• No results found

18 results with keyword: 'activity based modelling for operational decision support'

Activity-based Modelling for Operational Decision-support

Through explicit risk evaluation methods where the activity/period risk levels are calculated based on the current operational climate (ongoing and planned activities,

Protected

N/A

106
0
0
2021
Essays on Electoral Accountability and Equalization Transfer under a Decentralized Context: The Case of Peruvian Municipalities

Hegel employs some of the same concepts and strategies he developed decades earlier while experimenting with the idea of “an intellectual intuition of nature”

Protected

N/A

55
0
0
2020
Blue Island Post Office Direct Number

throughout new jersey via usps domestic shipping service provides the package is delivered to blue island historic architectural and blue island post office direct number in il

Protected

N/A

14
0
0
2022
Proving Termination of Imperative Programs via Term Rewriting ⋆

by PA -based rewrite rules from P ∪ {l → rJCK}. Thus, assume some infinite chain contains.. 3) } by the termination processor of Theorem 22 since the rewrite rules (2) and (3) are

Protected

N/A

44
0
0
2021
Number Plate Detection using Image Processing for Automated Toll Collection to prevent fraudulent behaviour

The purpose of this research paper is to propose a technique where collection of tolls can be done electronically using image processing technique where we

Protected

N/A

6
0
0
2020
Online growing neural gas for anomaly detection in changing surveillance scenes

Shah, Abnormal crowd behavior detection using social force model, in: IEEE Conference on Computer Vision and Pattern Recognition, 2009, pp. Vasconcelos, Anomaly detection

Protected

N/A

16
0
0
2021
The Impact of the Adoption Business Intelligence among Iranian Banks

Indeed, the BI systems and technologies emergence has prompted Iranian Banks to reassess their Information technology strategies to allow them to remain competitive in the

Protected

N/A

8
0
0
2020
An Efficient and Secure ID Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices

requirements viz; confidentiality and authentication. They claimed that their system’s secure against various attacks, such as replay attack, impersonation attack. But

Protected

N/A

6
0
0
2020
Economic Valuation for Information Security Investment: A Systematic Literature Review

(2011) Decision Support Systems Financial economics based value-at-Risk methods and operational risk modelling Profit optimization model for customer information security

Protected

N/A

55
0
0
2020
Improvement on Multi Group LEACH Protocol of Wireless Sensor Network

Energy constraint is one of the major research topics in WSN. Routing consumes the largest amount of energy in WSN so used routing protocol should be energy

Protected

N/A

6
0
0
2020
Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks

( “Selection of single sampling attributes plan for given acceptance quality level and limiting quality level involving minimum risks”, Communication is

Protected

N/A

12
0
0
2020
Impact of Adaptive Downlink Uplink Channel Split Ratio and Cyclic Prefix on WiMAX Network

Specifically, it has seen that TCP performance in terms of throughput and goodput depends on DL:UL ratio, frame duration, cyclic prefix, offered loads,

Protected

N/A

5
0
0
2020
Using Learning Cycle 5E-based Laboratory Activity in Improving Students’ Problem Solving Skills on Mixture Separation Topic

Suggestion that can be given are science teachers need to learn their students with laboratory activities using the 5E learning cycle, so that their problem solving skills can

Protected

N/A

11
0
0
2021
Offshore renewable energy and nature conservation: the case of marine tidal turbines in Northern Ireland

This study has demonstrated that during the construction and operation of the marine tidal turbine in Strangford Lough, the perceptions and views of different stakeholders some-

Protected

N/A

20
0
0
2021
Study of Wireless Optical CDMA LAN in Indoor Environment

channels, the signal to noise ratio (SNR) is proportional to the average received power, whereas on optical wireless links, it is proportional to the square of the

Protected

N/A

8
0
0
2020
AN IMPROVED OBLCAE ALGORITHM TO ENHANCE LOW CONTRAST IMAGES

OBLCAE stands for (Overall Brightness and local contrast adaptive enhancement) algorithm based on HSV color space is projected for low illumination color image

Protected

N/A

6
0
0
2020
Survey of Expert Opinion  on Intelligence  and Aptitude  Testing

Those who conduct research on the nature of intelligence and test use and those who design and validate tests, and who therefore are most qualified to

Protected

N/A

8
0
0
2021
Connected Government: Productivity Enhancement

Enable Government and Citizens to take advantage of the cutting-edge technologies like SMAC currently and those that emerge in future. The principles of open data, open standards

Protected

N/A

5
0
0
2020

Upload more documents and download any material studies right away!