نتایج جستجو برای: third party logistics 3pl provider selection problem

تعداد نتایج: 1432558  

Journal: :مدیریت زنجیره تأمین 0
عبدالستار صفائی احمد محمدپور لاریمی قاسم افضلی حاجی دلا

organizations around the world are seeking for tactics and techniques in order to survive in today's turbulent competitive environment. one of these approaches is outsourcing logistics supply chain operations in terms of third-party logistics companies. the results of the researches in supply chain, confirms the importance of third party logistic companies and the synergy of these companies for...

Journal: :Expert Syst. Appl. 2014
S. Senthil B. Srirangacharyulu A. Ramesh

Due to green legislations, industries track the used products through reverse logistics contractors. A reverse logistics programme offers significant cost savings in procurement, transportation, disposal and inventory carrying. Since reverse logistics operations and the supply chains they support are considerably more complex than traditional manufacturing supply chains, it can be offered to th...

Journal: :Journal of open innovation 2021

Optimizing the cargo flows through nodes of a digital transport corridor is crucial problem; solving it allows to introduce modern management methods in logistics. This study examines optimization technology distribution center as base node third-party logistics network operator. Our objective consisted theoretically substantiating application mathematical formalisms describing passage stochast...

2014
QIUXIANG LI

Considering the probability of the logistics business successfully completed is influenced by the effort level of 4PL and 3PL, it will cause bilateral moral risk in the case that both sides of the factors of production cannot be checked. Using the principal-agent theory, the paper discusses both sides contracts in the centralized decision and distributed decision, founding that short-term contr...

2007
Adrian Leung Geong Sen Poh

Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید