The grey wolf (Canis lupus) was the first species to give rise to a domestic population, and they remained widespread throughout the last Ice Age when many other large mammal species went extinct. Little is known, however, about...
The grey wolf (Canis lupus) was the first species to give rise to a domestic population, and they remained widespread throughout the last Ice Age when many other large mammal species went extinct. Little is known, however, about...
The traditional entrepreneurial resource decision-making model that relies on empirical decision-making or simple template matching is difficult to adapt to the current complex social environment. Therefore, the multi-objective...
This study aimed to synthesize the literature on Metaverse to highlight its current research, opportunities, and applications in e-healthcare and education to reduce inequalities and for delivering fair and equal opportunities...
Founded in 1974, Das Puppenspiel Puppet Theatre is a professional touring company that offers award-winning productions featuring exquisitely designed mask, mime, marionette and bunraku-style puppetry. The tale involves...
Is it just my e-magination, or are we in an e-lust for e-books? E-verywhere I look, now, I seem to e-ncounter something about eBooks. I have been ebombarded recently with a glut of eBook offers.
There are several studies that assess the influence of factors on citizens' intention to adopt e-government services in various contexts. However, there is a lack of research that examines the perceived barriers to B2G...
This paper devises a routing method for providing multipath routing in an IoT network. Here the fractional artificial bee colony(FABC) algorithm is devised for initiating the clustering process. Moreover, the multipath routing...
Quick Facts
Since 1937, the Caldecott Medal has recognized the year's most distinguished American picture book for children "Wolf in the Snow," which also won a 2017 Boston Globe-Horn Book Award, is a wordless picture book about...
Any vulnerability in the software creates a software security threat and helps hackers to gain unauthorized access to resources. Vulnerability prediction models help software engineers to effectively allocate their resources to...
The importance of accessibility to digital resources is now widely acknowledged. The W3C WAI has played a significant role in promoting the importance of accessibility and developing a framework for accessible Web resources. The...
The importance of accessibility to digital resources is now widely acknowledged. The W3C WAI has played a significant role in promoting the importance of accessibility and developing a framework for accessible Web resources. The...
OBJECTIVES: E-cigarette companies and vendors claim the potential of e-cigarettes to help smokers reduce or quit tobacco use. E-cigarettes also have the potential to renormalise smoking. The purpose of this study was to describe...
A short review of theoretical and experimental results on fragmentation in
e^+e^- annihilation is presented. Starting with an introduction of the concept
of fragmentation functions in e^+e^- annihilation, aspects of...
Use of e-cigarettes (inhalable vapour producing battery powered devices that aim to simulate tobacco cigarettes), is rising in a number of countries, but as yet none of these products are regulated as...
Loggerhead sea turtles are currently listed as vulnerable by the International Union of Conservation of Nature (IUCN) with a decreasing population trend. Over the past four years, coyotes (Canis latrans) have depredated 24.18%...
A flavour-tagged time-dependent angular analysis of $B^0_s\to J/\psi\phi$
decays is presented where the $J/\psi$ meson is reconstructed through its decay
to an $e^+e^-$ pair. The analysis uses a sample of $pp$ collision data...
E-waste is a major global problem linked to the use, and discard of, electronic and electric devices. While the volume of these obsolete devices continues to increase and accumulate, the means and approaches currently used to...
$\textbf{Purpose }$– The development of e-grocery allows people to purchase food online and benefit from home delivery service. Nevertheless, a high rate of failed deliveries due to the customer’s absence causes significant loss...
The epigenetic phenomenon of genomic imprinting has motivated the development of numerous theories for its evolutionary origins and genomic distribution. In this review, we examine the three theories that have best withstood...
E-cadherin (CDH1) is a putative tumor suppressor gene implicated in breast carcinogenesis. Yet, whether risk factors or survival differ by E-cadherin tumor expression is unclear. We evaluated E-cadherin tumor...
In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud...
Abstract: A flavour-tagged time-dependent angular analysis of Bs0→J/ψϕ decays is presented where the J/ψ meson is reconstructed through its decay to an e+e- pair. The analysis uses a sample of pp collision data recorded with the...
A working paper commissioned by the e-Learning Team in the Learning and Teaching Enhancement Office, University of Bath. This report investigates different approaches to e-assessment and objective testing, and their implications...
This study develops an integrated model to investigate how value co-creation, driven by positively-valanced e-engagement, enhances repurchase intention among e-commence consumers. Applying the tenets of UTAUT, this study also...