نتایج جستجو برای: behavior allocation

تعداد نتایج: 694429  

2008
Saad Ghazanfar Kiani

In this dissertation, we study distributed resource allocation techniques in full reuse multicell networks. Throughout this work, we consider a system model in which simultaneous transmissions mutually interfere, and thus it is applicable to a number of wireless access schemes. On the basis of this model, we define the specific resource allocation problem addressed in this work: joint power all...

, ,

The goal of this research is the evaluation of knowledge management strategies which impact to innovative behavior personnel in workplace. Statistical community includes all human source bosses and assistants in Mazandaran public universities which their numbers were 105 totally. The number of statistical sample was evaluated 82 individuals by using Cochrane equation. To gather data, a question...

Journal: :علوم و فنون نظامی 0
پیمان خرازیان - کارشناس ارشد مدیریت دفاعی دانشگاه فرماندهی و ستاد آجا اردشیر محمدی - عضو هیات علمی دانشگاه فرماندهی و ستاد آجا

the task of optimally assigning military ordinance to enemy targets, often termed weapon target allocation (wta) problem, has become a major focus of modern military thought where a cost effective allocation is required without degrading the required kill performance. the paper presents three main weapon allocation techniques namely uniform weapon allocation, first-in-first weapon allocation an...

Journal: :Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 2008

2006
Konstadinos G. Goulias Kriste M. Henson

Formulation and specification of activity analysis models require better understanding of time allocation behavior that goes beyond the more recent within household analyses to understand selfish and altruistic behavior and how this relates to travel behavior. Using data from 1,471 persons in a recent 2-day time use/ activity diary and latent class cluster analysis we identify 11 distinct daily...

2010
Junghwan Rhee Ryan Riley Dongyan Xu Xuxian Jiang

Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approaches use kernel memory mapping to identify dynamic kernel objects and check kernel integrity. The snapshot-based memory maps generated by these approaches are based on the kernel memory which may have been manipulated by...

2001
Luis Rubalcava Duncan Thomas Arleen Leibowitz Robert Pollak

Recent research on household behavior suggests that, ceteris paribus, a woman’s "power" within a household influences consumption and time allocation choices. From an empirical point of view, a central stumbling block in this line of inquiry has been identification of sources of "power" that can plausibly be treated as exogenous. Aid to Families with Dependent Children, AFDC, was paid only to s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید