نتایج جستجو برای: stock control
تعداد نتایج: 1409588 فیلتر نتایج به سال:
Glottal flow waveforms estimated by inverse filtering acoustic speech pressure signals were compared to glottal area functions obtained by digital high-speed imaging of the vocal fold vibration. Speech data consisted of breathy, normal and pressed phonations produced by two male and one female subjects. The results yield both qualitative and quantitative information about the relationship betwe...
In this paper we present a visual analytics approach for deriving spatio-temporal patterns of collective human mobility from a vast mobile network traffic data set. More than 88 million movements between pairs of radio cells—so-called handovers—served as a proxy for more than two months of mobility within four urban test areas in Northern Italy. In contrast to previous work, our approach relies...
This document describes use cases and documents call flows that require the History-Info header field to capture the Request-URIs as a Session Initiation Protocol (SIP) Request is retargeted. The use cases are described along with the corresponding call flow diagrams and messaging details.
We define continuous and inverse shadowing for flows and prove some properties. In particular, we will prove that an expansive flow without fixed points on a compact metric space which is a shadowing is also a continuous shadowing and hence an inverse shadowing (on a compact manifold without boundary).
In distributed admission control (AC) schemes, handling concurrent AC decisions assumes a relevant role in avoiding over or false acceptance and, consequently, service quality degradation. This problematic is even more intricate in multiservice network environments where distinct service levels need to be fulfilled. This paper debates and points out solutions to mitigate the negative impact tha...
We address the problem of coupling 1D St-Venant equations (Shallow Water) with 2D ones, as applied to floodplain flows (river hydraulics). Continuous coupling conditions are derived, while numerical coupling is done using optimal control processes. In a variationnal data assimilation context, this approach allows to couple both models and assimilate data simultaneously. Two different versions o...
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Several tool sets have been developed to perform analysis of flow-level network traffic, however none have had security as the primary goal of the analysis, nor has performance been a key consideration. In this paper we p...
Stock assessment of Otolithes ruber was carried out using Virtual Population Analysis (VPA) method in the coastal waters of Northwest Persian Gulf. Catch and length frequency data during 2002-2012 were converted to age frequency. The maximum of stock number and biomass were observed in age group 1 and 2 respectively. The minimum of stock number and biomass were observed age group 6. The maximum...
It is important to share demand information among the members in supply chains. In recent years, production and inventory systems with advance demand information (ADI) have been discussed, where advance demand information means the information of demand which the decision maker obtains before the corresponding actual demand arrives. Appropriate production and inventory control using demand info...
Organizations need to use flexible access control mechanisms where the access decisions to critical information assets are taken dynamically. In this paper, we present a framework for insider threat likelihood assessment within the context of access control systems. Our approach takes into account information flows, the trustworthiness of subjects, the sensitivity of objects and the security co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید