نتایج جستجو برای: minimum acceptable diet

تعداد نتایج: 383868  

2009
CHRISTOPHER MARQUIS ZHI HUANG

This study focuses on how founding institutions impact intraorganizational capabilities and how such imprints may have different external manifestations in subsequent historical eras. We introduce the concept of exaptation to organizational theory, identifying an important process whereby the historical origin of a capability differs from its current usefulness. Three founding conditions—branch...

Journal: :Science and engineering ethics 2008
Colleen Murphy Paolo Gardoni

In this paper, we present a Capabilities-based Approach to the acceptability and the tolerability of risks posed by natural and man-made hazards. We argue that judgments about the acceptability and/or tolerability of such risks should be based on an evaluation of the likely societal impact of potential hazards, defined in terms of the expected changes in the capabilities of individuals. Capabil...

Journal: :Journal of experimental agriculture international 2022

A total number of two hundred and thirty five (235) respondents responded to the self-structured (online Google form) questionnaires administered them without being bias sample their opinions on performance common rodent population control methods readiness embrace plant-based formulated diets as a method in Nigeria. Statistical Package for Social Sciences (SPSS) was used analyze questionnaires...

2013
Thomas W. Bates Ching-Hung Henry Laura Lindsey

This paper examines how equity analysts affect corporate liquidity policy and the value of cash. Greater analyst coverage reduces information asymmetry between a firm and outside shareholders and enhances the monitoring process, in turn increasing the value of cash and allowing firms to hold more cash. The cash-to-assets ratio increases by 5.2 percentage points when moving from the bottom analy...

Journal: :IACR Cryptology ePrint Archive 2010
Ulrike Meyer Susanne Wetzel Sotiris Ioannidis

Entities define their own set of rules under which they are willing to collaborate, e.g., interact, share and exchange resources or information with others. Typically, these individual policies differ for different parties. Thus, collaboration requires the resolving of differences and reaching a consensus. This process is generally referred to as policy reconciliation. Current solutions for pol...

Journal: :J. Simulation 2012
Gaurav Jetly Christian L. Rossetti Robert Handfield

The pharmaceutical supply chain is composed of multiple firms interacting to produce and distribute drugs in an uncertain environment. In this work, we develop and validate a multi-agent simulation of the supply chains associated with the pharmaceutical industry. We demonstrate that the operating norms of a particular industry can be accurately represented to create an industry-specific model c...

2014
Xuebo Li Yongqiang Yang Genping Li Hongwei Li Qingshan Wang Lihua Wan

Variation in the type of tissue that larvae feed on can produce marked differences in developmental rate and body size, which can compromise predictions of minimum postmortem interval. A series of experiments were conducted to investigate the effect of fat content in the diet on larval growth in Chrysomya megacephala (Fabricius) (Diptera: Calliphoridae), an important forensic blowfly species in...

2009
Ernst Eberlein Dilip B. Madan Robert H. Smith

Portfolios are selected in non-Gaussian contexts to maximize a Cherny and Madan index of acceptability. Analytical gradients are developed for the purpose of optimizing portfolio searches on the unit sphere. It is shown that though an acceptability index is not a preference ordering, many utilities will concur with acceptability maximization. A stylized economy illustrates the advantages from t...

2010
Stuart E. Schechter Cormac Herley Michael Mitzenmacher

We propose to strengthen user-selected passwords against statistical-guessing attacks by allowing users of Internetscale systems to choose any password they want—so long as it’s not already too popular with other users. We create an oracle to identify undesirably popular passwords using an existing data structure known as a count-min sketch, which we populate with existing users’ passwords and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید