Search Results - (( Defined contribution pensions plans ) OR ((( Defined distributed cooperative plan ) OR ( Defined ((((distribution erosion) OR (distribution evolution))) OR (distribution estimation)) plans ))))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  2. 2

    Managing downside risk in financial markets : theory, practice and implementation by ScienceDirect (Online service)

    Published: Butterworth-Heinemann, 2001
    Description: 1 online resource (xiv, 267 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  3. 3

    Practical business statistics 6th ed. by Siegel, Andrew F.

    Published: Academic Press, 2012
    Description: 1 online resource (xix, 619 pages) : illustrations.
    Contents: “…RANDOM VARIABLES: WORKING WITH UNCERTAIN NUMBERS -- 8.) RANDOM SAMPLING: PLANNING AHEAD FOR DATA GATHERING -- 9.) CONFIDENCE INTERVALS: ADMITTING THAT ESTIMATES ARE NOT EXACT -- 10.) …”
    Elsevier - Click here for access
    eBook
  4. 4

    Collaborative genomics projects : a comprehensive guide First edition. by Sheth, Margi, Zhang, Jiashan, Zenklusen, Jean C.

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  5. 5
  6. 6

    LASER ADDITIVE MANUFACTURING OF METALLIC MATERIALS AND COMPONENTS by Gu, Dongdong, 1992-

    Published: ELSEVIER, 2022
    Description: 1 online resource.
    Contents: “…. -- Graphical abstract -- 3.1 Introduction -- 3.2 The preparation of CNTs/Ti6Al4V nanocomposite powder for laser additive manufacturing -- 3.2.1 Morphological evolution of milled CNTs/Ti6Al4V nanocomposite powder -- 3.2.2 Particle size distribution and flowability of milled CNTs/Ti6Al4V nanocomposite powder -- 3.2.3 Dispersion of CNTs in Ti6Al4V powder -- 3.2.4 LPBF processability of milled CNTs/Ti6Al4V nanocomposite powder.…”
    Elsevier - Click here for access
    Electronic eBook
  7. 7

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  8. 8

    The new public health Third edition. by Tulchinsky, Theodore H., Varavikova, Elena

    Published: Academic Press, 2014
    Description: 1 online resource (xxv, 884 pages) : illustrations.
    Contents: “…Expanding the Concept of Public Health -- Introduction -- Concepts of Public Health -- Evolution of Public Health -- Health and Disease -- The Host-Agent--Environment Paradigm -- The Expanded Host-Agent-Environment Paradigm -- The Natural History of Disease -- Society and Health -- Health Insurance Systems -- Health Promotion -- Social Determinants of Health -- Modes of Prevention -- Health Promotion -- Health Protection -- Primary Prevention -- Secondary Prevention -- Tertiary Prevention -- Demographic and Epidemiological Transition -- Interdependence of Health Services -- Defining Public Health -- Social Medicine and Community Health -- Social Hygiene, Eugenics, and Corruption of Public Health Concepts -- Medical Ecology.…”
    Elsevier - Click here for access
    eBook
  9. 9

    System requirements analysis Second edition. by Grady, Jeffrey O.

    Published: Elsevier, 2014
    Description: 1 online resource (834 pages) : illustrations (some color).
    Contents: “…-- 3.8.2.Emergence of Flowcharting -- 3.8.3.The First Model Becomes the First Comprehensive Model -- 3.8.4.A Parting of the Ways -- 3.8.5.Come Home -- 3.8.6.An Obvious Universality -- 3.8.7.Affordability -- 3.9.Physical Process Modeling -- 3.9.1.Introduction to Process Analysis -- 3.9.2.Process Fundamentals -- 3.9.3.Process Analysis Applications -- 3.9.4.Program Product-Oriented Processes -- 3.9.5.Deployment Planning Analysis -- 3.9.6.System Sustainment Process Analysis -- 3.10.RAS-Complete and RAS-Centered Analysis -- 3.10.1.A System Defined -- 3.10.2.Descriptors of Interest -- 3.10.3.System Functionality -- 3.10.4.Performance Requirements Derivation and Allocation -- 3.10.5.Conventional RAS Limitations -- 3.10.6.The Beginning of the Complete RAS -- 3.10.7.System Product Entity Structure -- 3.10.8.Allocation Pacing Alternatives -- 3.10.9.System Relations -- 3.10.10.The System Environment -- 3.10.11.Environmental Relation Algorithm -- 3.10.12.Specialty Engineering and RAS-Complete -- 3.10.13.Verification Extension -- 3.10.14.Conclusions -- 3.11.Model Documentation -- 3.11.1.The Common Failure -- 3.11.2.SAR Content and Format -- 3.11.3.Recommended Responsibility Pattern -- 4.A Variety of Software Models -- 4.1.Introduction -- 4.1.1.Computer Software Development Environment -- 4.1.2.Software Development Models for Analysis -- 4.1.3.Model Comparisons -- 4.1.4.Design and Manufacturing Differences -- 4.1.5.Software Deficit Disorder -- 4.2.Computer Processing-Oriented Analysis -- 4.2.1.Background -- 4.2.2.Flowcharts and Other Things -- 4.2.3.Modern Structured Analysis -- 4.2.4.Hatley-Pirbhai Real-Time Extension -- 4.2.5.Transform from Models to Software Entities and Their Requirements -- 4.2.6.Are These Models Appropriate Only for Software? …”
    Elsevier - Click here for access
    eBook