نتایج جستجو برای: it doesn
تعداد نتایج: 2839508 فیلتر نتایج به سال:
While security professionals have long talked about risk, moving an organization from a “security” mindset to one that thoughtfully considers information risk is a challenge. Managing information risk means building risk analysis into every business decision. In this panel, we will discuss how CISOs are working to move the conversation from security towards information risk. In particular, we w...
In order to explain how DIYbio knowledge and expertise is developed and shared the use of Practice Theory will help us gain a useful understanding of how working practices are sustained, reproduced and potentially changed. In addition, the development and sharing of thick, evocative, rich descriptions of these practices might contribute to the motivational knowledge of DIYbio practitioners.
in this paper, a new analytical approach has been presented for solving strongly nonlinear oscillator problems. iteration perturbation method leads us to high accurate solution. two different high nonlinear examples are also presented to show the application and accuracy of the presented method. the results are compared with analytical methods and with the numerical solution using runge-kutta m...
This document talks about the usage of Simulation Data Exchange (SDX) (Moorthy 1999) in order to enable a consistent digital model of automotive factories. The scope of the digital model is to plan and analyze the factory by using different software packages. Thus the model doesnt exist in only one application. Therefore the consistency in terms of geometry and process data needs to be guarant...
A straightforward method has been developed for the synthesis of the benzimidazole ring system through a carbon-nitrogen cross-coupling reaction. In the presence of 2.0 equiv. of K(2)CO(3) in water at 100 °C for 30 h, the intramolecular cyclization of N-(2-iodoaryl)benzamidine provides benzimidazole derivatives in moderate to high yields. Remarkably, the procedure occurs exclusively in wat...
Employees and/or functional managers increasingly adopt and use IT systems and services that the IS management of the organization does neither provide nor approve. To effectively counteract such shadow IT in organizations, the understanding of employees’ motivations and drivers is necessary. However, the scant literature on this topic primarily focused on various governance approaches at firm ...
While cloud computing is becoming a mainstream IT sourcing option, especially large companies struggle with the internal governance of cloud and the issue of shadow IT. This study takes a technological frames perspective to contrast the knowledge and expectations that business versus IT stakeholders have regarding cloud IT. Our interview data from 20 business and IT managers display the incongr...
Simulation modeling of the vessel traffic in Delaware River: Impact of deepening on port performance
This paper deals with simulation modeling of the vessel traffic in Delaware River. The purpose is to study the impact of deepening on the navigational efficiency in the River. In this regard, vessel calls to terminals, lightering and barge operations, tidal and navigational rules in the River, terminal and anchorage properties as well as vessel profiles are considered in the model. The simulati...
The multi level inverters are mainly classified as Diode clamped, Flying capacitor inverter and cascaded multi level inverter. The cascaded H-bridge multilevel control method is very easy when compare to other multilevel inverter because it doesn‟t require any clamping diode and flying capacitor. The simulation had been carried for single leg of three phase three and five level Half-bridge modu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید