In this paper, an (s, S) policy is determined by using a simulation-optimization approach for a periodic review inventory system at a pharmacy department of a major hospital in Thailand. The simulation, which imitates the...
Disciplinarily-integrated games represent a generalizable genre and template for designing games to support science learning with a focus on bridging across formal and phenomenological representations of core science...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new...
In this paper, techniques of statistical computing were applied to data logs to investigate the patterns in students' play of The Fuzzy Chronicles, and how these patterns relate to learning outcomes with regards to Newtonian...
In recent years, research on the QoS-aware service composition problem often assumes that each component service in the process to be solved is equally essential. They do not consider the impact of core component services and...
The present study performs the bibliometric analysis of the social commerce (s-commerce) literature, highlights the major research themes, and suggests future research directions. The HistCite software has been used for...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
From its earliest beginnings, the women’s movement has evolved into a complex enterprise combining social, political, economic and academic organizations around the globe. The move into the academic scene (women’s...
The influence of eWoM use for s-commerce in the context of Arab region remains unexplored. To bridge this gap, this study develops a model for eWoM use for s-commerce post adoption. This model link three antecedents-factors...
Dans cet article, nous discutons de l’interaction apprenant-tâche-dictionnaire à l’ordinateur. Nous faisons un survol de la littérature en lexicographie pédagogique dédiée...
This study evaluated the comparative effect of interactive multimedia to text-based content on learners taking a software application course.111 participants took part in the study. The researcher employed the use of web...
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research...
A century of British colonial rule over a population of Chinese majority has resulted in a special culture of Hong Kong. While the local people have maintained a considerable amount of the traditional Chinese culture, a very...
This paper aims to assess the dimensional deviation of Fused Deposition Modeling (FDM) processed ABS and ULTRAT parts using a new geometrical model which can evaluate three types of dimensional deviation: along the z-axis, along...
When one thinks of the -5 ending in English, the first use that comes to mind is probably that in which it expresses the notion of plurality. However the -5 morph is also pressed into service for other very different purposes...
Cyril Orji is professor of theology and Core Integrated Study. He is the author of numerous books, including Unmasking the African Ghost (2022), A Semiotic Christology (2021), and A Science–Theology Rapprochement (2018). His...
Israel, since its declaration of independence, has taken a realist perspective in its foreign policy. Yet, despite the offensive realist nature of its foreign policy, it suffered a near defeat in the Yom Kippur War in 1973....
This study researches the mediating consequence of social trust (identification-based trust and information-based trust) on the relationship between social networking services (SNS) use and social commerce intention. The study...
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research...
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research...