نتایج جستجو برای: downtime of machines
تعداد نتایج: 21168642 فیلتر نتایج به سال:
As additive manufacturing (AM) evolves to become a common method of producing final parts, further study of this computer integrated technology is necessary. The purpose of this research is to evaluate the potential impact of additive manufacturing improvements on the configuration of spare parts supply chains. This goal has been accomplished through scenario modeling of a real-life spare parts...
Rolling upgrade consists of upgrading progressively the servers of a distributed system to reduce service downtime. Upgrading a subset of servers requires a wellengineered cluster membership protocol to maintain, in the meantime, the availability of the system state. Existing cluster membership reconfigurations, like Zookeeper and CoreOS etcd, rely on a primary not only for reconfiguration but ...
Abstract Organizations widely use cloud computing to outsource their needs. One crucial issue of is that services must be available clients at all times. However, the may temporarily unavailable due maintenance infrastructure, load balancing services, defense against cyber attacks, power management, proactive fault tolerance, or resource usage. The unavailability impacts negatively on business ...
State Machines: A Generic Model of Computation
The induction motor (IM) is considered to be one of the most important types motors used in industries. A sudden failure this machine can lead unwanted downtime, with consequences costs, product quality, and safety. Over last decade, several methods techniques have been proposed diagnose detect faults machines. In paper, we present development a new algorithm based on combination both Park’s ve...
In this paper we describe G/G/R+s multi- repairmen machining system with balking. The system consists of M operating machines, S spare machines, R permanent and s additional repairmen. Assuming the discrete flow of machines by continuous one, the diffusion approximation technique for the machine repair system has developed. The system will be in normal working mode if there is M operating machi...
The rapid growth of botnets represents the greatest computer security threat facing individuals and corporations today. Fuelled by financial incentives and readily available source code, malware authors pursue aggressively the development of newer modules and the exploitation of code into these bots. For an organization, internal bot infections can have serious repercussions, including the loss...
برهم کنش های پروتئین-پروتئین در بسیاری از فرآیندهای سلولی نقش مهمی ایفا می کنند. بنابراین شناسایی، پیش بینی و تحلیل برهم کنش های پروتئین-پروتئین در حوزه زیست مولکولی مهم می باشد. روش های آزمایشگاهی که به این منظور طراحی گردیده اند بسیار پرهزینه، پر زحمت و وقت گیر می باشند. به همین دلیل نیاز به روش های محاسباتی برای بررسی برهم کنش های پروتئین-پروتئین روزانه افزایش می یابد. از این رو، هدف اصلی ا...
Multiprotocol Label Switching (MPLS) systems are used in core networks where system downtime must be kept to a minimum. Similarly, where MPLS is at the network edges (e.g., in Provider Edge (PE) routers) [RFC2547], system downtime must also be kept to a minimum. Many MPLS Label Switching Routers (LSRs) may, therefore, exploit Fault Tolerant (FT) hardware or software to provide high availability...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید