intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Criteria layer

Xem 1-10 trên 10 kết quả Criteria layer
  • This paper proposes a method of ranking load in Microgird system based on the calculation of priority weights on the continuity of power supply of the loads. The proposed method applies the covariance matrix of the criterion layer to determine values of each criterion.

    pdf9p visusanwojcicki 28-06-2022 9 3   Download

  • Thin layer drying behaviour of mint leaves was investigated in axial flow tray dryer at air temperatures of 45, 55 and 65°C. Five different thin layer drying models namely Newton, Page, Logarithmic, Diffusion approach and Henderson and Pabis models were fitted to experimental drying data. The highest adjusted R2 with the lowest standard square error (SSE) and root mean square error (RMSE) were selected as statistical criteria to evaluate how well the tested models fit the drying data.

    pdf9p kequaidan2 11-12-2019 11 0   Download

  • A miniature X-ray source has been optimized for electronic brachytherapy. The cooling fluid for this device is water. Unlike the radionuclide brachytherapy sources, this source is able to operate at variable voltages and currents to match the dose with the tumor depth. First, Monte Carlo (MC) optimization was performed on the tungsten target-buffer thickness layers versus energy such that the minimum X-ray attenuation occurred. Second optimization was done on the selection of the anode shape based on the Monte Carlo in water TG-43U1 anisotropy function.

    pdf8p kequaidan1 16-11-2019 33 0   Download

  • In this research, “Domain Ontology for Project Knowledge Management” is presented by literature and reliable resource reviews and analysis in three layers: “People”, “Technology” and “Process”. This ontology consists of 115 cells. The layer of “People” has been divided into two subgroups: “Culture” and “Leadership”, in12 cells. The layer of “Technology” has been classified into two subgroups: “Technology Component” and “Application”, which has 72 cells.

    pdf26p kequaidan1 05-11-2019 15 2   Download

  • Chapter 1 - Introduction. This chapter addresses four issues: data communications, networks, protocols and standards, and standards organizations. First, we give a broad definition of data communications. We then define networks as a highway on which data can travel. We also discuss different types of protocols and the difference between protocols and standards. Then, we give a brief review of the standards organizations that we refer to throughout the book. Finally, we discuss network models.

    ppt30p nhanmotchut_2 19-10-2016 49 2   Download

  • The following overview illustrates the main set of criteria and standards for the IS audit. The IS audit checks the effectiveness of the security organisation as well as the appropriateness and implementation of the organisation’s security concept. The security strategy and the implementations of technical, organisational, and personal safeguards are examined (see [BMI2]). IS audits should be performed regularly. Federal agencies are obligated by the Federal Implementation Plan to perform a comprehensive IS audit at least every 3 years.

    pdf53p tay_thi_le 19-02-2013 50 4   Download

  • Although an audit requires different layers of quality control measures and criteria, the auditors carrying out the audit fieldwork should be left with a degree of professional judgement. This depends upon the audit task in hand, problems encountered that need to be addressed immediately, as well as, most importantly, to the degree of direction, supervision and/or review, that is required on the auditors. The degree of professional judgement also depends upon the auditor’s competence, expertise, professional qualifications, aptitude and level in the hierarchy. ...

    pdf34p tay_thi_le 19-02-2013 37 3   Download

  • Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed are J2EE and XML integration at each layer of an n-tier distributed application model. Design patterns, tradeoffs, and decision criteria are provided in terms of individual XML and J2EE technology combinations....

    pdf296p trasua_123 04-01-2013 68 9   Download

  • Intrusion detection systems and vulnerability scanners provide an additional layer of network security.While firewalls permit or deny traffic based on source, destination, port, or other criteria, they do not actually analyze traffic for attacks or search the network for existing vulnerabilities. In addition, firewalls typically do not address the internal threat presented by “insiders.

    pdf18p khongmuonnghe 04-01-2013 53 2   Download

  • When it comes to the structured cabling system, however, the aesthetics of the components are often not considered. So while space planners argue over carpet choices and wall art, the decision criteria for physical layer projects are normally limited to functionality and price – which makes sense because most brands of cable managers, cable, and patch panels offer both a similar appearance and performance within defined requirements.

    pdf3p mylinh 14-08-2009 66 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2