نتایج جستجو برای: access restrictions to machines
تعداد نتایج: 10664006 فیلتر نتایج به سال:
The propagation of seismic waves through Earth can now be modeled accurately with the recently developed spectral-element method. This method takes into account heterogeneity in Earth models, such as three-dimensional variations of seismic wave velocity, density, and crustal thickness. The method is implemented on relatively inexpensive clusters of personal computers, so-called Beowulf machines...
BACKGROUND Twenty-four hour access to condoms for young people living in rural Victoria is problematic for many reasons, including the fact that condom vending machines are often located in venues and places they cannot access. METHOD We partnered with three rural councils to install condom vending machines in locations that provided improved access to condoms for local young people. Councils...
One of the designs of cellular manufacturing systems (CMS) requires that a machine population be partitioned into machine cells. Numerous methods are available for clustering machines into machine cells. One method involves using a similarity coefficient. Similarity coefficients between machines are not absolute, and they still need more attention from researchers. Although there are a number o...
The notion of linear-time computability is very sensitive to machine model. In this connection, we introduce a class NLT of functions computable in nearly linear time n(log n)O(1) on random access computers. NLT is very robust and does not depend on the particular choice of random access computers. Kolmogorov machines, Schonhage machines, random access Turing machines, etc. also compute exactl...
This paper deals with the transient analysis of K-out-of-N: G system consisting of Noperatingmachines. To improve system reliability, Y cold standby and S warm standbys spares areprovided to replace the failed machines. The machines are assumed to fail in multiple modes. At leastK-out-of-N machines for smooth functioning of the system. Reliability and mean time to failure areestablished in term...
We investigate how private information and monitoring affects both the sensitivity of investment to internally generated cash flows and the role of accounting quality in reducing this sensitivity. We expect financing frictions to be lower when debt is obtained from banks with private information and when banks place direct restrictions on investments. We also argue that access to private inform...
In this paper, a new mathematical model for the problem of job scheduling in virtual manufacturing cells (VMC) is presented to minimizing the completion time of all jobs. Sequence dependent setup times of machines is considered and lot-streaming is possible. In Virtual manufacturing cells, each job has a different processing path and there is a set of machines for processing each operation. The...
The present investigation deals with a machine repair problem consisting of cold and warm standby machines. The machines are subject to breakdown and are repaired by the permanent repairman operating under N-policy. There is provision of one additional removable repairman who is called upon when the work load of failed machines crosses a certain threshold level and is removed as soon as the wor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید