Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
This article reports on a study involving experienced university lecturers from mainland China reflecting on how to blend FutureLearn MOOCs into their existing English Language Teaching (ELT) curricula while on an ‘upskilling'...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
With the rapidly developing of the scientific research in the field of sports, big data analytics and information science are used to carry out technical and tactical statistical analysis of competition or training videos. The...
Studies that specifically discuss the formation of autonomous motivations of users of social networking services (SNSs) and how such motivation influences SNS user intention to disclose personal location-related information...
Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
This research advances scholarly understanding of the strategic decisions regarding external communication during the critical period of product launch. Drawing on research about dynamic capabilities and external organizational...
Through user characteristic information, user interaction behavior, commodity characteristic information, recommendation engine, and related technologies in data mining, this paper makes a more in-depth study, and analyzes the...
This paper expounds on the development prospects of SMEs and E-commerce finance, and illustrates the significance of developing online finance. It also introduces the commonly-used research methods of the two kinds of financial...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
This article mainly studies the design and realization of English listening teaching system based on virtual environment technology. This paper designs and builds a virtual experimental operating platform to assist students in...
Through the cooperation with the Evergreen Education Foundation in the United States, the Tongwei rural library network has been set up and a cooperation service alliance between a public library and school libraries has been...
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties...
The green transformation and upgrading of manufacturing enterprises cannot do without the support of green investment. The purpose of this study is to verify whether there is a correlation between the influencing factors of...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
Students can find numerous online resources and platforms for English vocabulary learning during COVID-19. However, most online vocabulary recollection research was concerned with general vocabulary retention, particularly the...