 Deviations from design intent.…”
    Elsevier - Click here for access
    Electronic eBook
  4. 4

    How to validate a pharmaceutical process by Ostrove, Steve

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…II: Stage I-Process Development4 Getting Started; Before It All Starts; Example; Getting Started (After the Equipment Specifications); The Validation Master Plan; Standard Operating Procedures (SOPs) Preparation; Quality Programs; Training; Basic Risk Approach; Putting it Together; Notes; 5 Basic Equipment and Utility Qualification; Introduction; Determining the Level of Qualification; Factory Acceptance Test and Site Acceptance Test; Commissioning; Qualification Protocols-Installation Qualification (IQ) and Operational Qualification (OQ); Performance Qualification.…”
    Elsevier - Click here for access
    eBook
  5. 5

    High-Arctic Ecosystem Dynamics in a Changing Climate : Ten Years of Monitoring and Research at Zackenberg Research Station, Northeast Greenland by ScienceDirect (Online service)

    Published: Elsevier/Academic Press, 2008
    Description: 1 online resource (xxxi, 563 pages) : illustrations, maps.
    Elsevier - Click here for access
    eBook
  6. 6

    Introduction to applied probability by Pfeiffer, Paul E., Schum, David A.

    Published: Academic Press, 1973
    Description: 1 online resource (xv, 403 pages)
    Contents: “…Sets and Events; Introduction; 3-1. A Well-Defined Trial and Its Possible Outcomes; 3-2. …”
    Elsevier - Click here for access
    eBook
  7. 7

    Collaborative genomics projects : a comprehensive guide First edition. by Sheth, Margi, Zhang, Jiashan, Zenklusen, Jean C.

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  8. 8

    Modern enterprise business intelligence and data management : a roadmap for IT directors, managers, and architects by Simon, Alan, 1958-

    Published: Morgan Kaufmann, 2014
    Description: 1 online resource.
    Contents: “…Cover; Title Page; Copyright Page; Table of contents; Preface; Terminology; Defining "Enterprise"; Defining "Data"; Defining "Enterprise Data Management"; Defining "Business Intelligence"; About the author; Chapter 1 -- The Rebirth of Enterprise Data Management; 1.1 -- In the beginning: how we got to where we are today; 1.1.1 -- 1960s and 1970s; 1.1.2 -- 1980s; 1.1.2.1 -- Enterprise Data Models; 1.1.2.2 -- Distributed Database Management Systems (DDBMSs); 1.1.3 -- 1990s; 1.1.3.1 -- Data Warehousing; 1.1.3.2 -- Read-Only Distributed Data Access; 1.1.4 -- 2000s; 1.1.5 -- Today.…”
    Elsevier - Click here for access
    eBook
  9. 9

    Assessment, restoration and reclamation of mining influenced soils by ScienceDirect (Online service)

    Published: Academic Press, 2017
    Description: 1 online resource.
    Contents: “…2.3 Total Metal Content2.3.1 Destructive Techniques; 2.3.1.1 Origin Determination by MC-ICP-MS; 2.3.2 Nondestructive Techniques for Determination of Total Content; 2.3.2.1 XRF Technique and Rapid Screening Using Portable X-ray Fluorescence Spectrometry; 2.4 Available Content; 2.4.1 Selective Chemical Extractions; 2.4.2 Methods of Extraction of the Operationally Defined Available Content; 2.4.2.1 Weak Neutral Salt Solutions; 2.4.2.2 Organic Acid Extractions; 2.4.2.3 Chelating Agents; 2.5 Distribution of Toxic Elements in Soils; 2.5.1 Sequential Chemical Extractions.…”
    Elsevier - Click here for access
    eBook
  10. 10

    The new public health Third edition. by Tulchinsky, Theodore H., Varavikova, Elena

    Published: Academic Press, 2014
    Description: 1 online resource (xxv, 884 pages) : illustrations.
    Contents: “…Contents note continued: Health Policy and Planning as Context -- The Elements of Organizations -- Scientific Management -- Bureaucratic Pyramidal Organizations -- Organizations as Energy Systems -- Cybernetics and Management -- Target-Oriented Management -- Operations Research -- Management by Objectives -- Human Relations Management -- The Hawthorne Effect -- Maslow's Hierarchy of Needs -- Theory X--Theory Y -- Network Organization -- Total Quality Management -- Changing Human Behavior -- Empowerment -- Strategic Management of Health Systems -- Health System Organization Models -- Functional Model -- Corporate Model -- Matrix Model -- Skills for Management -- The Chief Executive Officer of Health Organizations -- Community Participation -- Integration: Lateral and Vertical -- Norms and Performance Indicators -- Health Promotion and Advocacy -- Philanthropy and Volunteerism -- New Organizational Models -- New Projects and their Evaluation.…”
    Elsevier - Click here for access
    eBook
  11. 11

    Foundations of electrical engineering. [Volume 3], Fields--Networks--Waves by Simonyi, Károly

    Published: Pergamon Press, 1963
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  12. 12

    Forest recreation 3rd ed. by Douglass, Robert W.

    Published: Pergamon Press, 1982
    Description: 1 online resource (x, 326 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  13. 13

    Configuration management for senior managers : essential product configuration and lifecycle management for manufacturing by Watts, Frank B.

    Published: Elsevier : BH, 2015
    Description: 1 online resource.
    Contents: “…FUNCTION NAMERESPONSIBILITIES; REENGINEER OR CONTINUOUS IMPROVEMENT; PLAN TO IMPROVE; SUMMARY; Chapter Four -- CM and Software; SOFTWARE'S CURRENT CONDITION; MODERN TREND; PROCESS REDESIGN BEFORE SOFTWARE; CM'S ROLL IN SOFTWARE; WHAT CM SHOULD CONTROL-AND NOT; SOFTWARE (SW) AND FIRMWARE (FW) CONTROL; SUMMARY; Chapter Five -- Standard Foundation Blocks; STANDARDS WRITING; GENERAL STANDARDS; ACRONYMS AND DEFINITIONS; PART NUMBERS-SIGNIFICANT OR NOT; CLASS CODING; INTERCHANGEABILITY AND THE PART NUMBER; INTERCHANGEABILITY/PART NUMBER/REV CHANGE; ITEM/DOCUMENT NUMBERING.…”
    Elsevier - Click here for access
    eBook
  14. 14

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  15. 15

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  16. 16

    Fund custody and administration by Loader, David

    Published: Elsevier/Academic Press, 2016
    Description: 1 online resource (xxiii, 319 pages) : illustrations.
    Contents: “…Regulation and directivesAIFMD and AIFMs; EEA Firms; Retail funds; UCITS Directive; Money laundering; Principles and recommendations; Fund Structures-Companies, Trusts, Partnerships, Common Funds; Fund of funds; Multimanager funds; Other structures; Retail funds; Alternative Investment Funds; Hedge funds; Open Ended and Closed Funds; Fund Jurisdictions; Key Players in the Operation of a Fund; Retail/mutual fund custodian; Fund administration; Prime broker/brokers; Setting up a Fund; Outsourcing; Documentation and agreements; Summary; Part 3 -- The Day-to-Day Operation of a Fund; Introduction.…”
    Elsevier - Click here for access
    eBook
  17. 17

    Software architectures and tools for computer aided process engineering by ScienceDirect (Online service)

    Published: Elsevier, 2002
    Description: 1 online resource (xii, 700 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  18. 18

    Chemometrics in spectroscopy Second edition. by Mark, Howard, Workman, Jerry, Jr

    Published: Elsevier Ltd. : Academic Press, 2018
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  19. 19

    Managing downside risk in financial markets : theory, practice and implementation by ScienceDirect (Online service)

    Published: Butterworth-Heinemann, 2001
    Description: 1 online resource (xiv, 267 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  20. 20

    Basic mechanisms and clinical treatment of tumor metastasis by ScienceDirect (Online service)

    Published: Academic Press, 1985
    Description: 1 online resource (692 pages) : illustrations, charts, tables.
    Contents: “…PATIENTS AND METHODS USED IN THIS STUDY; III. DISTRIBUTION OF THE ANTIGENS DEFINED WITH MONOCLONAL ANTIBODIES IN THE HEMATOPOIETIC CELL LINES AND NORMAL LYMPHOID TISSUES; IV. …”
    Elsevier - Click here for access
    eBook