نتایج جستجو برای: keywords modern
تعداد نتایج: 2116683 فیلتر نتایج به سال:
To cite this article: Scott J. Davis, Shatiel B. Edwards, Gerald E. Teper, David G. Bassett, Michael J. McCarthy, Scott C. Johnson, Craig R. Lawton, Matthew J. Hoffman, Liliana Shelton, Stephen M. Henry, Darryl J. Melander, Frank M. Muldoon, Brian D. Alford, Roy E. Rice, (2016) Maximizing the U.S. Army’s Future Contribution to Global Security Using the Capability Portfolio Analysis Tool (CPAT)....
Supplying chain cooperation has already become an important strategy that enterprises use to tackle market competition; however, the supply chain crisis caused by supply chain risk makes the supply chain operation of enterprises very fragile. This paper applies Portfolio Theory to explain the suppliers’ combination plays an important role in dispersing the supplying chain risk and controlling i...
In the context of the historical development of portfolio theory the authors describe a stochastic asset/liability modelling exercise for a closed pension fund portfolio, illustrating the reduction in variance of estimated future surplus which can be achieved by investment in index-linked securities. Equity investment would increase the expected level of surplus, but the outcome would be more u...
Healthcare organizations continue to make large investments in health information technology to improve quality of care and lower costs. Therefore, there is an evergrowing need to have an ever-clearer understanding of how IT investments impact these organizations. In this paper, we present an extensive review of literature on the impact of health information technology on quality. We identify a...
cam (complementary and alternative medicine) therapies have become increasingly popular in pediatric populations. phytotherapy are the most common cam used in children. yet, little is known about children’s preferences for cam. but it is expected to become more widely integrated into the modern medical system, including the medical curriculum.the aim of this study is to introduce the prevalenc...
Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید