Essays about: "Rizwan Ahmed"

Found 3 essays containing the words Rizwan Ahmed.

  1. 1. Supplier Selection Process Improvement through Six-Sigma DMAIC : A case of Lafarge Pakistan Cement Limited

    University essay from Ekonomihögskolan, ELNU

    Author : Zaheer Tariq; Muhammad Rizwan Ul Haque; Kamonmarn Jaenglom; Ahmed Nawaz; [2010]
    Keywords : Supplier Selection; Supplier; Six Sigma; DMAIC; Process Improvement; supplier selection process Improvement; Lafarge Cement Pakistan; cement industry; supplier base;

    Abstract :   Degree Project Advanced Level - Business Administration, Linnaeus Business School at Linnaeus University, Business Process and Supply Chain Management, 4FE02E, Spring 2010.   Authors: Muhammad Rizwan ul Haque, Ahmed Nawaz Shaikh, Kamonmarn Jaenglom, Zaheer Tariq Tutor: Petra Andersson   Title: Supplier Selection Process Improvement through Six-Sigma DMAIC (A case of Lafarge Pakistan Cement Limited)   Background: Cement industry is considered to be an intensive supplier base industry. READ MORE

  2. 2. Electrical and Optical Characteristics of InP Nanowires based p-i-n Photodetectors

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Rizwan Ahmed; Shahid Abbas; [2010]
    Keywords : Shahid Abbas; Rizwan Ahmad; Håken Pettersson; IR photodetectors; electrical characteristics; optical characteristics; polarization; nanophotonics; InP; photonics; nanowires.;

    Abstract : Photodetectors are a kind of semiconductor devices that convert incoming light to an electrical signal. Photodetectors are classified based on their different structure, fabrication technology, applications and different sensitivity. READ MORE

  3. 3. Secure Software Development : Identification of Security Activities and Their Integration in Software Development Lifecycle

    University essay from Blekinge Tekniska Högskola/Avdelningen för programvarusystem

    Author : Syed Rizwan Ahmed; [2007]
    Keywords : Security; Software; Software Development Lifecycle;

    Abstract : Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and extensibility. Securing software is usually considered as a post development activity and not much importance is given to it during the development of software. READ MORE