intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Using set operators

Xem 1-20 trên 28 kết quả Using set operators
  • The rest of the paper is organized as follows: In the next section, we recall the concept of picture fuzzy set and several operators of two picture fuzzy sets. We then propose a new MCDM method using the dissimilarity measure of picture fuzzy sets. Finally, we apply the proposed method for evaluating water reuse applications.

    pdf10p vibecca 01-10-2024 4 1   Download

  • The purpose of this paper is to study the characteristics of competitiveness in firms’ sectors of the Greek manufacturing industry, based on firm level accounting and qualitative data attempting to identify key issues regarding Greek SMEs. An unbalanced data set of 407 Greek manufacturing SMEs is implemented, covering the period of 2003-2011 with the use of a multivariate regression model (EGLS) with explanatory variables characterizing firms’ operational activity.

    pdf7p longtimenosee10 26-04-2024 2 2   Download

  • This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.

    pdf306p runthenight04 02-02-2023 6 2   Download

  • A locust bean dehulling machine was fabricated and evaluated using locally available materials. The machine performs dual operations of removing the seed coats and cleaning.

    pdf11p lucastanguyen 01-06-2020 7 1   Download

  • The purpose of this paper is to model the operation of the Shutdown Cooling System (SDCS) for CANDU 6 nuclear power plants in case of LOCA accidents, using Flowmaster calculation code, by delimiting models and setting calculation assumptions, input data for hydraulic analysis and input data for calculating thermal performance check for heat exchangers that are part of this system.

    pdf7p christabelhuynh 31-05-2020 17 1   Download

  • Contents of "Ht50 ventilator": operator’s responsibility for patient safety; specifications; description of controls; theory of operation; ventilation set up & use; cleaning & maintenance; troubleshooting; ventilator set up procedure with exhalation valve calibration,...

    pdf121p minhhoan2006 16-06-2014 87 3   Download

  • This computerized study of the homonyms of elementary words (roughly equivalent to monosyllabic words) has allowed the compilation of exhaustive lists of homonym sets, using phonetic transcriptions from five different dictionaries. Of the 5,757 elementary words, 2,966 were involved in at least one homonym set, indicating that homonyms will present a significant problem in.

    pdf8p nghetay_1 06-04-2013 56 2   Download

  • THE UNIVERSITY OF MICHIGAN undertook research, late in 1955, in the analysis of language structure for mechanical translation. Emphasis was placed on the use of the contextual structure of the sentence as a means of reducing ambiguity and on the formulation of a set of operative rules which an electronic computer could use for automatically translating Russian texts into English.

    pdf7p nghetay_1 06-04-2013 53 2   Download

  • Globalization Support Features Globalization Support ensures that database utilities and error messages, sort order, date, time, monetary, numeric, and calendar conventions automatically adapt to the native language. Oracle currently supports 57 languages, 88 territories, 84 linguistic sorts (71 monolingual and 13 multilingual), and 235 encoded character sets. The language-dependent operations are controlled by a number of parameters and environment variables on both the client and the server sides. The server and the client may run in the same or different locations.

    ppt42p trinh02 28-01-2013 74 5   Download

  • After completing this lesson, you should be able to do the following: Use the ROLLUP operation to produce subtotal values Use the CUBE operation to produce cross-tabulation values Use the GROUPING function to identify the row values created by ROLLUP or CUBE Use GROUPING SETS to produce a single result set

    ppt32p trinh02 28-01-2013 68 3   Download

  • Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.

    ppt20p trinh02 28-01-2013 81 3   Download

  • After completing this lesson, you should be able to do the following: Describe SET operators Use a SET operator to combine multiple queries into a single query Control the order of rows returned

    ppt24p trinh02 28-01-2013 46 3   Download

  • After completing this lesson, you should be able to do the following: List the operations that use temporary space Create and monitor temporary tablespaces Identify actions that use the temporary tablespace Describe the use of disk and memory for sorting Identify the SQL operations that require sorts Differentiate between disk and memory sorts List ways to reduce total sorts and disk sorts Determine the number of memory sorts performed Set parameters to optimize sorts

    ppt32p trinh02 28-01-2013 45 6   Download

  • Before a database is created, the UNIX environment must be configured and the Oracle9i server must have already been installed. Four environment variables must be set: ORACLE_HOME, ORACLE_SID, PATH, LD_LIBRARY_PATH. ORACLE_HOME is the full path to the top directory in which the Oracle9i Server is installed. The directory for ORACLE_HOME should be supplied by the person who installed the server, usually the UNIX administrator or the DBA. ORACLE_SID is a user-definable name assigned to an instance of a database.

    ppt10p trinh02 28-01-2013 62 6   Download

  • Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM) in the Linux kernel, based on the principle of least privilege. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.

    ppt15p muathu_102 28-01-2013 94 11   Download

  • cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...

    ppt19p muathu_102 28-01-2013 28 2   Download

  • To use data encryption algorithms in network communications, all parities must first agree on using the same secret keys Rely on couriers Set up a meeting to determine a secret key Use postal service, email service, phone service … However, these conventional methods are inflexible for network communication applications Public-key cryptography (PKC) Invented in the 1970’s Without the need of sharing prior secrets to distribute secret keys securely Can also be used for authentication

    ppt39p muathu_102 28-01-2013 69 4   Download

  • Any message written over a fixed set of symbols can be represented as a binary string (a sequence of 0's and 1's) Binary digits 0 and 1 are called bits To reduce computation overhead, encryption algorithms should only use operations that are easy to implement For a binary string X: The length of X, denoted by |X|, is the number of bits in X If |X| = l, X is an l-bit binary string Let a be a binary bit and k a non-negative integer. Denote by ak a binary string consisting of k copies of a Denote the concatenation of X and Y by XY or...

    ppt25p muathu_102 28-01-2013 53 2   Download

  • Let X be a compact K¨hler manifold with strictly pseudoconvex bounda ary, Y. In this setting, the SpinC Dirac operator is canonically identified with ¯ ¯ ∂ + ∂ ∗ : C ∞ (X; Λ0,e ) → C ∞ (X; Λ0,o ). We consider modifications of the classi¯ cal ∂-Neumann conditions that define Fredholm problems for the SpinC Dirac operator. In Part 2, [7], we use boundary layer methods to obtain subelliptic estimates for these boundary value problems. Using these results, we obtain an expression for the finite part of the holomorphic Euler characteristic of a strictly pseudoconvex manifold...

    pdf33p noel_noel 17-01-2013 42 5   Download

  • We provide a class of necessary and sufficient conditions for the discreteness of spectrum of Schr¨dinger operators with scalar potentials which o are semibounded below. The classical discreteness of spectrum criterion by A. M. Molchanov (1953) uses a notion of negligible set in a cube as a set whose Wiener capacity is less than a small constant times the capacity of the cube. We prove that this constant can be taken arbitrarily between 0 and 1. This solves a problem formulated by I. M. Gelfand in 1953. Moreover, we extend the notion of negligibility by allowing the constant to...

    pdf25p noel_noel 17-01-2013 40 6   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1468 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2