In order to make reading promotion more professional and qualified, some libraries and associations in China are training reading promoters. The Pudong Library of Shanghai is a typical case. This article summarizes the theory...
Medical interpreting has become a new research focus in recent decades, but few studies have discussed the role of interpreter in combination with strategies. This paper aims to work out how a medical interpreter plays his or...
Industrial big data is the key to realize the vision of smart factories. This research aims to identify and explore potential barriers that prevent organizations from deploying industrial big data solutions in the development of...
Coal has always been an important foundation for China’s economy. The booming and declining of the coal industry can directly impact the regional economy. This study researches the impact of the rise and fall of the coal...
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages...
Antenna design often requires dealing with multiple constraints in the requirements, and the designs can be modeled as constrained optimization problems (COPs). However, the constraints are usually very strange, and then the...
Aligned with the global trend of smartness, China has invested heavily in over 700 smart city projects across over 500 cities. Hundreds of smart city apps, initiated by local authorities, have so emerged in the daily lives of...
Characteristic development is a process of intentionally solidifying and cultivating something's uniqueness. This article analyzes the uniqueness of university library cultural services in comparison with those provided by other...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...