In this paper, a generalized EOQ model is developed with time-varying demand and shortages considering time-varying costs. The solution procedure is shown for determining the optimal replenishment policy over a finite...In this paper, a generalized EOQ model is developed with time-varying demand and shortages considering time-varying costs. The solution procedure is shown for determining the optimal replenishment policy over a finite time horizon during which the replenishment periods are assumed to be constant. The existence and uniqueness of the optimal replenishment policy are presented. The procedure is illustrated with two special cases of linear and non-linear demands and costs. Two numerical examples are also given.展开更多
The optimization policy of the purchase price and the profit under vendor managed inventory(VMI) is studied. For a salable product, supply chain mode of VMI is established, which is based on deterministic demand, havi...The optimization policy of the purchase price and the profit under vendor managed inventory(VMI) is studied. For a salable product, supply chain mode of VMI is established, which is based on deterministic demand, having initial stock and having stock-out cost. With the further analysis of the mode, VMI is found to increase profits of the buyer in the short-term motivation. But VMI will reduce profits of the supplier under the matching condition. And in the short-term motivation, VMI will increase the purchase price to compensate the transfer cost of the supplier. As a result, the foundation of theory is provided to implement VMI in the supply chain, and have some definituded project significance.展开更多
Introduction Cells can sense and respond to the mechanical microenvironment by converting forces into biochemical signals inside the cells,i.e.mechanotransduction<sup>[1-3]</sup>.Focal adhesions are the ma...Introduction Cells can sense and respond to the mechanical microenvironment by converting forces into biochemical signals inside the cells,i.e.mechanotransduction<sup>[1-3]</sup>.Focal adhesions are the major sites of interaction between a cell and its extracellular matrix(ECM)microenvironment,thus outside mechanical signals can be sensed at focal adhesions through transmembrane receptor integrins.In particular,it has been shown that matrix elasticity can control the cell fate<sup>[4]</sup>by modulating the interactions between ECM proteins and their receptor integrins<sup>[5,6]</sup>.For example,different rigidity of polyacrylamide(PA)gels can lead to different density of ECM ancho-展开更多
The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as int...The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the展开更多
文摘In this paper, a generalized EOQ model is developed with time-varying demand and shortages considering time-varying costs. The solution procedure is shown for determining the optimal replenishment policy over a finite time horizon during which the replenishment periods are assumed to be constant. The existence and uniqueness of the optimal replenishment policy are presented. The procedure is illustrated with two special cases of linear and non-linear demands and costs. Two numerical examples are also given.
文摘The optimization policy of the purchase price and the profit under vendor managed inventory(VMI) is studied. For a salable product, supply chain mode of VMI is established, which is based on deterministic demand, having initial stock and having stock-out cost. With the further analysis of the mode, VMI is found to increase profits of the buyer in the short-term motivation. But VMI will reduce profits of the supplier under the matching condition. And in the short-term motivation, VMI will increase the purchase price to compensate the transfer cost of the supplier. As a result, the foundation of theory is provided to implement VMI in the supply chain, and have some definituded project significance.
基金supported in part by NIH HL098472NSF CBET0846429
文摘Introduction Cells can sense and respond to the mechanical microenvironment by converting forces into biochemical signals inside the cells,i.e.mechanotransduction<sup>[1-3]</sup>.Focal adhesions are the major sites of interaction between a cell and its extracellular matrix(ECM)microenvironment,thus outside mechanical signals can be sensed at focal adhesions through transmembrane receptor integrins.In particular,it has been shown that matrix elasticity can control the cell fate<sup>[4]</sup>by modulating the interactions between ECM proteins and their receptor integrins<sup>[5,6]</sup>.For example,different rigidity of polyacrylamide(PA)gels can lead to different density of ECM ancho-
文摘The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the