This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
Industrial big data is the key to realize the vision of smart factories. This research aims to identify and explore potential barriers that prevent organizations from deploying industrial big data solutions in the development of...
Aligned with the global trend of smartness, China has invested heavily in over 700 smart city projects across over 500 cities. Hundreds of smart city apps, initiated by local authorities, have so emerged in the daily lives of...
Smart Parking schemes cannot succeed without the engagement and support of the drivers who may benefit from their use. This study investigates engagement with a Smart Parking service in the London Borough of Westminster. ...
This study aimed to explore factors affecting continual usage of one-stop smart urban apps, which is the key to realise the vision of smart cities. A questionnaire (involved a total of 578 users/citizens) was carried out to test...
In order to make reading promotion more professional and qualified, some libraries and associations in China are training reading promoters. The Pudong Library of Shanghai is a typical case. This article summarizes the theory...
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
A novel method for integrating multi-omics data, including gene expression, copy number variation, DNA methylation, and miRNA data, is proposed to identify biomarkers of cancer prognosis. First, survival analysis was performed...
Medical interpreting has become a new research focus in recent decades, but few studies have discussed the role of interpreter in combination with strategies. This paper aims to work out how a medical interpreter plays his or...
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
The purpose is to effectively manage the financial market, comprehensive assess personal credit, reduce the risk of financial enterprises. Given the systemic risk problem caused by the lack of credit scoring in the existing...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
With the explosion of internet information, people feel helpless and difficult to choose in the face of massive information. However, the traditional method to organize a huge set of original documents is not only time-consuming...
Antenna design often requires dealing with multiple constraints in the requirements, and the designs can be modeled as constrained optimization problems (COPs). However, the constraints are usually very strange, and then the...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Soybean disease has become one of vital factors restricting the sustainable development of high-yield and high-quality soybean industry. A hybrid artificial neural network (ANN) model optimized via particle swarm optimization...
Coal has always been an important foundation for China’s economy. The booming and declining of the coal industry can directly impact the regional economy. This study researches the impact of the rise and fall of the coal...
Coalition formation of unmanned aerial vehicle (UAV) swarms, an effective solution for UAV swarm task allocation, is an important technology for UAV swarms to perform real-time and efficient collaborative task allocation in a...
In order to solve the problems of high cost and difficult management of traditional agricultural planting, internet of things (IoT) technology was applied to realize real-time detection and intelligent management of crop growth...
This article describes how as internet technology continues to change and improve lives and societies worldwide, effective global information management becomes increasingly critical, and effective Internet information retrieval...
From applying for competitive grants to showcasing institutional collaboration and research trends, the need for research institutions to demonstrate and increase visibility of research impact is growing. The authors discuss...
Task optimization scheduling is one of the key concerns of both cloud service providers (CSPs) and cloud users. The CSPs hope to reduce the energy consumption of executing tasks to save costs, while the users are more concerned...
The study aims to investigate how pre-editing based on controlled Chinese rules can be an effective approach to improving Chinese-to-English machine translation (MT) output. Based on the analysis of comparable texts, and by...
To effectively evaluate the level of economic security of water resources (WES) in China and analyze its influencing factors, a comprehensive evaluation model of WES and a regression analysis model of influencing factors are...