Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
Online education has become the mainstream since the outbreak of COVID-19 pandemic. This paper did a bibliographic review based on VOSviewer and CiteSpace. The author reviewed the definitions, pros and cons for teachers and...
Based on the findings of previous studies, a new theoretical model of the influence of hospital's online healthcare information services to its elderly patients' information adoption intention was formulated, analyzed, and...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
As a new value creation phenomenon, value co-creation has been widely concerned by academia and industry. Companies begin to invest significant resources and build information exchange platform to interact with customers in...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
One challenge to the success of online knowledge-sharing communities relates to the participants' longtime participation. Literature has explored the determinants of initial participation rather than longtime participation...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
An ideal combination of both system planning and process control can greatly reduce system cost and maximize economic and environmental benefits associated with marine oily wastewater treatment. If appropriate process control is...
With the aim of exploring how digital transformation impacts enterprise development in China, this study takes Chinese A-share listed enterprises from 2007 to 2020 as the research sample and constructs a digital transformation...
Despite the increasing participation of Chinese immigrant professionals in Australian workplace, they are still underrepresented in senior leadership positions and their perspectives have been overlooked in management and...
Mass customization has been used in various clothing products including T-shirts, dress shirts, jeans, sports shoes, accessories, etc. However, even though the concept of mass customization has been accepted among scholars and...
The purposes are to predict exchange rate fluctuations more accurately and enhance Chinese enterprises’ ability to avoid exchange rate risks. Renminbi (RMB) exchange rate fluctuation’s prediction methods are studied based on...
Considering the mixed arguments and uncertainty about the payoff of cloud computing, this paper empirically studies the long-term cloud computing impact on the financial performance, specifically from the perspective of...
This study aimed to explore factors affecting continual usage of one-stop smart urban apps, which is the key to realise the vision of smart cities. A questionnaire (involved a total of 578 users/citizens) was carried out to test...
Previous studies demonstrate that online interactive relations can help improve users' innovation outcomes, yet few studies have investigated how they influence user innovation. This paper builds a social network based on users'...
To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD)...
The application of the metaverse provides a new perspective for educational innovation and talent training in the new century. By creating multi-channel perceptions such as sight, hearing, and touch through the VR/AR/MR...
With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio...
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations....
The wide use of social media technology boosts many online innovation platforms, providing effective communication channels for innovation spreading among online users. From the social network perspective, this paper...
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the...