Showing 1,161 - 1,180 results of 1,369 for search '"Transactionalism"', query time: 0.05s Refine Results
  1. 1161

    Low-carbon optimization planning method for integrated energy system based on DG uncertainty affine model by JIANG Tao, XU Cong, JIA Shaohui, WANG Shen, ZHANG Yajian

    Published 2024-08-01
    “…Aiming at the problem that the output of distributed generators (DG) of new energy sources such as wind power and photovoltaic is uncertain due to changes in environmental factors, and the transaction price of the existing carbon trading model is fixed, resulting in increased carbon reduction costs, an integrated energy system optimization planning method that takes into account dynamic carbon emission constraints and DG uncertainty was proposed. …”
    Get full text
    Article
  2. 1162

    The Impact of Economic Growth and Foreign Investment on the Advancement of E-commerce by Du Wenyang, Yihong Zhang, Bolot Dzhamankulov

    Published 2024-11-01
    “…It is recommended to prioritize policies that attract foreign investment, particularly in ICT, financial services, and trade sectors to stimulate e-commerce growth; develop targeted strategies to improve digital infrastructure and increase internet accessibility nationwide; implement regulations that facilitate secure online transactions and protect consumer rights in e-commerce; invest in digital literacy programs to increase e-commerce adoption among the population; create incentives for businesses to develop online platforms and integrate e-commerce into their operations; foster partnerships between foreign investors and local businesses to transfer knowledge and technology in e-commerce. …”
    Get full text
    Article
  3. 1163

    Jurisprudential Analysis of the Nature of Money Creation with an Emphasis on Mudaraba on Debt in the Banking System by Sadegh Elham, Mohammad Mahdi Shariatinejad, Muhammad Rasul Fakhreh

    Published 2024-10-01
    “…Finally, after the investigations, this research confirms the validity of such a transaction with the money created by the banking system, emphasizing the famous ruling on the inadmissibility of mudarabah on debt.…”
    Get full text
    Article
  4. 1164

    A Fast and Efficient Markov Chain Monte Carlo Method for Market Microstructure Model by Sun Yapeng, Peng Hui, Xie Wenbiao

    Published 2021-01-01
    “…Through this method, one can use the estimated market liquidity and surplus demand which is much smoother than the strong stochastic return process to assist the transaction decision making in the financial market.…”
    Get full text
    Article
  5. 1165

    The Impact of Land Development Rights Transfer on Urban–Rural Spatial Justice: A Case Study of Chongqing’s Land Quota Trading by Siyi Wei, Jing Huang, Zhanlu Zhang

    Published 2025-01-01
    “…The results show that LDR transfer promotes urban–rural spatial resources equity in the short term, particularly through the marketization of land transactions. Over the long term, it significantly enhances urban–rural spatial economic and social equity, evidenced by the narrowing of the income gap, the growth of the primary industry, and improved connectivity between urban and rural areas. …”
    Get full text
    Article
  6. 1166

    Global support at the click of a button: How digital remittances help Ukraine during crises by Yevheniia Polishchuk, Yana Valko, Olena Shuplat, Yurii Vasylyshen

    Published 2025-01-01
    “…Poland is the main supplier of money in Ukraine. The average transaction value has also decreased from USD 3,540 thousand in 2017 to USD 1,750 thousand by 2024, which is due to the increase in the number of platforms that allow small transfers. …”
    Get full text
    Article
  7. 1167

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  8. 1168

    Exploring drivers and prevention strategies for sexual violence among adolescent girls and young women in Kicukiro, Rwanda by Wongani Patricia Kawonga, Sam M. Livingstone, Augustine Ndaimani, Jean Pierre Sibomana, Tsion Yohannes Waka, Maxwell Mhlanga, Andrew Mclellan

    Published 2025-01-01
    “…Key drivers of sexual violence included substance use, transactional sexual relationships, inadequate family protection, entrenched gender stereotypes, and limited legal literacy.ConclusionFindings underscore the need for multifaceted interventions that address systemic and cultural barriers, strengthen legal frameworks, and expand community-based programs. …”
    Get full text
    Article
  9. 1169

    ANALYSIS OF THE IMPACT OF THE COVID19 PANDEMIC ON ONLINE FOOD SHOPPING by Margit CSIPKÉS, Dorina FODOR

    Published 2024-12-01
    “…The obtained results can highlight the importance of sustainability and trust in digital transactions, as well as the evolution of modern consumer behavior and shopping preferences.…”
    Get full text
    Article
  10. 1170

    Digital Safety for Women and Children: Legal and Policy Challenges Indonesia, Philippines, and Thailand by Dwi Nur Fauziah Ahmad, Nucharee Nuchkoom Smith

    Published 2024-12-01
    “…Key regulations such as the Electronic Information and Transactions (ITE) Law in Indonesia, the Cybercrime Prevention Act in the Philippines, and the Computer Crime Act in Thailand were analyzed alongside institutional reports and academic studies. …”
    Get full text
    Article
  11. 1171

    Effectiveness of Criminal Offense Law Regarding Illegal Levies: Reforming Social Organizations within the Indonesian Legal Framework by Muhammad Ishar Helmi, Pujiyono Pujiyono, Khamami Zada, Mara Sutan Rambe, Mualimin Mochammad Sahid

    Published 2024-12-01
    “…This ineffectiveness stems from inadequate supervision of youth organization activities, insufficient transparency in financial transactions, and weak enforcement measures against organizations engaging in extortion. …”
    Get full text
    Article
  12. 1172

    Typology of risks of territories of advanced development by M. A. Arzumanyan, O. I. Larina, N. V. Moryzhenkova

    Published 2018-06-01
    “…It should be noted that to date there is no single system of documents for the development of regional infrastructure, which causes a lot of uncertainties in the course of making a decision on this transaction.…”
    Get full text
    Article
  13. 1173

    Application of Internet of Things Based on Big Data Ecosystem in Factory Energy Consumption Analysis Model by Ang Li, Chen Zhang, Lei Li

    Published 2022-01-01
    “…The Internet of Things technology of big data ecosystem can be summarized as a technology that uses information sensing devices to complete the transaction and network connection according to the protocol content. …”
    Get full text
    Article
  14. 1174

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
    Get full text
    Article
  15. 1175

    Reflections on the possible application of Rome I Regulation to obligations related to crypto-assets by Michał Mariański

    Published 2024-12-01
    “…This study does not aim to analyse the basic rules of crypto-asset trading or make an assessment of their legal status but rather seeks to determine how the law applicable to obligations related to crypto-assets could be determined. Linking a given transaction to more than one legal area is one of the essential features of modern global financial markets. …”
    Get full text
    Article
  16. 1176

    Post-humanist food pedagogy in Margaret Atwood’s speculative fiction: The MaddAddam Trilogy by T. P. Anupama, Diana L. Anderleen

    Published 2024-12-01
    “…Drawing upon the concept of “post food,” which emerges from the industrial food chain’s influence on consumption patterns, the study examines how technological advancements and industrialization that reshape human interactions with food are transacted in learning. In MaddAddam , Atwood presents a post-apocalyptic narrative that highlights the intricate interplay between food, technology, and humanity’s future. …”
    Get full text
    Article
  17. 1177

    Process Improvement for Error Records in a Financial Institution with the Analysis of Simulation on Using Value Stream Mapping by İbrahim Yel, Orhan Engin

    Published 2022-06-01
    “…In financial institutions, customer satisfaction is closely related to the continuity of operational processes in financial transactions. First, the authors draw the current value stream map base on the approval and solution process adventure of these error records were handled in the processing logic, analyzed and a value stream map was drawn for the current situation. …”
    Get full text
    Article
  18. 1178

    The Role of the Federal Supreme Court in Ensuring the Supremacy of Moral Custom and Islamic Law in Iraq by Adnan Ali Majid Aljber, Mohammad Javaheri Tehrani, Seyyed Mojtaba Vaezi, Nader Mardani

    Published 2025-01-01
    “…Conclusion: The results of the research obtained by examining some of the judgments of the Federal Supreme Court in Iraq regarding municipal income from alcohol transactions and the issue of polygamy show that the Federal Supreme Court in Iraq plays an important role in guaranteeing the superiority of moral custom and Islamic Sharia through the annulment of objections against the constitution, because this lawsuit leads to the annulment of the text of the law whose constitution is challenged, and all the authorities accept In case the court issues a verdict that the law is illegal based on moral custom and Sharia law, it is obligatory to not implement this law contrary to the constitution and to take necessary measures to replace or amend it.…”
    Get full text
    Article
  19. 1179

    Advanced Fraud Detection: Leveraging K-SMOTEENN and Stacking Ensemble to Tackle Data Imbalance and Extract Insights by Nurafni Damanik, Chuan-Ming Liu

    Published 2025-01-01
    “…Overall, the proposed approach marks a notable step in protecting financial transactions from fraud.…”
    Get full text
    Article
  20. 1180

    Diverse single-stranded nucleic acid binding proteins enable both stable protection and rapid exchange required for biological function by Michael Morse, Ben A. Cashen, Ioulia Rouzina, Mark C. Williams

    Published 2025-01-01
    “…Single-stranded nucleic acid (ssNA) binding proteins must both stably protect ssNA transiently exposed during replication and other NA transactions, and also rapidly reorganize and dissociate to allow further NA processing. …”
    Get full text
    Article