intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Information sharing

Xem 1-20 trên 44 kết quả Information sharing
  • This article uses Random Forest (RF) and k-fold cross-validation to predict the hourly count of rental bikes (cnt/h) in the city of Seoul (Korea) using information related to rental hour, temperature, humidity, wind speed, visibility, dewpoint, solar radiation, snowfall, and rainfall.

    pdf9p viengfa 28-10-2024 1 1   Download

  • This paper contributes to the discussion of the benefit of IFRS adoption by providing statistical evidence on how the new accounting regimes effect to the value relevance of accounting information (i.e. the relationship between accounting earnings, book values of equity and share price) of Vietnamese listed firms.

    pdf16p viormkorn 27-09-2024 5 3   Download

  • The research’s purpose is to find out what environmental - related brand message of electric cars has been conducted in Vietnam to influence its customers. A study using online observation techniques found that automobile manufacturers are using messages mentioned about environment flexibly but must be cautious when sharing information about their new products’ environmental impact.

    pdf10p toduongg 24-08-2024 3 1   Download

  • Social media are currently building their own empire and power since they have great influence in a flat world. They play an important role in the communication of human beings i.e. sharing information and connecting people. Social media have become the main sources of getting latest news and platforms to spread ideas and mindsets. It is therefore essential to know and understand social media’s key vocabulary and terminologies. The paper analyses and synthesizes 100 collected words concerning social media.

    pdf4p tuongtrihoai 23-07-2024 7 2   Download

  • This study reconsiders current public lighting design and suggests alternative practices that were determined through a case study involving a main street shopping strip. Using design as an investigative method this thesis seeks to inform and inspire practitioners and decision makers by illustrating the possibilities of change. Australian cities are witnessing an unprecedented growth in urban density and if we do not change our thinking, the quality of our urban spaces will not match this growth.

    pdf141p runthenight07 01-03-2023 6 3   Download

  • This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.

    pdf306p runthenight04 02-02-2023 6 2   Download

  • This thesis is divided into six chapters. The current chapter has introduced the thesis. Chapter 2 discusses the background of the institutional features of the Indian IPO market, including the grey market. Chapter 3 (Study 1) introduces an integrated conceptual framework of information sharing, with and without allocation discretion to underwriters. Chapter 4 (Study 2) applies signaling theory in the Indian IPO market setting to understand the effect of the information asymmetry between IPO investors.

    pdf234p runthenight04 02-02-2023 6 3   Download

  • In the fourth industrial revolution, the use of the internet is indispensable in managing and sharing information of a country or a locality. Along with the strong development of the internet system and the need to share and look up information on the internet, the integration of GIS technology and web technology (WebGIS) is progressively and widely used. Online maps built with WebGIS have the advantages of ease of use, a large number of users, and providing support in managing, searching, and exploiting information anytime, anywhere.

    pdf8p vikissinger 03-03-2022 16 1   Download

  • The thesis is designed to evaluate the reality of knowledge sharing among lecturers in universities; offering a number of suggestions to help lecturers, university administrators enhance knowledge sharing for teaching and learning.

    pdf14p mmlemmlem_124 22-12-2020 12 0   Download

  • The study determines factors such as trust, enjoyment in helping others, knowledge self-efficacy, management support, using information and communication technology significantly influence knowledge donation and collection.

    pdf16p tohitohi 22-05-2020 64 2   Download

  • The purpose of this study is to determine the mediating role of Information Sharing Strategy (ISS) on Agile Supply Chain (ASC) practices for achieving Supply Chain Performance (SCP) in medium size manufacturing companies in UAE.

    pdf12p tohitohi 22-05-2020 13 0   Download

  • A basic function of extension is to assist the transfer of agricultural technology by ensuring that an adequate amount of high quality knowledge about it is present in the farming community for sustained agricultural development. Studies of the personal characteristics of power holders indicate that they possess high social status and are well known and respected in their communities. While leaders may share some relevant characteristics in similar situations, they also very likely differ in others so that their total personalities are not alike.

    pdf11p caygaocaolon4 04-04-2020 25 1   Download

  • Lecture Marketing channel strategy - Chapter 3: Channel analysis - Auditing marketing channels" has contents: Auditing marketing channels, physical possession, inventory holding costs, information sharing,... And other contents.

    pdf10p tieu_vu08 05-05-2018 58 1   Download

  • This paper proposes a procedural pipeline for wind forecasting based on clustering and regression. First, the data are clustered into groups sharing similar dynamic properties. Then, data in the same cluster are used to train the neural network that predicts wind speed. For clustering, a hidden Markov model (HMM) and the modified Bayesian information criteria (BIC) are incorporated in a new method of clustering time series data.

    pdf16p dieutringuyen 07-06-2017 37 2   Download

  • Module 12: Implementing ISA Server 2004 enterprise edition: back-to-back firewall scenario. The primary focus of this module is the lab where the students will implement ISA Server Enterprise Edition in a back-to-back firewall configuration that includes network load balancing and shared caching. The module information will introduce the complexities of implementing a back-to-back firewall configuration and then provide guidelines for deploying this configuration. In the lab, the students will implement and test a back-to-back firewall scenario.

    ppt10p nomoney2 10-02-2017 46 3   Download

  • "Dynamo: Visual Programming for Design" will demonstrate how to use Dynamo Visual Programming forautodesk® revit® software and autodesk vasari. The lab will provide users with resources and step by step examples for automating geometry creation, adjusting family parameters using external data, and sharing information with different design platforms.

    pdf56p nhatvykts 01-10-2014 359 60   Download

  • Social Media Analytics engines provide information. “Branded content, however, is far more social [than content mills like Demand Media’s] because branded content is written with a human voice and published by a branded entity [you, a friend, campaign, cause, company, brand, etc.]. Search drives a lot of traffic to branded content, of course, but once there, people are more likely to share branded content than content produced mainly for search results such as ‘how to tie a tie.’

    pdf23p hoangliensonnhi 14-08-2013 194 15   Download

  • READING 1. Work in groups. Share information on how you use computers in your free time. Compare answers with other groups and make a list of uses for your class. PRE-READING 2. You are going to hear four people talk about how they use computers. Before you listen, try to predict the uses they describe.

    doc66p lamphong_424 02-07-2013 233 53   Download

  • Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....

    pdf58p trinhvietnambk 29-05-2013 70 9   Download

  • A WLAN is a shared network. An access point is a shared device and functions like a shared Ethernet hub. Data is transmitted over radio waves. Two-way radio communications (half-duplex) are used. The same radio frequency is used for sending and receiving (transceiver).

    ppt54p muathu_102 28-01-2013 73 7   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
10=>1