The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Football fans are consumers with special relationship with their favourite teams. Consumer-brand relationship is unique and ultimate in football context. However, the absence of these relationships is mainly due to a lack of...
In order to meet the needs of life-long learning of the Internet of Things and the economic and social development of digital learning countries, we must actively explore the teaching mode of digital self-learning courses for...
Urban density, in the form of residents' and visitors' concentration, is long considered to foster diverse exchanges of interpersonal knowledge and skills, which are intrinsic to sustainable human settlements. However, with...
“Ideology” shapes our discourse practices and is closely related to the translation activities. This paper attempts to explore how ideological factors influence the cultural transmission of Confucianism through a comparative...
Today an increasing number of cities are equipping themselves with three-dimensional urban modelling and simulation platforms for energy management to integrate both spatial and semantic data for enabling better decision-making....
The conservation and restoration of biodiversity in the marine environment is a crucial aspect of fishing and related activities. Human activities cause changes in fish population and deep transformation in the type and quality...
This study sets out to describe simultaneous interpreters' attention-sharing initiatives when exposed under input from both videotaped speech recording and real-time transcriptions. Separation of mental energy in acquiring...
Along with the rapid development of digital information technology, e-government is of great potential because it is a new form of conducting public administration and a way of demonstrating governmental innovation. The...
The brain-computer interface (BCI) system uses electroencephalography (EEG) signals for correspondence between the human and the outside world. This BCI communication system does not require any muscle action; hence, it can be...
In the face of fierce competition, many peer-to-peer (P2P) lending platforms have introduced automated investment tools to serve customers better. Based on a large sample of data from PPdai.com, the authors studied the impact of...
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Current planning practices in Europe are affected by regulations aiming at environmental protection and risk reduction; however, planners face difficulties in implementing the norms. This chapter discusses the influence of the...
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system...
Drawing from extant retailing and supply chain research, this paper studies the dual channel supply chain decision-making of member channel, and obtains the optimal price strategy, maximum demand and maximum total revenue of the...
Library maker services are a current focus of the industry's theoretical research and practice. With the popularization of the maker movement and the development of “mass entrepreneurship and innovation” in China, the library...
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking...
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate...