نتایج جستجو برای: opportunistic behavior
تعداد نتایج: 638689 فیلتر نتایج به سال:
The importance of project governance in curbing opportunistic behavior (OB) has been clearly established the literature. Although contract and trust are considered critical factors that explain governance, there is a lack understanding regarding their interplay at various stages development. current study takes dynamic perspective breaks down into completeness (CC) enforcement (CE), while diffe...
In this work, we consider a client relay wireless system, where users cooperate to send uplink data packets. We focus on the simplest, but realistic network topology and derive the primary performance metrics, including throughput, mean packet delay, and energy efficiency. Importantly, our model enables opportunistic reception and transmission of relay packets thus allowing for many useful insi...
background: hiv/aids patients are mainly hospitalized for hiv-related diseases and opportunistic infections. thisstudy was performed todetermine thecauses ofhospitalization and its related factors in hiv/aids patients in tehran’s imam khomeini hospital during 2009-2012. methods: thisstudy wasa descriptive cross-sectionalstudy . hiv patients admitted to the imam khomeini hospital were included i...
Introduction: Due to the complexity of health services, which require the engagement of different parties for the provision of integrated services, inappropriate network governance models can lead to financial conflicts, lack of transparency of accountabilities for medical errors, and difficulties on multi-professional team working. Therefore, this study aimed to examine factors influencing the...
Economists are quick to assume opportunistic behavior in almost every walk of life other than our own. Our empirical methods are based on assumptions of human behavior that would not pass muster in any of our models. The solution to this problem is not to expect a mass renunciation of data mining, selective data cleaning or opportunistic methodology selection, but rather to follow Leamer’s lead...
Given the global challenges of security, both in physical and cyber worlds, security agencies must optimize the use of their limited resources. To that end, many security agencies have begun to use "security game" algorithms, which optimally plan defender allocations, using models of adversary behavior that have originated in behavioral game theory. To advance our understanding of adversary beh...
introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید