نتایج جستجو برای: idm

تعداد نتایج: 613  

Journal: :Advanced Engineering Informatics 2013
Ghang Lee Young Hyun Park Sungil Ham

This paper proposes a new extended Process to Product Modeling (xPPM) method for integrated and seamless information delivery manual (IDM) and model view definition (MVD) development. Current IDM development typically uses Business Process Modeling Notation (BPMN) to represent a process map (PM). Exchange requirements (ERs) and functional parts (FPs) specify the information required when inform...

Journal: :Journal of World Economy: Transformations & Transitions 2022

Investment Decision Making (IDM) is closely related to the important role of stocks in national economy. decision-making becomes a research topic that studied by researchers with various designs. However, through initial observations, it was found many theoretical frameworks define investment decision-making. This article aims stock decision making including and their paired variables. A System...

Journal: :JOURNAL OF SOCIAL TRANSFORMATION AND REGIONAL DEVELOPMENT 2022

One measure of the success village development is measured by achievement Village Development Index (IDM), status in IDM seen from 5 categories, namely (1). The villages very disadvantaged, (2), underdeveloped (3), developing (4), advanced and (5), independent villages. border areas are really cause for concern. Based on size (IDM) 2020, number theborder that have disadvantaged dominant. Wiraja...

Journal: :IFAC-PapersOnLine 2021

The standard robot identification method is based on the use of inverse dynamic model (IDM) and application Least Squares (LS) estimation while tracking trajectories. Although this approach has been successfully applied to several industrial robots, friction assumed be linear. In paper, a two-step LS proposed that corrects limitation. first step, State-Dependent-Parameter (SDP) combined with ID...

2012
Terry Brumback Daniel J. Fonseca Gary P. Moynihan

This article introduces the Alabama Freeway Incident Detection System-Incident Detection Module (AFIDS-IDM) as a methodology for the detection of freeway incidents. AFIDS-IDM invokes fuzzy cluster analysis in the identification of lane blocking incidents from comparisons of time varying patterns of incident induced and incident free traffic states. Lane traffic counts and density, collected at ...

Journal: :Ingénierie des Systèmes d'Information 2007
Thi-Lan-Anh Dinh Olivier Gerbé Houari A. Sahraoui

RÉSUMÉ. Les nombreux travaux de recherche autour de IDM (ingénierie dirigée par les modèles) montrent que la gestion de modèles prend une importance grandissante et intervient dans divers domaines comme la gestion des connaissances, la gestion de métadonnées, les ontologies, la qualité de service et le génie logiciel. La représentation de modèles est fondamentale pour la gestion de modèles. Com...

Journal: :The Veterinary record 2012

Recent developments in the disease situation surrounding Schmallenberg virus (SBV) in northern Europe are discussed in the latest outbreak assessment from the International Disease Monitoring (IDM) team at Defra. In the assessment, which was published on 23 Apr 2012, the IDM team says that AHVLA laboratories are currently validating a serological ELISA that has become commercially available in ...

Journal: :IACR Cryptology ePrint Archive 2011
Benjamin Gittins

In 2007, the E.U. FP6 SecurIST called [31] for trustworthy international identity management (IdM) that was usercentric. In 2009, the U.S. Department of Homeland Security (DHS) called [28] for trustworthy [70] global-scale IdM and the U.S. National Institute of Standards and Technology (NIST) called [13] for new cryptographic key management (CKM) designs. In this paper we outline the core archi...

2013
L. Arockiam

This paper proposes security algorithms which are used to mitigate the Media Access Control (MAC) layer Denial of Service (DoS) attacks in WLAN infrastructure networks. This work is aimed to attend the DoS attacks due to the susceptibility of the MAC layer’s management frames. The management frames are sent unencrypted; this makes the intruder easily spoof the MAC address of the client or Acces...

2014
Fang Jia Lian-Jun Bao Jordan Crago Daniel Schlenk Jay Gan

Many cases of severe environmental contamination arise from historical episodes, where recalcitrant contaminants have resided in the environment for a prolonged time, leading to potentially decreased bioavailability. Use of bioavailable concentrations over bulk chemical levels improves risk assessment and may play a critical role in determining the need for remediation or assessing the effectiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید