نتایج جستجو برای: user requirement
تعداد نتایج: 392453 فیلتر نتایج به سال:
DEFINITION Spatial cloaking is a technique to blur a user’s exact location into a spatial region in order to preserve her location privacy. The blurred spatial region must satisfy the user’s specified privacy requirement. The most widely used privacy requirements are k-anonymity and minimum spatial area. The k-anonymity requirement guarantees that a user location is indistinguishable among k us...
In this paper, by introducing knowledge of fuzzy mathematics, probability theory and gaming theory, a QoS unicast routing scheme with ABC supported is proposed based on small-world optimization algorithm. Under inaccurate network status information and imprecise user QoS requirement, the proposed scheme uses the range to describe the user QoS requirement and the edge parameter, introduces the u...
The menu is one of the most widely used elements of a graphical user interface. The objective of a menu system is to provide various commands and functions to the user in an easy way so that the user can just select the desired operation from a given list instead of typing a complex command in the command prompt. There are several aspects of a menu system such as functionality, adaptability, ae...
The first geostationary Earth observation satellite of Korea – the Communication, Ocean, and Meteorological Satellite (COMS) – was successfully launched on 27 June 2010. After arrival at its operational orbit, the satellite underwent an in-orbit test (IOT) that lasted for about 8 months. During the IOT period, the main payload for the weather application, the meteorological imager, went through...
Tag software is included in a web application to facilitate categorization and classification of information. Generally, freely available tag software is adapted, or new code is written to incorporate tagging functionality. Since there is an absence of requirement specification and design document for tag software, even academically, it becomes difficult for the user to know about the possible ...
Runtime requirement monitoring is used for verification and validation of implemented requirements. To monitor the requirements in runtime; we propose a “QoE probe” tool, a mobile application integrated through an API, to collect usage logs as well as users’ Quality of Experience (QoE) in the form of user feedback. The analysis of the collected data guides requirement monitoring of functional a...
We calculate the maximum number of subscribers in a CDMA cellular network for a given GoS requirement, QoS requirement, network topology, and user distribution profile. We formulate a constrained optimization problem that maximizes the call arrival rates subject to upper bounds on the blocking probabilities and lower bounds on the bit energy to interference ratios. We present examples for tradi...
Background & Aim: Web-based technologies provide new opportunities for education, research and professional development of nursing. Nurses have few opportunities to use the Internet due to managers&apos obligations not to use the Internet in work hours, and their traditional attitudes to nursing practice. Establishment of a national nursing portal is a useful way to resolve some of these proble...
introduction: brachytherapy is one of the most common treatment modalities for gynecological cancer. the gzp6 brachytherapy system is one of the devices utilized in iran. it has been considered particularly due to its low cost compared to other more complete and established systems. this system has some deficiencies including lack of a treatment planning software for non-predefined treatments, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید