Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal...
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
PURPOSE: The B-MaP-C study investigated changes to breast cancer care that were necessitated by the COVID-19 pandemic. Here we present a follow-up analysis of those patients commenced on bridging endocrine therapy (BrET), whilst...
Sequential B cell-targeted immunotherapy with BAFF antagonism (belimumab) and B cell depletion (rituximab) may enhance B cell targeting in ANCA-associated vasculitis (AAV) through several...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Group B Streptococcus (GBS) can cause invasive disease (iGBS) in young infants, typically presenting as sepsis or meningitis, and is also associated with stillbirth and preterm birth. GBS vaccines are under...
To present the biodiversity information, a semantic model is required that connects all kinds of data about living creatures and their habitats. The model must be able to encode human knowledge for machines to be understood....
This study aims to determine procurement and project management critical factors to develop procurement strategy with stakeholders to eliminate Project Scope Creep (PSC) risks in the oil & gas (O&G) sector. Analytical Hierarchy...
In recent years, 5G has been the focus of research and development in the telecom industry. This paper aims to understand the development trend and technical hot spots of 5G technology through the patent analysis and build a...
Gait is a vital biometric process for human identification in the domain of machine learning. In this article, a new method is implemented for human gait recognition based on accurate segmentation and multi-level features...
Empirical studies have shown that China's Air Pollution Prevention and Control Law (APPCL2000), as an environmental regulation, has significantly alleviated the air pollution problem and improved the TFP of air polluting...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
This paper intends to capture the attention of the lean researchers towards a shift of priorities of the various techniques implemented in lean and its journey of 40 years in the global scenario. In particular, the paper focuses...
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security....
Purpose of this study to examine the effect of interactivity on musers’ engagement towards mobile bookkeeping application using stimulus-organism-response (S-O-R) theory and technology acceptance model (TAM). Further, moderation...
The pace of competition has increased in every sphere of the economy, and to face such high level of competition, organizations look for sustainable competitive edge. Knowledge as a tool of competition has been found to be...
This paper is a response to Olderroge 1984 that Efik does not have a system of number beyond one thousand, since according to the claim, the word for thousand in Efik is tosin, a recent borrowing from English and assimilated...
Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the...
This study examines the impact of electronic customer relationship management (E-CRM) on customer loyalty through the mediating effects of customer experience and customer satisfaction in the context of the banking industry....
How can moral market growth be pursued while sustaining the market’s moral legitimation? We address this question in a study of how Fairtrade International (FTI), the ‘market mediator’ responsible for regulating the fair trade...
While the acceptance and use of mobile marketing technology (MMT) is playing a significant roles in Small and Medium Enterprises (SMEs), few studies have explored how an appropriate framework for understanding the underlying...
This article describes how despite the extensive academic interest in e-commerce, an investigation of consumer cognitive innovativeness towards new product purchase intention has been neglected. Based on the...