Setup simulation Sample Clauses

Setup simulation. 1. Define the geometry (often complex), and generate the mesh (check mesh quality).
AutoNDA by SimpleDocs
Setup simulation. 1. Define the geometry and discretization of the particle (spherical, cylindrical, or sheet; particle size; discretization scheme, numerical solution parameters, fitting algorithm), and boundary and initial conditions to reflect the influence of the surrounding fluid (e.g., constant gas-phase composition and fixed heat transfer coefficient; temperatures, initial concentrations).

Related to Setup simulation

  • Simulation An activity that mimics the reality of the clinical environment that is designed to demonstrate procedures, decision-making, and critical thinking through techniques such as role- playing and the use of devices (AANC, 2008). Wellness: Wellness is the optimal state of health of individuals or groups. There are two focal concerns: the realization of the fullest potential of an individual physically, psychologically, socially, spiritually, and economically; and the fulfillment of one’s role expectations in the family, community, place of worship, workplace and other settings (Xxxxx, Xxxx, & Xxxxxxx, 2006). References Accreditation Commission for Education in Nursing (ACEN). (2013). ACEN 2013 standards and criteria baccalaureate. Retrieved from xxxx://xxx.xxxxxxxxxx.xxx/manuals/SC2013_BACCALAUREATE.pdf. American Association of Colleges of Nursing (AACN). (2008). The essentials of baccalaureate education for professional nursing practice. Retrieved from xxxx://xxx.xxxx.xxxx.xxx/education-resources/baccessentials08.pdf. Xxxxxx, X., & Xxxxxx, S. (2012). Xxxxxx & Xxx’x fundamentals of nursing (9th ed.). Upper Saddle River, New Jersey: Person Education, Inc. Xxxxxx, X., & Xxxxx, S. (2014). Contemporary nursing: Issues, trends, and management (6th ed.). St. Louis, Missouri: Elsevier Xxxxx. Commission on Collegiate Nursing Education (CCNE). (2009). Standards for accreditation of baccalaureate and graduate degree nursing programs. Retrieved from xxxx://xxx.xxxx.xxxx.xxx/ccne-accreditation/standards09.pdf. Xxxxxxxxxx, X., Xxxxxxxx, X., Xxxxxxxxxxx, J., Xxxxx, X., Xxxxxxx, X., Xxxxxxxx, P., … (2007). Quality and safety education for nurses. Nursing Outlook, 55(3), 122-131. Institute of Medicine (IOM). (2003). Health professions education: A bridge to quality. Retrieved from xxxx://xxx.xxx.xxx/Reports/2003/health-professions-education-a-bridge- to-quality.aspx Xxxxxxx, X., & Xxxxxx, C. (2012). Leadership roles and management functions in nursing: Theory and application (6th ed.). Hong Kong, China: Wolters Kluwer Health/Lippincott Xxxxxxxx & Xxxxxxx Xxxxx, X. (Ed.). (2009). Xxxxx’x dictionary of medicine, nursing and health professions (8th ed.). St. Louis, Missouri: Xxxxx Elsevier.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Configuration The configuration for the Purchase Right Aircraft will be the Detail Specification for Model 767-3S2F aircraft at the revision level in effect at the time of the Supplemental Agreement. Such Detail Specification will be revised to include (i) changes required to obtain required regulatory certificates and (ii) other changes as mutually agreed upon by Boeing and Customer.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Layout a. Estimate and quantity sheet

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.