![](images/graphics/blank.gif)
Criteria layer
-
This paper proposes a method of ranking load in Microgird system based on the calculation of priority weights on the continuity of power supply of the loads. The proposed method applies the covariance matrix of the criterion layer to determine values of each criterion.
9p
visusanwojcicki
28-06-2022
9
3
Download
-
Thin layer drying behaviour of mint leaves was investigated in axial flow tray dryer at air temperatures of 45, 55 and 65°C. Five different thin layer drying models namely Newton, Page, Logarithmic, Diffusion approach and Henderson and Pabis models were fitted to experimental drying data. The highest adjusted R2 with the lowest standard square error (SSE) and root mean square error (RMSE) were selected as statistical criteria to evaluate how well the tested models fit the drying data.
9p
kequaidan2
11-12-2019
11
0
Download
-
A miniature X-ray source has been optimized for electronic brachytherapy. The cooling fluid for this device is water. Unlike the radionuclide brachytherapy sources, this source is able to operate at variable voltages and currents to match the dose with the tumor depth. First, Monte Carlo (MC) optimization was performed on the tungsten target-buffer thickness layers versus energy such that the minimum X-ray attenuation occurred. Second optimization was done on the selection of the anode shape based on the Monte Carlo in water TG-43U1 anisotropy function.
8p
kequaidan1
16-11-2019
33
0
Download
-
In this research, “Domain Ontology for Project Knowledge Management” is presented by literature and reliable resource reviews and analysis in three layers: “People”, “Technology” and “Process”. This ontology consists of 115 cells. The layer of “People” has been divided into two subgroups: “Culture” and “Leadership”, in12 cells. The layer of “Technology” has been classified into two subgroups: “Technology Component” and “Application”, which has 72 cells.
26p
kequaidan1
05-11-2019
15
2
Download
-
Chapter 1 - Introduction. This chapter addresses four issues: data communications, networks, protocols and standards, and standards organizations. First, we give a broad definition of data communications. We then define networks as a highway on which data can travel. We also discuss different types of protocols and the difference between protocols and standards. Then, we give a brief review of the standards organizations that we refer to throughout the book. Finally, we discuss network models.
30p
nhanmotchut_2
19-10-2016
49
2
Download
-
The following overview illustrates the main set of criteria and standards for the IS audit. The IS audit checks the effectiveness of the security organisation as well as the appropriateness and implementation of the organisation’s security concept. The security strategy and the implementations of technical, organisational, and personal safeguards are examined (see [BMI2]). IS audits should be performed regularly. Federal agencies are obligated by the Federal Implementation Plan to perform a comprehensive IS audit at least every 3 years.
53p
tay_thi_le
19-02-2013
50
4
Download
-
Although an audit requires different layers of quality control measures and criteria, the auditors carrying out the audit fieldwork should be left with a degree of professional judgement. This depends upon the audit task in hand, problems encountered that need to be addressed immediately, as well as, most importantly, to the degree of direction, supervision and/or review, that is required on the auditors. The degree of professional judgement also depends upon the auditor’s competence, expertise, professional qualifications, aptitude and level in the hierarchy. ...
34p
tay_thi_le
19-02-2013
37
3
Download
-
Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed are J2EE and XML integration at each layer of an n-tier distributed application model. Design patterns, tradeoffs, and decision criteria are provided in terms of individual XML and J2EE technology combinations....
296p
trasua_123
04-01-2013
68
9
Download
-
Intrusion detection systems and vulnerability scanners provide an additional layer of network security.While firewalls permit or deny traffic based on source, destination, port, or other criteria, they do not actually analyze traffic for attacks or search the network for existing vulnerabilities. In addition, firewalls typically do not address the internal threat presented by “insiders.
18p
khongmuonnghe
04-01-2013
53
2
Download
-
When it comes to the structured cabling system, however, the aesthetics of the components are often not considered. So while space planners argue over carpet choices and wall art, the decision criteria for physical layer projects are normally limited to functionality and price – which makes sense because most brands of cable managers, cable, and patch panels offer both a similar appearance and performance within defined requirements.
3p
mylinh
14-08-2009
66
5
Download