Found: 30
Select item for more details and to access through your institution.
EXAMINING THE RELATIONSHIP BETWEEN FINANCIAL KNOWLEDGE, RISK TOLERANCE, AND PAST BEHAVIOURAL BIAS ON INVESTORS ACTUAL INVESTMENT BEHAVIOR.
- Published in:
- International Journal of Professional Business Review (JPBReview), 2023, v. 8, n. 6, p. 1, doi. 10.26668/businessreview/2023.v8i6.2333
- By:
- Publication type:
- Article
Deposition of ZnO nanostructured film at room temperature on glass substrates by activated reactive evaporation.
- Published in:
- Applied Nanoscience, 2014, v. 4, n. 7, p. 801, doi. 10.1007/s13204-013-0258-1
- By:
- Publication type:
- Article
Growth of ZnSe nano and microstructures at high vacuum by thermal evaporation.
- Published in:
- Applied Nanoscience, 2014, v. 4, n. 4, p. 469, doi. 10.1007/s13204-013-0222-0
- By:
- Publication type:
- Article
Understanding continuance intention of subscription video-on-demand based over-the-top (OTT) platforms: A multiple moderation approach.
- Published in:
- Interdisciplinary Journal of Management Studies, 2024, v. 17, n. 3, p. 953, doi. 10.22059/IJMS.2023.358347.675802
- By:
- Publication type:
- Article
DETECTION AND REMOVAL OF BLACK HOLE ATTACK IN MOBILE AD HOC NETWORKS USING GRP PROTOCOL.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 10, n. 6, p. 1, doi. 10.26483/ijarcs.v9i6.6335
- By:
- Publication type:
- Article
Load Predicting Model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network.
- Published in:
- International Journal of Interactive Mobile Technologies, 2020, v. 14, n. 5, p. 150, doi. 10.3991/ijim.v14i05.13361
- By:
- Publication type:
- Article
Some Investigation on DDOS Attack Models in Mobile Networks.
- Published in:
- International Journal of Interactive Mobile Technologies, 2019, v. 13, n. 10, p. 71, doi. 10.3991/ijim.v13i10.11304
- By:
- Publication type:
- Article
A NEW Z-SOURCE INVERTER FOR APPLICATION IN WIND ENERGY CONVERSION SYSTEM.
- Published in:
- Turkish Journal of Physiotherapy Rehabilitation, 2021, v. 32, n. 2, p. 2640
- By:
- Publication type:
- Article
Context-Aware Spectrum Sharing and Allocation for Multiuser-Based 5G Cellular Networks.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/5309906
- By:
- Publication type:
- Article
An Efficient Mechanism for Deep Web Data Extraction Based on Tree-Structured Web Pattern Matching.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/6335201
- By:
- Publication type:
- Article
Execution of Multitarget Node Selection Scheme for Target Position Alteration Monitoring in MANET.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/2088289
- By:
- Publication type:
- Article
An Efficient Mechanism for Deep Web Data Extraction Based on Tree-Structured Web Pattern Matching.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/6335201
- By:
- Publication type:
- Article
MEASURING SIX SIGMA KEY CRITERIA FOR SUCCESS IN INSTITUTIONS OF HIGHER LEARNING: DEVELOPMENT AND TESTING VERIFICATION TOOL.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 2275, doi. 10.47750/pnr.2022.13.S07.312
- By:
- Publication type:
- Article
Effect of C2-C5 Alcohol Blends with Diesel and Camphor Oil as Additive on the Performance and Emissions in Diesel Engine.
- Published in:
- International Journal of Vehicle Structures & Systems (IJVSS), 2023, v. 15, n. 1, p. 64, doi. 10.4273/ijvss.15.1.12
- By:
- Publication type:
- Article
Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1283, doi. 10.32604/cmc.2020.011226
- By:
- Publication type:
- Article
Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets.
- Published in:
- Computers, Materials & Continua, 2019, v. 60, n. 2, p. 435, doi. 10.32604/cmc.2019.06295
- By:
- Publication type:
- Article
Shape, Color and Texture Based CBIR System Using Fuzzy Logic Classifier.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 3, p. 729, doi. 10.32604/cmc.2019.05945
- By:
- Publication type:
- Article
Hepatoprotective activity of Amorphophallus paeoniifolius tubers against paracetamol-induced liver damage in rats
- Published in:
- Asian Pacific Journal of Tropical Biomedicine, 2012, v. 2, n. s1, p. S238, doi. 10.1016/S2221-1691(12)60167-1
- By:
- Publication type:
- Article
Diuretic effect of Caesalpinia bonduc in rats.
- Published in:
- Bangladesh Journal of Pharmacology, 2011, v. 6, n. 1, p. 61, doi. 10.3329/bjp.v6i1.8487
- By:
- Publication type:
- Article
An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 46, n. 2, p. 1563, doi. 10.32604/csse.2023.035307
- By:
- Publication type:
- Article
Secure Key Management Based Mobile Authentication in Cloud.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 3, p. 887, doi. 10.32604/csse.2022.021845
- By:
- Publication type:
- Article
Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 1, p. 17, doi. 10.32604/csse.2022.021590
- By:
- Publication type:
- Article
Tyrosinase from Sepiella inermis (Van Hasselt [Ferussac & d’Orbigny], 1835) and its Phenol Removal Activity.
- Published in:
- Nature Environment & Pollution Technology, 2021, v. 20, n. 2, p. 649, doi. 10.46488/NEPT.2021.v20i02.023
- By:
- Publication type:
- Article
EXAMINING THE RELATIONSHIP BETWEEN FINANCIAL KNOWLEDGE, RISK TOLERANCE, AND PAST BEHAVIOURAL BIAS ON INVESTORS ACTUAL INVESTMENT BEHAVIOR.
- Published in:
- Environmental & Social Management Journal / Revista de Gestão Social e Ambiental, 2024, v. 18, n. 6, p. 1, doi. 10.24857/rgsa.v18n6-025
- By:
- Publication type:
- Article
The personal authentication service and security enhancement for optimal strong password.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 14, p. N.PAG, doi. 10.1002/cpe.5009
- By:
- Publication type:
- Article
An efficient CBIR system based on color histogram, edge, and texture features.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 12, p. N.PAG, doi. 10.1002/cpe.4994
- By:
- Publication type:
- Article
A simple yarn hairiness measurement setup using image processing techniques.
- Published in:
- Indian Journal of Fibre & Textile Research, 2012, v. 37, n. 4, p. 331
- By:
- Publication type:
- Article
ANALYSIS ON PERFORMANCE COMPARISON OF VIRTUAL GRID-BASE DYNAMIC ROUTE ADJUSTMENT IN WIRELESS DETECTOR NETWORKS.
- Published in:
- ICTACT Journal on Communication Technology, 2020, v. 11, n. 1, p. 2138, doi. 10.21917/ijct.2020.0315
- By:
- Publication type:
- Article
Novel DoS Attack Detection Based on Trust Mode Authentication for IoT.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 34, n. 3, p. 1505, doi. 10.32604/iasc.2022.022151
- By:
- Publication type:
- Article
COVID-19 PANDEMICS EEFECT ON INDUSTRY -- A STUDY.
- Published in:
- Ilkogretim Online, 2021, v. 20, n. 4, p. 784, doi. 10.17051/ilkonline.2021.04.83
- By:
- Publication type:
- Article