Results 11 to 20 of about 4,132,791 (270)

Relationship between nurses knowledge level and workload about implementation of patient identification

open access: yesHealthcare in Low-resource Settings, 2023
Patient safety incidents can originate from patient identification errors. From the preliminary study, it was found that there were 3 cases of patient identification errors in the year 2022.
Arsyawina Arsyawina   +5 more
doaj   +1 more source

Towards more effective identification keys: A study of people identifying plant species characters

open access: yesPeople and Nature, 2022
Accurate species identification is essential for ecological monitoring and biodiversity conservation. Interactive plant identification keys have been considerably improved in recent years, mainly by providing iconic symbols, illustrations, or images for ...
Jana Wäldchen   +4 more
doaj   +1 more source

Aggregation procedure based on majority principle for collective identification of firm’s crucial knowledge [PDF]

open access: yes, 2010
It is very important to identify, preserve, and transfer knowledge to those who need it within firm. However, the identification of knowledge and especially tacit knowledge is a complex process because knowledge cannot be measured quantitatively. In this
Chakhar, Salem, Saad, I.
core   +1 more source

Assessment of the factors affecting the efficiency of the knowledge identification process in the sector of information technology

open access: yesBusiness: Theory and Practice, 2014
The factors influencing the knowledge identification process are changing in a dynamic environment along with their evaluation methods that are controversially considered in scientific literature and practice. This paper examines the issue concerning the
Jurgita Raudeliūnienė, Eglė Jaskytė
doaj   +1 more source

Online identification of a two-mass system in frequency domain using a Kalman filter [PDF]

open access: yes, 2016
Some of the most widely recognized online parameter estimation techniques used in different servomechanism are the extended Kalman filter (EKF) and recursive least squares (RLS) methods.
Derammelaere, Stijn   +6 more
core   +3 more sources

Enantiospecific Synthesis, Chiral Separation, and Biological Activity of Four Indazole-3-Carboxamide-Type Synthetic Cannabinoid Receptor Agonists and Their Detection in Seized Drug Samples

open access: yesFrontiers in Chemistry, 2019
Synthetic cannabinoid receptor agonists (SCRAs) have been the largest group of illicit psychoactive substances reported to international monitoring and early warning systems for many years. Carboxamide-type SCRAs are amongst the most prevalent and potent.
Lysbeth H. Antonides   +15 more
doaj   +1 more source

KNOWLEDGE AND IDENTIFICATION OF DIFFERENT ARTISTIC PRACTICES [PDF]

open access: yesIstraživanja u Pedagogiji, 2018
With its ambient, interesting and dynamic use of materials, alternative views of materials and objects, with its playfulness and affecting different senses contemporary fine art can be very interesting for art-educational work.
Katja Kozjek Varl, Jerneja Herzog
doaj   +1 more source

Relationships between structural social capital, knowledge identification capability and external knowledge acquisition [PDF]

open access: yesEuropean Journal of Management and Business Economics, 2017
Purpose - The purpose of this paper is to analyze the mediating effect of the identification of valuable external knowledge on the relationship between the development of inter-organizational ties (structural social capital) and the acquisition of ...
Beatriz Ortiz   +2 more
doaj   +1 more source

Zero Knowledge Broadcasting Identification Scheme [PDF]

open access: yes, 2002
Zero knowledge proofs form an important category in the public key identification protocols, they are depending on number theory. In 1989, Stern announced his protocol which is based on syndrome-decoding problem, he also studied the attacks against this type of problems.
Magdi S. El-Soudani   +2 more
openaire   +1 more source

Improved Zero-Knowledge Identification with Lattices [PDF]

open access: yesTatra Mountains Mathematical Publications, 2010
ABSTRACT Zero-knowledge identification schemes solve the problem of authenticating one party to another via an insecure channel without disclosing any additional information that might be used by an impersonator. In this paper we propose a scheme whose security relies on the existence of a commitment scheme and on the hardness of worst-case ...
Pierre-Louis Cayrel   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy