Suggested Topics within your search.
Suggested Topics within your search.
- Management 16
- Business 14
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Computer programs 7
- Business writing 6
- Commercial law 6
- English language 6
- New business enterprises 6
- Industrial management 5
- Information technology 5
- Moral and ethical aspects 5
- Business ethics 4
- Business mathematics 4
- Commercial statistics 4
- Communication in management 4
- History 4
- Law and legislation 4
- Marketing 4
- Personnel management 4
- Statistical methods 4
- Statistics 4
- methods 4
- Business English 3
- Business Management 3
- Business logistics 3
- History and criticism 3
- Leadership 3
- Mass media 3
-
1141
Business Retention and Expansion (BRE) Programs: Approaches to BRE Programs
Published 2006-10-01“…Cothran, is the second in a series of ten on establishing Business Retention and Expansion (BRE) programs. It describes two broad approaches to BRE -- traditional, or "volunteer", and continuous, or "paid staff." …”
Get full text
Article -
1142
Lobbying as means of risk minimization and big business - government interaction
Published 2009-10-01Get full text
Article -
1143
Map of the existing research on business innovation, funding, and policy framework
Published 2020-01-01Subjects: “…business innovation…”
Get full text
Article -
1144
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01Subjects: Get full text
Article -
1145
MARKET TRENDS IN THE DEVELOPMENT OF COMPANIES IN THE SPHERE OF INTELLECTUAL BUSINESS SERVICES
Published 2017-09-01Subjects: “…smart business services…”
Get full text
Article -
1146
STRATEGIES OF MANIPULATIVE RHETORIC IN THE ENGLISH-LANGUAGE BUSINESS MEDIA DISCOURSE
Published 2024-12-01Subjects: Get full text
Article -
1147
Antenna Optimization Based on Auto-Context Broad Learning System
Published 2022-01-01“…In order to further improve the performance of the model and speed up the design of microwave components to achieve more accurate prediction of hard-to-measure quality variables through easy-to-measure parameter variables, the conception of auto-context (AC) for the regression scenario is proposed in this paper, using the current BLS training results as the prior knowledge, which are taken as the context information and combined with the original inputs as new inputs for further training. …”
Get full text
Article -
1148
Síndrome del martillo hipotenar. Presentación de un caso
Published 2024-06-01“…El objetivo de este artículo es brindar una breve reseña de esta enfermedad y presentar el caso de un paciente de 45 años, con parestesias y signos de hipoperfusión de los dedos 4.° y 5.° luego de múltiples traumatismos en la eminencia hipotenar. …”
Get full text
Article -
1149
PRELIMINARY DISCUSSIONS ON ISSUES RELATED TO A EUROPEAN BUSINESS CODE
Published 2024-05-01Subjects: “…european business code…”
Get full text
Article -
1150
THE RESEARCH OF BUSHING STRENGTHENING PROCESS ON SHORT EDGE-MARGIN HOLE
Published 2016-01-01Subjects: Get full text
Article -
1151
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
1152
-
1153
Neumomediastino espontáneo y dermatomiositis. Presentación de un caso
Published 2021-08-01Subjects: Get full text
Article -
1154
Manufacturer’s Business Strategy: Interaction of Sharing Economy and Product Rollover
Published 2020-01-01“…This paper develops an analytical framework to study a manufacturer’s optimal business strategy involving the interaction of product sharing and product rollover in the sharing economy. …”
Get full text
Article -
1155
Resilient business strategies in the German hospitality industry and its viability
Published 2024-07-01Subjects: Get full text
Article -
1156
CIDADANIAS CIENTÍFICAS: auto-representações dos públicos de xenotransplante
Published 2014-04-01Get full text
Article -
1157
Documentário e Conspiração: o caso The Epoch Times Brasil
Published 2023-11-01Get full text
Article -
1158
Asymmetry of prosperity and business activity levels according to the regions of Georgia
Published 2025-01-01“…The per capita volume of direct foreign investment in Georgia's regions is ten times lower than in the capital, while business sector output is 3.4 times lower.…”
Get full text
Article -
1159
DISCLOSURE OF BUSINESS VALUE INFORMATION IN THE FINANCIAL STATEMENTS (REPORTING OF THE COMPANY)
Published 2017-04-01Subjects: “…business value…”
Get full text
Article -
1160
MODELING THE DISTRIBUTION AND USE OF PROFITS IN VARIOUS BUSINESS DEVELOPMENT STRATEGIES
Published 2019-10-01Subjects: “…profit distribution and use…”
Get full text
Article