Using a corpus approach, this article investigates the translation styles of the first chapter of Fu Sheng Liu Ji at three levels: the statistical parameters, the translation of culture-specific lexis, and readability...
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
The transaction scale of cross-border import e-commerce has grown rapidly around the world. Platform-style cross-border e-commerce does not control the quality, source and transaction process of goods strictly and...
The ubiquitous use of ICT can create “techno-stress.” The purpose of the research is to examine the case of the specificity of the techno-stress phenomenon of local managers. The authors develop their research questions on the...
In wireless sensor networks, MAC protocol is used to achieve efficient, fair and balanced allocation of wireless channel resources and access control of nodes in the network, and to control the communication process of nodes in...
The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only...
In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a service recommendation...
E-commerce has developed rapidly, and product promotion refers to how e-commerce promotes consumers' consumption activities. The demand and computational complexity in the decision-making process are urgent problems to be solved...
The outbreak of the COVID-19 pandemic calls for effective use of language to keep the public informed of the pandemic update and prevention measures. Meanwhile, the crisis context of the pandemic shaped the language use as well....
This study qualitatively analyzes interactional coping strategies used to managed technostress in the post-adoption stage of information technology implementation at a French legal firm. The nine strategies are participatory...
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
Translatorial agencies have gained wider currency in contemporary translation studies. Efforts have been made to delve into it from both translators' individual habits and the contextual elements of their work. But there is...
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Drawing on André Lefevere's rewriting theory, this paper endeavours to explore how Howard Goldblatt translates Mo Yan's novel Life and Death Are Wearing Me Out (hereafter referred to as L&D) with regard to patronage control by...
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
Based on the findings of previous studies, a new theoretical model of the influence of hospital's online healthcare information services to its elderly patients' information adoption intention was formulated, analyzed, and...
This study identifies coping strategies to examine the behaviors adopted by team managers in addressing technostress. It evaluates the choice of coping strategies to increase performance. A study involving 3 companies and 45...
The novel coronavirus is a new type of virus, and its transmission characteristics are different from the previous virus. Based on the SEIR transmission model, this paper redefines the latent state as close contacts state...
With the rapid development of computer intelligence technology, the majority of scholars have a great interest in the detection and tracking of moving targets in the field of video surveillance and have been involved in its...
The discovery of 250-kelvin superconducting lanthanum polyhydride under high pressure marked a significant advance toward the realization of a room-temperature superconductor. X-ray diffraction (XRD) studies reveal a...
The training of special ability of skiing should start from the control of body posture ability to highlight the characteristics of the sports. Thus, the athletes can have the sports ability in the process of high-speed skiing....
The internet of things (IoT) is a modern generation of internet-associated embedded information and communication technology in an online environment to incorporate logistics and supply chain processes seamlessly. Automation in...
Online merchants often use social media to communicate deal messages to directed consumers, but they face the fundamental challenge of how to effectively communicate deal messages to these consumers using that medium. This...
AbstractCertain quantum devices, such as half-wave plates and quarter-wave plates in quantum optics, are bidirectional, meaning that the roles of their input and output ports can...
Recently, automata have become a research hott spot in various countries for a wide range of applications in areas such as security, entertainment, and industry. We designed a mobile robot which is based on gesture control with...