نتایج جستجو برای: maintenance technique

تعداد نتایج: 750321  

Journal: :مهندسی عمران فردوسی 0
سعید غفارپور جهرمی نبی ا... احمدی شهرام وثوق علی خدایی

modified bituminous materials can bring real benefits to highway maintenance/construction, in terms of better and longer lasting roads, and savings in total road life castings. this paper present the effect of there novel modifier as precipitated calcium carbonate (pcc) and two type of nanoclay on rheological properties of bitumen binder. various blends of modifier and bitumen were selected and...

2010
Haritha Saranga

Opportunistic maintenance has been an essential part of all systems-maintenance, implicitly if not explicitly. However, as systems become more expensive and complex, the decisions involving opportunistic maintenance activities become more complicated. In this paper, we discuss a few issues that arise while carrying out the opportunistic maintenance, and try to resolve them with the help of a po...

2009
Jorge E. Núñez Mc Leod Selva S. Rivera

In this paper a study about human error optimization is presented. A discussion about the maintenance or operation management is done. The models of human error were made using a well known technique named Technique for Human Error Rate Prediction (THERP), wisely used in the nuclear area. These models were included in the Probabilistic Safety Analysis (PSA) to evaluate the impact of human error...

Journal: :The British journal of nutrition 1979
D J Thomson J S Fenlon S B Cammell

1. Total body energy retention (ER) and metabolizable energy intake (MEI) values from experiments with 231 lambs (Suffolk male x (Border Leicester male x Cheviot female) female) housed indoors and given thirteen forage diets were used to estimate the metabolizable energy (ME) required for maintenance. 2. ER was measured using the comparative slaughter technique, and the lambs were fed at severa...

2002
Giuseppe Manco Elio Masciari Massimo Ruffolo Andrea Tagarelli

We introduce a technique based on data mining algorithms for classifying incoming messages, as a basis for an overall architecture for maintenance and management of e-mail messages. We exploit clustering techniques for grouping structured and unstructured information extracted from e-mail messages in an unsupervised way, and exploit the resulting algorithm in the process of folder creation (and...

2008
Millist W. Vincent Jixue Liu Jiashen Tian Mukesh Mohania

Materialized views are used in a number of areas such as data warehousing, query optimization and mobile computing. A central issue in the application of materialized views is view maintenance, which is the issue of how to update a materialized view in response to changes in the source data. The standard techniques used by commercial database software for view maintenance are full view re-compu...

Journal: :J. Parallel Distrib. Comput. 2009
Haiying Shen Yingwu Zhu

File replication is a widely used technique for high performance in peer-to-peer content delivery networks. A file replication technique should be efficient and at the same time facilitates efficient file consistency maintenance. However, most traditional methods do not consider nodes’ available capacity and physical location in file replication, leading to high overhead for both file replicati...

1996
Enric Mayol Ernest Teniente

Two different approaches have been traditionally considered for dealing with the process of integrity constraints enforcement: integrity constraints checking and integrity constraints maintenance. However, while previous research in the first approach has mainly addressed efficiency issues, research in the second approach has been mainly concentrated in being able to generate all possible repai...

Journal: :IEICE Transactions 2010
Chen-Sung Chang

This paper applies the Evolutionary Programming (EP) algorithm and a risk assessment technique to obtain an optimal solution to the Unit Maintenance Scheduling Decision (UMSD) problem subject to economic cost and power security constraints. The proposed approach employs a risk assessment model to evaluate the security of the power supply system and uses the EP algorithm to establish the optimal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید