Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,440)

Search Parameters:
Keywords = contract management

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 5651 KiB  
Article
Towards a Trustworthy Rental Market: A Blockchain-Based Housing System Architecture
by Ching-Hsi Tseng, Yu-Heng Hsieh, Yen-Yu Chang and Shyan-Ming Yuan
Electronics 2025, 14(15), 3121; https://doi.org/10.3390/electronics14153121 - 5 Aug 2025
Abstract
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, [...] Read more.
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, underlying technologies, and myriad benefits of decentralized rental platforms. The intrinsic characteristics of blockchain—immutability, transparency, and decentralization—are pivotal in enhancing the credibility of rental information and proactively preventing fraudulent activities. Smart contracts emerge as a key innovation, enabling the automated execution of Rental Agreements, thereby significantly boosting efficiency and minimizing reliance on intermediaries. Furthermore, Decentralized Identity (DID) solutions offer a robust mechanism for securely managing identities, effectively mitigating risks associated with data leakage, and fostering a more trustworthy environment. The suitability of platforms such as Hyperledger Fabric for developing such sophisticated rental systems is also critically evaluated. Blockchain-based systems promise to dramatically increase market transparency, bolster transaction security, and enhance fraud prevention. They also offer streamlined processes for dispute resolution. Despite these significant advantages, the widespread adoption of blockchain in the rental sector faces several challenges. These include inherent technological complexity, adoption barriers, the need for extensive legal and regulatory adaptation, and critical privacy concerns (e.g., ensuring compliance with GDPR). Furthermore, blockchain scalability limitations and the intricate balance between data immutability and the necessity for occasional data corrections present considerable hurdles. Future research should focus on developing user-friendly DID solutions, enhancing blockchain performance and cost-efficiency, strengthening smart contract security, optimizing the overall user experience, and exploring seamless integration with emerging technologies. While current challenges are undeniable, blockchain technology offers a powerful suite of tools for fundamentally improving the rental market’s efficiency, transparency, and security, exhibiting significant potential to reshape the entire rental ecosystem. Full article
(This article belongs to the Special Issue Blockchain Technologies: Emerging Trends and Real-World Applications)
Show Figures

Figure 1

11 pages, 1342 KiB  
Review
Review of Neurostimulation Therapies for Obstructive Sleep Apnea: Hypoglossal Nerve Stimulation and Beyond
by Patrícia dos Santos Cé, Maria Eduarda Schiestl Melo, Alan Alves Machado, Sarah Eden Ridge and Thomaz Fleury Curado
J. Clin. Med. 2025, 14(15), 5494; https://doi.org/10.3390/jcm14155494 - 4 Aug 2025
Abstract
Obstructive sleep apnea (OSA) is a sleep-related respiratory disorder characterized by partial or complete obstruction of the upper airway, typically resulting in a decrease in arterial oxygen saturation and repeated awakenings from sleep. It is the most common sleep-related respiratory disorder, affecting 9% [...] Read more.
Obstructive sleep apnea (OSA) is a sleep-related respiratory disorder characterized by partial or complete obstruction of the upper airway, typically resulting in a decrease in arterial oxygen saturation and repeated awakenings from sleep. It is the most common sleep-related respiratory disorder, affecting 9% to 38% of adults. OSA is associated with loss of tone, improper contraction of the tongue, and pharyngeal dilator muscles of the upper airway during sleep. The gold-standard treatment for moderate-to-severe OSA is continuous positive airway pressure (CPAP). However, many patients have poor long-term compliance with CPAP. Stimulation of the upper airway with electrical activation of the hypoglossal nerve has emerged as a promising treatment for patients with moderate-to-severe OSA who have failed CPAP therapy. Objectives: The present paper aims to review the literature regarding neurostimulation for the treatment of OSA. Conclusions: Hypoglossal nerve stimulation (HNS) has shown favorable success and low morbidity in the management of moderate-to-severe OSA. Full article
(This article belongs to the Special Issue Airway Management: From Basic Techniques to Innovative Technologies)
Show Figures

Figure 1

35 pages, 3122 KiB  
Article
Blockchain-Driven Smart Contracts for Advanced Authorization and Authentication in Cloud Security
by Mohammed Naif Alatawi
Electronics 2025, 14(15), 3104; https://doi.org/10.3390/electronics14153104 - 4 Aug 2025
Abstract
The increasing reliance on cloud services demands advanced security mechanisms to protect sensitive data and ensure robust access control. This study addresses critical challenges in cloud security by proposing a novel framework that integrates blockchain-based smart contracts to enhance authorization and authentication processes. [...] Read more.
The increasing reliance on cloud services demands advanced security mechanisms to protect sensitive data and ensure robust access control. This study addresses critical challenges in cloud security by proposing a novel framework that integrates blockchain-based smart contracts to enhance authorization and authentication processes. Smart contracts, as self-executing agreements embedded with predefined rules, enable decentralized, transparent, and tamper-proof mechanisms for managing access control in cloud environments. The proposed system mitigates prevalent threats such as unauthorized access, data breaches, and identity theft through an immutable and auditable security framework. A prototype system, developed using Ethereum blockchain and Solidity programming, demonstrates the feasibility and effectiveness of the approach. Rigorous evaluations reveal significant improvements in key metrics: security, with a 0% success rate for unauthorized access attempts; scalability, maintaining low response times for up to 100 concurrent users; and usability, with an average user satisfaction rating of 4.4 out of 5. These findings establish the efficacy of smart contract-based solutions in addressing critical vulnerabilities in cloud services while maintaining operational efficiency. The study underscores the transformative potential of blockchain and smart contracts in revolutionizing cloud security practices. Future research will focus on optimizing the system’s scalability for higher user loads and integrating advanced features such as adaptive authentication and anomaly detection for enhanced resilience across diverse cloud platforms. Full article
Show Figures

Figure 1

22 pages, 337 KiB  
Review
Contract Mechanisms for Value-Based Technology Adoption in Healthcare Systems
by Aydin Teymourifar
Systems 2025, 13(8), 655; https://doi.org/10.3390/systems13080655 - 3 Aug 2025
Viewed by 47
Abstract
Although technological innovations are often intended to improve quality and efficiency, they can exacerbate systemic challenges when not aligned with the principles of value-based care. As a result, healthcare systems in many countries face persistent inefficiencies stemming from the overuse, underuse, misuse, and [...] Read more.
Although technological innovations are often intended to improve quality and efficiency, they can exacerbate systemic challenges when not aligned with the principles of value-based care. As a result, healthcare systems in many countries face persistent inefficiencies stemming from the overuse, underuse, misuse, and waste associated with the adoption of health technology. This narrative review examines the dual impact of healthcare technology and evaluates how contract mechanisms can serve as strategic tools for promoting cost-effective, outcome-oriented integration. Drawing from healthcare management, and supply chain literature, this paper analyzes various payment and contract models, including performance-based, bundled, cost-sharing, and revenue-sharing agreements, through the lens of stakeholder alignment. It explores how these mechanisms influence provider behavior, patient access, and system sustainability. The study contends that well-designed contract mechanisms can align stakeholder incentives, reduce inefficiencies, and support the delivery of high-value care across diverse healthcare settings. We provide concrete examples to illustrate how various contract mechanisms impact the integration of health technologies in practice. Full article
(This article belongs to the Special Issue Operations Management in Healthcare Systems)
19 pages, 2280 KiB  
Article
A Swap-Integrated Procurement Model for Supply Chains: Coordinating with Long-Term Wholesale Contracts
by Min-Yeong Ryu and Pyung-Hoi Koo
Mathematics 2025, 13(15), 2495; https://doi.org/10.3390/math13152495 - 3 Aug 2025
Viewed by 109
Abstract
In today’s volatile supply chain environment, organizations require flexible and collaborative procurement strategies. Swap contracts, originally developed as financial instruments, have recently been adopted to address inventory imbalances—such as the 2021 COVID-19 vaccine swap between South Korea and Israel. Despite its increasing adoption [...] Read more.
In today’s volatile supply chain environment, organizations require flexible and collaborative procurement strategies. Swap contracts, originally developed as financial instruments, have recently been adopted to address inventory imbalances—such as the 2021 COVID-19 vaccine swap between South Korea and Israel. Despite its increasing adoption in the real world, theoretical studies on swap-based procurement remain limited. This study proposes an integrated model that combines buyer-to-buyer swap agreements with long-term wholesale contracts under demand uncertainty. The model quantifies the expected swap quantity between parties and embeds it into the profit function to derive optimal order quantities. Numerical experiments are conducted to compare the performance of the proposed strategy with that of a baseline wholesale contract. Sensitivity analyses are performed on key parameters, including demand asymmetry and swap prices. The numerical analysis indicates that the swap-integrated procurement strategy consistently outperforms procurement based on long-term wholesale contracts. Moreover, the results reveal that under the swap-integrated strategy, the optimal order quantity must be adjusted—either increased or decreased—depending on the demand scale of the counterpart and the specified swap price, deviating from the optimal quantity under traditional long-term contracts. These findings highlight the potential of swap-integrated procurement strategies as practical coordination mechanisms across both private and public sectors, offering strategic value in contexts such as vaccine distribution, fresh produce, and other critical products. Full article
(This article belongs to the Special Issue Theoretical and Applied Mathematics in Supply Chain Management)
Show Figures

Figure 1

24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 - 1 Aug 2025
Viewed by 109
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

24 pages, 7997 KiB  
Article
Comparative Analysis of Habitat Expansion Mechanisms for Four Invasive Amaranthaceae Plants Under Current and Future Climates Using MaxEnt
by Mao Lin, Xingzhuang Ye, Zixin Zhao, Shipin Chen and Bao Liu
Plants 2025, 14(15), 2363; https://doi.org/10.3390/plants14152363 - 1 Aug 2025
Viewed by 235
Abstract
As China’s first systematic assessment of high-risk Amaranthaceae invaders, this study addresses a critical knowledge gap identified in the National Invasive Species Inventory, in which four invasive Amaranthaceae species (Dysphania ambrosioides, Celosia argentea, Amaranthus palmeri, and Amaranthus spinosus) [...] Read more.
As China’s first systematic assessment of high-risk Amaranthaceae invaders, this study addresses a critical knowledge gap identified in the National Invasive Species Inventory, in which four invasive Amaranthaceae species (Dysphania ambrosioides, Celosia argentea, Amaranthus palmeri, and Amaranthus spinosus) are prioritized due to CNY 2.6 billion annual ecosystem damages in China. By coupling multi-species comparative analysis with a parameter-optimized Maximum Entropy (MaxEnt) model integrating climate, soil, and topographical variables in China under Shared Socioeconomic Pathways (SSP) 126/245/585 scenarios, we reveal divergent expansion mechanisms (e.g., 247 km faster northward shift in A. palmeri than D. ambrosioides) that redefine invasion corridors in the North China Plain. Under current conditions, the suitable habitats of these species span from 92° E to 129° E and 18° N to 49° N, with high-risk zones concentrated in central and southern China, including the Yunnan–Guizhou–Sichuan region and the North China Plain. Temperature variables (Bio: Bioclimatic Variables; Bio6, Bio11) were the primary contributors based on permutation importance (e.g., Bio11 explained 56.4% for C. argentea), while altitude (e.g., 27.3% for A. palmeri) and UV-B (e.g., 16.2% for A. palmeri) exerted lower influence. Model validation confirmed high accuracy (mean area under the curve (AUC) > 0.86 and true skill statistic (TSS) > 0.6). By the 2090s, all species showed net habitat expansion overall, although D. ambrosioides exhibited net total contractions during mid-century under the SSP126/245 scenarios, C. argentea experienced reduced total suitability during the 2050s–2070s despite high-suitability growth, and A. palmeri and A. spinosus expanded significantly in both total and highly suitable habitat. All species shifted their distribution centroids northward, aligning with warming trends. Overall, these findings highlight the critical role of temperature in driving range dynamics and underscore the need for latitude-specific monitoring strategies to mitigate invasion risks, providing a scientific basis for adaptive management under global climate change. Full article
(This article belongs to the Section Plant Ecology)
Show Figures

Figure 1

27 pages, 525 KiB  
Article
An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective
by Maria Carannante and Alessandro Mazzoccoli
Risks 2025, 13(8), 144; https://doi.org/10.3390/risks13080144 - 31 Jul 2025
Viewed by 127
Abstract
This article provides an overview of the current state-of-the-art in cyber risk and cyber risk management, focusing on the mathematical models that have been created to help with risk quantification and insurance pricing. We discuss the main ways that cyber risk is measured, [...] Read more.
This article provides an overview of the current state-of-the-art in cyber risk and cyber risk management, focusing on the mathematical models that have been created to help with risk quantification and insurance pricing. We discuss the main ways that cyber risk is measured, starting with vulnerability functions that show how systems react to threats and going all the way up to more complex stochastic and dynamic models that show how cyber attacks change over time. Next, we examine cyber insurance, including the structure and main features of the cyber insurance market, as well as the growing role of cyber reinsurance in strategies for transferring risk. Finally, we review the mathematical models that have been proposed in the literature for setting the prices of cyber insurance premiums and structuring reinsurance contracts, analysing their advantages, limitations, and potential applications for more effective risk management. The aim of this article is to provide researchers and professionals with a clear picture of the main quantitative tools available and to point out areas that need further research by summarising these contributions. Full article
14 pages, 872 KiB  
Article
Beyond Pain Management: Skin-to-Skin Contact as a Humanization Strategy in Cesarean Delivery: A Randomized Controlled Trial
by José Miguel Pérez-Jiménez, Rocío de-Diego-Cordero, Álvaro Borrallo-Riego, Manuel Luque-Oliveros, Domingo de-Pedro-Jimenez, Manuel Coheña-Jimenez, Patricia Bonilla Sierra and María Dolores Guerra-Martín
Healthcare 2025, 13(15), 1866; https://doi.org/10.3390/healthcare13151866 - 30 Jul 2025
Viewed by 201
Abstract
Background: Postoperative pain management after a cesarean section remains a significant challenge, as inadequate control can delay maternal recovery and hinder early bonding and breastfeeding. While multimodal analgesia is the standard approach, non–pharmacological strategies like immediate skin–to–skin contact (SSC) are often underused despite [...] Read more.
Background: Postoperative pain management after a cesarean section remains a significant challenge, as inadequate control can delay maternal recovery and hinder early bonding and breastfeeding. While multimodal analgesia is the standard approach, non–pharmacological strategies like immediate skin–to–skin contact (SSC) are often underused despite their potential benefits in reducing pain, improving uterine contractions, and increasing maternal satisfaction. Objective: To evaluate the effects of immediate SSC on postoperative pain perception, uterine contraction quality, and maternal satisfaction, and to explore ways to incorporate SSC into routine post–cesarean care to promote recovery and humanized care. Method: A randomized clinical trial was conducted with 80 women undergoing elective cesarean sections, divided into two groups: SSC (40 women) and control (40 women). Postoperative pain was measured using the Visual Analog Scale (VAS) at various intervals, while uterine contraction quality and maternal satisfaction were assessed through clinical observation and a Likert scale, respectively. Results: We found that women in the SSC group experienced significantly lower pain scores (VAS2 and VAS3, p < 0.001), stronger infraumbilical uterine contractions (92.5%, p < 0.001), and higher satisfaction levels (average 9.98 vs. 6.50, p < 0.001). An inverse correlation was observed between pain intensity and satisfaction, indicating that SSC enhances both physiological and psychological recovery. Conclusions: Immediate SSC after cesarean is an effective, humanizing intervention that reduces pain, supports uterine contractions, and boosts maternal satisfaction. These findings advocate for integrating SSC into standard postoperative care, aligning with ethical principles of beneficence and autonomy. Further research with larger samples is necessary to confirm these benefits and facilitate widespread adoption in maternity protocols. Full article
Show Figures

Figure 1

22 pages, 6452 KiB  
Article
A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains
by John Byrd, Kritagya Upadhyay, Samir Poudel, Himanshu Sharma and Yi Gu
Future Internet 2025, 17(8), 334; https://doi.org/10.3390/fi17080334 - 27 Jul 2025
Viewed by 417
Abstract
The global coffee supply chain is a complex multi-stakeholder ecosystem plagued by fragmented records, unverifiable origin claims, and limited real-time visibility. These limitations pose risks to ethical sourcing, product quality, and consumer trust. To address these issues, this paper proposes a blockchain and [...] Read more.
The global coffee supply chain is a complex multi-stakeholder ecosystem plagued by fragmented records, unverifiable origin claims, and limited real-time visibility. These limitations pose risks to ethical sourcing, product quality, and consumer trust. To address these issues, this paper proposes a blockchain and IoT-enabled framework for secure and transparent coffee supply chain management. The system integrates simulated IoT sensor data such as Radio-Frequency Identification (RFID) identity tags, Global Positioning System (GPS) logs, weight measurements, environmental readings, and mobile validations with Ethereum smart contracts to establish traceability and automate supply chain logic. A Solidity-based Ethereum smart contract is developed and deployed on the Sepolia testnet to register users and log batches and to handle ownership transfers. The Internet of Things (IoT) data stream is simulated using structured datasets to mimic real-world device behavior, ensuring that the system is tested under realistic conditions. Our performance evaluation on 1000 transactions shows that the model incurs low transaction costs and demonstrates predictable efficiency behavior of the smart contract in decentralized conditions. Over 95% of the 1000 simulated transactions incurred a gas fee of less than ETH 0.001. The proposed architecture is also scalable and modular, providing a foundation for future deployment with live IoT integrations and off-chain data storage. Overall, the results highlight the system’s ability to improve transparency and auditability, automate enforcement, and enhance consumer confidence in the origin and handling of coffee products. Full article
Show Figures

Figure 1

24 pages, 4612 KiB  
Article
A Privacy Preserving Attribute-Based Access Control Model for the Tokenization of Mineral Resources via Blockchain
by Padmini Nemala, Ben Chen and Hui Cui
Appl. Sci. 2025, 15(15), 8290; https://doi.org/10.3390/app15158290 - 25 Jul 2025
Viewed by 160
Abstract
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign [...] Read more.
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign permissions based on predefined roles rather than real-world conditions like mining licenses, regulatory approvals, or investment status. To address this, this paper explores an attribute-based access control model for blockchain-based mineral tokenization systems. ABAC allows access permissions to be granted dynamically based on multiple attributes rather than fixed roles, making it more adaptable to the mining industry. This paper presents a high-level system design that integrates ABAC with the blockchain using smart contracts to manage access policies and ensure compliance. The proposed model is designed for permissioned blockchain platforms, where access control decisions can be automated and securely recorded. A comparative analysis between ABAC and RBAC highlights how ABAC provides greater flexibility, security, and privacy for mining operations. By introducing ABAC in blockchain-based mineral reserve tokenization, this paper contributes to a more efficient and secure way of managing data access in the mining industry, ensuring that only authorized stakeholders can interact with tokenized mineral assets. Full article
Show Figures

Figure 1

17 pages, 655 KiB  
Review
Passenger Service Time at the Platform–Train Interface: A Review of Variability, Design Factors, and Crowd Management Implications Based on Laboratory Experiments
by Sebastian Seriani, Vicente Aprigliano, Vinicius Minatogawa, Alvaro Peña, Ariel Lopez and Felipe Gonzalez
Appl. Sci. 2025, 15(15), 8256; https://doi.org/10.3390/app15158256 - 24 Jul 2025
Viewed by 273
Abstract
This paper reviews the variability of passenger service time (PST) at the platform–train interface (PTI), a critical performance indicator in metro systems shaped by the infrastructure design, affecting passenger behavior and accessibility. Despite its operational importance, PST remains underexplored in relation to crowd [...] Read more.
This paper reviews the variability of passenger service time (PST) at the platform–train interface (PTI), a critical performance indicator in metro systems shaped by the infrastructure design, affecting passenger behavior and accessibility. Despite its operational importance, PST remains underexplored in relation to crowd management strategies. This review synthesizes findings from empirical and experimental research to clarify the main factors influencing PST and their implications for platform-level interventions. Key contributors to PST variability include door width, gap dimensions, crowd density, and user characteristics such as mobility impairments. Design elements—such as platform edge doors, yellow safety lines, and vertical handrails—affect flow efficiency and spatial dynamics during boarding and alighting. Advanced tracking and simulation tools (e.g., PeTrack and YOLO-based systems) are identified as essential for evaluating pedestrian behavior and supporting Level of Service (LOS) analysis. To complement traditional LOS metrics, the paper introduces Level of Interaction (LOI) and a multidimensional LOS framework that captures spatial conflicts and user interaction zones. Control strategies such as platform signage, seating arrangements, and visual cues are also reviewed, with experimental evidence showing that targeted design interventions can reduce PST by up to 35%. The review highlights a persistent gap between academic knowledge and practical implementation. It calls for greater integration of empirical evidence into policy, infrastructure standards, and operational contracts. Ultimately, it advocates for human-centered, data-informed approaches to PTI planning that enhance efficiency, inclusivity, and resilience in high-demand transit environments. Full article
(This article belongs to the Special Issue Research Advances in Rail Transport Infrastructure)
Show Figures

Figure 1

18 pages, 1510 KiB  
Review
Uncovering the Professional Landscape of Clinical Research Nursing: A Scoping Review with Data Mining Approach
by Mattia Bozzetti, Monica Guberti, Alessio Lo Cascio, Daniele Privitera, Catia Genna, Silvia Rodelli, Laura Turchini, Valeria Amatucci, Luciana Nicola Giordano, Vincenzina Mora, Daniele Napolitano and Rosario Caruso
Nurs. Rep. 2025, 15(8), 266; https://doi.org/10.3390/nursrep15080266 - 24 Jul 2025
Viewed by 314
Abstract
Background/Objectives: Clinical Research Nurses (CRNs) have emerged as pivotal actors in the conduct, coordination, and oversight of clinical trials globally. Over the past three decades, the role of the CRN has evolved in response to the increasing complexity of research protocols, ethical [...] Read more.
Background/Objectives: Clinical Research Nurses (CRNs) have emerged as pivotal actors in the conduct, coordination, and oversight of clinical trials globally. Over the past three decades, the role of the CRN has evolved in response to the increasing complexity of research protocols, ethical standards, and regulatory frameworks. Originating as task-oriented support figures, CRNs have progressively assumed broader responsibilities that include patient advocacy, protocol integrity, ethical vigilance, and interprofessional coordination. By mapping the global literature on CRNs, this review will examine how their role has been defined, implemented, and evaluated over the past three decades. Methods: A scoping review was conducted using JBI methodology and PRISMA-ScR guidelines. The search covered the peer-reviewed and gray literature from 1990 to 2024 across major databases. Data analysis combined traditional extraction with topic modeling, Multiple Correspondence Analysis, and k-means clustering to identify key themes. Results: From the 128 included studies, four major themes emerged: clinical trial management, role perception and team integration, professional competencies and development, and systemic barriers. Despite formal competency frameworks, CRNs face inconsistencies in role recognition, unstable contracts, and limited career pathways. Emotional strain and professional isolation are recurrent. Over time, their functions have evolved from task execution to broader responsibilities, including advocacy and ethical oversight. However, no studies reported patient-level outcomes, revealing a critical gap in the evidence base. Conclusions: CRNs play a vital but undervalued role in clinical research. Persistent structural challenges hinder their development and visibility. Enhancing institutional support and generating outcome-based evidence are necessary steps toward fully integrating CRNs into research infrastructures. Full article
Show Figures

Figure 1

20 pages, 1857 KiB  
Article
Application of Risk Management in Applied Engineering Projects in a Petrochemical Plant Producing Polyvinyl Chloride in Cartagena, Colombia
by Juan Pablo Bustamante Visbal, Rodrigo Ortega-Toro and Joaquín Alejandro Hernández Fernández
ChemEngineering 2025, 9(4), 75; https://doi.org/10.3390/chemengineering9040075 - 21 Jul 2025
Viewed by 385
Abstract
Risk management is crucial in engineering projects, especially in highly complex environments like petrochemical plants producing polyvinyl chloride (PVC). This study proposes a tailored risk management model, using analytic hierarchy process (AHP) and linear regression analysis, alongside MS Excel and IBM SPSS® [...] Read more.
Risk management is crucial in engineering projects, especially in highly complex environments like petrochemical plants producing polyvinyl chloride (PVC). This study proposes a tailored risk management model, using analytic hierarchy process (AHP) and linear regression analysis, alongside MS Excel and IBM SPSS® version 23, to identify, assess, and prioritize key risks. Surveys and interviews revealed seven management factors (budget, schedule, safety, productivity, contracting, quality, and environment) and 18 critical risks, including design errors and procurement delays. The model quantifies risk impacts, provides a regression equation for risk classification, and supports effective mitigation strategies. Based on this model, decision-making can be facilitated for the implementation of effective mitigation strategies. It also promotes continuous improvement, optimizing economic resources and minimizing environmental impacts, addressing a research gap in Colombia’s petrochemical sector and paving the way for broader industrial applications. Full article
Show Figures

Figure 1

21 pages, 12791 KiB  
Article
Investigating the Evolution of Resilient Microservice Architectures: A Compatibility-Driven Version Orchestration Approach
by Mykola Yaroshynskyi, Ivan Puchko, Arsentii Prymushko, Hryhoriy Kravtsov and Volodymyr Artemchuk
Digital 2025, 5(3), 27; https://doi.org/10.3390/digital5030027 - 20 Jul 2025
Viewed by 351
Abstract
An Application Programming Interface (API) is a formally defined interface that enables controlled interaction between software components, and is a key pillar of modern microservice-based architectures. However, asynchronous API changes often lead to breaking compatibility and introduce systemic instability across dependent services. Prior [...] Read more.
An Application Programming Interface (API) is a formally defined interface that enables controlled interaction between software components, and is a key pillar of modern microservice-based architectures. However, asynchronous API changes often lead to breaking compatibility and introduce systemic instability across dependent services. Prior research has explored various strategies to manage such evolution, including contract-based testing, semantic versioning, and continuous deployment safeguards. Nevertheless, a comprehensive orchestration mechanism that formalizes dependency propagation and automates compatibility enforcement remains lacking. In this study, we propose a Compatibility-Driven Version Orchestrator, integrating semantic versioning, contract testing, and CI triggers into a unified framework. We empirically validate the approach on a Kubernetes-based environment, demonstrating the improved resilience of microservice systems to breaking changes. This contribution advances the theoretical modeling of cascading failures in microservices, while providing developers and DevOps teams with a practical toolset to improve service stability in dynamic, distributed environments. Full article
Show Figures

Figure 1

Back to TopTop