Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal...
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
This paper plans to develop a novel image compression model with four major phases. (i) Segmentation (ii) Feature Extraction (iii) ROI classification (iv) Compression. The image is segmented into two regions by Adaptive ACM. The...
PURPOSE: The B-MaP-C study investigated changes to breast cancer care that were necessitated by the COVID-19 pandemic. Here we present a follow-up analysis of those patients commenced on bridging endocrine therapy (BrET), whilst...
Group B Streptococcus (GBS) can cause invasive disease (iGBS) in young infants, typically presenting as sepsis or meningitis, and is also associated with stillbirth and preterm birth. GBS vaccines are under...
This article presents a qualitative analysis of a 3D routing algorithm in a 3×3×3 mesh NOC topology. The effect of load variation on throughput, total energy, and maximum delay for different types of routing is observed. The...
Sequential B cell-targeted immunotherapy with BAFF antagonism (belimumab) and B cell depletion (rituximab) may enhance B cell targeting in ANCA-associated vasculitis (AAV) through several...
In an emerging nation like India, entrepreneurship has the ability to present a solution for many problems related to the economy. The Union territory (UT) of Jammu & Kashmir (J&K) has grave issues of high unemployment and low...
The complimentary nature of qualitative and quantitative research methods are examined with respect to a study assessing the market's view of a training and development institute in the Middle East. The qualitative portion...
William J. Zanardi is Professor Emeritus at St. Edward’s University in Austin, Texas. Over the last thirty plus years, the works of Bernard Lonergan and Philip McShane have greatly influenced his teaching and writing. As one of...
Nowadays, in online social networks, there is an instantaneous extension of multimedia services and there are huge offers of video contents which has hindered users to acquire their interests. To solve these problem different...
Gait is a vital biometric process for human identification in the domain of machine learning. In this article, a new method is implemented for human gait recognition based on accurate segmentation and multi-level features...
Empirical studies have shown that China's Air Pollution Prevention and Control Law (APPCL2000), as an environmental regulation, has significantly alleviated the air pollution problem and improved the TFP of air polluting...
Stephen J. Costello holds a BA, MA, and PhD in philosophy. He has addressed two parliaments—Stormont on human rights and the European Parliament in Brussels on mental health. He has twenty-five years’ experience giving seminars...
E-learning is of increasing importance in delivering flexible and distributed programmes for workforce skill development such as induction, product knowledge, systems compliance, and customer service. This research consists of a...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Connected vehicular tracking schema operated in environmentally safe radio frequency of 434 MHz, artificial intelligence, and machine learning and IoT technology (CVT-AIML-IoT) is cost effective and secured tracking or device...
This paper intends to capture the attention of the lean researchers towards a shift of priorities of the various techniques implemented in lean and its journey of 40 years in the global scenario. In particular, the paper focuses...
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security....
The pace of competition has increased in every sphere of the economy, and to face such high level of competition, organizations look for sustainable competitive edge. Knowledge as a tool of competition has been found to be...
How can moral market growth be pursued while sustaining the market’s moral legitimation? We address this question in a study of how Fairtrade International (FTI), the ‘market mediator’ responsible for regulating the fair trade...
ICT use in family functioning is an important area to study as the impact changes when technology grows over years. This research analyzed the role of ICT use in process & structure of families using the factors present in...