-
1301
Online sales funnel as an analytical tool for business efficiency management
Published 2019-09-01“…The peculiarities of settings of problems on monitoring the process of attracting customers to the electronic resource of a company, and their support up to conclusion of commercial transaction (product sale) have been revealed. A scenarios matrix for promoting information about a product, a brand, or a service using various communication channels has been compiled.Among various strategies of a sales funnel management the following three main strategies have been highlighted: the strategy of a proportional expansion (when increasing a traffic at the entrance of a funnel, which gives a large conversion, the funnel expands at all next stages, and the output result is increased); the strategy of stretching (increasing of a conversion at each level results in the output increasing), and the strategy of a key level (this strategy demands to determine the level of the funnel, which limits the entire system, and to apply efforts to improve conversion indicators at this special level). …”
Get full text
Article -
1302
A Scrutiny onThe Factors Affecting the Participation of Women Doing Sports and Not Doing sports in Sportive Events
Published 2019-04-01“…The data obtained were transferred to the computer environment for statistical transaction. As the statistical process, the Chi-Square test processes were conducted for identifying the frequency, %, Crosstab, and differences. …”
Get full text
Article -
1303
Self-actualization of families with a cerebrovascular disease patient by nurses, and of self-actualization of nurses themselves: an integrative review based on family care/caring t...
Published 2025-01-01“…We conducted an integrative review of 11 articles describing transactions between nurses and families according to Toronto and Remington. …”
Get full text
Article -
1304
Integration of Universities and Employers – Potential in Building Social Capital
Published 2024-08-01“…These practices contribute to the establishment of trust between the participants of educational relations; form communications that become resources for obtaining benefits for the parties involved in cooperation; help students to master the corporate norms and rules of employers; reduce the level of transaction costs in employment, etc. It has been established that the main forms of integration of universities and their partners are realized mainly to achieve a high level of postgraduate employment of graduates, which in practice are associated with the reproduction of social capital of both open and closed type. …”
Get full text
Article -
1305
A Plague of Their Own: Injury Incidence Remains Elevated in the 2021 Major League Baseball Season Compared to Pre-COVID-19 Seasons
Published 2022-10-01“… # Study Design Descriptive epidemiology study # Methods The MLB transactions database was searched for players placed on the IL between 2018 and 2021. …”
Get full text
Article -
1306
Strategy of Russian Military Cooperation with the Countries of the Arab Region
Published 2024-04-01“…These include initiatives such as expanding licensing, leasing, offset transactions, and technology transfer initiatives; advocating for fifth-generation fighter aircraft and long-range radar detection and control systems, leveraging Industry 4.0 technologies; and prioritizing the training of foreign specialists.…”
Get full text
Article -
1307
Innovations and barriers in sustainable and green finance for advancing sustainable development goals
Published 2025-01-01“…The identified barriers include high transaction costs and insufficient institutional frameworks in developing countries, hindering the broader adoption of green finance tools. …”
Get full text
Article -
1308
New Architecture of Foreign Direct Investment Regulation in the European Union
Published 2024-11-01“…The adoption of supranational mechanisms for EU FDI screening through Regulation 2019/452 not only highlights the expansion of multi-level governance, as promoted by the European Commission, but also reconfigures the EU's role as a global actor in investment transactions. This shift directly impacts a wide range of stakeholders.The study aims to explore the institutional architecture established by Regulation 2019/452 and address the research question: Why has the EU transitioned from a neoliberal approach favoring free capital movement (negative integration) to a framework emphasizing common European monitoring rules (positive integration)? …”
Get full text
Article -
1309
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
1310
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Initially, the reputation score is computed for every registered node using the confidence threshold value and transaction to verify the trustworthiness of the IoMT nodes. …”
Get full text
Article -
1311
Genebanks and market participation: evidence from groundnut farmers in Malawi
Published 2022-03-01“…The adoption of these improved varieties led to increased production surplus and reduced transaction costs, allowing farmers to better participate in local groundnut markets. …”
Get full text
Article -
1312
Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain
Published 2022-02-01“…The results of the reliability testing of the system indicate that the system successfully processed 200 transactions in approximately 8 seconds. For scalability testing, it is estimated that 10 million blocks require a storage capacity of 22.6 GB to become a node or miner on this blockchain network. …”
Get full text
Article -
1313
Assessing the Role of Electronic Banking on Performance of Micro Financial Institutions: A Case Study of Pride Micro Finance Limited Kabale District.
Published 2023“…The study found that The study findings on the importance of electronic banking methods in microfinance institutions. the results were obtained from; a digital signature for security. convenience way of operating banking transactions, faster transfer, reliability, and time factor. the study went ahead to find the types of electronic banking methods adopted in microfinance towards their performance and the responses were obtained from mobile/SMS banking. electronic funds transfers. self Service (PC) banking, POS Banking (Credit and Debit cards), internet banking, and an automated teller machine the study findings on the relationship between electronic banking on the performance of microfinance institutions, the results revealed that there is a very high positive significant relationship between electronic banking on the performance of microfinance institutions that is 0.853 significant at 0.0I level of a two-tailed test with 50 degrees of freedom. …”
Get full text
Thesis -
1314
Cash Management and Performance Small Scale Business in Mbarara City: A Case Study of Central Market.
Published 2024“…The study concluded that small-scale businesses do not keep proper books of accounts, they use simple exercise books to record their transactions which in turn they do not mind keeping appropriately as most of the businesses are sole proprietorships and can by family members not answer to anybody. …”
Get full text
Thesis -
1315
Internal Control Systems and Financial Management in Uganda: A Case of Rukungiri District Local Government.
Published 2024“…The study results revealed that not all financial transactions had been recorded in a timely, accurate, and clear nature for every financial year which is a requirement for all public entities by the laws in Uganda. …”
Get full text
Thesis -
1316
Community Participation and Performance of Uganda Revenue Authority in Kabale District, Uganda.
Published 2020“…This was attributed to close collaboration between communities that are supposed to pay taxes such as cargo companies, clearing agents, transport companies and local traders whose commercial transactions are engaged across gazetted border posts of Katuna and Kamwezi. …”
Get full text
Thesis -
1317
GEOINFORMATION TECHNOLOGIES IN THE TRAINING OF FUTURE MINING ENGINEERS
Published 2023-09-01“…The constant growth of information has led to the emergence of many opportunities for digital transactions in various professions, one of which is the mining engineer. …”
Get full text
Article -
1318
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025-01-01“…The proposed work demonstrates that IIoTs may benefit from blockchain frameworks because blockchains reuse existing security mechanisms, enable transaction validation without central trust, and implement appropriate authorization. …”
Get full text
Article -
1319
Intelligent model for forecasting fluctuations in the gold price
Published 2024-09-01“…Understanding the gold price and making correct forecasts can help inform decisions about buying and selling gold in global markets, and determine the most favorable times for transactions and investments. Therefore, it is crucial to accurately predict the gold price from various perspectives. …”
Get full text
Article -
1320
Repetitive Mild but Not Single Moderate Brain Trauma Is Associated with TAR DNA-Binding Protein 43 Mislocalization and Glial Activation in the Mouse Spinal Cord
Published 2025-01-01“…Later in life, these changes can be manifested as neurodegenerative sequalae that commonly involve proteinopathies, such as transactive DNA-binding protein 43 (TDP-43). The progression of pathophysiological changes to the spinal cord motor neurons has been detected after repetitive TBI, while such changes have been less investigated after single TBI. …”
Get full text
Article