نتایج جستجو برای: reverse addressing
تعداد نتایج: 176098 فیلتر نتایج به سال:
Closed-loop supply chain network design is a critical issue due to its impact on both economic and environmental performances of the supply chain. In this paper, we address the problem of designing a multi-echelon, multi-product and capacitated closed-loop supply chain network. First, a mixed-integer linear programming formulation is developed to maximize the total profit. The main contribution...
Sustainability in the supply chain means pushing the supply chain to focus on social, economic and environmental aspects, and addressing the existing problems in the traditional supply chain. Considering the importance of evaluating supply chain networks, especially in the field of perishable commodities, this paper aimed to design a mathematical model for the reverse supply chain of perishable...
This report examines relationships between residential location and travel patterns of the elderly. Using the 1995 Nationwide Personal Transportation Survey, we describe travel patterns of the elderly and estimate models of trip making, daily travel and transit use. Travel tends to shift to the middle part of the day with age, and trip making declines after age 75. We find that land use and tra...
INTRODUCTION ......................................................................................................................................... 379 I. WHAT DOES A “RIGHT TO HOUSING” MEAN? ....................................................................... 381 II. THE RIGHT TO HOUSING IN EUROPE ...................................................................................... 382 ...
Automatic protocol reverse engineering is a process of extracting protocol message formats and protocol state machine without access to the specification of target protocol. Protocol reverse engineering is useful for addressing many problems of network management and security, such as network management, honey-pot systems, intrusion detection, Botnet detection and prevention, and so on. Current...
of the Thesis Addressing Fault and Calibration in Wireless Sensor Networks
This study considers the impact of different connection strategies in developing neocortical networks. An adequate connectivity is a requisite for synaptogenesis and the development of synchronous oscillatory network activity during maturation of cortical networks. In a defined time window early in development neurites have to grow out and connect to other neurons. Based on morphological observ...
In Part 2, we examine the viability of the new symbolic language that we described in Part 1, in a specific setting. Using an abstract classification task that involves decision-making under time pressure, we study multiple measures of subject performance at this task using the new language vis-à-vis written and spoken English. Initial experimental results suggest that, despite its relative nov...
Comparison of RISC&CISC in details, encompassing the addressing modes, evolution, definitions and characteristics. Pre - RISC design is also elaborated. Both the architectures are explained with the help of example. Analysis is made based on performance.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید