Sökning: "Mao"
Visar resultat 1 - 5 av 91 uppsatser innehållade ordet Mao.
1. Fast Prototyping of Massive MIMO User Equipment Using PYNQ
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : .... LÄS MER
2. The Effect Of Social Media (Paid, Earned, Owned) On Consumer Green Purchase Behaviour In Chinese Market : A Quantitative Research
Kandidat-uppsats, Linnéuniversitetet/Institutionen för marknadsföring och turismvetenskap (MTS)Sammanfattning : Background As people become more aware of environmental protection, green purchasing has gradually become a trend among consumers. Social media, as an emerging marketing approach, has also started to gain more and more companies' attention and application. LÄS MER
3. CLONING IN THE VIDEO GAME INDUSTRY : A literature review
Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : Video game cloning is controversial within the industry, both because copyright laws do not protect game mechanics, and because people’s judgements about game cloning are unclear. Therefore, this study aims to examine the current literature related to game cloning and summarise the impact of cloning on the game industry, as well as the challenges faced by developers. LÄS MER
4. Balancing environment and economy: the interplay between eco-innovation, carbon emission and firm performance
Magister-uppsats, Lunds universitet/Nationalekonomiska institutionenSammanfattning : With an ever-increasing human ecological footprint, the United Nations Sustainable Development Goals require global collaboration in terms of sustainable business practices to combat global ecological issues. Our study examines the complex relationship between eco-innovation, CO2 emissions, and financial performance using fixed effects panel data regression. LÄS MER
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. LÄS MER