Search

Results: 44
Do Social Networking Fan Page Posts Matter for Corporate Image?
The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Published by: IGI Global
The Role of Brand and Fan Personalities in Building Fan-Brand Relationships
Football fans are consumers with special relationship with their favourite teams. Consumer-brand relationship is unique and ultimate in football context. However, the absence of these relationships is mainly due to a lack of...
Published by: IGI Global
Construction of OBE Concept Autonomous Learning Mode in University Teaching Based on the Internet
Fan Yang, Jiong Fan
Feb 21, 2022
In order to meet the needs of life-long learning of the Internet of Things and the economic and social development of digital learning countries, we must actively explore the teaching mode of digital self-learning courses for...
Published by: IGI Global
Diversity beyond density
Urban density, in the form of residents' and visitors' concentration, is long considered to foster diverse exchanges of interpersonal knowledge and skills, which are intrinsic to sustainable human settlements. However, with...
Published by:
A Critical Study on Translation of the Analects
Fan Min
Jan 01, 2021
“Ideology” shapes our discourse practices and is closely related to the translation activities. This paper attempts to explore how ideological factors influence the cultural transmission of Confucianism through a comparative...
Published by: IGI Global
EEB Project System Integration and Technology Sperimentation Matrix
Francesca Ugliotti
Jan 15, 2021
Today an increasing number of cities are equipping themselves with three-dimensional urban modelling and simulation platforms for energy management to integrate both spatial and semantic data for enabling better decision-making....
Published by: IGI Global
Parametric functional analysis of variance for fish biodiversity
The conservation and restoration of biodiversity in the marine environment is a crucial aspect of fishing and related activities. Human activities cause changes in fish population and deep transformation in the type and quality...
Attention-Sharing Initiative of Multimodal Processing in Simultaneous Interpreting
This study sets out to describe simultaneous interpreters' attention-sharing initiatives when exposed under input from both videotaped speech recording and real-time transcriptions. Separation of mental energy in acquiring...
Published by: IGI Global
The Rumble in the Meson
Ben Allanach, Joe Davighi
Apr 12, 2023
Abstract We juxtapose global fits of two bottom-up models (an S3 scalar leptoquark model and a...
Published by:
E-Government and Foreign Direct Investment
Along with the rapid development of digital information technology, e-government is of great potential because it is a new form of conducting public administration and a way of demonstrating governmental innovation. The...
Published by: IGI Global
Single-Channel Region-Based Speller for Controlling Home Appliances
The brain-computer interface (BCI) system uses electroencephalography (EEG) signals for correspondence between the human and the outside world. This BCI communication system does not require any muscle action; hence, it can be...
Published by: IGI Global
The Impact of Automated Investment on Peer-to-Peer Lending
In the face of fierce competition, many peer-to-peer (P2P) lending platforms have introduced automated investment tools to serve customers better. Based on a large sample of data from PPdai.com, the authors studied the impact of...
Published by: IGI Global
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Published by: IGI Global
Bridging the Gap Between Strategic Environmental Assessment and Planning
Current planning practices in Europe are affected by regulations aiming at environmental protection and risk reduction; however, planners face difficulties in implementing the norms. This chapter discusses the influence of the...
Published by: IGI Global
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
Published by: IGI Global
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory
With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system...
Published by: IGI Global
Research on Dual Channel Supply Chain Decision Making of New Retailing Enterprises Considering Service Behavior in the Era of Big Data
Drawing from extant retailing and supply chain research, this paper studies the dual channel supply chain decision-making of member channel, and obtains the optimal price strategy, maximum demand and maximum total revenue of the...
Published by: IGI Global
The Design and Practice of Library Maker Service in Shenyang Normal University
Library maker services are a current focus of the industry's theoretical research and practice. With the popularization of the maker movement and the development of “mass entrepreneurship and innovation” in China, the library...
Published by: IGI Global
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
Published by: IGI Global
A Summary of the Development of Cyber Security Threat Intelligence Sharing
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Published by: IGI Global
Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition
Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking...
Published by: IGI Global
The Key Research and Application in Grid Planning Using Improved Genetic Algorithm
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
Published by: IGI Global
Information Entropy Augmented High Density Crowd Counting Network
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate...
Published by: IGI Global

|<

<

1

2

>

>|