The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
This research examines the effects of factors such as perceived ease of use, perceived usefulness, perceived enjoyment, innovativeness, perceived information quality, and perceived customisation on behavioural intention to use...
Researchers are increasingly using algorithms that are influenced by nature because of its ease and versatility, the key components of nature-inspired metaheuristic algorithms are investigated, involving divergence and adoption...
Cost is the backbone of any business model to sustain and growth in the competitive business market. Considering this, higher energy consumption may affect the operational cost of any industry. Cloud computing is one of the most...
Immune-mediated necrotising myopathy (IMNM) is a severe and poorly understood complication of statin use. Prompt management with immunosuppressive treatment is often needed to control the condition, which differs from the...
Placements in the emergency department provide medical students with countless clinical and practical learning opportunities. However, medical education may not always be optimised for students in this busy, potentially...
The current study serves two purposes. First and foremost, this research aims to determine the impact of a game mechanism known as virtual currency on the intention of young female consumers to use it in an e-tailing platform;...
According to the market research firm Tractica, the global artificial intelligence software market is forecast to grow to 126 billion by 2025. Additionally, the Gartner group predicts that during the same time as much as 80% of...
INTRODUCTION: Understanding the contribution of the fibularis longus tendon to the support of the midfoot arches has potential therapeutic applications. This cadaveric study sought to quantify this support across both the...
Large, symptomatic and ruptured abdominal aortic aneurysms are usually treated surgically if patients are deemed fit enough. This may be achieved through endovascular or open surgical repair. The type of treatment that a patient...
An abdominal aortic aneurysm is an irreversible dilatation of the abdominal aorta. The majority of abdominal aortic aneurysms are asymptomatic and identified incidentally while investigating a separate pathology. Others are...
OBJECTIVE: To characterize breast masses using mammography and ultrasonography along with colour Doppler study and to correlate mammography, ultrasonography and FNAC findings and to determine sensitivity and specificity of...
OBJECTIVES: To describe the epidemiology of sepsis in critical care by applying the Sepsis-3 criteria to electronic health records. DESIGN: Retrospective cohort study using electronic health records. SETTING: Ten ICUs from four...
OBJECTIVE: To characterize breast masses using mammography and ultrasonography along with colour Doppler study and to correlate mammography, ultrasonography and FNAC findings and to determine sensitivity and specificity of...
Gamification is all about using game features in a serious context to encourage people to use products or services. E-commerce has used gamification for marketing determinations to strengthen intent to use. Technology Acceptance...
In this paper, Feature Selection Technique (FST) namely Particle Swarm Optimization (PSO) has been used. The filter based PSO is a search method with Correlation-based Feature Selection (CBFS) as a fitness function. The FST has...
Program slicing is a technique to decompose programs depending on control flow and data flow amongst several lines of code in a program. Conditioned slicing is a generalization of static slicing and dynamic slicing. A variable...
Allotment of nurses to patients is a critical task in terms of better treatment. Nurses should be appointed according to a patient's health condition, type of disease, and financial condition. Again, understaffing of nurses may...
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...