Search

Results: 173
Formal Analysis of Database Trigger Systems Using Event-B
Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal...
Published by: IGI Global
The Rumble in the Meson
Ben Allanach, Joe Davighi
Apr 12, 2023
Abstract We juxtapose global fits of two bottom-up models (an S3 scalar leptoquark model and a...
Published by:
Trust, Risk and Alternative Website Quality in B-Buyer Acceptance of Cross-Border E-Commerce
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
Published by: IGI Global
Maternal immunisation against Group B Streptococcus

Background

Group B Streptococcus (GBS) can cause invasive disease (iGBS) in young infants, typically presenting as sepsis or meningitis, and is also associated with stillbirth and preterm birth. GBS vaccines are under...
Published by: PLoS Medicine
Does a user-friendly up-to-date pediatric education website improve faculty engagement in the educational program?
Medical Education websites are an important tool in communication, promotion and organization of a medical education program. These websites can also be used to deliver curriculum and manage assessment tools for learners. The...
A Deep Learning-Based Approach to Classification of Baby Sign Language Images
Baby Sign Language is used by hearing parents to hearing infants as a preverbal communication which reduce frustration of parents and accelerated learning in babies, increases parent-child bonding, and lets babies communicate...
Published by: IGI Global
A Machine Learning Method with Threshold Based Parallel Feature Fusion and Feature Selection for Automated Gait Recognition
Gait is a vital biometric process for human identification in the domain of machine learning. In this article, a new method is implemented for human gait recognition based on accurate segmentation and multi-level features...
Published by: IGI Global
Will Environmental Regulation Narrow the Gap in Regional Economic Growth?
Empirical studies have shown that China's Air Pollution Prevention and Control Law (APPCL2000), as an environmental regulation, has significantly alleviated the air pollution problem and improved the TFP of air polluting...
Published by: IGI Global
Applying Bibliometrics to Examine Research Output and Highlight Collaboration
Throughout the pandemic, research contributing to discoveries associated with COVID-19 has grown considerably. To help increase visibility of this integral body of research and illustrate the extensive organizational...
Published by: IGI Global
THE "INDIFFERENCE-ke CONSTRUCTION" IN MODERN CONVERSATIONAL PERSIAN
Nima Sadat-Tehrani
Aug 01, 2013
This paper deals with a construction in Persian called here the Indifference-ke Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Do the National Board of Medical Examiners (NBME) subject examinations predict success on the Medical Council of Canada qualifying examination (MCCQE) Part 1?
NBME subject examinations are used by many Canadian medical schools to evaluate students during their clerkship rotations. Although studies show strong correlations between NBME scores and the American licensing examination...
Lean Manufacturing Towards Sustainability
This paper intends to capture the attention of the lean researchers towards a shift of priorities of the various techniques implemented in lean and its journey of 40 years in the global scenario. In particular, the paper focuses...
Published by: IGI Global
Multi-Objective Optimization-Oriented Resource Allocation in the Fog Environment
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
Published by: IGI Global
Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security....
Published by: IGI Global
The Challenges and Coping Strategies of KM Implementation in HEIs
The pace of competition has increased in every sphere of the economy, and to face such high level of competition, organizations look for sustainable competitive edge. Knowledge as a tool of competition has been found to be...
Published by: IGI Global

|<

<

1

2

3

4

5

>

>|