نتایج جستجو برای: reverse addressing

تعداد نتایج: 176098  

Closed-loop supply chain network design is a critical issue due to its impact on both economic and environmental performances of the supply chain. In this paper, we address the problem of designing a multi-echelon, multi-product and capacitated closed-loop supply chain network. First, a mixed-integer linear programming formulation is developed to maximize the total profit. The main contribution...

Mehrdad Javadi Saeed Tavakkoli Moghaddam Seyyed Mohammad Hadji Molana

Sustainability in the supply chain means pushing the supply chain to focus on social, economic and environmental aspects, and addressing the existing problems in the traditional supply chain. Considering the importance of evaluating supply chain networks, especially in the field of perishable commodities, this paper aimed to design a mathematical model for the reverse supply chain of perishable...

2003
Genevieve Giuliano Hsi-Hwa Hu Kyoung Lee

This report examines relationships between residential location and travel patterns of the elderly. Using the 1995 Nationwide Personal Transportation Survey, we describe travel patterns of the elderly and estimate models of trip making, daily travel and transit use. Travel tends to shift to the middle part of the day with age, and trip making declines after age 75. We find that land use and tra...

2017
THOMAS BYRNE DENNIS P. CULHANE Dennis P. Culhane

INTRODUCTION ......................................................................................................................................... 379 I. WHAT DOES A “RIGHT TO HOUSING” MEAN? ....................................................................... 381 II. THE RIGHT TO HOUSING IN EUROPE ...................................................................................... 382 ...

Journal: :J. Network and Computer Applications 2013
Jian-Zhen Luo Shunzheng Yu

Automatic protocol reverse engineering is a process of extracting protocol message formats and protocol state machine without access to the specification of target protocol. Protocol reverse engineering is useful for addressing many problems of network management and security, such as network management, honey-pot systems, intrusion detection, Botnet detection and prevention, and so on. Current...

2007
Laura Kathryn Balzano Steven Margulis Greg Pottie Mark Hansen Mani B. Srivastava

of the Thesis Addressing Fault and Calibration in Wireless Sensor Networks

2006
Andreas Herzog Karsten Kube Bernd Michaelis Ana D. de Lima Thomas B. Voigt

This study considers the impact of different connection strategies in developing neocortical networks. An adequate connectivity is a requisite for synaptogenesis and the development of synchronous oscillatory network activity during maturation of cortical networks. In a defined time window early in development neurites have to grow out and connect to other neurons. Based on morphological observ...

Journal: :Decision Support Systems 2002
James R. Marsden Ramakrishnan Pakath Kustim Wibowo

In Part 2, we examine the viability of the new symbolic language that we described in Part 1, in a specific setting. Using an abstract classification task that involves decision-making under time pressure, we study multiple measures of subject performance at this task using the new language vis-à-vis written and spoken English. Initial experimental results suggest that, despite its relative nov...

Journal: :CoRR 2011
Farhat Masood

Comparison of RISC&CISC in details, encompassing the addressing modes, evolution, definitions and characteristics. Pre - RISC design is also elaborated. Both the architectures are explained with the help of example. Analysis is made based on performance.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید