نتایج جستجو برای: computer operating procedure
تعداد نتایج: 1282898 فیلتر نتایج به سال:
A direct search approach to determine optimal reservoir operating is proposed with ant colony optimization for continuous domains (ACOR). The model is applied to a system of single reservoir to determine the optimum releases during 42 years of monthly steps. A disadvantage of ant colony based methods and the ACOR in particular, refers to great amount of computer run time consumption. In this st...
For example, in an s-t reliability network evaluation, the connectivity of the network requires to use a depth-first procedure as EF [2,3]. In other cases (telecommunication networks as well as pipeline systems, computer nets, transporting systems among others) the connectivity is not a sufficient condition for an operating state and the success of the network implies that a required flow is gu...
A direct search approach to determine optimal reservoir operating is proposed with ant colony optimization for continuous domains (ACOR). The model is applied to a system of single reservoir to determine the optimum releases during 42 years of monthly steps. A disadvantage of ant colony based methods and the ACOR in particular, refers to great amount of computer run time consumption. In this st...
This paper proposes a simplified solution procedure to the model presented by Akinc and Roodman. The Benders’ decomposition procedure for analyzing this model has been developed, and its shortcomings have been highlighted. Here, the special nature of the problem is exploited which allowed us to develop a new algorithm through surrogating method. The two methods are compared by several numerical...
The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budg...
چکیده ندارد.
چکیده ندارد.
The Linux operating system is in widespread use, and there is now interest in using Linux for safety related systems. This report considers the availability and quality of evidence for the safety integrity of Linux. Three criteria are defined for the suitability of an operating system for use in safety related applications, namely that the operating system must be sufficiently well understood, ...
present study is an extension of earlier work carried out on two-lane two way roads in the two provinces of pakistan i.e. n-25, n-55 and n-5 regarding the measure of operating speed and development of operating speed prediction models. curved sections of two-lane rural highways are the main location of run-off road accidents. in addition to that the road alignment having combination of geometri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید