Study on Coupling of Entrepreneurial Enterprise Growth and Enterprise Network Competence Based on a Random Network Model
نویسندگان
چکیده
منابع مشابه
Adaptive Distributed Enterprise Network Management Model Based on Physical Topology
On the basis of the basic idea of physical topology, a load balancing adaptive distributed enterprise network management model ADNMM is proposed. The system has good scalability, which allows the addition of management nodes dynamically so as expand the scope of network management; with sophisticated load balancing capacity, which can dynamically adjust the load of the managed node; with topolo...
متن کاملFrom Enterprise Network to Network Enterprise
Enterprise network is an important component for building corporate information system. Furthermore, dramatic changes of computing and communication technologies make it possible for enterprise network to run the whole business process. This paper proposes a new perspective of enterprise network, called network enterprise. Network enterprise can maximize the potential of the network resources. ...
متن کاملOn Enterprise Social Network Sites
Enterprise social networks are organizationally bounded online platforms for users to interact with another and maintain interpersonal relationships. The allure of these technologies is often seen in intra-organizational communication, collaboration and innovation. How these technologies actually support organizational innovation efforts remains unclear. A specific challenge is whether digital ...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Online Engineering (iJOE)
سال: 2016
ISSN: 1861-2121,1868-1646
DOI: 10.3991/ijoe.v12i12.6445