Logical Design Sample Clauses

Logical Design. The logical design phase is a further elicitation of system requirements. This may include “system models that illustrate data structures, business process, data flows, and user interfaces.” [75] Some of these refactored requirements and use cases challenged the existing software architecture and the basic conceptual model. The logical design and basic architecture of QM were reworked to better fit revised requirements. This led to an iterative re- evaluation of requirements, problems and features list in light of the resulting logical design and architectural changes.
AutoNDA by SimpleDocs
Logical Design. Some of these refactored requirements and use cases challenged the existing software architecture and basic conceptual model. After reviewing the extensive list of changes and requirements it became clear that while the existing application would largely stay intact, there were several main changes in the logical design of the application that needed to be revamped to better fit revised requirements. The first was the use of Questionnaire sets and the fixed hierarchy of Study 🡪 Questionnaire Set 🡪 Questionnaire 🡪 Section. The second was the concept of the Subject of study, and the third was the addition of Relationships.

Related to Logical Design

  • Final Design A.4.1. Provide OWNER with proposed final construction drawings and detailed opinions of probable total Project construction costs in writing for OWNER' s review, prior to completion of the final Contract Documents, so that any changes that may be necessary in accordance with Project' s budgetary schedule can be made prior to bid.

  • Program Design The County Human Resources Department will operate a Catastrophic Leave Bank which is designed to assist any County employee who has exhausted all paid accruals due to a serious or catastrophic illness, injury, or condition of the employee or family member. The program establishes and maintains a Countywide bank wherein any employee who wishes to contribute may authorize that a portion of his/her accrued vacation, compensatory time, holiday compensatory time or floating holiday be deducted from those account(s) and credited to the Catastrophic Leave Bank. Employees may donate hours either to a specific eligible employee or to the bank. Upon approval, credits from the Catastrophic Leave Bank may be transferred to a requesting employee's sick leave account so that employee may remain in paid status for a longer period of time, thus partially ameliorating the financial impact of the illness, injury, or condition. Catastrophic illness or injury is defined as a critical medical condition, a long-term major physical impairment or disability which manifests itself during employment.

  • Schematic Design See Section 2, Part 1, Article 2.1.4, Paragraph 2.1.4.2.

  • ROADWAY DESIGN MISCELLANEOUS (ROADWAY) The Engineer shall provide the following services:

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Study Design This includes a discussion of the evaluation design employed including research questions and hypotheses; type of study design; impacted populations and stakeholders; data sources; and data collection; analysis techniques, including controls or adjustments for differences in comparison groups, controls for other interventions in the State and any sensitivity analyses, and limitations of the study.

  • Developer License We grant you a non-assignable, non-sublicensable, non-exclusive, worldwide right and license for the number of Developer(s) indicated in the Order Form to install the Software on any number of Machines in order to internally use the Software to create, develop and test Applications. For clarity, a single Software license may be re-allocated to another Developer in the event that the original Developer is no longer employed by you or has been assigned to a new role where access to the Software will no longer be required on a permanent basis.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Project Design Applicants must design a project that provides access to health services to enable eligible women and men experiencing health needs to secure and maintain safe and accessible quality screening and diagnostic services, comprehensive family planning, and/ or other women’s health services.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Time is Money Join Law Insider Premium to draft better contracts faster.