نتایج جستجو برای: penetration level

تعداد نتایج: 1112692  

2003
Patrik Appelqvist Jussi Heikkilä

A key challenge for companies is to combine the high flexibility required to operate according to customer needs and wishes with the high level of efficiency required to stay competitive in terms of costs. Recent research on supply chain management suggests that companies in highly dynamic industries need not only to constantly develop their supply chain, but also simultaneously develop their p...

2015
Zhang Li Zhang Tao

A coupled level set and Particle-In-Cell method is presented to treat the penetration problems. The coupled method has the advantages of level set method and Particle-In-Cell method, and the basic idea is that the important computation region such as the large deformation region where more particles are added for calculation, while the continuous transport method is used in the other regions. T...

2014
Alessandro Olper Daniele Curzi Valentina Raimondi

The aim of this contribution is to study empirically the effect of trade liberalization on productivity growth exploiting a large micro-dataset of more than 20,000 French and Italian food firms, over the 2004-2012 period. This relationship has been studied focusing on import penetration at both industry and upstream sectors level, to investigate the role played by imports in intermediate inputs...

The integration of Distributed Energy Resources (DER) in the distribution network has plenty of advantages if their allocation and Penetration Level (PL) are done appropriately. Hence, the challenge of finding the best allocation and PL of DERs in large distribution networks is an important but intricate problem. This paper proposes a novel methodology to simultaneously determine the optimal lo...

2013
Arthur Hicken

The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Engineers are extremely well poised to perform tasks critical for securing the application—provided that certain key obstacles are overcome. Cloud Shifts the Burden of Security to Development

2016
Shamal Faily Claudia Iacob Sarah Field

Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards ...

2002
Andrea Bonaccorsi Cristina Rossi Maurizio Martinelli Irma Serrecchia Daniele Vannozzi

This paper reports about the analysis of the Internet diffusion among families and business basing on daily observations on registrations of second level domain names underneath the “.it” ccTLD . In particular, domains registered by individuals are analysed. The penetration rate over the relevant population of potential adopters is computed at highly disaggregated geographical level (province)....

Journal: :تحقیقات مهندسی کشاورزی 0
مجتبی نادری بلداجی دانشجوی دکتری پردیس کشاورزی و منابع طبیعی دانشگاه تهران رضا علیمردانی استاد دانشکده مهندسی بیوسیستم پردیس کشاورزی و منابع طبیعی دانشگاه تهران احمد طباطبایی فر استاد دانشکده مهندسی بیوسیستم پردیس کشاورزی و منابع طبیعی دانشگاه تهران احمد شریفی استادیار پژوهش مؤسسه تحقیقات فنی و مهندسی کشاورزی

soil compaction is an important aspect of agriculture and different methods are available to measure this parameter. one method is called the cone index; measuring the force required per unit area for penetration of a standard steel cone into the ground. cone penetrometers are used for cone index measurement. in this study, a tractor mounted, hydraulically-operated penetrometer was designed, bu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید