نتایج جستجو برای: application method

تعداد نتایج: 2249570  

Journal: :Mathematical and Computer Modelling 2006
Hsu-Hsi Chang Wen-Chih Huang

In this paper we present a Quantified SWOT (Strengths, Weaknesses, Opportunities and Threats) analytical method which provides more detailed and quantified data for SWOT analysis. The Quantified SWOT analytical method adopts the concept of Multiple-Attribute Decision Making (MADM), which uses a multi-layer scheme to simplify complicated problems, and thus is able to perform SWOT analysis on sev...

2006
Travis Hoppe

1 2 , γ γ , can be mapped conveniently onto a matrix. The expectation value of the this operator <Ψ|H|Ψ > will lead to a corresponding eigenpair. We can map the gird of H using a simple finite difference equation, onto a vector whose elements are defined as, {Ψ00, Ψ10, ..., Ψn0, Ψn1, ..., Ψnn}. When the corresponding eigenvector is found, these elements are then mapped back onto their correspon...

2004
R. M. Hather E. L. Burd C. Boldyreff

In this paper we describe some of the work performed in the Esprit AMES (Application Management Environment Support) project. We describe our assessment matrix for evaluating a company's effectiveness at performing application management and our process model around which the assessment procedure is defined. This assessment matrix is loosely based on the work on the SEI's Capability Maturity Mo...

Journal: :Concurrency and Computation: Practice and Experience 2001
Jason Maassen Thilo Kielmann Henri E. Bal

We describe and evaluate a new approach to object replication in Java, aimed at improving the performance of parallel programs. Our programming model allows the programmer to define groups of objects that can be replicated and updated as a whole, using reliable, totallyordered broadcast to send update methods to all machines containing a copy. The model has been implemented in the Manta high-pe...

2015
Zhang Shunli

In order to improve the work of a single path network reliability failure case, this chapter put forward a set of a single backup path algorithm based on the path. In this algorithm, using two disjoint paths as work path to transmit data, and USES the path does not intersect with the job of a set the path as the backup path. Then, this algorithm, is proposed based on a single a single backup pa...

2014
Muhammad Idrees Fazal Muhammad

Muhammad Idrees and Fazal Muhammad ABSTRACT In this paper, Differential Transform Method (DTM) is proposed for the closed form solution of linear and non-linear stiff systems. This method gives the series of solutions which can easily be converted into exact solution. The method is described and illustrated with the help of examples. The results show that DTM is very easy, effective and conveni...

2006
Emmanuel Renaux Eric Lefebvre

Component support has actually been enhanced with version 2.0 of the Unified Modeling Language and component appears as the best reusable unit of software, whereas more and more pre-built components are made available. However, reuse of components to build system remains a difficult task. Components are mostly identified in the late phases of the system development cycle without considering the...

2017
Mun-Kun Hong Dah-Ching Ding

BACKGROUND AND OBJECTIVES Postoperative adhesions occur less often in laparoscopies than in laparotomies, but the incidence can be reduced further. Seprafilm, a sodium hyaluronate/carboxymethylcellulose absorbable barrier, was developed to prevent adhesions after abdominal surgery, and is approved for postoperative adhesion prevention. However, Seprafilm is seldom used in laparoscopic surgery b...

2017
Helder Jose Celani de Souza Messias Borges Silva Cinthia B. Moyses Fernando Lopes Alberto Fabrício J. Pontes Ubirajara R. Ferreira Roberto N. Duarte Carlos Eduardo Sanches da Silva

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید