Using set operators
-
This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.
306p runthenight04 02-02-2023 9 2 Download
-
A locust bean dehulling machine was fabricated and evaluated using locally available materials. The machine performs dual operations of removing the seed coats and cleaning.
11p lucastanguyen 01-06-2020 8 1 Download
-
The purpose of this paper is to model the operation of the Shutdown Cooling System (SDCS) for CANDU 6 nuclear power plants in case of LOCA accidents, using Flowmaster calculation code, by delimiting models and setting calculation assumptions, input data for hydraulic analysis and input data for calculating thermal performance check for heat exchangers that are part of this system.
7p christabelhuynh 31-05-2020 18 1 Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 82 3 Download
-
Before a database is created, the UNIX environment must be configured and the Oracle9i server must have already been installed. Four environment variables must be set: ORACLE_HOME, ORACLE_SID, PATH, LD_LIBRARY_PATH. ORACLE_HOME is the full path to the top directory in which the Oracle9i Server is installed. The directory for ORACLE_HOME should be supplied by the person who installed the server, usually the UNIX administrator or the DBA. ORACLE_SID is a user-definable name assigned to an instance of a database.
10p trinh02 28-01-2013 62 6 Download
-
Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM) in the Linux kernel, based on the principle of least privilege. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.
15p muathu_102 28-01-2013 94 11 Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p muathu_102 28-01-2013 28 2 Download
-
Let X be a compact K¨hler manifold with strictly pseudoconvex bounda ary, Y. In this setting, the SpinC Dirac operator is canonically identified with ¯ ¯ ∂ + ∂ ∗ : C ∞ (X; Λ0,e ) → C ∞ (X; Λ0,o ). We consider modifications of the classi¯ cal ∂-Neumann conditions that define Fredholm problems for the SpinC Dirac operator. In Part 2, [7], we use boundary layer methods to obtain subelliptic estimates for these boundary value problems. Using these results, we obtain an expression for the finite part of the holomorphic Euler characteristic of a strictly pseudoconvex manifold...
33p noel_noel 17-01-2013 42 5 Download
-
We provide a class of necessary and sufficient conditions for the discreteness of spectrum of Schr¨dinger operators with scalar potentials which o are semibounded below. The classical discreteness of spectrum criterion by A. M. Molchanov (1953) uses a notion of negligible set in a cube as a set whose Wiener capacity is less than a small constant times the capacity of the cube. We prove that this constant can be taken arbitrarily between 0 and 1. This solves a problem formulated by I. M. Gelfand in 1953. Moreover, we extend the notion of negligibility by allowing the constant to...
25p noel_noel 17-01-2013 40 6 Download
-
Digital signal processing has revolutionized the storage and transmission of audio and video signals as well as still images, in consumer electronics and in more scientific settings (such as medical imaging). The main advantage of digital signal processing is its robustness: although all the operations have to be implemented with, of necessity, not quite ideal hardware, the a priori knowledge that all correct outcomes must lie in a very restricted set of well-separated numbers makes it possible to recover them by rounding off appropriately. ...
33p tuanloccuoi 04-01-2013 52 7 Download
-
Basic elements of program Input – Initialize, define or assign numerical values to variables. Set of command expressions – Operations applied to input variables that lead to the desired result. Output – Display (graphically or numerically) result.An example of technical computinAn example of technical computing Let us consider using the hyperbolic tangent to model a downhill section of a snowboard or snow ski facility. Let us first examine the hyperbolic tangent function by executing the command: ezplot( ‘tanh(x)’ )...
17p feteler 27-11-2012 59 2 Download
-
ON A BOUNDARY VALUE PROBLEM FOR NONLINEAR FUNCTIONAL DIFFERENTIAL EQUATIONS ROBERT HAKL Received 21 August 2004 and in revised form 1 March 2005 We consider the problem u (t) = H(u)(t) + Q(u)(t), u(a) = h(u), where H,Q : C([a,b];R) αβ → L([a,b];R) are, in general, nonlinear continuous operators, H ∈ ab (g0 ,g1 , p0 , p1 ), and h : C([a,b];R) → R is a continuous functional. Efficient conditions sufficient for the solvability and unique solvability of the problem considered are established. 1. Notation The following notation is used throughout the paper: N is the set of all natural numbers....
26p sting12 10-03-2012 53 6 Download
-
A combinatorial bijection between k-edge colored trees and colored Pr¨ufer codes for labelled trees is established. This bijection gives a simple combinatorial proof for the number k(n − 2)!nk−n n−2 of k-edge colored trees with n vertices.A k-edge colored tree is a labelled tree whose edges are colored from a set of k colors such that any two edges with a common vertex have different colors
7p thulanh5 12-09-2011 84 7 Download
-
Chapter 2: Software & Operating System ATHENA Objective What is the software? How is software categorized? What is an operating system ? What does an operating system do? ATHENA What’s the software ? Software is the instructions and associated data, stored in electronic format, that direct the computer to accomplish a task. A computer program is a set of detailed, step-by-step instructions that tells a computer how to solve a problem or carry out a task. ATHENA How is software categorized? Software is categorized as either application software or system software.
11p hangkute_101091 19-07-2010 121 12 Download