نتایج جستجو برای: compromising approach

تعداد نتایج: 1299112  

2016
Stefan Henningsson Thomas Kude Karl Michael Popp

In this paper, we report on a novel approach developed by SAP AG, the German enterprise software company, for managing the integration of acquisitions of companies to access innovative technologies and related capabilities: the Product Council approach. The value of the Product Council approach rests in ensuring critical speed while not compromising accuracy in the integration process. For SAP,...

Journal: :trauma monthly 0
mahmood karimi mobarakeh department of orthopedic and trauma surgery, kerman university of medical sciences, shahid bahonar hospital, kerman, ir iran ali nemati department of orthopedic and trauma surgery, kerman university of medical sciences, shahid bahonar hospital, kerman, ir iran; department of orthopedic and traumatic surgery, shahid beheshti medical university, imam hossein hospital, shahid madani avenue, 1617763141, ir iran +98-9133425890, [email protected] reza noktesanj department of orthopedic and trauma surgery, kerman university of medical sciences, shahid bahonar hospital, kerman, ir iran amirhossein fallahi department of orthopedic and trauma surgery, kerman university of medical sciences, shahid bahonar hospital, kerman, ir iran saeed safari department of emergency medicine, shahid beheshti medical university, imam hossein hospital, ir iran

background there is considerable variation in the treatment of distal forearm torus fractures (dftf), from soft bandaging to cast immobilization. objectives the present study aimed to show the result of removable wrist splint (rws) in the treatment of these fractures. materials and methods one hundred forty two children aged less than 17 years old with dftf were studied prospectively. these pat...

Journal: :Archives of Pediatrics & Adolescent Medicine 2000

Journal: :Journal of Economic Behavior and Organization 2021

Abstract We study the problem of sharing revenues raised from collective sale broadcasting rights for sports leagues. characterize rules satisfying three basic and intuitive axioms: symmetry, additivity maximum aspirations. They convey a natural compromise between two focal rules, arising polar estimations teams’ loyal viewers. also show that these ruleshave further interesting properties, such...

2015
Andrea Almeida Tofani Gabriela de Almeida Lamarca Aubrey Sheiham Mario Vianna Vettore

BACKGROUND This study assessed clustering of three health-compromising behaviours and explored the association of neighbourhood and individual social capital with simultaneous health-compromising behaviours and patterns of those behaviours in women in the first trimester of pregnancy (baseline) and during the second and third trimesters of pregnancy (follow-up). METHODS A longitudinal study w...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات 1394

abstract the purpose of this study was to find out the effect of applying the principles of group-dynamic assessment (g-da) on learning of conditional structures in english by iranian efl learners at the intermediate level, which according to the formal educational system in iran, includes students who are in their second year of studying in high schools of koohdasht city. this study was a qua...

2016
Jan Hofmaier Steffi Kantz Matthias Söhn Oliver S Dohm Stefan Bächle Markus Alber Katia Parodi Claus Belka Maximilian Niyazi

BACKGROUND The purpose of this study is to investigate the potential to reduce exposure of the contralateral hippocampus in radiotherapy for glioblastoma using volumetric modulated arc therapy (VMAT). METHODS Datasets of 27 patients who had received 3D conformal radiotherapy (3D-CRT) for glioblastoma with a prescribed dose of 60Gy in fractions of 2Gy were included in this planning study. VMAT...

2009
Martin Vuagnoux Sylvain Pasini

Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The technique generally used to detect compromising emanations is based on a wide-band receiver, tuned on a specific frequency. However, this method ma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید