Search alternatives:
“host » “cost (Expand Search)
Showing 32,701 - 32,720 results of 33,170 for search '(((( “post OR “gmost) OR “most) in the shell” ) OR ( “host in the shell” ))', query time: 0.25s Refine Results
  1. 32701
  2. 32702
  3. 32703
  4. 32704

    When AI meets influencers: Role of AI-powered instagram influencers driving consumers’ purchase intentions: An integration of SMIV & SOR framework by Rohit Dhiman, Narender Singh Bhati

    Published 2025-09-01
    “…The findings highlighted that both Interaction and Trustworthiness were the most significant factors impacting Brand Awareness and Trust in Branded Posts, which in turn affect Purchase Intention (PI). …”
    Get full text
    Article
  5. 32705
  6. 32706
  7. 32707
  8. 32708
  9. 32709
  10. 32710
  11. 32711
  12. 32712
  13. 32713

    Discussions on education in Serbia during the COVID-19 lockdown: A twitter-based analysis by Jovanović Olja, Gagić Dragana, Radaković Tatjana, Barišić Milica, Vulić Šimšić Ivana

    Published 2025-01-01
    “…The results of the research show a decreasing trend in the frequency of posts related to education, starting from 1,402 in the first week to 92 tweets in the fifth week. …”
    Get full text
    Article
  14. 32714

    Digital readiness and business performance of Rwandan women entrepreneurs in cross-border trade under the African Continental Free Trade Area (AfCFTA) by Josephine Mutesi, Samuel Mutarindwa, Alice Mukasekuru, Gilbert Shyaka

    Published 2025-12-01
    “…Therefore, future studies would use longitudinal study with large samples from all border posts and also should examine the gendered nature of digital readiness and entrepreneurial performance in Rwanda.…”
    Get full text
    Article
  15. 32715

    A text mining study of competencies in modern supply chain management with skillset mapping by Parminder Singh Kang, Rickard Enstroem, Bhawna Bhawna, Owen Bennett

    Published 2025-06-01
    “…The findings reveal that job postings primarily emphasize traditional operational skills such as logistics, inventory control, and customer relationship management. …”
    Get full text
    Article
  16. 32716

    Evaluation of deepseek, gemini, ChatGPT-4o, and perplexity in responding to salivary gland cancer by Ahmed Bashah, Abdulkhaleq Salem, Ali Al-waqeerah, Eslam Ghaleb, Natheer Wahan, Ahmed Awad, Omran Al-tos, Gang Chen

    Published 2025-08-01
    “…Methods Thirty clinical questions related to salivary gland malignancies were created according to the ASCO 2021 guidelines. Two researchers posted on four AI chatbot platforms: ChatGPT-4o, DeepSeek, Gemini, and Peperlixity. …”
    Get full text
    Article
  17. 32717

    Bridging the Digital Frontier: The Integration of Social Media Strategy and Promotion in India's Top 10 Institutes of Technology by Arumugam Pitchai, Kuna Sriram, R Rega

    Published 2025-04-01
    “…The study thoroughly examines metrics including subscribers, likes, posts, views, followers, and engagement rates, revealing the profound impact of social media on higher education institutions. …”
    Get full text
    Article
  18. 32718

    Classifying the Clarity of Questions in CQA Networks: A Topic based Approach by Alireza Khabbazan, Ahmad Ali Abin

    Published 2023-03-01
    “…To get the proper answer, it is necessary to address all the required details in the question. The questions posted in these networks can be divided into clear and unclear. …”
    Get full text
    Article
  19. 32719

    Pre Hoc and Co Hoc Explainability: Frameworks for Integrating Interpretability into Machine Learning Training for Enhanced Transparency and Performance by Cagla Acun, Olfa Nasraoui

    Published 2025-07-01
    “…Post hoc explanations for black-box machine learning models have been criticized for potentially inaccurate surrogate models and computational burden at prediction time. …”
    Get full text
    Article
  20. 32720

    Understanding Social Engineering Victimisation on Social Networking Sites: A Comprehensive Review of Factors Influencing User Susceptibility to Cyber-Attacks by Saad S. Alshammari, Ben Soh, Alice Li

    Published 2025-02-01
    “…Common examples of social-engineering attacks include phishing websites, fake user accounts, fraudulent messages, impersonation of close friends, and malicious links shared through comments or posts on SNS platforms. The increasing number of SNS users is closely linked to a rise in SEV incidents. …”
    Get full text
    Article