نتایج جستجو برای: stock control

تعداد نتایج: 1409588  

2004
Hannu Pulakka Paavo Alku Svante Granqvist Stellan Hertegard Hans Larsson Anne-Maria Laukkanen Per-Ake Lindestad Erkki Vilkman

Glottal flow waveforms estimated by inverse filtering acoustic speech pressure signals were compared to glottal area functions obtained by digital high-speed imaging of the vocal fold vibration. Speech data consisted of breathy, normal and pressed phonations produced by two male and one female subjects. The results yield both qualitative and quantitative information about the relationship betwe...

Journal: :ISPRS Int. J. Geo-Information 2012
Günther Sagl Martin Loidl Euro Beinat

In this paper we present a visual analytics approach for deriving spatio-temporal patterns of collective human mobility from a vast mobile network traffic data set. More than 88 million movements between pairs of radio cells—so-called handovers—served as a proxy for more than two months of mobility within four urban test areas in Northern Italy. In contrast to previous work, our approach relies...

Journal: :RFC 2014
Mary Barnes François Audet Shida Schubert Hans Erik van Elburg Christer Holmberg

This document describes use cases and documents call flows that require the History-Info header field to capture the Request-URIs as a Session Initiation Protocol (SIP) Request is retargeted. The use cases are described along with the corresponding call flow diagrams and messaging details.

2004
Piotr Kościelniak

We define continuous and inverse shadowing for flows and prove some properties. In particular, we will prove that an expansive flow without fixed points on a compact metric space which is a shadowing is also a continuous shadowing and hence an inverse shadowing (on a compact manifold without boundary).

Journal: :JCM 2006
Solange Rito Lima Paulo Carvalho Vasco Freitas

In distributed admission control (AC) schemes, handling concurrent AC decisions assumes a relevant role in avoiding over or false acceptance and, consequently, service quality degradation. This problematic is even more intricate in multiservice network environments where distinct service levels need to be fulfilled. This paper debates and points out solutions to mitigate the negative impact tha...

Journal: :Mathematics and Computers in Simulation 2009
J. Marin Jérôme Monnier

We address the problem of coupling 1D St-Venant equations (Shallow Water) with 2D ones, as applied to floodplain flows (river hydraulics). Continuous coupling conditions are derived, while numerical coupling is done using optimal control processes. In a variationnal data assimilation context, this approach allows to couple both models and assimilate data simultaneously. Two different versions o...

2004
Carrie Gates Michael P. Collins Michael Duggan Andrew Kompanek Mark Thomas

Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Several tool sets have been developed to perform analysis of flow-level network traffic, however none have had security as the primary goal of the analysis, nor has performance been a key consideration. In this paper we p...

Stock assessment of Otolithes ruber was carried out using Virtual Population Analysis (VPA) method in the coastal waters of Northwest Persian Gulf. Catch and length frequency data during 2002-2012 were converted to age frequency. The maximum of stock number and biomass were observed in age group 1 and 2 respectively. The minimum of stock number and biomass were observed age group 6. The maximum...

Koichi Nakade Shiori Yokozawa

It is important to share demand information among the members in supply chains. In recent years, production and inventory systems with advance demand information (ADI) have been discussed, where advance demand information means the information of demand which the decision maker obtains before the corresponding actual demand arrives. Appropriate production and inventory control using demand info...

2016
Sofiene Boulares Kamel Adi Luigi Logrippo

Organizations need to use flexible access control mechanisms where the access decisions to critical information assets are taken dynamically. In this paper, we present a framework for insider threat likelihood assessment within the context of access control systems. Our approach takes into account information flows, the trustworthiness of subjects, the sensitivity of objects and the security co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید