Results 1 to 10 of about 2,747,349 (267)

Consumer preferences towards imported food products in the Republic of Srpska [PDF]

open access: yesMarketing (Beograd. 1991), 2023
The research of preferences towards imported products, primarily food products, is very current in marketing research and studies today. In various studies, evaluations of specific attributes of imported food products were taken as factors that determine
Kurušić Drago   +2 more
doaj   +1 more source

The influence of signal attributes on the willingness to pay for pasture-raised beef [PDF]

open access: yesRAUSP Management Journal, 2020
Purpose – This study aims to identify the marginal impact of introducing a signal attribute of pasture-raised beef on consumer willingness to pay (WTP) for other independent attributes.
Juliana Chini   +3 more
doaj   +1 more source

Digital Twin Production in the Architecture, Engineering, Construction and Operation Industry: Organizational Attributes and Strategies [PDF]

open access: yesJournal of Engineering, Project, and Production Management, 2023
Digital twin technology has grown over the years. However, a digital twin cannot be produced effectively without adequate organizational attributes. Inaccurate digital twins cannot be used for the operation and maintenance phase.
Yuveelai Bunjaridh   +2 more
doaj   +1 more source

Perceived attributes and adoption of Indigenous Technological Knowledge on agriculture - a case study from Bhirkot municipality of Syangja District, Nepal

open access: yesCogent Food & Agriculture, 2021
The authors conducted a study during August-September, 2020. This study to investigate the perceived attributes and adoption level of Indigenous Technological Knowledge in agriculture.
Sushil Khatri   +2 more
doaj   +1 more source

Designing to Attract in an Emerging Market: Applying Behavioural Reasoning Theory to South African Consumer Reactions to an Ultra-High Temperature Milk Product Line Extension

open access: yesJournal of Marketing and Consumer Behaviour in Emerging Markets, 2022
In the ultra-high temperature (UHT) milk category, parent brands introduce line extensions as innovative product designs to address the competitiveness in the market.
Elizabeth Kempen, Lorna Christie
doaj   +1 more source

Modification of TOPSIS method for solving of multicriteria tasks [PDF]

open access: yesYugoslav Journal of Operations Research, 2010
This paper describes the possible modifications of one of the multi-criteria analysis methods that possess certain advantages in cases of solving the real business problems.
Marković Zoran
doaj   +1 more source

Cyber Attacker Profiling for Risk Analysis Based on Machine Learning

open access: yesSensors, 2023
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack forecasting, security incident investigations and security decision support.
Igor Kotenko   +3 more
doaj   +1 more source

Zero-Shot Image Classification Method Based on Attention Mechanism and Semantic Information Fusion

open access: yesSensors, 2023
The zero-shot image classification (ZSIC) is designed to solve the classification problem when the sample is very small, or the category is missing. A common method is to use attribute or word vectors as a priori category features (auxiliary information)
Yaru Wang   +4 more
doaj   +1 more source

Introduction to plithogenic sociogram with preference representations by plithogenic number [PDF]

open access: yesJournal of Fuzzy Extension and Applications, 2022
The theory of Plithogeny is gaining momentum in recent times as it generalizes the concepts of fuzzy, intuitionistic, neutrosophy and other extended representations of fuzzy sets.
Nivetha Martin   +2 more
doaj   +1 more source

Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects

open access: yesInformation, 2020
Early detection of the security incidents and correct forecasting of the attack development is the basis for the efficient and timely response to cyber threats. The development of the attack depends on future steps available to the attackers, their goals,
Elena Doynikova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy