With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
It is increasingly important to reuse the wastewater conservancy facilities, which can further promote the development of agricultural economy. The basis of full investigation and research on the wastewater conservancy...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
With the rapid development of information communication technology (ICT) in teaching, deeper learning has become an essential competency for success in the 21st-century classroom. College students' deeper learning assessments...
With the aim of exploring how digital transformation impacts enterprise development in China, this study takes Chinese A-share listed enterprises from 2007 to 2020 as the research sample and constructs a digital transformation...
Passenger-paid seat selection is one of the important sources of ancillary revenue for airlines, and machine learning-based willingness-to-pay identification is of great practicality for airlines to accurately tap potential...
While career anchors have mainly studied in the US society; this study demonstrates the difference in the career anchors of the information technology/information system (IT/IS) personnel rooted in different cultures. The survey...
This study reviewed EC studies in China. A total of 1,982 journal articles published between 2001 and 2020 were collected from the Web of Science database. In addition, it referred to the Five-Year Plan for Economic and Social...
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
This study examines the transformational leadership behavior for organizational change by creating the environment of sharing knowledge in organizational and individual level of the organization for a sample of 300 employees and...
Personalized information retrieval is an effective tool to solve the problem of information overload. Along with the rapid development of emerging network technologies such as cloud computing, however, network servers are...
The Belt and Road Initiative (BRI) initiated by Chinese government could be regarded as a systematic framework for promoting economic cooperation and development among the countries along the Belt and Road and China. This paper...
The integration of economies always attracts much attention from policymakers and researchers. This paper introduces a novel approach to evaluate potential economic and environmental gains from integrating economies. Based on...
In recent years, wearable and mobile technologies have been applied in different domains such as medical, personal safety, sports, and lifestyle computing (Cheng & Mitomo, 2017). Wearable technologies may help users bring their...
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio...
With the continuous developments of real estates and the increasing personalization of people, more and more house owners are willing to search for and discover their preferred decorative art patterns via various house...
This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge...
In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social...
This paper investigates structural variation of agricultural productivity growth in China using a multiple-frontier approach. Agricultural productivity gain in Sichuan province is decomposed into technological progress...
This study makes use of online teaching in this environment and adopts it for use in a required computer skills course with Cognitive apprenticeship (CA) and Co-regulated learning (CRL) teaching methods to improve students’...
As artificial intelligence technique is widely used in the automatic driving system, the safety evaluation of automatic vehicles is considered to be the most important demand. Under this context, in this paper, an evaluation...
As M-Health apps become more popular, users can access more mobile health information (MHI) through these platforms. Yet one preeminent question among both researchers and practitioners is how to bridge the gap between simply...
The sudden outbreak of COVID-19 has dealt a huge blow to traditional education and training companies. Institutions use the WeChat platform to attract users, but how to identify high-quality users has always been a difficult...