Showing 61 - 80 results of 90 for search 'Real Analysis Exchange', query time: 0.09s Refine Results
  1. 61

    FIRM’S CHARACTERISTICS AND EARNINGS MANAGEMENT: EVIDENCE FROM LISTED PHARMACEUTICAL COMPANIES IN NIGERIA by Muhammed BELLO, Leye Sherifdeen OYEDIRAN, Emmanuel Yinka ONIFADE

    Published 2023-12-01
    “…The study recommends that investors in listed pharmaceutical companies in Nigeria should always be on the lookout for the potential for more real activity earnings management before arriving at their investment decisions. …”
    Get full text
    Article
  2. 62

    Genre et discours métaphoriques sur la traduction by Lori Chamberlain

    Published 2020-12-01
    “…She goes further by proposing a real program for feminist translation studies that enable a dialogue with disciplines other than literature or philosophy: such as history or sociology.…”
    Get full text
    Article
  3. 63

    Presenting a model to explain unfavorable risk and favorable risk according to psychological variables in predicting market fluctuations in the Iranian capital market. by Hasan Rezaeikangi, Mahdi Mohammad Bagheri, Hojat Babaei, Ali Raeispour Rajabali

    Published 2024-09-01
    “…At the sector level, financial sectors (such as DF and RE sectors) can generate a certain spillover effect on real economy sectors across the quantile, but the net spillover effects of financial sectors are smaller than that of some real economy sectors. …”
    Get full text
    Article
  4. 64

    Protocol for a systematic review of living labs in agricultural-related systems by Maryam Yousefi, Frank Ewert

    Published 2023-10-01
    “…Researchers and practitioners working in areas such as co-design which incorporate user involvement, collaboration, and knowledge exchange, may also benefit from these findings.…”
    Get full text
    Article
  5. 65

    Actors and roles in integration of electric vehicles in energy markets and power systems: Theory, glossary, and application to virtual power plant and fleet operator by Jan F. Heinekamp, Kai Strunz

    Published 2025-03-01
    “…The shown quantitative analysis of costs and revenues substantiates the importance of actor-specific modeling for accurate benefit allocation. …”
    Get full text
    Article
  6. 66

    Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence by Youyang Qu, Lichuan Ma, Wenjie Ye, Xuemeng Zhai, Shui Yu, Yunfeng Li, David Smith

    Published 2023-12-01
    “…Extensive experiments and analysis on real-world datasets have testified the proposed model, and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness.…”
    Get full text
    Article
  7. 67

    Design and implementation of an intelligent sports management system (ISMS) using wireless sensor networks by ZhiGuo Zhu

    Published 2025-01-01
    “…In addition, the IoT layer collects real-time data from sensors and wearable devices, which is essential for performance analysis and injury prevention. …”
    Get full text
    Article
  8. 68

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…Furthermore, the current methods consistently produce false alarms and sometimes completely miss real threats. This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
    Get full text
    Article
  9. 69

    The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review by Wasif ur Rehman, Mohsin Ali Koondhar, Samandar Khan Afridi, Lutfi Albasha, Idris H. Smaili, Ezzeddine Touti, Mouloud Aoudia, Wassim Zahrouni, Ibrahim Mahariq, M.M.R. Ahmed

    Published 2025-03-01
    “…The deployment of 5G technologies in the agricultural sector promises to revolutionize smart farming practices by enabling unprecedented levels of connectivity, data exchange, and real-time monitoring. This paper presents a comprehensive review of the challenges, considerations, and future directions of integrating 5G technologies into smart agriculture, aligning with Sustainable Development Goals (SDGs) such as SDG 2 (Zero Hunger) and SDG 9 (Industry, Innovation, and Infrastructure).Key topics discussed include the necessity of dense network infrastructure, optimization strategies for cross-deployment of 5G and sensing networks, and the role of edge computing in 5G-enabled farming production. …”
    Get full text
    Article
  10. 70

    A Convenient and Sensitive LC-MS/MS Method for Simultaneous Determination of Carbadox- and Olaquindox-Related Residues in Swine Muscle and Liver Tissues by Heying Zhang, Wei Qu, Yanfei Tao, Dongmei Chen, Shuyu Xie, Lingli Huang, Zhenli Liu, Yuanhu Pan, Zonghui Yuan

    Published 2018-01-01
    “…Tissue samples were extracted with 2% metaphosphoric acid in 20% methanol and cleaned up by solid-phase extraction (SPE) on a mixed-mode anion-exchange column (Oasis MAX). Analysis was performed on a C18 column by detection with mass spectrometry in the multiple reaction monitoring (MRM) mode. …”
    Get full text
    Article
  11. 71

    Sensitivity to Initial Data Errors in Interpreting Temperature Logging of an Isolated Injection Well Segment by K. A. Potashev, D. R. Salimyanova, A. B. Mazo, A. A. Davletshin, A. V. Kosterin

    Published 2024-07-01
    “…This increased the efficiency of the method by 10 – 15 % in solving the problem under consideration.The algorithm’s stability against perturbations in the initial data on temperature and thermophysical properties was demonstrated. The sensitivity analysis revealed that a 1 % error in the temperature measurements results in a standard deviation of the solution, which is about 2 % from the true value of the well operating period. …”
    Get full text
    Article
  12. 72

    AI augmented edge and fog computing for Internet of Health Things (IoHT) by Deepika Rajagopal, Pradeep Kumar Thimma Subramanian

    Published 2025-01-01
    “…An edge/fog computing environment, paired with current computing techniques, is the answer to fulfill the energy efficiency and latency requirements for the real-time collection and analysis of health data. …”
    Get full text
    Article
  13. 73

    A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…Furthermore, the analysis of previously published state-of-the-art techniques is presented in this paper. …”
    Get full text
    Article
  14. 74

    The Mediating Role of Cash Flow Statement Indicators in the Relationship between Stock Mispricing and Corporate Cash Holding by Ali Majid Akaleh, Hamzeh Didar, Gholamreza Mansourfar

    Published 2024-09-01
    “…This study investigated how Tehran Stock Exchange (TSE) firms made cash holdings decisions when their stocks were mispriced in the market. …”
    Get full text
    Article
  15. 75

    Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO

    Published 2014-11-01
    “…With the rapid development of network technologies,real-time information exchanging between heterogeneous networks becomes more frequently.To effectively guarantee the secure and real-time information exchanging crossing different networks,a network isolation communication scheme (NICS) is proposed to resist against covert channel.A newly theoretical model of NICS is designed and proved based on the information theory,and followed with a specific solution.Security analysis indicates that the NICS is able to effectively solve problems of the potential packet lengths’ covert channel (PLCC) and the status covert channel (SCC) in most of the existing work; and,given similar amount of information for exchanging,the NICS can achieve equivalent security degree with the physical isolation in terms of resisting against the covert channel.…”
    Get full text
    Article
  16. 76

    Enseigner les humanités numériques en Tunisie : conditions, pratiques et choix by Delphine Cavallo, Aïda Chebbi

    Published 2024-06-01
    “…We conclude that the analysis of pedagogical practices in real-life situations must be part of the ethics of teaching digital humanities.…”
    Get full text
    Article
  17. 77

    A comprehensive review of digital twin in healthcare in the scope of simulative health-monitoring by Mubaris Nadeem, Sascha Kostic, Mareike Dornhöfer, Christian Weber, Madjid Fathi

    Published 2025-01-01
    “…DTs are a concept to create a digital representation of a physical entity and imitate its behavior, while feeding real-world data to the digital counterpart, thus allowing enabling digital simulations related to the real-world entity. …”
    Get full text
    Article
  18. 78

    Presenting a Prediction Model for CEO Compensation Sensitivity using Meta-heuristic Algorithms (Genetics and Particle Swarm) by Saeed Khaljastani, Habib Piri, Reza Sotoudeh

    Published 2024-09-01
    “…Data collection methods for this research include document analysis, internet research, and library study, depending on the specific requirements. …”
    Get full text
    Article
  19. 79

    Sexe on-line. Animateurs, clients et production de scénarios sexuels by Elena Stoian

    Published 2013-07-01
    “…The article then analyses part of an erotic dialogue, in order to think sexual exchanges. The relationships are read as discourses, mobilising some conventional sexual scripts, set in a temporality which extends into the virtual order the organisation of the so-called “realexchanges (excitement, plateau, orgasm, resolution). …”
    Get full text
    Article
  20. 80

    Presenting the model of antecedents affecting moral-emotional acting in education by arefeh kazemi malekmahmoudi, negin jabbari, kiomars niaz azari

    Published 2024-11-01
    “…The research data collection tool included a researcher-made questionnaire, and data analysis was done through exploratory and confirmatory factor analysis in SPSS21 and PLS software. …”
    Get full text
    Article