نتایج جستجو برای: مدل breach gui
تعداد نتایج: 129795 فیلتر نتایج به سال:
a non-performance of contract in due date is considered as an actual breach, has sanctions in order to securing interest of the injured party. has foreseeable breach of contract - it is accepted today as an actual breach by different legal systems - the same sanctions of actual breach of contract? in this article suspension of performance of obligations by innocent party and, in some conditions...
primary and widely in use computed tomography (ct) dose descriptor is a volumetric ct dose index (ctdiv) that is usually measured by a pencil ionization chamber with active length of 100mm and polymethyl methacrylate (pmma) phantom. ctdiv depends on scan parameters such as mas, kv, collimation, tube rotation time but is independent of patient’s size and shape. for the purpose of a good estimati...
Employees are sensitive to promises offered at the beginning of their employment and if these promises are breached, they react in different ways. These reactions differ in different cultures. The purpose of this research is to shed some light on the relationship between psychological contract breach and organizational citizenship behavior and turnover intention emphasizing the moderat...
This paper discusses the computation of optimal coverage paths in an ad-hoc network consisting of n sensors. Improved algorithms, with a preprocessing time of O(n log n), to compute a maximum breach/support path P in optimal O(|P |) time or the maximum breach/support value in O(1) time are presented. Algorithms for computing a shortest path that has maximum breach/support are also provided. Exp...
Oracles used for testing graphical user interface (GUI) programs are required to take into consideration complicating factors such as variations in screen resolution or color scheme when comparing observed GUI elements to expected GUI elements. Researchers proposed fuzzy comparison rules and computationally expensive image processing techniques to tame the comparison process since otherwise the...
Managing information resources including protecting the privacy of customer data plays a critical role in most firms. Data breach incidents may be extremely costly for firms. In the face of a data breach event, some firms are reluctant to disclose information to the public. Firm may be concerned with the potential drop in the market value following the revelation of a data breach. This paper ex...
Within the frame work of the realis large-scale dike breaching experiment following overflow was held at Lillo (Antwerp) in 2012. The outcomes of the breach test serve to unveil the impact of a chosen breach growth model, to set application limits, to come up with guidelines for proper selection and usage of the model to be applied. Breach growth models are used to predict the breach dimensions...
باتوجه به کاربرد گستردة ماهوارههای مخابراتی مدار زمینآهنگ و مدت زمان بالایی که صرف طراحی مفهومی این نوع ماهوارهها میشود، در این پژوهش بهمنظور کاهش مدت زمان و هزینة فاز طراحی مفهومی، نرمافزاری بر پایة ادغام دو روش آماری و پارامتری تدوین شده است. مدل آماری استفاده شده در این نرمافزار شامل پایگاه داده متشکل از 147 ماهواره است که بین سالهای 2010 تا 2016 پرتاب شدهاند. جهت افزایش دقت نرمافز...
This poster describes a visualisation technique for communicating the effects of implicit feedback decisions using a familiar interface component, the scrollbar. The results of a pilot evaluation show the technique is unobtrusive and encourages focused interaction.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید