نتایج جستجو برای: mega project
تعداد نتایج: 254602 فیلتر نتایج به سال:
The dynamism and volatility of a project or a portfolio (frequently changing scope, objectives, priorities, resource allocation, etc) imply that the project can no longer be managed and governed with static or predefined metrics, methodologies, and best practices. As the environment in which a project has to be managed becomes uncertain and unpredictable, it becomes necessary, if not mandatory,...
projects scheduling by the project portfolio selection, something that has its own complexity and its flexibility, can create different composition of the project portfolio. an integer programming model is formulated for the project portfolio selection and scheduling.two heuristic algorithms, genetic algorithm (ga) and simulated annealing (sa), are presented to solve the problem. results of cal...
This research aimed to investigate the green practices in mega construction project of China–Pakistan Economic Corridor (CPEC). Over recent years, there has been an increasing need for adopting and implementing more sustainable practices, leading national international environmental agendas. To address issue, were considered independent variable comprising design, procurement, construction. The...
phytate in poultry rations containing rice bran (rb) critically reduce poultry performance while increasing n and p excretion. the objective of this study was to determine whether the anti-nutritive problems associated with higher inclusions of rice bran in poultry rations (up to 40%) could be mitigated with mega doses of phytase. twenty days old male broiler chicks (n=180) in 60 floor pens wer...
1 Motivation Tactical theorem provers or proof planners, such as Clam 4], HOL3], or mega 2] provide proof tactics and/or proof methods to support abstract level proof construction and to improve the communication with the user. Tactics and methods typically abbreviate frequently recurring low level proof patterns. A system like mega 2] is capable of an explicit maintenance of abstract level pro...
For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید