Search

Results: 31
Recommendation of Healthcare Services Based on an Embedded User Profile Model
In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a service recommendation...
Published by: IGI Global
Multi-Objective Optimization Information Fusion and Its Applications for Logistics Centers Maximum Coverage
Xiao Deng
Apr 01, 2022
From past the development direction of logistics centers covering problem, the main solution is almost always relying on modern computer and gradually developed intelligent algorithm, at the same time, the previous understanding...
Published by: IGI Global
Rewriting of Text and Paratext: Reception of “Bushido
Xiao Li
Jan 01, 2022
Bushido: The Soul of Japan is an influential sociology work for the world to study Japan. Drawing primarily upon cultural translation studies and Gerard Genette's paratext theory, this article investigates how the 10 Chinese...
Published by: IGI Global
Developmental Trajectory of the American Yacht Clubs
The yacht industry is one of the leading industries used to guide residents’ increase in consumption. This study analyzes the evolving spatial pattern of yacht clubs in the United States from 1900-2017, aiming to explore the...
Published by: IGI Global
Examining the Effect of Positive Online Reviews on Consumers' Decision Making
Lin Xiao, Yuan Li
Jul 01, 2019
Online reviews play an important role in consumers' decision making. However, limited studies have been conducted to understand the effects of online reviews on consumers' behavior. Drawing upon the Elaboration Likelihood Model...
Published by: IGI Global
Multimodal Sentiment Analysis of Online Product Information Based on Text Mining Under the Influence of Social Media
Xiao Zeng, Ziqi Zhong
Mar 22, 2022
Currently, with the dramatic increase in social media users and the greater variety of online product information, manual processing of this information is time-consuming and labour-intensive. Therefore, based on the text mining...
Published by: IGI Global
Use of Digital Finance Platforms for Personal Finance Management in Rural China
This study examined the antecedents and consequences of the use of digital finance platforms to manage personal finance of rural people in China. The conceptual framework of the study was developed from the integration of...
Published by: IGI Global
Factors Influencing Chinese Online Health Service Use
Despite the popularity of online health services (OHSs) among patients in recent years, academic research on this phenomenon is limited. Drawing on the valence framework, the authors proposed a model to explore both the most...
Published by: IGI Global
A New Kind of High Capacity and Security Reversible Data Hiding Scheme
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
Published by: IGI Global
International Inclusive Innovation of Entrepreneurial Firms
Although inclusive innovation has been regarded as a process according to prior studies, this complex process remains relatively under-researched, particularly when the process is successfully completed by entrepreneurial firms...
Published by: IGI Global
Corn Disease Detection Based on an Improved YOLOX-Tiny Network Model
In order to detect corn diseases accurately and quickly and reduce the impact of corn diseases on yield and quality, this paper proposes an improved object detection network named YOLOX-Tiny, which fuses convolutional attention...
Published by: IGI Global
An Ontology-Based Automation System
This paper presents an ontology-based approach to benefit automatic fertilization management for citrus orchards located in mountainous region. The core of the fertilization approach is the citrus fertilization ontology, which...
Published by: IGI Global
Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing
To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD)...
Published by: IGI Global
A Multi-Objective Differential Evolutionary Optimization Method for Performance Optimization of Cloud Application
Due to the limited search space in the existing performance optimization ap-proaches at software architectures of cloud applications (SAoCA) level, it is difficult for these methods to obtain the cloud resource usage scheme with...
Published by: IGI Global
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter
Lane detection still demonstrates low accuracy and missing robustness when recorded markings are interrupted by strong light or shadows or missing marking. This article proposes a new algorithm using a model of road structure...
Published by: IGI Global
Empirical Study on the Influencing Factors of WeChat Business Integrity
With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the...
Published by: IGI Global
A Bibliometric Review of Information Systems Research From 1975-2018
Information Systems (IS) scholars attempted to explore the intellectual structure of the IS discipline from previous literature. However, the corpus data, analytical method, and sample size are significantly different among...
Published by: IGI Global
A Modification-Free Steganography Algorithm Based on Image Classification and CNN
In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social...
Published by: IGI Global
Air Pollution and Migration
This paper investigates the impact of air pollution on China’s internal migration using the Migrant Population Dynamic Monitoring Survey and Air Quality Index (AQI) data in 2014. Binary response models suggest that, on average...
Published by: IGI Global
Video-Based Person Re-Identification With Unregulated Sequences
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
Published by: IGI Global
Rare and Endangered Plant Leaf Identification Method Based on Transfer Learning and Knowledge Distillation
Considering the limited sample size of rare and endangered plant leaves and the issue that leaf identification is mainly conducted using mobile smart devices and other technology with low computing power, this paper proposes a...
Published by: IGI Global
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Published by: IGI Global
Mining and Analysis of Organizational Characteristics of English Language Skills Teaching in Primary Schools
Language skills are an important factor affecting students' language application. The cultivation of students' language skills depends on teacher-led daily classroom teaching. In view of the importance of language skills in...
Published by: IGI Global
Insights into the Origin of High Activity of Ni<sub>5</sub>P<sub>4</sub>(0001) for Hydrogen Evolution Reaction.
Hydrogen evolution reaction (HER) is directly relevant to green hydrogen production from water splitting. Recently, a low-cost Ni5P4 material has been demonstrated experimentally and theoretically to...
Published by:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code
To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on...
Published by: IGI Global

|<

<

1

2

>

>|