This paper aims to study the protection of data privacy in news crowdfunding in the era of artificial intelligence. This paper respectively quotes the encryption algorithm of artificial intelligence data protection and the BP...
Purpose- The aim of this study is to analyze the effect of corporate social responsibility (CSR) and social preference on quality improvement of the agricultural products supply chain composed of agricultural products producer...
Though various ranking methods in the data envelopment analysis (DEA) context have emerged since the conventional DEA was introduced, none of them has not been accepted as a universal or a superior method for ranking...
Firms are awash in big data and analytical technology as part of the process of deriving values in the current turbulent environment. The literature has reached a consensus that investments in technology only may not reap...
Machine learning is a broad field that contains multiple fields of discipline including mathematics, computer science, and data science. Some of the concepts, like deep neural networks, can be complicated and difficult to...
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
With the problems of neonatal survival and aging of the population becoming increasingly serious, the voice that longs for a new model of the medical industry is pushed to the limelight in the society. Gradually, a neologism...
In online sharing economy platforms, users often need to cooperate with strangers with minimal information. When personal photos are available on these platforms, how do users form social perceptions and consequently cooperative...
Nowadays, machine learning is popular in remote access Trojan (RAT) detection which can create patterns for decision-making. However, most research focus on improving the detection rate and reducing the false negative rate...
Globally, aging is now a societal trend and challenge in many developed and developing countries. A key medical strategy that a fast-paced aging society must consider is the provision of quality long-term care (LTC) services....
The risk assessment of liquefied natural gas (LNG) transportation routes has raised researchers' concerns in recent years, which is a group multi-criteria decision-making (GMCDM) problems that involves experts' opinions from...
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
Predicting graduation destination can help students determine their learning goals in advance, help faculty optimize curriculum and provide career guidance for students. In this paper, the authors first propose a prediction...
The study aims to establish a platform-based enterprise credit supervision mechanism, and combined with big data, accurately evaluate the credit assets of enterprises under the influence of social stability risk, and improve the...
By analyzing the impact of different fairness concerns on a green supply chain, this study determines the optimal decisions under different power structures and conducts a comparative analysis of them. The findings of this study...
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has...
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method...
A large number of customers have used traditional e-commerce portals, where there are no assurance of product quality, display of all features, picture search, virtual chat service, product recommendation and tracking facility....
Self-regulated learning (SRL) is a very significant ability for students in the learning process, and SRL strategies are used to assist students in learning efficiently in higher education. Many SRL environments face challenges...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
In the era of big data with exponential growth in data volume, how to reduce data security issues such as data leakage caused by machine learning is a hot area of recent research. The existing privacy budget allocation...
This article describes how current research on the institutional entrepreneurship process tends to ‘design principles.' There is lack of research on mechanism and strategy of the institutional bricolage, especially for Internet...
5G service refers to the mobile services built on the 5th generation telecommunication technology. It enhances end user experience of mobile internet surfing significantly. The high bandwidth of 5G technologies offers vendors...