Search

Results: 36
Video-Based Person Re-Identification With Unregulated Sequences
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
Published by: IGI Global
Visualizing Online Education in the COVID-19 Pandemic Based on the Bibliometric Method
Lei Liang
Jan 01, 2022
Online education has become the mainstream since the outbreak of COVID-19 pandemic. This paper did a bibliographic review based on VOSviewer and CiteSpace. The author reviewed the definitions, pros and cons for teachers and...
Published by: IGI Global
The Influence of Hospital Online Healthcare Information Services on Information Adoption Intention
Liu Liang
Oct 01, 2022
Based on the findings of previous studies, a new theoretical model of the influence of hospital's online healthcare information services to its elderly patients' information adoption intention was formulated, analyzed, and...
Published by: IGI Global
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
He Xu, Peng Li, Chao Xu
Jan 01, 2021
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Published by: IGI Global
The Role of Customer-Task Fit Between Service Interaction and Value Co-Creation
As a new value creation phenomenon, value co-creation has been widely concerned by academia and industry. Companies begin to invest significant resources and build information exchange platform to interact with customers in...
Published by: IGI Global
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
Published by: IGI Global
Why People are Involved in and Committed to Online Knowledge-Sharing Communities
One challenge to the success of online knowledge-sharing communities relates to the participants' longtime participation. Literature has explored the determinants of initial participation rather than longtime participation...
Published by: IGI Global
Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
Published by: IGI Global
An Integrated System Planning and Process Control System for Marine Wastewater Management
An ideal combination of both system planning and process control can greatly reduce system cost and maximize economic and environmental benefits associated with marine oily wastewater treatment. If appropriate process control is...
Does Digital Transformation Promote Enterprise Development?
With the aim of exploring how digital transformation impacts enterprise development in China, this study takes Chinese A-share listed enterprises from 2007 to 2020 as the research sample and constructs a digital transformation...
Published by: IGI Global
Acculturation Matters?
Despite the increasing participation of Chinese immigrant professionals in Australian workplace, they are still underrepresented in senior leadership positions and their perspectives have been overlooked in management and...
Published by: IGI Global
Fashion or Function
Mass customization has been used in various clothing products including T-shirts, dress shirts, jeans, sports shoes, accessories, etc. However, even though the concept of mass customization has been accepted among scholars and...
Published by: IGI Global
The Analysis of Global RMB Exchange Rate Forecasting and Risk Early Warning Using ARIMA and CNN Model
The purposes are to predict exchange rate fluctuations more accurately and enhance Chinese enterprises’ ability to avoid exchange rate risks. Renminbi (RMB) exchange rate fluctuation’s prediction methods are studied based on...
Published by: IGI Global
Efficiency or Innovation?
Considering the mixed arguments and uncertainty about the payoff of cloud computing, this paper empirically studies the long-term cloud computing impact on the financial performance, specifically from the perspective of...
Published by: IGI Global
One-Stop Smart Urban Apps and Determinants of Their Continuance Usage
This study aimed to explore factors affecting continual usage of one-stop smart urban apps, which is the key to realise the vision of smart cities. A questionnaire (involved a total of 578 users/citizens) was carried out to test...
Published by: IGI Global
How Does User Social Network Improve Innovation Outcomes on a Virtual Innovation Platform?
Previous studies demonstrate that online interactive relations can help improve users' innovation outcomes, yet few studies have investigated how they influence user innovation. This paper builds a social network based on users'...
Published by: IGI Global
Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing
To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD)...
Published by: IGI Global
On the Personalized Learning Space in Educational Metaverse Based on Heart Rate Signal
The application of the metaverse provides a new perspective for educational innovation and talent training in the new century. By creating multi-channel perceptions such as sight, hearing, and touch through the VR/AR/MR...
Published by: IGI Global
Hospital Employee Performance Evaluation Based on Knowledge Map
With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
Published by: IGI Global
Anti-Forensics of Double Compressed MP3 Audio
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio...
Published by: IGI Global
An Agent-based Simulation-optimization Coupling Approach for Device Allocation and Operation Control in Response to Offshore Oil Spills
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
Two-Step Image-in-Image Steganography via GAN
Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations....
Published by: IGI Global
The Online Social Network and User Innovation in the Context of an Online Innovation Platform
The wide use of social media technology boosts many online innovation platforms, providing effective communication channels for innovation spreading among online users. From the social network perspective, this paper...
Published by: IGI Global
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Published by: IGI Global
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain
Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the...
Published by: IGI Global

|<

<

1

2

>

>|