Search

Results: 124
Formal Analysis of Database Trigger Systems Using Event-B
Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal...
Published by: IGI Global
The Rumble in the Meson
Ben Allanach, Joe Davighi
Apr 12, 2023
Abstract We juxtapose global fits of two bottom-up models (an S3 scalar leptoquark model and a...
Published by:
Trust, Risk and Alternative Website Quality in B-Buyer Acceptance of Cross-Border E-Commerce
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
Published by: IGI Global
Maternal immunisation against Group B Streptococcus

Background

Group B Streptococcus (GBS) can cause invasive disease (iGBS) in young infants, typically presenting as sepsis or meningitis, and is also associated with stillbirth and preterm birth. GBS vaccines are under...
Published by: PLoS Medicine
An Improved Firefly Algorithm-Based 2-D Image Thresholding for Brain Image Fusion
In this article, an attempt is made to diagnose brain diseases like neoplastic, cerebrovascular, Alzheimer's, and sarcomas by the effective fusion of two images. The two images are fused in three steps. Step 1. Segmentation: The...
Published by: IGI Global
An Improved Firefly Algorithm-Based 2-D Image Thresholding for Brain Image Fusion
In this article, an attempt is made to diagnose brain diseases like neoplastic, cerebrovascular, Alzheimer's, and sarcomas by the effective fusion of two images. The two images are fused in three steps. Step 1. Segmentation: The...
Published by: IGI Global
Optimizing Energy Consumption in IoT-Based Scalable Wireless Sensor Networks
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
Published by: IGI Global
A 2D Histogram-Based Image Thresholding Using Hybrid Algorithms for Brain Image Fusion
In this article an effort is made to identify brain tumor disease such as neoplastic, cerebrovascular, Alzheimer's, lethal, sarcoma diseases by successful fusion of images from magnetic resonance imaging (MRI) and computed...
Published by: IGI Global
A Machine Learning Method with Threshold Based Parallel Feature Fusion and Feature Selection for Automated Gait Recognition
Gait is a vital biometric process for human identification in the domain of machine learning. In this article, a new method is implemented for human gait recognition based on accurate segmentation and multi-level features...
Published by: IGI Global
Will Environmental Regulation Narrow the Gap in Regional Economic Growth?
Empirical studies have shown that China's Air Pollution Prevention and Control Law (APPCL2000), as an environmental regulation, has significantly alleviated the air pollution problem and improved the TFP of air polluting...
Published by: IGI Global
THE "INDIFFERENCE-ke CONSTRUCTION" IN MODERN CONVERSATIONAL PERSIAN
Nima Sadat-Tehrani
Aug 01, 2013
This paper deals with a construction in Persian called here the Indifference-ke Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Lean Manufacturing Towards Sustainability
This paper intends to capture the attention of the lean researchers towards a shift of priorities of the various techniques implemented in lean and its journey of 40 years in the global scenario. In particular, the paper focuses...
Published by: IGI Global
Multi-Objective Optimization-Oriented Resource Allocation in the Fog Environment
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
Published by: IGI Global
Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security....
Published by: IGI Global
The Challenges and Coping Strategies of KM Implementation in HEIs
The pace of competition has increased in every sphere of the economy, and to face such high level of competition, organizations look for sustainable competitive edge. Knowledge as a tool of competition has been found to be...
Published by: IGI Global
Mission accomplished? Balancing market growth and moral legitimation in the fair trade moral market
How can moral market growth be pursued while sustaining the market’s moral legitimation? We address this question in a study of how Fairtrade International (FTI), the ‘market mediator’ responsible for regulating the fair trade...
Published by:
Monitoring IaaS Cloud for Healthcare Systems
Healthcare functionality is enriched by cloud services which offers a perspective for broad integration and interoperability. Cloud-based facilities support healthcare systems to remain connected to remote access devices to...
Published by: IGI Global
SLAMMP Framework for Cloud Resource Management and Its Impact on Healthcare Computational Techniques
Technology such as cloud computing(CC) is constantly evolving and being adopted by the industries to manage their data and tasks. CC provides the resources for managing the tasks of the cloud users. The acceptance of the CC in...
Published by: IGI Global
Doctoral Education, Pedagogy, and Autoethnography
This special issue of the Morning Watch brings together papers written for a doctoral course in the Faculty of Education.  As facilitators of ED 702A/B Advanced Research Methodology in Education, a core course in the Faculty of...
State of the Art in Authorship Attribution With Impact Analysis of Stylometric Features on Style Breach Prediction
The most influential research was studied that spans over the domains from Authorship attribution and stylometry. The reference material contributes robust classifiers with reasonable array of feature extraction techniques, such...
Published by: IGI Global
A Conceptual Study on Employer Perception towards Hiring Employee with Online Degree/Certification
Higher education is enduring a transition across the world. This transition leads to the introduction of technology into the education system and provides opportunities to pursue a degree through online participation. According...
Published by: IGI Global
Supporting Real-Time Data Transmissions in Cognitive Radio Networks Using Queue Shifting Mechanism
As cognitive radio networks are conceptualized to make use of the opportunistic spectrum access, the users of these networks may face problems in satisfying their quality of service (QoS) requirements. Some services of users...
Published by: IGI Global
Native Hawaiian Interdisciplinary Health Program
Michael C. DeMattos
Dec 14, 2019
In Spring of 2012, the University of Hawai‘i at Mānoa, John A. Burns School of Medicine, Native Hawaiian Center of Excellence, and the Myron B. Thompson School of Social Work Baccalaureate Program partnered and created the...

|<

<

1

2

3

4

5

>

>|