Essays about: "mao"
Showing result 1 - 5 of 60 essays containing the word mao.
-
1. Fast Prototyping of Massive MIMO User Equipment Using PYNQ
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : .... READ MORE
-
2. The Effect Of Social Media (Paid, Earned, Owned) On Consumer Green Purchase Behaviour In Chinese Market : A Quantitative Research
University essay from Linnéuniversitetet/Institutionen för marknadsföring och turismvetenskap (MTS)Abstract : Background As people become more aware of environmental protection, green purchasing has gradually become a trend among consumers. Social media, as an emerging marketing approach, has also started to gain more and more companies' attention and application. READ MORE
-
3. CLONING IN THE VIDEO GAME INDUSTRY : A literature review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Video game cloning is controversial within the industry, both because copyright laws do not protect game mechanics, and because people’s judgements about game cloning are unclear. Therefore, this study aims to examine the current literature related to game cloning and summarise the impact of cloning on the game industry, as well as the challenges faced by developers. READ MORE
-
4. Balancing environment and economy: the interplay between eco-innovation, carbon emission and firm performance
University essay from Lunds universitet/Nationalekonomiska institutionenAbstract : With an ever-increasing human ecological footprint, the United Nations Sustainable Development Goals require global collaboration in terms of sustainable business practices to combat global ecological issues. Our study examines the complex relationship between eco-innovation, CO2 emissions, and financial performance using fixed effects panel data regression. READ MORE
-
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE