نتایج جستجو برای: application method
تعداد نتایج: 2249570 فیلتر نتایج به سال:
In this paper we present a Quantified SWOT (Strengths, Weaknesses, Opportunities and Threats) analytical method which provides more detailed and quantified data for SWOT analysis. The Quantified SWOT analytical method adopts the concept of Multiple-Attribute Decision Making (MADM), which uses a multi-layer scheme to simplify complicated problems, and thus is able to perform SWOT analysis on sev...
1 2 , γ γ , can be mapped conveniently onto a matrix. The expectation value of the this operator <Ψ|H|Ψ > will lead to a corresponding eigenpair. We can map the gird of H using a simple finite difference equation, onto a vector whose elements are defined as, {Ψ00, Ψ10, ..., Ψn0, Ψn1, ..., Ψnn}. When the corresponding eigenvector is found, these elements are then mapped back onto their correspon...
In this paper we describe some of the work performed in the Esprit AMES (Application Management Environment Support) project. We describe our assessment matrix for evaluating a company's effectiveness at performing application management and our process model around which the assessment procedure is defined. This assessment matrix is loosely based on the work on the SEI's Capability Maturity Mo...
We describe and evaluate a new approach to object replication in Java, aimed at improving the performance of parallel programs. Our programming model allows the programmer to define groups of objects that can be replicated and updated as a whole, using reliable, totallyordered broadcast to send update methods to all machines containing a copy. The model has been implemented in the Manta high-pe...
In order to improve the work of a single path network reliability failure case, this chapter put forward a set of a single backup path algorithm based on the path. In this algorithm, using two disjoint paths as work path to transmit data, and USES the path does not intersect with the job of a set the path as the backup path. Then, this algorithm, is proposed based on a single a single backup pa...
Muhammad Idrees and Fazal Muhammad ABSTRACT In this paper, Differential Transform Method (DTM) is proposed for the closed form solution of linear and non-linear stiff systems. This method gives the series of solutions which can easily be converted into exact solution. The method is described and illustrated with the help of examples. The results show that DTM is very easy, effective and conveni...
Component support has actually been enhanced with version 2.0 of the Unified Modeling Language and component appears as the best reusable unit of software, whereas more and more pre-built components are made available. However, reuse of components to build system remains a difficult task. Components are mostly identified in the late phases of the system development cycle without considering the...
BACKGROUND AND OBJECTIVES Postoperative adhesions occur less often in laparoscopies than in laparotomies, but the incidence can be reduced further. Seprafilm, a sodium hyaluronate/carboxymethylcellulose absorbable barrier, was developed to prevent adhesions after abdominal surgery, and is approved for postoperative adhesion prevention. However, Seprafilm is seldom used in laparoscopic surgery b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید