5. Conclusion

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5. Conclusion

Let P be a simple polygon of n vertices and let S be a set of n points called sites lying in the interior of P. The geodesic-distance between two sites x and y in P is defined as the length of the shortest polygonal path connecting x and y constrained to lie in P. It is a useful notion in graphics problems concerning visibility between objects, computer vision problems concerned with the descri...

متن کامل

5. Conclusion

were made for get_file operations on a disk to memory basis, i.e. the files were requested from the file servers disk and discarded on the receivers side. Thus we where able to neglect the influence of local disk write operations upon the results. This resembles a scenario where a user requests a certain file (e.g. a drawing) for viewing. Since drawings are typically stored as bitmaps (binary) ...

متن کامل

5. Conclusion

Experiments with the Fuzzy ACC under various traffic conditions have shown that the fuzzy approach is very robust especially with regard to the inevitable sensor noise. The modular architecture facilitates fine-tuning of the fuzzy controller for the different situation-specific components and minimizes interference of those components during operation. The approach to adaptation has two main go...

متن کامل

5 Conclusion

14 On the receipt of the service request, the QoS manager translates this request on one or more logical configurations based on the profile concept, and produces the corresponding configurations by accessing the system information repository (4). To decide about the possibility of the establishment of a configuration which is the mapping result of a logical configuration, the QoS manager asks ...

متن کامل

5. Conclusion

The Security functionality provided by the protocols is almost equivalent. While the FTAM and RDA authentication and authorisation mechanisms are a mere mapping to those of the accessed file system or database, DFR defines own mechanisms. No sound statements on efficiency and reliability issues of the protocols can be made right now. These have to be derived from experiences with trial implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nihon Naika Gakkai Zasshi

سال: 2017

ISSN: 0021-5384,1883-2083

DOI: 10.2169/naika.106.457