International network
-
House of Risk Method is used to identify the most potential risk agents, while the fuzzy reasoning risk assessment model is used to determine the risk severity by risk agents. Based on the analysis, it is found that risk agent stock out of the product is the most potential risk agent in this industry. To reduce the impact, mitigation strategies are suggested for stock out product risk agents in warehouse are flexible supply base, safety stock, internal coordination, as well as create and control production schedules.
5p longtimenosee10 26-04-2024 5 2 Download
-
The research subject is the process of economic and mathematical modelling of time series characterizing the bitcoin exchange rate volatility, based on the use of artificial neural networks. The purpose of the work is to search and scientifically substantiate the tools and mechanisms for developing prognostic estimates of the crypto currency market development. The paper considers the task of financial time series trend forecasting using the LSTM neural network for supply chain strategies.
5p longtimenosee09 08-04-2024 9 1 Download
-
This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.
306p runthenight04 02-02-2023 8 2 Download
-
Glioblastoma (GBM) can be divided into subtypes according to their genomic features, includ‑ ing Proneural (PN), Neural (NE), Classical (CL) and Mesenchymal (ME). However, it is a difficult task to unify various genomic expression profiles which were standardized with various procedures from different studies and to manually classify a given GBM sample into a subtype.
13p vielonmusk 21-01-2022 16 1 Download
-
The research works were published at international paper mainly focused on diagnosing epilepsy sleep disorders, coma and brain death, stress, depresssion pathological… in automation field as spelling, eye blink, head movement, mental arithmetic… this were performed by offline, no mainly focus on resolving in realtime and in control automation field.
33p gaocaolon6 30-07-2020 44 3 Download
-
SARNET (Severe Accident Research Network) was set up under the aegis of the Framework Programmes of the European Commission from 2004 to 2013 and coordinated by IRSN to perform R&D on severe accidents in water-cooled nuclear power plants.
10p christabelhuynh 30-05-2020 17 1 Download
-
This paper aims to incorporate rules of origin into international taxation into firms’ global operations. The purposes of this research are to develop a new model for the global logistics network design of an assembly system with rules of origin and to analyze how the changes of international relationships will affect logistics network design and evaluation functions.
11p enzoenzo 29-01-2020 33 4 Download
-
Nowadays, the concept of globalization seems reduced to the size of the market and, export is only one aspect of the phenomenon of globalization. In global industries, it is now the most competitive positions and bases of competitiveness which should be established worldwide. Therefore, globalization raises strategies to become more global rather than local. Those strategies consist in expanding and coordinating all activities of the company worldwide.
91p nguyenyenyn117 18-06-2019 52 8 Download
-
This paper proposes the perceptual organization model to perform the above task. This paper addresses the outdoor scene segmentation and object classification using cluster based perceptual organization. Perceptual organization is the basic capability of the human visual system is to derive relevant grouping and structures from an image without prior knowledge of its contents.
25p byphasse043256 24-03-2019 27 1 Download
-
In this paper, a novel method is presented to detect spam content on the web. It is based on classification and employs an idea from biology, namely, danger theory, to guide the use of different classifiers. The evaluation of content features of WEBSPAM-UK2007 data set using 10-fold cross-validation demonstrates that this method provides high evaluation criteria in detecting web spam.
13p byphasse043256 23-03-2019 27 1 Download
-
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.
7p byphasse043256 23-03-2019 31 1 Download
-
Module 3: Enabling access to internet resources. This module explains how to provide access to Internet resources for internal corporate clients while maintaining network security. The module discusses different ways to implement this and also how to configure rules for access.
36p nomoney2 10-02-2017 41 4 Download
-
Module 5: Configuring access to internal resources. This module explains how to configure Web and server publishing rules to publish internal network resources to the Internet without compromising internal network security.
36p nomoney2 10-02-2017 50 4 Download
-
Module 7: Advanced application and web filtering. This module explains how application and Web filtering can be used for very specific filtering of traffic that flows through the ISA Server. The module shows how to configure application and Web filtering to provide advanced protection for the internal network.
23p nomoney2 10-02-2017 50 3 Download
-
Module 8: Configuring virtual private network access for remote clients and networks. This module explains how to provide access to the internal network for remote users while maintaining network security by implementing a virtual private network (VPN). The module shows how to configure ISA Server 2004 to provide a VPN solution.
38p nomoney2 10-02-2017 49 4 Download
-
Lecture Business communication design - Chapter 2: How business communicates. The main contents of this chapter include all of the following: 21st-Century business directions, formal communication networks, informal communication networks, communicating externally.
22p nomoney2 10-02-2017 58 3 Download
-
Chapter summary: External unshielded twisted pair (UTP) cable installations use prefabricated cables to connect computers directly to hubs; internal cable installations use bulk cable, which you pull through walls, ceilings, or floors; to connect two computers without a hub, you must use a crossover cable connection, which reverses the transmit and receive signals;...
18p tangtuy08 21-04-2016 35 2 Download
-
Objective: Identify organizations responsible for WAN standards Explain the difference between a WAN and LAN and the type of addresses each uses; describe the role of a router in a WAN Identify internal components of the router and describe their functions; describe the physical characteristics of the router.
96p xaydungk23 19-04-2016 82 8 Download
-
The Elastomeric Alloy (EA) materials based on polypropylene (PP) and Vietnam waste Rubber Powder (RP) has been prepared in internal mixer of Haake in melting state with peroxide initiator. Dynamically stabilizing process at presence of radical donor and acceptor systems has leaded to form chemical bonds on the surface between two phases of surspending rubber powder and PP matrix and then to form intermediate phase surrounding Rubber Particles and making EA higher dense than that of materials by simple mixing RP and PP without networking.
5p uocvong03 24-09-2015 32 6 Download
-
Tên dự án: XÂY DỰNG MÔ HÌNH VÀ GIẢI PHÁP TRIỂN KHAI MẠNG CHO CÔNG TY MTEK. Thời gian thực hiện dự án: Từ ngày 15/10/2010 đến ngày 5/11/2010 1. Khảo sát hiện trạng Mô hình Công Ty MTek như sau: Mạng: lớp C Xây dựng địa chỉ IP: theo hình ta có 3 network • Đường mạng 192.168.2.0/24 : Internal. • Đường mạng 192.168.1.1 – 192.168.1.11 : DMZ. • Đường mạng 192.168.3.1 : ADSL. Nhằm nâng cấp chất lượng và hiện đại hóa CNTT trong công ty, hỗ trợ và hoàn thành các mục tiêu do BGĐ đề ra: mạng phải nhanh, ít sự cố về Mail, WEB, Database, bảo...
41p marco27770 10-06-2013 185 57 Download