With proliferated applications of the internet and world wide web, people are increasingly interacting with government websites. It is therefore significant to measure satisfaction on government systems from citizen's...
Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot...
The aim of this study is to explore the impact mechanisms of psychological learning climate on employees' innovative use of information systems (IS). Using structural equation modeling, this study develops a theoretical model to...
This article aims to study e-commerce precision models and consumer behavior models based on clustering algorithms, and at the same time conduct detailed research on the Gaussian mixture distribution algorithm, consumer behavior...
For real-time video transmission in multimedia sensor networks, efficient and reliable communication is very important. However, under actual conditions, when the sensor transmits data to the sink node, the link between the...
The study examines the crucial role of value co-creation impacts on customer loyalty (attitudinal and behavioural loyalty) in the Chinese self-service food industry, especially in “Hot Pot,” also known as “Huo Guo,” taking into...
This paper sets Stackelberg model of bilateral quality efforts decision dominated by supermarket in the agricultural products supply chain by considering fairness concern and altruistic reciprocity. We use backward induction...
The emergence of online education helps improving the traditional English teaching quality greatly. However, it only moves the teaching process from offline to online, which does not really change the essence of traditional...
This paper measures enterprise digital transformation by the method of text analysis and empirically tests the impact of enterprise digital transformation on the executives' corruption. We find that the higher degree of digital...
In order to investigate the relationship between IT application maturity and management capabilities, the authors conducted a survey study to collect related company information for analysis. Data processing was conducted to...
According to the investigation of library resources discovery system construction in 20 universities in China, the aggregation discovery service provided by the multi-source aggregation function, the discovery function is based...
Although the traditional convolutional neural network is applied to image segmentation successfully, it has some limitations. That's the context information of the long-range on the image is not well captured. With the success...
It has been increasingly common for the government to adopt non-market approaches to manage or interfere with the market during a stock market crisis. Taking Chinese government’s bailout of the market during the COVID-19...
Asia is the largest and most populous continent of Earth with an overall population of 446.27 crores. Housing this population drives various challenges in different aspects, in which providing healthy and nutritious food to each...
As students in online courses usually show differences in their cognitive levels and lack communication with teachers, it is difficult for teachers to grasp student perceptions of the importance of knowledge-points and to...
Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus...
Considering the limited sample size of rare and endangered plant leaves and the issue that leaf identification is mainly conducted using mobile smart devices and other technology with low computing power, this paper proposes a...
As artificial intelligence technique is widely used in the automatic driving system, the safety evaluation of automatic vehicles is considered to be the most important demand. Under this context, in this paper, an evaluation...
Non-fungible tokens (NFTs) are unique digital assets that are based on smart contracts of blockchain technology and traded via cryptocurrencies. They became known to the public in 2021 and kept growing rapidly. Until the second...
Despite the promise of cross-border e-commerce, attracting consumers is still a worldwide challenge. Many cross-border e-commerce platforms have responded to the challenges by embracing innovative tools like live streaming....
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
Image aesthetic quality assessment has been a hot research topic in the field of image analysis during the last decade. Most recently, people have proposed comment type assessment to describe the aesthetics of an image using...
As M-Health apps become more popular, users can access more mobile health information (MHI) through these platforms. Yet one preeminent question among both researchers and practitioners is how to bridge the gap between simply...
Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis...
The first years of an infant's life represent a sensitive period for neurodevelopment where one can see the emergence of nascent forms of executive function (EF), which are required to support complex cognition. Few tests exist...