Search

Results: 31
Do Social Networking Fan Page Posts Matter for Corporate Image?
The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Published by: IGI Global
The Role of Brand and Fan Personalities in Building Fan-Brand Relationships
Football fans are consumers with special relationship with their favourite teams. Consumer-brand relationship is unique and ultimate in football context. However, the absence of these relationships is mainly due to a lack of...
Published by: IGI Global
Paratext Analysis of Patronage Factors
Hu Liu
Jan 01, 2021
Drawing on André Lefevere's rewriting theory, this paper endeavours to explore how Howard Goldblatt translates Mo Yan's novel Life and Death Are Wearing Me Out (hereafter referred to as L&D) with regard to patronage control by...
Published by: IGI Global
Construction of OBE Concept Autonomous Learning Mode in University Teaching Based on the Internet
Fan Yang, Jiong Fan
Feb 21, 2022
In order to meet the needs of life-long learning of the Internet of Things and the economic and social development of digital learning countries, we must actively explore the teaching mode of digital self-learning courses for...
Published by: IGI Global
Diversity beyond density
Urban density, in the form of residents' and visitors' concentration, is long considered to foster diverse exchanges of interpersonal knowledge and skills, which are intrinsic to sustainable human settlements. However, with...
Published by:
A Critical Study on Translation of the Analects
Fan Min
Jan 01, 2021
“Ideology” shapes our discourse practices and is closely related to the translation activities. This paper attempts to explore how ideological factors influence the cultural transmission of Confucianism through a comparative...
Published by: IGI Global
Integration of Cutting-Edge Interoperability Approaches in Cyber-Physical Production Systems and Industry 4.0
Interoperability in smart manufacturing refers to how interconnected cyber-physical components exchange information and interact. This is still an exploratory topic, and despite the increasing number of applications, many...
Published by: IGI Global
Attention-Sharing Initiative of Multimodal Processing in Simultaneous Interpreting
This study sets out to describe simultaneous interpreters' attention-sharing initiatives when exposed under input from both videotaped speech recording and real-time transcriptions. Separation of mental energy in acquiring...
Published by: IGI Global
Single-Channel Region-Based Speller for Controlling Home Appliances
The brain-computer interface (BCI) system uses electroencephalography (EEG) signals for correspondence between the human and the outside world. This BCI communication system does not require any muscle action; hence, it can be...
Published by: IGI Global
The Impact of Automated Investment on Peer-to-Peer Lending
In the face of fierce competition, many peer-to-peer (P2P) lending platforms have introduced automated investment tools to serve customers better. Based on a large sample of data from PPdai.com, the authors studied the impact of...
Published by: IGI Global
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
Published by: IGI Global
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory
With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system...
Published by: IGI Global
The Design and Practice of Library Maker Service in Shenyang Normal University
Library maker services are a current focus of the industry's theoretical research and practice. With the popularization of the maker movement and the development of “mass entrepreneurship and innovation” in China, the library...
Published by: IGI Global
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
Published by: IGI Global
A Multi-Dimensional Context-Aware Healthcare Service Recommendation Method
Due to the outbreak of the COVID-19, online diagnosis and treatment services have developed rapidly, but it is not easy for patients to choose the appropriate healthcare service in the face of massive amounts of information. ...
Published by: IGI Global
A Summary of the Development of Cyber Security Threat Intelligence Sharing
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Published by: IGI Global
Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition
Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking...
Published by: IGI Global
The Key Research and Application in Grid Planning Using Improved Genetic Algorithm
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
Published by: IGI Global
Information Entropy Augmented High Density Crowd Counting Network
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate...
Published by: IGI Global
The Impact of SIPOC on Process Reengineering and Sustainability of Enterprise Procurement Management in E-Commerce Environments Using Deep Learning
In order to better promote the healthy and long-term development of enterprise procurement management process, under the background of e-commerce environment, Suppliers-Inputs-Process-Outputs-Customers (SIPOC) model, deep...
Published by: IGI Global
Analysis of WeChat Subscription Influence Based on Topic Diffusion
With the average daily growth of 15000 new subscribers, the number of WeChat subscription has broken the 5,800,000 subscribers recently. WeChat subscription's topic influence calculation has been very significant. This article...
Published by: IGI Global
Research on Measurement and Control System of Common Parameters of Agricultural Equipment Based on Wireless Transmission
To resolve the limited transmission and complicated layout, the common parameter measurement and control system of agricultural equipment use virtual instrument technology and embedded technology. The research results show that...
Published by: IGI Global
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism
In order to improve the ability to detect network attacks, traditional intrusion detection models often used convolutional neural networks to encode spatial information or recurrent neural networks to obtain temporal features of...
Published by: IGI Global
A Novel Compressed Sensing-Based Graph Isomorphic Network for Key Node Recognition and Entity Alignment
In recent years, the related research of entity alignment has mainly focused on entity alignment via knowledge embeddings and graph neural networks; however, these proposed models usually suffer from structural heterogeneity and...
Published by: IGI Global
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning
Traditional software defenses take corresponding actions after the attacks are discovered. The defenders in this situation are comparatively passive because the attackers may try many different ways to find vulnerability and...
Published by: IGI Global

|<

<

1

2

>

>|