-
81
Generative AI in Higher Education: Balancing Innovation and Integrity
Published 2025-01-01“…This paper argues that while GenAI can provide substantial benefits in terms of automation and efficiency, its integration must be managed with care to avoid undermining the authenticity of student work and exacerbating existing inequalities. …”
Get full text
Article -
82
The Validity of Cryptocurrency Transactions and the Analysis of Associated Disputes
Published 2025-03-01“…Methodology This research seeks to analyze the claim for cryptocurrency recovery through a descriptive-analytical method, based on the norms and principles governing the legal system of Iran, particularly the principles and rules of civil procedure. …”
Get full text
Article -
83
To the Question of Legal Responsibility for the Use of Cryptal Currencyin Production
Published 2018-12-01“…Using the capabilities of the system analysis method, formal logic, as well as linguistic and philological techniques and methods of research, the author comments on the norms of the current criminal and administrative legislation on responsibility for the use of cryptocurrency in the calculations.It is concluded that there are significant shortcomings in this area, which does not allow to regulate these public relations in the most efficient way. …”
Get full text
Article -
84
Decentralized biobanking platform for organoid research networks
Published 2025-07-01“…IntroductionOrganoids are living, patient-derived tumor models that are revolutionizing precision medicine and drug development, however current privacy practices strip identifiers, thereby undermining ethics, efficiency, and effectiveness for patients and research enterprises alike. …”
Get full text
Article -
85
Optimizing patient autonomy: a discrete choice experiment on preferences and disparities in healthcare provider selection
Published 2025-02-01“…Objectives This study explores public preferences regarding hospital choice before the 2023 reform, evaluates the relative importance of key hospital attributes influencing decision-making, assuming a baseline of high-quality care and analyses how these preferences vary across demographic and socio-economic groups. Methods Utilizing a discrete choice experiment involving 2117 participants, this study quantifies preferences for different hospital attributes, including hospital type, geographical location, and appointment availability. …”
Get full text
Article -
86
Workplace Incivility and Job Alienation: Analyzing the Mediating Role of Social Capital and the Moderating Role of Psychological Capital
Published 2025-06-01“…Social capital in the workplace refers to a network of relationships built on mutual trust, cooperation, knowledge sharing, and shared norms, all of which enhance organizational cohesion and efficiency. Workplace incivility undermines trust, the foundation of social capital. …”
Get full text
Article -
87
A critical analysis of public private partnership model in energy from waste projects
Published 2024-12-01“…This study addresses this gap by comparing the PFI models used in the UK and Canada in currently operative EfW projects using mixed risk epistemology approach combining methods that provide both a real and objective evaluation of issues and risks and a subjective (or opinion-based) evaluation. …”
Get full text
Article -
88
Good Governance and Seigniorage in a Selected OPEC Countries and Iran
Published 2025-03-01“…Therefore, based on the results obtained from the analysis of responce functions in empirical analysis, it is essential to pay attention to changing and improving the methods of governance and administration of the country. …”
Get full text
Article -
89
Enhanced framework for credit card fraud detection using robust feature selection and a stacking ensemble model approach
Published 2025-06-01“…The outcomes highlight the model's proficiency in properly identifying fraudulent transactions while reducing false positives. The proposed method provides a viable alternative for secure and efficient credit card fraud detection in the contemporary digital economy, characterized by high accuracy and real-time scalability.…”
Get full text
Article -
90
Impact softening performance of low melting point alloy/copper foam composite phase change materials
Published 2025-08-01“…The deformation failure mechanism and the strain rate softening effect of low melting point alloy/copper foam composite phase change material (CPCM) under impact loading were investigated using a macro-fine-micro multi-scale analysis method. The consequences of strain rate and relative density on the dynamic response of CPCM were experimentally examined using Split-Hopkinson-Pressure-Bar methods. …”
Get full text
Article -
91
Decentralized Biobanking Apps for Patient Tracking of Biospecimen Research: Real-World Usability and Feasibility Study
Published 2025-04-01“… BackgroundBiobank privacy policies strip patient identifiers from donated specimens, undermining transparency, utility, and value for patients, scientists, and society. …”
Get full text
Article -
92
Examining the Influence of the Shadow Economy on the Performance of Financial Markets and the Banking Sector in BRICS Countries: A Panel SUR Approach
Published 2025-06-01“…The diversion of financial and banking resources to shadow economic activities impairs the allocation of these resources to productive and formal endeavors, potentially undermining the efficiency of financial and banking operations. …”
Get full text
Article -
93
Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials
Published 2023-03-01“…Contextual vulnerability is an important consideration in reviewing proposed subject selection methods. Some recipients are uniquely prone to receiving an unfair offer to enroll in an experimental clinical trial when excluded from allograft waitlists due to psychosocial or compliance evaluations. …”
Get full text
Article -
94
Research on pedestrian detection technology for mining unmanned vehicles
Published 2024-10-01“…The working environment of mining unmanned vehicles features complex lighting conditions, leading to frequent occurrences of missed detections in pedestrian detection, which undermines the reliability and safety of these vehicles. …”
Get full text
Article -
95
Comparative analysis of machine learning algorithms for money laundering detection
Published 2025-07-01“…The findings underscore the potential of ML algorithms capability to combat money laundering and indeed enhance anti-money efforts and offer financial institutions a powerful, resource-efficient method for fraud detection in large-scale transaction environments.…”
Get full text
Article -
96
Path and Practice of Gap Management in National Parks: A Comparison Between China and the US and Inspirations Therefrom
Published 2025-02-01“…Through a comparative approach, the research identifies key institutional factors shaping the management of these gaps and provides recommendations for improving China’s approach to gap management.MethodsThis research employs a combination of policy text analysis, historical analysis and comparative analysis to explore the concept and management of “gap” in national parks in both China and the US. …”
Get full text
Article -
97
Comparative Ethics of Modern Payment Models
Published 2023-01-01“…Volume-based reimbursement schemes prioritize efficiency, regardless of these major bioethical principles. …”
Get full text
Article -
98
Comparative Ethics of Modern Payment Models
Published 2023-01-01“…Volume-based reimbursement schemes prioritize efficiency, regardless of these major bioethical principles. …”
Get full text
Article -
99
Factors that influence recruitment to COVID-19 vaccine trials: a qualitative evidence synthesis
Published 2024-12-01“…These adaptive methods allow for modifications to the trial procedures without undermining the trial’s integrity, making the research process more flexible and efficient. …”
Get full text
Article -
100
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery
Published 2025-04-01“…They collect and analyze the provided sensing data through an appropriate truth discovery (TD) method to identify valuable data sets. However, existing privacy-preserving MCS systems lack transparency, enabling data aggregators to deviate from the specified protocols and allowing malicious users to provide false or invalid sensing data, thereby contaminating the resulting data sets. …”
Get full text
Article