A methodology for the evaluation of proposal tendered on the basis of buil-operate-tarnser model

Download
1991
Korkmaz, Ahmet

Suggestions

A Methodology for the Evaluation of Proposals Tendered on the Basis of Build-Operate-Transfer (BOT) Model
Birgönül, Mustafa Talat; Dikmen Toker, İrem (1996-09-13)
A methodology for determining the cluster of a new project
Yiğit, Aybeniz; Saatçioğlu, Ömer; Department of Industrial Engineering (2005)
By definition, all projects are unique; however R&D projects have specific characteristics that make them harder to manage. The project management methodology applied to R&D projects may show differences due to the categorization of them. But if there exists a categorization of projects, one can analyze the properties of the project classes and then manage similar projects similarly. In this study, the R&D projects of a main military electronics company of Turkey, are analyzed. Tunç (2004) has developed a m...
A methodology to assess suitability of a site for small scale wet and dry CSP systems
Uzgoren, Eray; Timur, Eray (2015-06-25)
This study presents a methodology to assess suitability of a site for small scale concentrated solar power (CSP) systems for its energy conversion efficiency and make-up water requirement. Energy conversion efficiency of CSPs relies not only on the level of direct solar radiation but also on the performance of the cooling system. Regions with high solar potential have to deal with heat rejection at elevated temperatures which causes reduced energy conversion efficiencies due to high condenser temperatures. ...
A framework for chosen IV statistical analysis of stream ciphers
Englund, Hakan; Johansson, Thomas; Turan, Meltem Soenmez (2007-12-13)
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generalize this idea and propose a framework for chosen IV statistical attacks using a polynomial description. We propose a few new statistical attacks, apply them on some existing stream cipher proposals, and give some conclusions regarding the strength of their IV initialization. In particular, we experimentally detected statistical weak...
A methodology for determination of performance based design parameters
Yazgan, Ufuk; Gülkan, Polat; Yakut, Ahmet; Department of Civil Engineering (2003)
Citation Formats
A. Korkmaz, “A methodology for the evaluation of proposal tendered on the basis of buil-operate-tarnser model,” Middle East Technical University, 1991.