نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

Journal: :مدیریت صنعتی 0
سیدحسین احمدی دانشجوی کارشناسی ارشد مدیریت صنعتی، دانشگاه تهران، ایران نیما گروسی مختار زاده استادیار گروه مدیریت صنعتی دانشگاه تهران

maintenance process is one of the most necessary processes in every organization, whose main task is maintaining machines in desired conditions or restoring machines from non-optimal (nonoperational)conditions to optimal (operational) conditions. machines failure would result in loss of machines availability time, and rise of both organization costs and production time. also, it may cause irrep...

Today, small and medium enterprises are considered as one of the main components of economic development for various reasons. To name a few, job creation, resource efficiency, the ability to enhance local technology, the ability to meet new needs, quick decision-making, and training successful managers will all lead to the growth and economic development of countries. Despite these benefits, sm...

2016
Myungho Jung

Nowadays, tens or hundreds of virtual machines are running on a host with the development of virtualzation. For security, users want to run programs on virtual machines to avoid access from others. Instead of running virtual machines at all times, it saves significant resources in the host by running virtual machines on demand. In this project, an automated system to manage virtual machines is ...

2017
Hilary M. Schwandt Ilene S. Speizer Meghan Corroon

BACKGROUND Health service providers can restrict access to contraceptives through their own imposed biases about method appropriateness. In this study, provider biases toward contraceptive service provision among urban Nigerian providers was assessed. METHODS Health providers working in health facilities, as well as pharmacists and patent medical vendors (PMV), in Abuja, Benin City, Ibadan, I...

Journal: :I. J. Network Security 2006
Chin-Chen Chang Iuon-Chang Lin Chia-Te Liao

Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines to construct an access control system. The security management framework is a pattern classification system using well trained support vector machines. The proposed system can not only be applied to broad access polic...

2017
Caitlin Myers Daniel Ladd

IZA DP No. 10952 AUGUST 2017 Did Parental Involvement Laws Grow Teeth? The Effects of State Restrictions on Minors’ Access to Abortion* We compile data on the locations of abortion providers and enforcement of parental involvement laws to document dramatic increases in the distances minors must travel if they wish to obtain an abortion without involving a parent or judge. Between 1992 – the yea...

Journal: :Data Science Journal 2009
Yoshihiro Takata Y. Kasahara T. Matsuhira

We developed a general-purpose database (DB) system that manages and opens experimental and/or observational data accumulated in universities and academic institutes. This platform works as a web-DB management system in which databases can be easily managed without special skills and facilities. By defining a group manager and data manager, the proposed system defines a flexible access restrict...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید