The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
This article reports on a study involving experienced university lecturers from mainland China reflecting on how to blend FutureLearn MOOCs into their existing English Language Teaching (ELT) curricula while on an ‘upskilling'...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
To understand the impacts of anthropogenic activities on structure and composition of microbial communities and evaluate how microbial communities respond environmental gradients at river sediments, the composition of microbial...
Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
As irreplaceable knowledge infrastructures, universities have been acknowledged to play the roles of fostering knowledge workers, supporting knowledge economies, and building knowledge cities. Through spatial developments...
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very...
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many...
In order to solve the poor performance problem of massive rules reasoning, as well as the inconsistency problem of working memory in distributed rule matching, this article presents the formal definition of interference...
Traditional image denoising algorithms are generally based on spatial domains or transform domains to denoise and smooth the image. The denoised images are not exhaustive, and the depth-of-learning algorithm has better denoising...
Improving software development efficiency based on existing APIs is one of the hot researches in software engineering. Understanding and learning so many APIs in large software libraries is not easy and software developers...
Credit scoring, aiming to distinguish potential loan defaulter, has played an important role in the financial industry. To further improve the accuracy and efficiency of classification, this paper develops an ensemble model...
Quantitative detection of virus-like particles under a low concentration is of vital importance for early infection diagnosis and water pollution analysis. In this paper, a novel virus detection method is proposed using indirect...