Search results for "Lua"
showing 10 items of 3286 documents
METHODS OF SUPPLIERS EVALUATION IN ROMANIA
2015
My topic is methods of suppliers evaluation and it contains several subtopics. The first one includes the most popular factors which are influencing choice of supplier. Second is for Finding Supplier Lists the other one is about submit all information and making a choose which supplier is the most appropriate for as. My report is also connected with the practical part of the problem. All this factors influencing choice of supplier are very important especially in our days, because there are a lot of different suppliers on the market and if we want our company to be the best we have to make right decision about our supplier.
E-supply Chain for International Technology Transfer
2001
This research (a review of current literature and empirical research) suggests that in order to make the e-supply chain for technology transfer of a Western country company (i.e., technology supplier) more efficient and effective than the conventional technology development and delivery approach, it should be considered as a process whose phases include planning, implementation and evaluation. This paper focuses only on the e-supply chain for technology package development for international technology transfer, and does not deal with all the aspects of IT-supported technology transfer process. peerReviewed
Clinical Behavior of Ceramic, Hybrid and Composite Onlays. A Systematic Review and Meta-Analysis
2020
A systematic review and meta-analysis was performed to analyze the survival of onlay restorations in the posterior region, their clinical behavior according to the material used (ceramic reinforced with lithium disilicate, conventional feldspathic ceramic or reinforced with leucite; hybrid materials and composite), possible complications, and the factors influencing restoration success. The systematic review was based on the preferred reporting items for systematic reviews and meta-analyses (PRISMA) statement, without publication date or language restrictions. An electronic search was made in the PubMed, Scopus, Embase, and Cochrane databases. After discarding duplicate publications and stu…
What Can You Achieve in Eight Years? : A Case Study on Participation, Effectiveness, and Overall Impact of a Comprehensive Workplace Health Promotion…
2019
Objective: To investigate participation and effectiveness of a multiyear comprehensive workplace health promotion (WHP) program. Methods: Participation and effectiveness data came from employer and vendor systems. Health data came from health risk assessments (HRA) and biometric screenings. Participation and effectiveness were analyzed using descriptive analyses, T-tests and Mann-Whitney U tests where appropriate. Overall impact was assessed using the PIPE Impact Metric. Results: 86% of employees completed the HRA and 80% the biometrical screenings. Annual participation rate was 24%, and total reach was 58%. The portion of successful participants was 23% in 2010–2013 and 18% in 2014–2017. P…
Osallistava suunnittelu Soiperoisen luonnonsuojelualueella
2001
Suunnitteluajattelu : riskitekijöiden tunnistaminen ja niiden eliminoiminen suunnittelutoiminnan kehittämiseksi
2010
Tutkielmassa selvitettiin kysely- ja haastattelututkimuksen avulla, millaisia suunnitteluajattelun riskitekijöitä tyypillisestä suunnitteluorganisaatiosta voidaan tunnistaa.
A Framework to Assess Social Capital Development in Public Policies
2015
From “Strategic Fit” to Synergy Evaluation in M&A Deals
2012
The aim of this paper is to grasp the processes underlying the genesis and assessment of synergies in M&A deals. We proceed to an in-depth scrutiny of the foundations of synergies using Porter’s model of the value chain. A discernment of the nature of synergies and the mode of their emergence is helpful to clarify to what extent and under which boundary conditions it is appropriate to apply the DCF or the real option techniques for evaluating each type of synergy. Combining both financial tools, the methodology suggested for evaluating the synergies is able to: evaluate projects of M&As, orient the selection of target firms and the definition of the premium of acquisition, and drive…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
Reduced Order Models for Pricing European and American Options under Stochastic Volatility and Jump-Diffusion Models
2017
Abstract European options can be priced by solving parabolic partial(-integro) differential equations under stochastic volatility and jump-diffusion models like the Heston, Merton, and Bates models. American option prices can be obtained by solving linear complementary problems (LCPs) with the same operators. A finite difference discretization leads to a so-called full order model (FOM). Reduced order models (ROMs) are derived employing proper orthogonal decomposition (POD). The early exercise constraint of American options is enforced by a penalty on subset of grid points. The presented numerical experiments demonstrate that pricing with ROMs can be orders of magnitude faster within a give…