نتایج جستجو برای: performance evaluation model

تعداد نتایج: 3568102  

, , Khatibi, Amin, Mehdipour, Abdolrahman, Shetab Boshehri, Nahid,

 The aim of this study was to design a comprehensive system model to evaluate the performance of Iran wrestling board. The method of this study was descriptive and mixed that was conducted as a field. The statistical population consisted of the officials (chairman, vice-chairman and secretary) of the wrestling boards of Iran provinces, as well as the presidents of the wrestling federation, the ...

Fekri, Roxana, Rezaei, Abdolkarim,

This study is practical and its purpose was to present a model based on examining the relationships between three variables: employee performance indicators, human error and employee evaluation methods, respecting the mediating role of methods in the oil refining industry. 281of 1050 official employees of the refining industry were selected by Morgn table for main model and 140 of 220 employees...

2004
Erwin Schoonderwaldt Kjetil Falkenberg Anders Askenfelt

IMUTUS (Interactive Music Tuition System) is a EU project that aims to develop a practising environment for the recorder, combining new technologies and new approaches for music learning. Automatic analysis and evaluation of student performances play a central role in the student-system interaction. The performance evaluation module identifies typical performance errors, and provides feedback t...

2017
Yun Wang Yanping Zhang Jiangbo Liu Rahul Bhandari

Recent years have witnessed successful real-world deployments of wireless sensor networks (WSNs) in a wide range of civil and military applications. Sensing coverage and network connectivity are two of the most fundamental issues to ensure effective environmental sensing and robust data communication in a WSN application. This chapter presents fundamental studies on the sensing coverage and the...

2006
Kiran Yedavalli Bhaskar Krishnamachari

In this paper, we study the single-packet medium access problem, which occurs in many wireless sensor network applications. In this problem, each contending node in the onehop network has a single packet to transmit and the node is in contention of the channel only until its packet is transmitted. We analyze the performance of slotted multi-access techniques for this problem using Markov chains...

Journal: :I. J. Network Security 2008
Hao Luo Binxing Fang Xiao-chun Yun Zhi-Gang Wu

We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavior based on the leaky integrate-and-fire model to detect anomaly. The simplicity of our detection method is that the method requires neither the set of anomalies to be detected, nor the thresholds to be supplied by the ...

Journal: :RITA 2011
Sérgio M. Dias Newton José Vieria

This paper presents a framework for the development of formal concept analysis (FCA) algorithms. Its main component is a synthetic generator which formal parameters can be adjusted to allow testing the algorithms in situations of interest. It is also presented in the framework some basic FCA algorithms and some formal contexts obtained from real data sets, from a relatively small to a very larg...

Journal: :Industrial Management and Data Systems 2004
Antonio C. Caputo F. Cucchiella Luciano Fratocchi Pacifico Marcello Pelagagge Federica Scacchia

This study proposes a model for the analysis and performance evaluation of e-supply chains (e-SCs), that are supply chains (SCs) in which actors are connected by Internet technologies. It is assumed that e-SC performances are influenced by the network organizational structures, by the criteria adopted to manage relationships among involved actors, and by the critical activities that the leading...

2004
Jaroslaw Stanczyk Eckart Mayer Jörg Raisch

This paper discusses the usefulness of (max, +) algebra as a mathematical modelling framework for discrete event systems (DESs). A Max-Plus Algebra Toolbox developed at Lehrstuhl für Systemtheorie technischer Prozesse is presented. This software package is a set of functions to take advantage of the (max, +) algebra in the Matlab environment for rapid prototyping, design, and analysis of DESs. ...

2006
Kazuhiko Sumi Chang Liu Takashi Matsuyama

We have analyzed the vulnerability and threat of the biometric evaluation database and proposed the method to generate a synthetic database from a real database. Our method is characterized by finding nearest neighbor triples or pairs in the feature space of biometric samples, and by crossing over those triples and pairs to generate synthetic samples. The advantages of our method is that we can...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید