نتایج جستجو برای: magnetic logging
تعداد نتایج: 346510 فیلتر نتایج به سال:
Economic and environmental logging is important for sustainable wood production in the Caspian forests, north of Iran. Predetermination of the skid trail network and directional felling is a usual recommended method to reduce logging impact. The aim of this study was evaluation of directional felling and finding factors effective on felling error. Totally 135 trees were selected randomly for di...
Emerging byte-addressable, non-volatile memory (NVM) is fundamentally changing the design principle of transaction logging. It potentially invalidates the need for flush-beforecommit as log records are persistent immediately upon write. Distributed logging—a once prohibitive technique for single node systems in the DRAM era—becomes a promising solution to easing the logging bottleneck because o...
Logging has been a common practice for monitoring and diagnosing performance issues. However, logging comes at a cost, especially for large-scale online service systems. First, the overhead incurred by intensive logging is non-negligible. Second, it is costly to diagnose a performance issue if there are a tremendous amount of redundant logs. Therefore, we believe that it is important to limit t...
The portable digital multimeters (DMMs) frequently recommended to be used for data acquisition from electromagnetic field meters are the data logging DMMs. In this paper it is shown that it is better to use for this task the DMMs with event logging mode instead of the ones with the data logging mode. The advantages obtained using these DMMs are presented. The performed experimental results pr...
Production variability is a significant determinant of logging investment outcome. This variability may result from either process variation or zero production weeks. Using assumptions for a “typical” Southern logging system, the Auburn Harvest Analyzer and a simulation model, the impacts of production variation on logging cost, investment return and risk were estimated. The expected value of l...
Off-line intrusion detection systems rely on logged data. However, the logging mechanism may be complicated and time-consuming and the amount of logged data tends to be very large. To counter these problems we suggest a very simple and cheap logging method, light-weight logging. It can be easily implemented on a Unix system, particularly on the Solaris operating system from Sun. It is based on ...
Southern timber harvesting equipment and on-road vehicle costs were obtained for the years from 1967 to 1984. Average cost trends for equipment and vehicles were determined for the period. Average logging contract rates and price trends were also estimated. Comparisons indicated that equipment costs increased more than the general inflation rate and less than the prices of other industrial comm...
Cloud computing o ers computational resources such as processing, networking, and storage to customers. Infrastructure as a Service (IaaS) consists of a cloud-based infrastructure to o er consumers raw computation resources such as storage and networking. These resources are billed using a pay-per-use cost model. However, IaaS is far from being a secure cloud infrastructure as the seven main se...
Manetho is a new transparent rollback recovery protocol for long running distributed computations It uses a novel combination of antecedence graph maintenance unco ordinated checkpointing and sender based message logging Manetho simultaneously achieves the advantages of pessimistic message logging namely limited rollback and fast output commit and the advantage of optimistic message logging nam...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید