نتایج جستجو برای: critical path method
تعداد نتایج: 2161279 فیلتر نتایج به سال:
Medical Virtual Patient Simulator (MedVPS) is a cutting-edge eLearning innovation for medical and other health professionals. It consists of a framework that supports various patient cases, tailored by interdisciplinary medical teams. Each virtual patient case follows the critical path to be followed for a specific patient in a hospital. MedVPS takes the student on a journey that enables the st...
The aim of this paper is to review a published paper, ‘Using computer software packages to enhance the teaching of Engineering Management Science: Part 1 –Critical path networks’. Excel in Microsoft Office 2007 was discovered to be able to solve critical path network problems with some programming. The capabilities of the two previously evaluated packages, Microsoft Project 2007 and Quantitativ...
This paper proposes a new method to solve fuzzy critical path problems for a project network with activity times being normalised trapezoidal fuzzy numbers. is solved successfully to demonstrate the validity of the proposed approach.
In this paper, we propose a new approach to critical path analysis in a project network whose activity times are uncertain. The uncertain parameters in the project network are represented by fuzzy numbers. We use fuzzy arithmetic and a fuzzy ranking method to determine the fuzzy critical path of the project network without converting the fuzzy activity times to classical numbers. The proposed m...
Figuring out why a process in a batch window ended late often requires tracing back through the critical path to look for anomalies. In a complicated batch schedule, determining which jobs are on the critical path can be a seemingly daunting task. Various commercial products can be used for this task, but they may not be necessary. The code needed to determine which predecessor jobs constitute ...
In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying is co...
As processor reliability becomes a first order design constraint, this research argues for a need to provide continuous reliability monitoring. We present an adaptive critical path monitoring architecture which provides accurate and real-time measure of the processor’s timing margin degradation. Special test patterns check a set of critical paths in the circuit-under-test. By activating the act...
This paper aims at analyzing the key trends and challenges of the ontology matching field. The main motivation behind this work is the fact that despite many component matching solutions that have been developed so far, there is no integrated solution that is a clear success, which is robust enough to be the basis for future development, and which is usable by non expert users. In this paper we...
In the field of personal mobile communications, it has been suggested that SCTP could provide a solution to the problems encountered by the currently implemented TCP/Mobile IP scheme. By exploiting SCTP’s multihoming feature to connect to several separate wireless networks concurrently, allows a Mobile Node to choose which wireless path suits the particular needs of the user application it is r...
Earned Value Management Method (EVM), widely used in the world, is a project management method of costschedule integrated control. But the traditional EVM sometimes cannot provide an accurate result. In this paper, a practical method is given to analyze the project performance, in which the Network Diagram Method and the Critical Path Method have been introduced into EVM system that can better ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید