This paper provides an in-depth examination of the distribution of the Antipassive morpheme -si- in Mittimatalik, a dialect of !nuktitut spoken in North Baffin. It is demonstrated that the occurrence of the overt Antipassive...
Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal...
In this paper, pectoral muscle segmentation was performed to study the presence of malignancy in the pectoral muscle region in mammograms. A combined approach involving granular computing and layering was employed to locate the...
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
PURPOSE: The B-MaP-C study investigated changes to breast cancer care that were necessitated by the COVID-19 pandemic. Here we present a follow-up analysis of those patients commenced on bridging endocrine therapy (BrET), whilst...
Group B Streptococcus (GBS) can cause invasive disease (iGBS) in young infants, typically presenting as sepsis or meningitis, and is also associated with stillbirth and preterm birth. GBS vaccines are under...
Despite the introduction of vaccination, there remains a need for pre-exposure prophylactic agents against SARS-CoV-2. Several patient groups are more vulnerable to SARS-CoV-2 infection by virtue of underlying...
Sequential B cell-targeted immunotherapy with BAFF antagonism (belimumab) and B cell depletion (rituximab) may enhance B cell targeting in ANCA-associated vasculitis (AAV) through several...
In this paper, we examined consumers’ intention to adopt and use mobile payment method in Ghana. Data for the study was obtained from a sample of 260 respondents through online and direct survey using structured questionnaire....
Underlying consonant sequences in Cayuga (and ill other Northernlroquoian languages) are apparently subject to phonotactic constraints. The non-randomness of underlying consonant sequences is problematic for Optimality-Theory...
The forming of low and high strength tailor welded steel sheets into preferred three-dimensional shapes by a homogeneous distribution of plastic strain is highly difficult. In this work, the formability of tailor-welded blanks...
Plenary Keynote Presentation V: Panel Presentation from The Phenomenon of Singing International Symposium VIII. Held at Memorial University, St. John's NL, 2011. Introduction: Andrea Rose (Memorial University of Newfoundland...
In this article, an attempt is made to diagnose brain diseases like neoplastic, cerebrovascular, Alzheimer's, and sarcomas by the effective fusion of two images. The two images are fused in three steps. Step 1. Segmentation: The...
Gait is a vital biometric process for human identification in the domain of machine learning. In this article, a new method is implemented for human gait recognition based on accurate segmentation and multi-level features...
Empirical studies have shown that China's Air Pollution Prevention and Control Law (APPCL2000), as an environmental regulation, has significantly alleviated the air pollution problem and improved the TFP of air polluting...
Assessment and Reporting of Model Adequacy is an important step in the simulation modelling process. It stipulates the level of precision and accuracy, which are important features of the model predictions. In an academic...
Biosurfactant production by Rhodococcus erythropolis SB-1A was studied based on Atlas oil agar medium in a batch reactor. The strain was isolated from a water sample collected from Northern Atlantic Ocean. Several parameters...
A key component in the usage of Industry 4.0 arrangements is the up and coming age of system network, LTE/LTE advanced today, and 5G, later on. Industry 4.0 is conveying private LTE arranges today, as they trust it will give...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
In this article, an attempt is made to diagnose brain diseases like neoplastic, cerebrovascular, Alzheimer's, and sarcomas by the effective fusion of two images. The two images are fused in three steps. Step 1. Segmentation: The...
This paper intends to capture the attention of the lean researchers towards a shift of priorities of the various techniques implemented in lean and its journey of 40 years in the global scenario. In particular, the paper focuses...
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security....