Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
Credit scoring, aiming to distinguish potential loan defaulter, has played an important role in the financial industry. To further improve the accuracy and efficiency of classification, this paper develops an ensemble model...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
Improving software development efficiency based on existing APIs is one of the hot researches in software engineering. Understanding and learning so many APIs in large software libraries is not easy and software developers...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...