Healthcare insurance fraud influences not only organizations by overburdening the already fragile healthcare systems, but also individuals in terms of increasing premiums in health insurance and even fatalities. Identifying the...
The ‘main structure and performances’ of any physical system may be (nearly) maintained for a given time interval only if this system is kept inside a kind of ‘shell’ that protects it and only, if the necessary (desired)...
The network in information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their...
Research on the identification model of orange origin based on machine learning in Near infrared (NIR) spectroscopy. According to the characteristics of NIR spectral data, a complete general framework for origin identification...
With the rapid development of information communication technology (ICT) in teaching, deeper learning has become an essential competency for success in the 21st-century classroom. College students' deeper learning assessments...
The sudden attack of the new crown virus in 2020 has brought an unprecedented impact on the real estate market economy and has completely disrupted people's work and life rhythm! With the rapid development of the Internet, the...
With the rapid development of mobile Internet technology, mobile network data traffic presents an explosive growth trend. Especially, the proportion of mobile video business has become a large proportion in mobile Internet...
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
Incorporate contextual information into recommendation systems can obtain better accuracy of recommendation, however, the users’ individual privacy may be disclosed by attackers. In order to resolve this problem, the authors...
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
This study investigated integrated elderly care services supply chains using a combination of Decision Making Trial and Evaluation Laboratory (DEMATEL), Interpretative Structural Modeling (ISM), and the Technique for Order...
With continual increase of environmental pressure from human activities, it has become necessary to study the process of socioeconomic water usage influencing the water quality. Based on the system dynamic model developed before...
Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot...
Under the background of electrification, it is significant to explore the changes in residential electricity consumption for energy conservation and emission reduction. Based on the staggered difference-in-difference (DID)...
To improve the anti-jamming performance of frequency hopping system in complex electromagnetic environment, a Deep Q-Network algorithm with priority experience replay (PER) based on Pareto samples (PPER-DQN) is proposed, which...
Although business and researchers acknowledge the importance of social media, little research has been conducted to explore what attracts people to follow brand Twitter accounts. This research attempts to achieve an analytical...
Although business and researchers acknowledge the importance of social media, little research has been conducted to explore what attracts people to follow brand Twitter accounts. This research attempts to achieve an analytical...
Most recommender systems usually combine several recommendation methods to enhance the recommendation accuracy. Collaborative filtering (CF) is a best-known personalized recommendation technique. While temporal association...
With the progress of digital and mobile technologies, mobile short video apps (MSAs) have been booming in recent years. These MSAs are expanding their role in social commerce, which has aroused scholar’s and practitioners’...
The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future...
Biosurfactant production by Rhodococcus erythropolis SB-1A was studied based on Atlas oil agar medium in a batch reactor. The strain was isolated from a water sample collected from Northern Atlantic Ocean. Several parameters...
Agriculture is considered a sector with an essential contribution to carbon emissions in the Belt and Road Initiative (BRI) countries. This paper innovatively uses the by-production process to analyze the agricultural carbon...