Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
Compared with traditional machine learning model, graph neural networks (GNNs) have distinct advantages in processing unstructured data. However, the vulnerability of GNNs cannot be ignored. Graph universal adversarial attack is...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Initially, this special edition of The Morning Watch was developed to share the results of this research into four case studies within Inuit Nunangat. As such, the writing reflects a research project focused on four schools and...
Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
Inventory routing problem (IRP) has always been a hot issue. Due to its particularity, perishable products have high requirements for inventory and transportation. In order to reduce the losses of perishable goods and improve...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
In the promotion of global peace and security, police cooperation is considered one of the major pillars. This exploratory qualitative study focuses on the possibilities and challenges that should be overcome in the quest to...
The impact of cross-border e-commerce (CBEC) on international trade is prominent in recent years. The authors extend the international trade model with heterogeneous firms to include CBEC export and deduce that CBEC lowers the...
Intelligent predictive systems are showing a greater level of accuracy and effectiveness in early detection of critical diseases like cancer and liver and lung disease.Predictive models assist medical practitioners in...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
In order to address the problems that the accuracy and convergence of current network security situation assessment models need to be improved, a model of network security situation assessment based on SAA-SSA-BPNN is proposed....
Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge...
The purpose is to explore the application potential of HCI (Human-Computer Interaction) technology under AI (Artificial Intelligence) in enterprise performance evaluation and the influence of abusive management and self-efficacy...
This paper investigates structural variation of agricultural productivity growth in China using a multiple-frontier approach. Agricultural productivity gain in Sichuan province is decomposed into technological progress...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
In previous studies of synthetic speech detection (SSD), the most widely used features are based on a linear power spectrum. Different from conventional methods, this article proposes a new feature extraction method for SSD from...
This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very...