Search results
From LIMSWiki
Jump to navigationJump to search
- '''Background''': For [[laboratory informatics]] applications, [[Software verification and validation|validation]] of the autoverification function is one of the '''Methods''': We developed a correctness verification and integrity validation method (hereinafter referred to as the "new method48 KB (6,399 words) - 18:33, 10 June 2021
- ...eeping copies of the original data, nor of accessing the whole content for verification regarding data preservation. Due to these requirements, [[Data integrity|in The central concept of this paper’s proposal is the verification by the cloud service user that a particular property, in our case the integ93 KB (14,047 words) - 00:38, 27 March 2019
- ...as Robot was that a test creator could record test macros, note points of verification, and replay the macros later with test results noted. Tools such as Rationa ...ay be tested as each iteration of code is completed. Prior to beginning of verification or validation, the project plan or other test plan document should discuss31 KB (4,944 words) - 23:13, 27 April 2016
- ====Verification==== ...h as a missing or duplicate label. By default, the <tt>report</tt> command fails if there are any ERROR-level violations, halting any automated build proces55 KB (8,385 words) - 20:40, 19 September 2021
- The {{tl|Failed verification}} tag will categorise tagged articles into [[:Category:Articles with unsour ...says that 32% of statistics are made up, then that information has failed verification. If you are unable to fix the error, then you should tag the information a2 KB (327 words) - 02:50, 31 May 2013
- ...nel and tighter budgets). These problems can be compounded if the business fails to promote and implement the environmental and operational (i.e., factory) ...d with sufficient equipment for that work—which will include providing the verification testing to ensure the HACCP plan is working as intended—is essential.<ref18 KB (2,573 words) - 22:55, 1 March 2024
- ...re tested. User-acceptance testing occurs in this environment; if the test fails, the software goes back to development, and if it passes, it is promoted to ...on runs that were performed using test samples in the laboratory and after verification that all test plans and checklists were completed.77 KB (9,756 words) - 22:16, 4 April 2024
- ...ing potential for the use of autoverification, allowing rapid and accurate verification of [[clinical laboratory]] tests. The purpose of the study is to develop an ...e between cannabis distributors and laboratories. We find that, if a batch fails mandatory tests, the value of cannabis that must be destroyed accounts for83 KB (11,691 words) - 15:36, 2 January 2024
- ...t computer. Manual notification by telephone is performed if the recipient fails to accept it within five minutes of the alarm prompt display. ...ratory test report time. Hence, a multi-center study is needed for further verification. Within this study, the IT-driven optimization of emergency laboratory test81 KB (9,868 words) - 16:27, 7 May 2024
- ...stence in OMOP CDM using the mapping tables or two new columns. During the verification, records are deleted in OMOP CDM if they were found. This approach is also ...a daily basis (requirement B). In the Processor, we added the logic of the verification of CUD-FHIR resources and their deletion from OMOP CDM if they already exis51 KB (7,348 words) - 23:47, 4 December 2023
- ...e is the “No” branch from “New Product Generation Justified?” and “Product Fails,” both of which lead to product retirement. For both hardware and softwar ...are being used as part of a LES. Manual modes mean typing (with data entry verification), while digital systems provide for an electronic transfer as the method of218 KB (34,907 words) - 16:00, 29 March 2024
- ...ks against stolen hashes and on-line brute-force in case the rate limiting fails. However, it increases CPU load on the server and would open a vector for D ...e no sufficient protection. Consider using a question together with e-mail verification by sending a new temporary password, for example.4 KB (603 words) - 22:44, 10 August 2016
- ...rtification procedures. The Privacy Shield Framework additionally includes verification, assessment, and supervision mechanisms, as well as special rules related t68 KB (9,682 words) - 19:21, 31 July 2021