نتایج جستجو برای: operation sequence

تعداد نتایج: 611923  

Mohammad Saidi Mehrabad Saeed Zarghami

This paper presented a mixed integer programming for integrated scheduling and process planning. The presented process plan included some orders with precedence relations similar to Multiple Traveling Salesman Problem (MTSP), which was categorized as an NP-hard problem. These types of problems are also called advanced planning because of simultaneously determining the appropriate sequence and m...

2007
Craig Stuart Sapp

A technique for comparing numerous performances of an identical selection of music is described. The basic methodology is to split a one-dimensional sequence into all possible sequential sub-sequences, perform some operation on these sequences, and then display a summary of the results as a two-dimensional plot; the horizontal axis being time and the vertical axis being sub-sequence length (lon...

2003
Huei-Ming Wang Yi-Chung Lin

In spoken dialogue systems, sentence verification technique is very useful to avoid misunderstanding user’s intention by rejecting out-of-domain or bad quality utterances. However, compared with word verification and concept verification, sentence verification has been seldom touched in the past. In this paper, we propose a sentence verification approach which uses discriminative features extra...

Journal: :Journal of experimental child psychology 2008
John N Towse Graham J Hitch Z Hamilton Sarah Pirrie

We analyze the timing of recall as a source of information about children's performance in complex working memory tasks. A group of 8-year-olds performed a traditional operation span task in which sequence length increased across trials and an operation period task in which processing requirements were extended across trials of constant sequence length. Interword pauses were longer than are com...

Journal: :iranian journal of science and technology (sciences) 2005
f. ayatollah zadeh shirazi

this text carries out some ideas about exact and p− exact sequences of transformationsemigroups. some theorems like the short five lemma (lemma 1.3 and lemma 2.3) are valid here as inexact sequences of r − modules.

Journal: :bulletin of the iranian mathematical society 2012
xiugui liu kai ma

let $p$ be a prime number greater than three. in this paper, we prove the existence of a new family of homotopy elements in the stable homotopy groups of spheres $pi_{ast}(s)$ which is represented by $h_nh_mtilde{beta}_{s+2}in {rm ext}_a^{s+4, q[p^n+p^m+(s+2)p+(s+1)]+s}(mathbb{z}_p,mathbb{z}_p)$ up to nonzero scalar in the adams spectral sequence, where $ngeq m+2>5$, $0leq sext}_a^{s+2,q[(s+2)p...

The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...

In this paper, a mixed integer programming model for Advanced Planning and Scheduling has been presented and implemented in Mann Plastic Company with the objective of minimizing cost of tardiness and earliness of an order. The proposed mathematical model considers capacity constraints, operation sequence, due date in multi order environment and outsourcing. In order to solve the mathematical ...

2004
Josef Urban

Let I be a set, let f be a many sorted set indexed by I, and let p be a finite sequence of elements of I. Observe that f · p is finite sequence-like. Let S be a non empty many sorted signature. A sort symbol of S is an element of S. Let S be a non empty many sorted signature. An operation symbol of S is an element of the operation symbols of S. Let S be a non void non empty many sorted signatur...

Journal: :Mathematics 2022

In order to solve various security risks faced by image privacy protection, we propose a 3D cuboid encryption scheme based on message-encoded controlled alternate quantum walks. Firstly, calculated the initial parameters of system and performed one-dimensional walk generate probability distribution sequence. Secondly, encoded sequence into quaternary message using multiple sets messages control...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید