Search

Results: 39
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree
This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
Published by: IGI Global
Critical Obstacles Affecting Adoption of Industrial Big Data Solutions in Smart Factories
Industrial big data is the key to realize the vision of smart factories. This research aims to identify and explore potential barriers that prevent organizations from deploying industrial big data solutions in the development of...
Published by: IGI Global
Mobile Applications in China's Smart Cities
Aligned with the global trend of smartness, China has invested heavily in over 700 smart city projects across over 500 cities. Hundreds of smart city apps, initiated by local authorities, have so emerged in the daily lives of...
Published by: IGI Global
Investigating the Usage of IoT-Based Smart Parking Services in the Borough of Westminster
Smart Parking schemes cannot succeed without the engagement and support of the drivers who may benefit from their use. This study investigates engagement with a Smart Parking service in the London Borough of Westminster. ...
Published by: IGI Global
One-Stop Smart Urban Apps and Determinants of Their Continuance Usage
This study aimed to explore factors affecting continual usage of one-stop smart urban apps, which is the key to realise the vision of smart cities. A questionnaire (involved a total of 578 users/citizens) was carried out to test...
Published by: IGI Global
Reading Promoters' Training
Lihua Wang, Fei Yang
Jan 01, 2020
In order to make reading promotion more professional and qualified, some libraries and associations in China are training reading promoters. The Pudong Library of Shanghai is a typical case. This article summarizes the theory...
Published by: IGI Global
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
Published by: IGI Global
Integration of Multi-Omics Data to Identify Cancer Biomarkers
Peng Li, Bo Sun
Jan 01, 2022
A novel method for integrating multi-omics data, including gene expression, copy number variation, DNA methylation, and miRNA data, is proposed to identify biomarkers of cancer prognosis. First, survival analysis was performed...
Published by: IGI Global
A Better Medical Interpreting Service
Jifei Zhang, Fei Wang
Jan 01, 2021
Medical interpreting has become a new research focus in recent decades, but few studies have discussed the role of interpreter in combination with strategies. This paper aims to work out how a medical interpreter plays his or...
Published by: IGI Global
Point of View in Translator's Style
Yang Liu
Oct 31, 2022
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
Published by: IGI Global
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
Published by: IGI Global
Exploration of Financial Market Credit Scoring and Risk Management and Prediction Using Deep Learning and Bionic Algorithm
Peng Du, Hong Shu
Jan 01, 2022
The purpose is to effectively manage the financial market, comprehensive assess personal credit, reduce the risk of financial enterprises. Given the systemic risk problem caused by the lack of credit scoring in the existing...
Published by: IGI Global
The Relationship Between Bitcoin and Stock Market
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
Published by: IGI Global
English Article Style Recognition and Matching by Using Web Semantics
Mi Zhou, Lina Peng
Apr 01, 2022
With the explosion of internet information, people feel helpless and difficult to choose in the face of massive information. However, the traditional method to organize a huge set of original documents is not only time-consuming...
Published by: IGI Global
Design of a Crooked-Wire Antenna by Differential Evolution and 3D Printing
Antenna design often requires dealing with multiple constraints in the requirements, and the designs can be modeled as constrained optimization problems (COPs). However, the constraints are usually very strange, and then the...
Published by: IGI Global
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
He Xu, Peng Li, Chao Xu
Jan 01, 2021
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Published by: IGI Global
Feasibility of Hybrid PSO-ANN Model for Identifying Soybean Diseases
Soybean disease has become one of vital factors restricting the sustainable development of high-yield and high-quality soybean industry. A hybrid artificial neural network (ANN) model optimized via particle swarm optimization...
Published by: IGI Global
Study of the Impact of the Rise and Fall of the Coal Industry on the Regional Economy
Coal has always been an important foundation for China’s economy. The booming and declining of the coal industry can directly impact the regional economy. This study researches the impact of the rise and fall of the coal...
Published by: IGI Global
A Survey of UAV Swarm Task Allocation Based on the Perspective of Coalition Formation
Coalition formation of unmanned aerial vehicle (UAV) swarms, an effective solution for UAV swarm task allocation, is an important technology for UAV swarms to perform real-time and efficient collaborative task allocation in a...
Published by: IGI Global
Internet of Things-Enabled Crop Growth Monitoring System for Smart Agriculture
In order to solve the problems of high cost and difficult management of traditional agricultural planting, internet of things (IoT) technology was applied to realize real-time detection and intelligent management of crop growth...
Published by: IGI Global
A Study on Effective Measurement of Search Results from Search Engines
This article describes how as internet technology continues to change and improve lives and societies worldwide, effective global information management becomes increasingly critical, and effective Internet information retrieval...
Published by: IGI Global
New Data-Related Roles for Librarians
From applying for competitive grants to showcasing institutional collaboration and research trends, the need for research institutions to demonstrate and increase visibility of research impact is growing. The authors discuss...
Published by: IGI Global
MHDNNL
Task optimization scheduling is one of the key concerns of both cloud service providers (CSPs) and cloud users. The CSPs hope to reduce the energy consumption of executing tasks to save costs, while the users are more concerned...
Published by: IGI Global
Designing Controlled Chinese Rules for MT Pre-Editing of Product Description Text
The study aims to investigate how pre-editing based on controlled Chinese rules can be an effective approach to improving Chinese-to-English machine translation (MT) output. Based on the analysis of comparable texts, and by...
Published by: IGI Global
Evaluation of Economic Security of Water Resources and Analysis of Influencing Factors
To effectively evaluate the level of economic security of water resources (WES) in China and analyze its influencing factors, a comprehensive evaluation model of WES and a regression analysis model of influencing factors are...
Published by: IGI Global

|<

<

1

2

>

>|