The researchers of this study selected five journals in the field of education and conducted a series of analyses regarding publications dating from 2010 to 2019 to investigate the research trends and characteristics in the...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
BACKGROUND: While most existing studies reveal left-behind children (LBC) are prone to suffering from mental health issues, some other literature fails to develop a statistical significance between being left-behind and facing...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
With the rapid development of computer intelligence technology, the majority of scholars have a great interest in the detection and tracking of moving targets in the field of video surveillance and have been involved in its...
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
This study reviewed EC studies in China. A total of 1,982 journal articles published between 2001 and 2020 were collected from the Web of Science database. In addition, it referred to the Five-Year Plan for Economic and Social...
Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus...
This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters...
The study aims to identify influencing factors and their influences on the residential land use right mortgage as the basis for proposing solutions to improve land use right mortgage. The study used methods of collecting...
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...
In the context of digital transformation, this emerging technologies input creates powerful digital capabilities. Despite of the long distance, The enterprises cooperate more closely through wireless networks in digital space...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
A mobile application (App) is an application designed to run on a smartphone, tablet, or other mobile device. With the continuous change of mobile payment applications in smart phones and the support of the banking system, the...
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
Fog computing is a potential solution for the Internet of Things in close connection with things and end-users. Fog computing will easily transfer sensitive data without delaying distributed devices. Moreover, fog computing is...
The emergence of the cloud computing service has resulted in the entry of many companies into the market, with numerous competitors for cloud computing leading the technological trend. Recent studies have mainly focused on the...