Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
24741
The Relationship Between Satisfaction with Complaint Handling and Repurchase Intentions: Detecting Moderating Influences in E-Tail
Published 2017-01-01“…Hence, this study makes theoretical and managerial contributions related to failures in shopping experiences and repurchase intentions in e-tail.…”
Get full text
Article -
24742
Ridge and Transverse Correlation without Long-Range Longitudinal Correlation
Published 2013-01-01Get full text
Article -
24743
The Future Ground of Organizations on the Awareness and Diversity of Knowledge: Innovation
Published 2013-11-01“…The methodology of this study is basically descriptive and theoretical. In this study, the main findings of the literature regarding these two subjects (knowledge management – innovation) are evaluated and a conceptual framework for further research is offered. …”
Get full text
Article -
24744
Control of Material Procurement Cost of Enterprises under the Background of the Low-Carbon Economy
Published 2022-01-01“…Purchasing cost control management is generally regarded as an applied management discipline with important theoretical, operational, time, and management roles. …”
Get full text
Article -
24745
Research on Design of Extending Orthogonal Space-Time Block Code
Published 2013-06-01“…Then its performance was theoretically analyzed and compared. The simulation results show that the bit error rate of the system is reduced and the signal-to-noise ratio gain of the system is improved by the two kinds of improved scheme, and compared with the scheme which is combined with antenna selection technology, the performance of the second scheme combined with adaptive power allocation is superior.…”
Get full text
Article -
24746
EXPLORING CHRISTIAN LEADERSHIP IN PARACHURCH ORGANISATIONS IN LESOTHO
Published 2020-12-01“…A qualitative methodology was used that involved interviews with ten chief executive officers and ten focus-group interviews from ten parachurch institutions based in the Maseru district, Lesotho. The theoretical framework and empirical analysis propose a leadership strategy that pays attention to servant leadership and team leadership that peruse an open and inclusive communication strategy. …”
Get full text
Article -
24747
Association rules recommendation algorithm supporting recommendation nonempty
Published 2017-10-01“…Existing association rule recommendation technologies were focus on extraction efficiency of association rule in data mining.However,it lacked consideration of recommendation balance between popular and unusual data and efficient processing.In order to improve the quality and efficiency of personalized recommendation and balance the recommendation weight of cold and hot data,the problem of mining frequent itemset based on association rule was revaluated and analyzed,a new evaluation metric called recommendation RecNon and a notion of k-pre association rule were defined,and the pruning strategy based on k-pre frequent itemset was designed.Moreover,an association rule mining algorithm based on the idea was proposed,which optimized the Apriori algorithm and was suitable for different evaluation criteria,reduced the time complexity of mining frequent itemset.The theoretic analysis and experiment results on the algorithm show that the method improved the efficiency of data mining and has higher RecNon,F-measure and precision of recommendation,and efficiently balance the recommendation weight of cold data and popular one.…”
Get full text
Article -
24748
Modal Analysis and Test Research of Double Meshing Needle Teeth Cam Indexing Mechanism
Published 2019-04-01“…Through the modal analysis of double meshing needle teeth cam indexing mechanism, the experimental support and theoretical basis for vibration the characteristics analysis and the structural optimization design are provided.…”
Get full text
Article -
24749
Multi-channel recovery data flow parallel transmission and control method
Published 2009-01-01“…In order to shorten the time for disaster recovery, a multi-channel recovery data flow parallel transmission and control(MRPTC)method was presented.First, the connections between the server to be recovered and the several standby servers were established, the difference comparison between the current damaged data and the original intact data(the backup data) was completed, the differences were obtained.Then the different parts of the differences were dynamically downloaded from the standby servers in the parallel mode, these parts were united locally, the whole data was finally obtained, and the fast disaster recovery of the data was achieved.The theoretical analysis and the experiment results show that the proposed method has the features of multi-point collaborative difference recovery, high recovery speed, full bandwidth utilization, and low network requirement.Therefore, this method is a new good approach of fast disaster recovery.…”
Get full text
Article -
24750
Os movimentos sociais na crise financeira global: questões e polêmicas
Published 2013-01-01“…The purpose of this article is to perform a theoretical analysis, based on contemporary social science authors, of the social movements that emerged after the financial crisis of 2008, placing them in the context of contemporary capitalism. …”
Get full text
Article -
24751
L’intervention féministe sous l’influence de l’intersectionnalité : enjeux organisationnels et communicationnels au sein des organismes féministes au Québec
Published 2020-12-01“…More recently, the popularity of intersectionality, as a framework for theoretical, political and practical analysis, has led francophone feminist practitioners to take a critical look at their approaches and postures, in particular by considering the interweaving of sexism with other forms of oppression such as racism. …”
Get full text
Article -
24752
Privacy-preserving convolutional neural network inference scheme based on homomorphic ciphertext transformation
Published 2024-10-01“…Using the ciphertext conversion technology provided by the Pegasus framework, the conversion between different forms of homomorphic ciphertext is realized. Theoretical analysis and experimental results show that the proposed scheme can ensure data security, and has higher inference accuracy and lower calculation and communication overhead.…”
Get full text
Article -
24753
La catégorisation, entre cognition et interaction
Published 2018-06-01“…The purpose of this conclusion is to return to some of the theoretical presuppositions conveyed by the texts presented in the context of this volume, and to initiate a dialogue with an alternative perspective, that of interaction analysis. …”
Get full text
Article -
24754
Good Practices in Empirical Corporate Finance and Accounting Research
Published 2018-08-01“…All considerations are rooted in financial microeconometrics, the field for examining both practical and theoretical questions of applying econometric techniques in corporate finance and accounting research based on the use of microdata (Gruszczyński 2018a).Two major parts of the paper include: (1) discussion of the typical drawbacks in applying regression-type models, like causality vs. correlation, selection of explanatory variables and endogeneity, and (2) list of good practices in microeconometric applications to corporate finance and accounting research, based on Faff (2017), Kennedy (2002), Adams (2017), Hyndman (robjhyndman.com/) and author’s own experience.Catalogue of good practices in microeconometric applications to corporate finance and accounting may serve as the checklist for students and researchers.…”
Get full text
Article -
24755
OFDM transmission scheme with subcarrier supply index modulation
Published 2023-02-01“…To address the drawback that subcarrier activation pattern (SAP) of the orthogonal frequency division multiplexing with index modulation (OFDM-IM) cannot match the binary numbers which affects the system performance, the orthogonal frequency division multiplexing with subcarrier supply index modulation (OFDM-SSIM) transmission scheme was proposed.The index utilization of the system was improved and the spectral efficiency (SE) of the system was enhanced by adding the supply index.Also, as the subcarrier activation pattern of the proposed scheme match the binary numbers, low complexity log-likelihood ratio (LLR) detection was made easy to adopt and bit error rate (BER) performance was maintained good.Theoretical analysis and simulation results show that the proposed scheme effectively improves the SE and BER performance over classical OFDM-IM scheme in additive white Gaussian noise (AWGN) channels and Rayleigh fading channels.…”
Get full text
Article -
24756
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01“…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
Get full text
Article -
24757
Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks
Published 2012-12-01“…We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
Get full text
Article -
24758
Debates and Discourses on Ornament in Contemporary Architecture
Published 2022-05-01“…This paper neither intends to construct a theoretical framework of the history of ornament nor focuses on its thresholds. …”
Get full text
Article -
24759
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01“…Then, the safety of the proposed method was analyzed in detail from a probabilistic perspective, providing a theoretical basis for optimizing various parameters. …”
Get full text
Article -
24760
Current problems of the patent tax system
Published 2021-06-01“…The paper performed the theoretical calculation of the potential annual income for certain types of economic activity in the conditions of the updated patent taxation system for the city of Moscow and certain regions: the Republic of Tatarstan, the Chuvash Republic and the Republic of Mari El. …”
Get full text
Article