Showing 81 - 100 results of 109 for search 'undermine efficiency (method OR methods)', query time: 0.16s Refine Results
  1. 81

    Generative AI in Higher Education: Balancing Innovation and Integrity by Nigel J. Francis, Sue Jones, David P. Smith

    Published 2025-01-01
    “…This paper argues that while GenAI can provide substantial benefits in terms of automation and efficiency, its integration must be managed with care to avoid undermining the authenticity of student work and exacerbating existing inequalities. …”
    Get full text
    Article
  2. 82

    The Validity of Cryptocurrency Transactions and the Analysis of Associated Disputes by Hossein Qahari, Javad Hosseinzadeh

    Published 2025-03-01
    “…Methodology This research seeks to analyze the claim for cryptocurrency recovery through a descriptive-analytical method, based on the norms and principles governing the legal system of Iran, particularly the principles and rules of civil procedure. …”
    Get full text
    Article
  3. 83

    To the Question of Legal Responsibility for the Use of Cryptal Currencyin Production by A. A. Maksurov

    Published 2018-12-01
    “…Using the capabilities of the system analysis method, formal logic, as well as linguistic and philological techniques and methods of research, the author comments on the norms of the current criminal and administrative legislation on responsibility for the use of cryptocurrency in the calculations.It is concluded that there are significant shortcomings in this area, which does not allow to regulate these public relations in the most efficient way. …”
    Get full text
    Article
  4. 84

    Decentralized biobanking platform for organoid research networks by Marielle Gross, Marielle Gross, Ananya Dewan, Mario Macis, Mario Macis, Eve Budd, M. Eifler, Olayinka Odeniran, Jeff Kahn, Jeff Kahn, Jeff Kahn, Robert Clell Miller, Robert Clell Miller, William Sanchez

    Published 2025-07-01
    “…IntroductionOrganoids are living, patient-derived tumor models that are revolutionizing precision medicine and drug development, however current privacy practices strip identifiers, thereby undermining ethics, efficiency, and effectiveness for patients and research enterprises alike. …”
    Get full text
    Article
  5. 85

    Optimizing patient autonomy: a discrete choice experiment on preferences and disparities in healthcare provider selection by Gideon Leibner, Shuli Brammli-Greenberg

    Published 2025-02-01
    “…Objectives This study explores public preferences regarding hospital choice before the 2023 reform, evaluates the relative importance of key hospital attributes influencing decision-making, assuming a baseline of high-quality care and analyses how these preferences vary across demographic and socio-economic groups. Methods Utilizing a discrete choice experiment involving 2117 participants, this study quantifies preferences for different hospital attributes, including hospital type, geographical location, and appointment availability. …”
    Get full text
    Article
  6. 86

    Workplace Incivility and Job Alienation: Analyzing the Mediating Role of Social Capital and the Moderating Role of Psychological Capital by Fariborz Fathi Chegeni, Mostafa OmidNezhad

    Published 2025-06-01
    “…Social capital in the workplace refers to a network of relationships built on mutual trust, cooperation, knowledge sharing, and shared norms, all of which enhance organizational cohesion and efficiency. Workplace incivility undermines trust, the foundation of social capital. …”
    Get full text
    Article
  7. 87

    A critical analysis of public private partnership model in energy from waste projects by Junaid Tahir, Mark Atkinson, Zhigang Tian, Mohamad Kassem, Rafiq Ahmad, Pablo Martinez

    Published 2024-12-01
    “…This study addresses this gap by comparing the PFI models used in the UK and Canada in currently operative EfW projects using mixed risk epistemology approach combining methods that provide both a real and objective evaluation of issues and risks and a subjective (or opinion-based) evaluation. …”
    Get full text
    Article
  8. 88

    Good Governance and Seigniorage in a Selected OPEC Countries and Iran by ALI Rashid Shamkhal, Kambiz Paykarjou, beitollah Akbari Moghaddam

    Published 2025-03-01
    “…Therefore, based on the results obtained from the analysis of responce functions in empirical analysis, it is essential to pay attention to changing and improving the methods of governance and administration of the country. …”
    Get full text
    Article
  9. 89

    Enhanced framework for credit card fraud detection using robust feature selection and a stacking ensemble model approach by Rahul Kumar Gupta, Asmaul Hassan, Samir Kumar Majhi, Nikhat Parveen, Abu Taha Zamani, Raju Anitha, Binayak Ojha, Abhinav Kumar Singh, Debendra Muduli

    Published 2025-06-01
    “…The outcomes highlight the model's proficiency in properly identifying fraudulent transactions while reducing false positives. The proposed method provides a viable alternative for secure and efficient credit card fraud detection in the contemporary digital economy, characterized by high accuracy and real-time scalability.…”
    Get full text
    Article
  10. 90

    Impact softening performance of low melting point alloy/copper foam composite phase change materials by Jingjing Song, Minzu Liang, Yuliang Lin, Leilei Wu, Jiakai Guo, Wen Liang, Yuwu Zhang

    Published 2025-08-01
    “…The deformation failure mechanism and the strain rate softening effect of low melting point alloy/copper foam composite phase change material (CPCM) under impact loading were investigated using a macro-fine-micro multi-scale analysis method. The consequences of strain rate and relative density on the dynamic response of CPCM were experimentally examined using Split-Hopkinson-Pressure-Bar methods. …”
    Get full text
    Article
  11. 91

    Decentralized Biobanking Apps for Patient Tracking of Biospecimen Research: Real-World Usability and Feasibility Study by William Sanchez, Ananya Dewan, Eve Budd, M Eifler, Robert C Miller, Jeffery Kahn, Mario Macis, Marielle Gross

    Published 2025-04-01
    “… BackgroundBiobank privacy policies strip patient identifiers from donated specimens, undermining transparency, utility, and value for patients, scientists, and society. …”
    Get full text
    Article
  12. 92

    Examining the Influence of the Shadow Economy on the Performance of Financial Markets and the Banking Sector in BRICS Countries: A Panel SUR Approach by Jaber Hasan Mhejir, Samad Hekmati Farid, Ali Reza Zadeh, Yousef Mohammad Zadeh

    Published 2025-06-01
    “…The diversion of financial and banking resources to shadow economic activities impairs the allocation of these resources to productive and formal endeavors, potentially undermining the efficiency of financial and banking operations. …”
    Get full text
    Article
  13. 93

    Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials by Gianna Strand

    Published 2023-03-01
    “…Contextual vulnerability is an important consideration in reviewing proposed subject selection methods. Some recipients are uniquely prone to receiving an unfair offer to enroll in an experimental clinical trial when excluded from allograft waitlists due to psychosocial or compliance evaluations. …”
    Get full text
    Article
  14. 94

    Research on pedestrian detection technology for mining unmanned vehicles by ZHOU Libing, YU Zhengqian, WEI Jianjian, JIANG Xueli, YE Baisong, ZHAO Yexin, YANG Siliang

    Published 2024-10-01
    “…The working environment of mining unmanned vehicles features complex lighting conditions, leading to frequent occurrences of missed detections in pedestrian detection, which undermines the reliability and safety of these vehicles. …”
    Get full text
    Article
  15. 95

    Comparative analysis of machine learning algorithms for money laundering detection by Sunday Adeola Ajagbe, Simphiwe Majola, Pragasen Mudali

    Published 2025-07-01
    “…The findings underscore the potential of ML algorithms capability to combat money laundering and indeed enhance anti-money efforts and offer financial institutions a powerful, resource-efficient method for fraud detection in large-scale transaction environments.…”
    Get full text
    Article
  16. 96

    Path and Practice of Gap Management in National Parks: A Comparison Between China and the US and Inspirations Therefrom by Yun MA, Siyuan HE

    Published 2025-02-01
    “…Through a comparative approach, the research identifies key institutional factors shaping the management of these gaps and provides recommendations for improving China’s approach to gap management.MethodsThis research employs a combination of policy text analysis, historical analysis and comparative analysis to explore the concept and management of “gap” in national parks in both China and the US. …”
    Get full text
    Article
  17. 97

    Comparative Ethics of Modern Payment Models by Jacob Riegler

    Published 2023-01-01
    “…Volume-based reimbursement schemes prioritize efficiency, regardless of these major bioethical principles. …”
    Get full text
    Article
  18. 98

    Comparative Ethics of Modern Payment Models by Jacob Riegler

    Published 2023-01-01
    “…Volume-based reimbursement schemes prioritize efficiency, regardless of these major bioethical principles. …”
    Get full text
    Article
  19. 99

    Factors that influence recruitment to COVID-19 vaccine trials: a qualitative evidence synthesis by Linda Biesty, Sarah Sheehan, Pauline Meskell, Maura Dowling, Claire Glenton, Sasha Shepperd, Xin Hui S. Chan, Rebecca Cox, Declan Devane, Andrew Booth, Catherine Houghton

    Published 2024-12-01
    “…These adaptive methods allow for modifications to the trial procedures without undermining the trial’s integrity, making the research process more flexible and efficient. …”
    Get full text
    Article
  20. 100

    Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery by Ruijuan Jia, Juan Ma, Ziyin You, Mingyue Zhang

    Published 2025-04-01
    “…They collect and analyze the provided sensing data through an appropriate truth discovery (TD) method to identify valuable data sets. However, existing privacy-preserving MCS systems lack transparency, enabling data aggregators to deviate from the specified protocols and allowing malicious users to provide false or invalid sensing data, thereby contaminating the resulting data sets. …”
    Get full text
    Article