نتایج جستجو برای: exclusion of support network

تعداد نتایج: 21264305  

Various structural discontinuities, which form a discrete fracture network, play a significant role in the failure conditions and stability of the rock masses around underground excavations. Several continuum numerical methods have been used to study the stability of underground excavations in jointed rock masses but only few of them can take into account the influence of the pre-existing natur...

Journal: :فقه و اصول 0
سید محمد مهدی قبولی درافشان سید جمال الدین موسوی تقی آبادی

the brothers and sisters of the deceased person can, under certain conditions, cause partial exclusion or exclusion from restoration of inheritance for the deceased person’s mother. the issue of the siblings’ exclusion of mother from inheritance in imāmī jurisprudence is attributed to the noble āya eleven of the blessed sūrat al-nisā’ and is maintained in the iranian statutory law according to ...

1999
David F. Nagle Gregory R. Ganger Jeff Butler Garth Goodson Chris Sabol

While many storage products are directly attached to personal computers, most disk array products (65% and rising) are deployed in local area network file servers. This centralization of storage resources enables effective sharing, better administrative control and less redundancy. However, it also increases dependence on network and file server performance. With the emergence of high-performan...

1997
Jürgen Quittek Boris Weissman

Sather, a parallel object-oriented programming language developed at ICSI, offers advanced thread synchronization constructs separating locking mechanism and policies. While a lock management system provides a general locking mechanism, synchronization objects define and implement different extensible policies. Commonly used synchronization objects such as mutual exclusion and reader/writer loc...

Majid Nabi Bidhendi, Mohammad Mobin Gafoori Reza Hajiani, Sadegh Baziar Seyed Mehdi Mohaimenian Pour

Klinkenberg permeability is an important parameter in tight gas reservoirs. There are conventional methods for determining it, but these methods depend on core permeability. Cores are few in number, but well logs are usually accessible for all wells and provide continuous information. In this regard, regression methods have been used to achieve reliable relations between log readings and Klinke...

Due to the growth of the aging phenomenon, the use of intelligent systems technology to monitor daily activities, which leads to a reduction in the costs for health care of the elderly, has received much attention. Considering that each person's daily activities are related to his/her moods, thus, the relationship can be modeled using intelligent decision-making algorithms such as machine learn...

Bubble point pressure is an important parameter in equilibrium calculations of reservoir fluids and having other applications in reservoir engineering. In this work, an artificial neural network (ANN) and a least square support vector machine (LS-SVM) have been used to predict the bubble point pressure of reservoir fluids. Also, the accuracy of the models have been compared to two-equation stat...

2007
Manish Verma Allen Ballman Tzi-cker Chiueh

This paper presents the design, implementation and performance evaluation of Locust, a distributed shared virtual memory system that uses compile-time data dependency information to improve performance. The thesis of the Locust project is that the distributed shared memory program performance can closely approximate message passing program performance if compiler-generated data dependency infor...

2009
M. Gunasekaran P. Sampath B. Gopalakrishnan

Security is a critical problem when implementing Mobile Ad Hoc Networks (MANETs) and is widely acknowledged. This paper describes the effects of selfish nodes in MANETs. An Ad Hoc Network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. One of the different kinds of misbehavior is node selfishnes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید