نتایج جستجو برای: 2005 using johansen
تعداد نتایج: 3486009 فیلتر نتایج به سال:
In this study, sustainability of budget deficits in Turkey is examined empirically for the pe- riod from January 2006 to September 2020, using time series techniques based on monthly data, under intertemporal constraint approach. analysis phase, Johansen cointegration method was used long-term relationship series. Analysis results indicated that income and expenditure are not cointegrated. It c...
The present study investigates the cointegration relationships among crude oil price, domestic gold price and selected financial variables (exchange rates and stock price indices) in India. Increasing crude oil prices will increase the production costs which will affect cash flow and will decrease stock prices. Investors are showing fewer concerns in the stock markets and investing in yellow me...
DNA in eukaryotes is wrapped around a histone octamer containing H2A, H2B, H3, and H4, forming a nucleosome, which is the fundamental unit of chromatin. Posttranslational modifications of these histones play critical roles in genome function, including the regulation of transcription and maintenance of genome integrity (Jenuwein and Allis, 2001; Kouzarides, 2007). However, little is known about...
Laboratory studies were conducted to determine the effect of temperature and cold storage on the performance of Tetrastichus brontispae (Ferriere) (Hymenoptera: Eulophidae), one of the major endoparasitoids against coconut hispine beetle, Brontispa longissima (Gestro) (Coleptera: Chrysomelidae). The results revealed that T. brontispae could successfully parasitize host pupae under all seven tes...
The incorrect generic name Perisphaeria Burmeister, 1838 results from a mistake by Princis (1947). Perisphaeria is an incorrect spelling by Burmeister referring to Perisphaerus Serville, 1831. Princis (1947) incorrectly regarded Perisphaeria as proposed by Burmeister and as the senior synonym of Hyposphaeria Lucas, 1863, which is valid. The subfamilial name Perisphaeriinae based on Perisphaeria...
IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit...
Compliance with law, industry standards, and corporate governance regulations are one of the driving factors for discovering security requirements. This paper aims to incorporate constraints from regulations through security requirements at an early stage of development. Constraints are extracted using a pattern based approach from legal texts of information security laws and policies derived f...
This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, ...
In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS
There is a paucity of data concerning the changes in circulation occurring during swimming in fish. Data reported in the literature have been obtained from either restrained, anaesthetized or operated fish (Greene, 1904; Hart, 1945; Johansen, 1962; Robertson et al. 1966). Such procedures can have marked effects on fish (Fry, 1957). It is therefore surprising that little attention has been direc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید