نتایج جستجو برای: undesirable management
تعداد نتایج: 865718 فیلتر نتایج به سال:
We improve a number of existing algorithms for determining the location of one or more undesirable facilities amidst a set P of n demand points, under various constraints and distance functions. We assume that the demand points reside within some given bounded region R. Applying concepts and techniques from Computational Geometry, we provide e cient algorithms for the following problems: 1. Bri...
iv
The right not to know is often defended on the basis of the principle of respect for personal autonomy. If I choose not to acquire personal information that impacts on my future prospects, such a choice should be respected, because I should be able to decide whether to access information about myself and how to use it. But, according to the incoherence objection to the right not to know in the ...
Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In a...
reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...
Abstract Introduction: In higher education, accreditation begins with internal evaluation of the educational departments carried out by the faculty members in order to improve the educational quality. The purpose of this study was to determine the situation of education and research in the departments of School of Management and Medical informatics in Isfahan University of Medical Sciences i...
In this paper, we develop a framework to classify supply chain risk management problems and approaches for the solution of these problems. We argue that risk management problems need to be handled at three levels strategic, operational and tactical. In addition, risk within the supply chain might manifest itself in the form of deviations, disruptions and disasters. To handle unforeseen events i...
Outsourcing decisions, and contractual arrangements of the type required by an IT outsourcing deal, entail risks. This is not to say that outsourcing is bad in itself. It only means that, as in other risky business ventures such as new product development, capital investments, and IS projects, risk assessment and risk management are important contributors to the success of an IT outsourcing ven...
We investigate the origin of undesirable transverse cracks often observed in thin films obtained by the layer transfer technique. During this process, two crystals bonded to each other containing a weak plan produced by ion implantation are heated to let a thin layer of one of the material on the other. The level of stress imposed on the film during the heating phase due to the mismatch of ther...
The input data for DNA computing must be encoded into the form of single or double DNA strands. As complementary parts of single strands can bind together forming a double-stranded DNA sequence, one has to impose restrictions on these sets of DNA words (=languages) to prevent them from interacting in undesirable ways. We recall a list of known properties of DNA languages which are free of certa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید