Assurance – activities designed to reach a measure of confidence. Assurance is different from audit, which is more concerned with compliance to formal standards or requirements87.
Asynchronous inter-chip protocols are protocols for data exchange in low-speed devices; instead of frames, individual characters are used to control the exchange of data.
Athenahealth Inc. is a developer of cloud-based practice management, point-of-care mobile applications and electronic health record (EHR) systems for small to medium-sized (SMB) physician practices and hospitals88.
Attack Surface refers to the system elements and interactions that are vulnerable to cyberattacks89.
Attack Vector is a pathway by which a cybercriminal can gain access to an entity90.
Attention mechanism is one of the key innovations in the field of neural machine translation. Attention allowed neural machine translation models to outperform classical machine translation systems based on phrase translation. The main bottleneck in sequence-to-sequence learning is that the entire content of the original sequence needs to be compressed into a vector of a fixed size. The attention mechanism facilitates this task by allowing the decoder to look back at the hidden states of the original sequence, which are then provided as a weighted average as additional input to the decoder.
Attributes (XML) (Атрибуты (XML)) XML elements can have attributes that further describe them, such as the following: <Price currency=«Euro»> 25.43 </Price> In the example above, «currency» is an attribute of «Price», and the attribute’s value is «Euro»91.
Audit – an independent examination of an effort to determine its compliance with a set of requirements. An audit may be carried out by internal or external groups92.
Audit Trail is a record that can be interpreted by auditors to establish that an activity has taken place. Often, a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event. An audit trail of system resource usage may include user login, file access, and triggers that indicate whether any actual or attempted security violations occurred93.
Auditability – property that ensures that any action of any security subject on any security object may be examined in order to establish the real operational responsibilities94.
Augmented and virtual reality enable the creation of immersive and interactive experiences using digital simulations. In a post-pandemic world, where buying takes place at a distance, serving up products virtually has never been so crucial95.
Augmented Intelligence is the intersection of machine learning and advanced applications, where clinical knowledge and medical data converge on a single platform. The potential benefits of Augmented Intelligence are realized when it is used in the context of workflows and systems that healthcare practitioners operate and interact with. Unlike Artificial Intelligence, which tries to replicate human intelligence, Augmented Intelligence works with and amplifies human intelligence96.
Augmented Reality (AR) is an enhanced version of the real physical world that is achieved through the use of digital visual elements, sound, or other sensory stimuli delivered via technology. It is a growing trend among companies involved in mobile computing and business applications in particular. Also, Augmented Reality (AR) refers to an interactive experience that blends together the virtual world and the real world. For example, visuals of a product or component can be overlaid onto the real world via a mobile phone or tablet, enabling users to visualize a virtual object in a real-world space97,98.
Augmented reality technologies are visualization technologies based on adding information or visual effects to the physical world by overlaying graphic and/or sound content to improve user experience and interactive features.
Authentication – process of reliably identifying security subjects by securely associating an identifier and authenticator99.
Authoring organisation – the healthcare provider organisation that created the content of a document100.
Authorization – permission to perform certain operations or use certain methods or services101.
Authorization link is a link that connects a healthcare provider to a healthcare provider organisation so the healthcare provider can access the My Health Record system via the National Provider Portal on behalf of their organisation102.
Authorized employee – an employee of a registered healthcare provider organisation who has been authorized by the organisation to use the My Health Record system and access an individual’s My Health Record on behalf of the organisation103.
Authorized representative – someone who can apply for and manage a My Health Record on behalf of another person. For the purposes of the My Health Record system someone can be an authorized representative if they: Have parental responsibility for a person under 14; or Have legal authority to act on behalf of a person who is at least 14 and who is not capable of making his or her own decisions. If there is no one with parental responsibility or legal authority, a person who is otherwise appropriate to act on behalf of the individual can be an authorized representative. An individual can have more than one authorized representative104.
Auto Associative Memory is a single layer neural network in which the input training vector and the output target vectors are the same. The weights are determined so that the network stores a set of patterns. As shown in the following figure, the architecture of Auto Associative memory network has «n’ number of input training vectors and similar «n’ number of output target vectors105.
Autoclave is a strong heated container used for chemical reactions and other processes using high pressures and temperatures, e.g., steam cleaning and sterilization106.
Automata theory is the study of abstract machines and automata, as well as the computational problems that can be solved using them. It is a theory in theoretical computer science and discrete mathematics (a subject of study in both mathematics and computer science). Automata theory (part of the theory of computation) is a theoretical branch of Computer Science and Mathematics, which mainly deals with the logic