Search Results - (( Defined (contribution OR contributions) pension plant ) OR ((( Defined ((distribution operation) OR (distribution operations)) plan ) OR ( Defined distribution version plans ))))

  1. 181

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  2. 182

    Road vehicle automation 10 by SpringerLink (Online service), Automated Road Transportation Symposium

    Published: Springer, 2023
    Description: 1 online resource (vii, 183 pages) : illustrations (chiefly color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 183

    Microservices : science and engineering by SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource (363 pages)
    Contents:
    SpringerLink - Click here for access
    eBook
  4. 184
  5. 185
  6. 186

    CRM fundamentals by Kostojohn, Scott, Johnson, Mathew, Paulen, Brian

    Published: Apress, 2011
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  7. 187

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  8. 188

    CMMI for development : implementation guide by Chaudhary, Mukund, Chopra, Abhishek

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  9. 189

    Microsoft SharePoint : building Office 2007 solutions in VB 2005 by Hillier, Scot

    Published: Apress ; Distributed to the Book trade worldwide by Springer-Verlag, 2006
    Description: 1 online resource (xxv, 519 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  10. 190

    Knowledge-based and intelligent information and engineering systems : 14th international conference, KES 2010, Cardiff, UK, September 8-10, 2010, proceedings. Part I by International Conference on Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies Cardiff, Wales, SpringerLink (Online service)

    Published: Springer, 2010
    Description: 1 online resource (xlv, 679 pages) : illustrations.
    Contents: “…Keynote Talks -- Evolving Integrative Brain-, Gene-, and Quantum Inspired Systems for Computational Intelligence and Knowledge Engineering -- A Semiotic View of Social Intelligence for Realizing Human-Machine Symbiotic Systems -- Embracing Uncertainty: The New Machine Intelligence -- Exploiting Social Structures and Social Networks -- Knowledge Visualization for Engineered Systems -- Proximity-Based Federation of Smart Objects: Liberating Ubiquitous Computing from Stereotyped Application Scenarios -- Artificial Neural Networks, Connectionists Systems and Evolutionary Computation -- A Neural Network Model to Develop Urban Acupuncture -- Discovering Process Models with Genetic Algorithms Using Sampling -- A Multi-Objective Evolutionary Approach for the Antenna Positioning Problem -- CLONAL-GP Framework for Artificial Immune System Inspired Genetic Programming for Classification -- Solving Industrial Based Job-Shop Scheduling Problem by Distributed Micro-Genetic Algorithm with Local Search -- Data Mining via Rules Extracted from GMDH: An Application to Predict Churn in Bank Credit Cards -- Sensitivity Analysis and Automatic Calibration of a Rainfall-Runoff Model Using Multi-objectives -- University Course Timetabling Using ACO: A Case Study on Laboratory Exercises -- Machine Learning and Classical AI -- Nonparametric Statistical Analysis of Machine Learning Algorithms for Regression Problems -- Adaptive Learning of Nominal Concepts for Supervised Classification -- A Novel Approach of Process Mining with Event Graph -- A Classification Algorithm for Process Sequences Based on Markov Chains and Bayesian Networks -- Coaching to Enhance the Online Behavior Learning of a Robotic Agent -- Agent and Multi-agent Systems -- Cooperation of AGVs' Head-on Collision Avoidance by Knowledge Exchange in Autonomous Decentralized FMS -- A Log Analyzer Agent for Intrusion Detection in a Multi-Agent System -- A Proof System for Time-Dependent Multi-agents -- Toward Emotional E-Commerce: Formalizing Agents for a Simple Negotiation Protocol -- Distributed Ant Colony Clustering Using Mobile Agents and Its Effects -- Monitoring a Multi-Agent System Evolution through Iterative Development -- An Agent for Ecological Deliberation -- A Framework to Compute Inference Rules Valid in Agents' Temporal Logics -- Statecharts-Based JADE Agents and Tools for Engineering Multi-Agent Systems -- Telco Agent: Enabler of Paradigm Shift towards Customer-Managed Relationship -- Multi-attribute Auction Model for Agent-Based Content Trading in Telecom Markets -- Applying Possibility and Belief Operators to Conditional Statements -- A Computer Adaptive Testing Method for Intelligent Tutoring Systems -- Intelligent Vision, Image Processing and Signal Processing -- Combining Patient Metadata Extraction and Automatic Image Parsing for the Generation of an Anatomic Atlas -- Parallel Processing with CUDA in Ceramic Tiles Classification -- Signal Receiving and Processing Platform of the Experimental Passive Radar for Intelligent Surveillance System Using Software Defined Radio Approach -- Automated Anticounterfeiting Inspection Methods for Rigid Films Based on Infrared and Ultraviolet Pigments and Supervised Image Segmentation and Classification -- Vowel Recognition by Using the Combination of Haar Wavelet and Neural Network -- Bayesian Classification Using DCT Features for Brain Tumor Detection -- A New Strategy of Adaptive Nonlinear Echo Cancelling Volterra-Wiener Filter Structure Selection -- Intelligent System for Commercial Block Recognition Using Audio Signal Only -- Viewpoint Insensitive Actions Recognition Using Hidden Conditional Random Fields -- Fuzzy Hyper-Prototype Clustering -- Knowledge Management, Ontologies and Data Mining -- Clustering Using Difference Criterion of Distortion Ratios -- Computer-Generated Conversation Based on Newspaper Headline Interpretation -- Using Regression Analysis to Identify Patterns of Non-Technical Losses on Power Utilities -- Enhancing the Symbolic Aggregate Approximation Method Using Updated Lookup Tables -- Which XML Storage for Knowledge and Ontology Systems? …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 191

    Wireless internet : 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings by International Conference on Wireless Internet Haikou Shi, China, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xiv, 322 pages) : illustrations.
    Contents: “…Joint Asynchronous Time and Localization of an Unknown Node in Wireless Sensor Networks -- Distributed Beacon Synchronization Mechanism for 802.15.4 Cluster-Tree Topology -- A Short Survey on Fault Diagnosis in Wireless Sensor Networks -- Research on Data Storage Scheme under Sink Failures in Wireless Sensor Networks -- Impact of Irregular Radio and Faulty Nodes on Localization in Industrial WSNs -- A SDN Proactive Defense Scheme Based on IP and MAC Address Mutation -- An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage -- High capacity embedding methods of QR code error correction -- Perceptual secret sharing scheme based on Boolean operations and random grids -- Security-Aware Distributed Service Composition for WSNs based Smart Metering in Smart Grid Using Software Defined Networks -- A Simplied Interference Model for Outdoor Millimeter Wave Networks -- A CWMN Spectrum Allocation Based on Multi-Strategy Fusion Glowworm Swarm Optimization Algorithm -- Decode-and-Forward Full-duplex Relay Selection under Rayleigh Fading Environment -- Parameter Control Scheme among Multi-Cell for Mobility Load Balancing in Ultra-Dense Network -- Spectrum Sensing based on Modulated Wideband Converter with CoSaMP Reconstruction Algorithm -- Joint Partial Relay and Antenna Selection for Full-Duplex Amplify-and-Forward Relay Networks -- A Low-Complexity Power Allocation Method in Ultra-Dense Network -- QRD Architecture Using the Modied ILMGS Algorithm for MIMO Systems Simulating and Analyzing the Effect of Timeliness on the Accuracy Rate of Central Path Planning -- An Optimization of DBN/GPU Speech Recognition on Wireless Network Applications Estimating End-to-End Available Bandwidth for Cyber-Physical Applications in Hybrid Networks -- Delay Aware Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks -- An Improved Dynamic Clustering Algorithm Based on Uplink Capacity Analysis in Ultra-Dense Network System -- Wideband Spectrum Sensing by Multi-step Sample Autocorrelation Detection -- Noncoherent Joint Multiple Symbol Differential Detection and Channel Decoding in Massive MIMO System -- Downlink PDMA in the Heterogeneous Network Internet of Things -- Edge Caching to Deliver Mobile Content in Vehicular Ad Hoc Networks -- Enhanced IoT Data Acquisition in Information Centric Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 192

    Microsoft SharePoint : building Office 2007 solutions in C♯ 2005 by Hillier, Scot

    Published: Apress ; Distributed to the Book trade worldwide by Springer-Verlag, 2007
    Description: 1 online resource (xxv, 513 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  13. 193
  14. 194
  15. 195

    Compositional data analysis : CoDaWork, L'Escala, Spain, June 2015 by CoDaWork (Conference) La Escala, Spain), SpringerLink (Online service)

    Published: Springer, 2016
    Description: 1 online resource (x, 209 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  16. 196

    Learn Swift on the Mac : for OS X and iOS by Malik, Waqar

    Published: Apress, 2015
    Description: 1 online resource : color illustrations.
    SpringerLink - Click here for access
    eBook
  17. 197

    Proceedings of fifth International Conference on Soft Computing for Problem Solving : SocProS 2015. Volume 1 by International Conference on Soft Computing for Problem Solving Roorkee, India, SpringerLink (Online service)

    Published: Springer, 2016
    Description: 1 online resource (xix, 1063 pages) : illustrations.
    Contents: “…A Production Model with Stock Dependent Demand, Partial Backlogging, Weibull Distribution Deterioration and Customer Returns -- Chapter 3. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 198

    Continuous delivery with Visual Studio ALM 2015 by Olausson, Mathias, Ehn, Jakob

    Published: Apress ; Disctributed to the Book trade worldwide by Springer Science+Business Media, 2015
    Description: 1 online resource (xx, 320 pages) : illustrations.
    Contents:
    SpringerLink - Click here for access
    eBook
  19. 199
  20. 200

    Theory and engineering of complex systems and dependability : proceedings of the tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29-July 3... by International Conference on Dependability of Computer Systems Brunów, Poland, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvi, 604 pages) : illustrations.
    Contents: “…-Application of Data Encryption for Building Modern Virtual Private Networks -- Defining States in Reliability and Safety Modelling -- Macroscopic Transport Model as a Part of Traffic Management Center: Technical Feasibility Study -- Reliability Assessment of Integrated Airport Surface Surveillance System -- A Group Decision Support Technique for Critical IT-Infrastructures -- Planning of Electric Power Distribution Networks with Reliability Criteria -- Selected Aspects of Modeling the Movement of Aircraft in the Vicinity of the Airport with Regard to Emergency Situations -- Identifying and Symulation of Status of an Ict System Using Rough Sets -- Popular FPGA Device Families in Implementation of Cryptographic Algorithms -- Aspect-oriented Test Inputs Generation from Matlab/Simulink Models, Manel TEKAYA -- Ranking and Cyclic Job Scheduling in QoS-guaranteed Grids.- Web Based Engine for Processing and Clustering of Polish texts -- Effectiveness of Providing Data Confidentiality in Backbone Networks Based on Scalable and Dynamic Environment Technologies.- Models for Estimating the Execution Time of Software Loops in Parallel and Distributed Systems -- Analysis of Different Aspects of Infomobility for Public Transport in Latvia -- Data Actualization Using Regression Models in Decision Support System for Urban Transport Planning -- New Parallel Algorithm for the Calculation of Importance Measures -- An Unloading Work Model at an Intermodal Terminal.- Cost-aware Request Batching for Byzantine Fault-tolerant replication -- Symbolic Analysis Of Timed Petri nets.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook