A survey of current safety practices in the design of residential buildings in Saudi Arabia identified deficiencies in governance and design procedures. A systematic safety compliance checklist was developed to address these deficiencies incorporating existing local safety instructions and international safety codes and standards. Checklist use is intended to ensure compliance with minimal safety requirements in the design of residential buildings. 相似文献
Computer communication networks are basically resource sharing systems and are used for an efficient exchange of information among remote users. Performance (throughput, delay and power) of a computer network depends upon the intensity of data and/or information traffic. If a network's traffic is allowed to increase beyond certain limits, its performance rapidly degrades. In order to keep data traffic under control, some restrictions are applied at various levels of computer communication networks. These restrictions are usually referred to as flow control techniques.
This paper deals with window (also called end-to-end or entry-to-exit) flow control in computer communication networks. In this method, a source node is allowed to have only a limited number of unacknowledged messages, usually termed as “window size”, at a time. Flow control, in this paper, is discussed in the context of three computer communication switching techniques: packet switching, virtual cut-through switching and quasi cut-through switching. The analysis of window flow control is based upon simulation of a typical store-and-forward computer network. Several simulation results are presented to illustrate the effects of window flow control on various computer communication switching techniques. 相似文献
This paper shows that the minimum cost route should satisfy the Snell's law of light refraction and this can be done by successive iteration, in either a forward or backward direction. The number of iterations required for full convergence depends on the geometry of the problem and the cost ratio between each of the two neighbouring cost regions. 相似文献
In general, online signature capturing devices provide outputs in the form of shape and velocity signals. In the past, strokes have been extracted while tracking velocity signal minimas. However, the resulting strokes are larger and complicated in shape and thus make the subsequent job of generating a discriminative template difficult. We propose a new stroke-based algorithm that splits velocity signal into various bands. Based on these bands, strokes are extracted which are smaller and more simpler in nature. Training of our proposed system revealed that low- and high-velocity bands of the signal are unstable, whereas the medium-velocity band can be used for discrimination purposes. Euclidean distances of strokes extracted on the basis of medium velocity band are used for verification purpose. The experiments conducted show improvement in discriminative capability of the proposed stroke-based system. 相似文献
This paper, which is written to both researchers and practitioners, examines the impact of information technology (IT) on construction firm performance. Based on data collected from 74 construction firms, regression analysis is used to test the relationship between performance and IT. Analysis provides empirical evidence that IT is positively associated with firm performance, schedule performance, and cost performance. Firm performance is a composite score of several metrics of performance: schedule performance, cost performance, customer satisfaction, safety performance, and profit. The regression analysis shows that for every 1?unit increase in IT utilization, there is an increase of about 2, 5, and 3% in firm performance, schedule performance, and cost performance, respectively. No relationship is found between IT use and customer satisfaction, safety performance, and profitability. 相似文献