Showing 8,801 - 8,820 results of 31,041 for search '"strategy"', query time: 0.15s Refine Results
  1. 8801

    Brand contact integration in the Ethiopian beer market by Samson Mekonnen, George Angelopulo

    Published 2022-08-01
    “…Publicity and personal promotion are emphasised, product quality receives great attention, the company concentrates on a narrowly defined service interface, and a strong market-back strategy is evident in its communications. The Nordic School model of brand contact integration offers a heuristic prism for the assessment of communication integration, and we conclude that IMC principles are firmly embedded in the marketing communication practice of the Ethiopian brewer, but with characteristics that are specific to its unique market conditions. …”
    Get full text
    Article
  2. 8802

    Resource base of the building materials industry as the basis for sustainable development of the economy by O. E. Astafyeva

    Published 2024-03-01
    “…This is done to increase competitiveness and provide the strategy of building materials industry development.…”
    Get full text
    Article
  3. 8803
  4. 8804

    From Fiction to Video Games: Contemporary Needle Arts Across Genres by Amy D. WELLS

    Published 2018-12-01
    “…The presence of needle arts in contemporary fiction demonstrates how the craft becomes intertwined with the plot, working as a narrative strategy, moving beyond just its function of décor or setting. …”
    Get full text
    Article
  5. 8805

    Student youth participation in the development of a comfortable urban environment by Yu. V. Ukhanova, A. E. Zhdanova, K. E. Kosygina

    Published 2023-06-01
    “…The study was conducted in Vologda, Russian Federation, through a quantitative methodological strategy (questionnaire survey among university students, n = 207). …”
    Get full text
    Article
  6. 8806

    Abnormal Decrease of Macrophage ALKBH5 Expression Causes Abnormal Polarization and Inhibits Osteoblast Differentiation by Junquan Weng, Haidong Fan, Huijuan Liu, Su Tang, Yuyan Zheng

    Published 2023-01-01
    “…Our findings present a new mechanism for the suppression of osteoblast development in diabetic peri-implantitis and a new treatment strategy to promote anabolism by inhibiting ALKBH5.…”
    Get full text
    Article
  7. 8807

    COVID-19 Vaccination during Pregnancy in Southeast Asia by Jia Ni Kwan, Hong Chuan Loh, Irene Looi

    Published 2021-08-01
    “…Vaccination seems to be the most effective strategy to curb the pandemic and secondarily by social distancing, wearing face masks and practising hand hygiene. …”
    Get full text
    Article
  8. 8808

    Determinants of Portuguese Banks’ Profitability – An Update by Maria Clara Pires, Maria Basílio, Carlos Borralho

    Published 2021-07-01
    “…The profitability proxy used is the return on equity (ROE). The empirical strategy followed was pooled OLS. Variables relevant for explaining Portuguese banks' profitability are capital adequacy, liquidity and credit risk. …”
    Get full text
    Article
  9. 8809

    Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme by Yunchuan WANG, Xiaorong XU, Yingbiao YAO, Weiwei WU

    Published 2017-08-01
    “…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
    Get full text
    Article
  10. 8810

    Safeguarding Mobile Users from Violation by Third-party Apps by Vusumuzi Malele, Kagiso Mphasane

    Published 2025-01-01
    “…Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users’ continuous access to services. …”
    Get full text
    Article
  11. 8811

    On Key Evolution over Wireless Channels by Zhihong Liu, Yong Zeng, Pingjuan Zhang, Qiping Huang

    Published 2015-07-01
    “…To further confuse the eavesdropper, we present a strategy for legitimate parties to send artificial noise if the eavesdropper cannot distinguish the sources of messages. …”
    Get full text
    Article
  12. 8812

    UPAYA MENINGKATKAN PENGETAHUAN MATERI SURAT AL HUJURAT AYAT 13 DENGAN PENERAPAN MODEL PEMBELAJARAN DISCOVERY LEARNING PADA SISWA by Seto Wicaksono Sodiq, Ade Akhmad Saputra

    Published 2024-06-01
    “…The aim of this research is: (a) Want to know the increase in knowledge of Surah Al Hujurat Verse 13 in class IV students at SDN 41 Plus Banasin III after implementing the Discovery Learning learning model strategy. This research uses two rounds of action research. …”
    Get full text
    Article
  13. 8813

    From Animal Odd Couples to Oddkin: Probing Visual Representations of Interspecies Friendship through Critical Cuteness by Justyna Włodarczyk

    Published 2024-02-01
    “…Finally, the article suggests that the “cutification” of interspecies relations may be a strategy for diffusing the systematic violence meted out against wildlife during the colonization of the North American continent.…”
    Get full text
    Article
  14. 8814

    Near-term benefits from investment in climate adaptation complement long-term economic returns from emissions reduction by Lei Duan, Angelo Carlino, Ken Caldeira

    Published 2025-01-01
    “…Abstract Previous studies have suggested that a combined strategy using both emissions abatement and climate adaptation can improve economic outcomes. …”
    Get full text
    Article
  15. 8815

    VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms by UZhi-jun W, UIYi C, UEMeng Y

    Published 2015-01-01
    “…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
    Get full text
    Article
  16. 8816

    Drivability Improvement Control for Vehicle Start-Up Applied to an Automated Manual Transmission by Danna Jiang, Ying Huang, Zhe Zuo, Huan Li

    Published 2017-01-01
    “…The designed control strategy is verified on a complete powertrain and longitudinal vehicle dynamic model with different driver’s torque demands.…”
    Get full text
    Article
  17. 8817

    Value-difference learning based mMTC devices access algorithm in multi-cell network by Xin LI, Jun SUN

    Published 2022-06-01
    “…In the massive machine type communication scenario of 5G, the access congestion problem of massive machine type communication devices (mMTCD) in multi-cell network is very important.A double deep Q network with value-difference based exploration (VDBE-DDQN) algorithm was proposed.The algorithm focused on the solution that could reduce the collision when a number of mMTCDs accessed to eNB in multi-cell network.The state transition process of the deep reinforcement learning algorithm was modeled as Markov decision process.Furthermore, the algorithm used a double deep Q network to fit the target state-action value function, and it employed an exploration strategy based on value-difference to adapt the change of the environment, which could take advantage of both current conditions and expected future needs.Moreover, each mMTCD updated the probability of exploration according to the difference between the current value function and the next value function estimated by the network, rather than using the same standard to select the best base eNB for the mMTCD.Simulation results show that the proposed algorithm can effectively improve the access success rate of the system.…”
    Get full text
    Article
  18. 8818

    Bypassing Islamism and Feminism: Women’s Resistance and Rebellion in Post-revolutionary Iran by Fatemeh Sadeghi

    Published 2010-12-01
    “…The third presupposition is that discrimination against women in post-revolutionary Iran is essentially a legalist strategy and has resulted in campaigns that failed to address women’s daily challenges. …”
    Get full text
    Article
  19. 8819

    On a Certain Lithuanian Purpose Clause Construction by Axel Holvoet

    Published 2024-04-01
    “…It is argued that the anteriority converb was introduced as a pseudo-conditional strategy used to avoid a factive reading in constructions with evaluative predicates (as in gerai būtų suradus... = gerai būtų, jeigu surastume... …”
    Get full text
    Article
  20. 8820

    Digital inclusive finance, rural revitalization and rural consumption. by Wei Li, Lu Zhang, Mingyue Pu, Hui Wang

    Published 2025-01-01
    “…Based on the above findings, we believe that while promoting digitally inclusive finance, it is important to promote rural revitalization strategy in a timely manner, improve rural infrastructure, and continuously stimulate the impact of digitally inclusive finance on rural residents' consumption.…”
    Get full text
    Article