Search

Results: 241
Newcomer Integration and Academic Support in Newfoundland and Labrador
Xuemei Li, Hua Que
Dec 20, 2018
This article extracts eight points for discussion from many years of research in newcomer academic support and social integration in Newfoundland and Labrador. These points include: transportation to school for newcomer...
Semantic Trajectory Frequent Pattern Mining Model
Jie Su, Jun Li
Jan 01, 2022
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the Top-k candidate frequent...
Published by: IGI Global
Recommendations for Crowdsourcing Services Based on Mobile Scenarios and User Trajectory Awareness
Jie Su, Jun Li
Jan 01, 2022
With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems...
Published by: IGI Global
Better Not Let Me Know
Customers' concerns about inappropriate use of personal information can create potential threats that jeopardize the proliferation of emerging markets. This study aims at investigating how the adaptive and maladaptive responses...
Published by: IGI Global
Newcomers, Creative Spaces, and Connection Through Art
Historically, the island of Newfoundland has had  a culturally homogeneous population. For this reason, newcomers report a distressing insider/outsider dynamic of disconnect and challenges accessing local social support systems...
How Far Can the Message Go Through Online Communication
Jie Meng
Jan 01, 2022
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Published by: IGI Global
Information Acquisition, Persuasion, and Group Conformity of Online Tribalism
Jie Meng
Apr 01, 2022
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
Published by: IGI Global
A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention
Healthcare insurance fraud influences not only organizations by overburdening the already fragile healthcare systems, but also individuals in terms of increasing premiums in health insurance and even fatalities. Identifying the...
Published by: IGI Global
Challenges Encountered During Synchronous Online Collaborative Writing via Google Docs
Mufeeda Irshad
Nov 01, 2022
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
Published by: IGI Global
Study on Water-Atmosphere Interface Distribution and Concentration Fluctuation Intensities of Polybrominated Diphenyl Ethers in Great Lake
In this study, the water-atmosphere interfaces distribution and concentration fluctuation intensities of polybrominated diphenyl ethers (PBDEs) in Great Lake were analyzed. Based on the selected significant quantum descriptors...
A Blockchain-Based Privacy Protection Application for Logistics Big Data
Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link. In order to solve the problem of privacy protection in...
Published by: IGI Global
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation
This article describes how blind steganalysis aiming at uncovering the existence of hidden data in digital images remains an open problem. Conventional spatial image steganographic algorithms hide data into pixels spreading...
Published by: IGI Global
Water Resources Security Evaluation Based on Matter Element Model in the Yellow River Basin
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental  protection and control of water. The solution to assess the grade of water security  in...
An Agent-based Simulation-optimization Coupling Approach for Device Allocation and Operation Control in Response to Offshore Oil Spills
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
Application of Fuzzy Support Vector Machine in Short-Term Power Load Forecasting
The realization of short-term load forecasting is the basis of system planning and decision-making, and it is an important index to evaluate the safety and economy of power grid.In order to accurately predict the power load...
Published by: IGI Global
A Study on Pollution in Livestock and Poultry Breeding in Shiyan City
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
Do We Trust the Internet?
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen...
Published by: IGI Global
At the Juncture of TESL, Multicultural Education, and Newcomer Integration
Xuemei Li
Dec 20, 2018
Teaching English as a Second Language (TESL) may not be a familiar term for many people in Newfoundland and Labrador, and TESL professionals in the province are a very small group. One can easily count the numbers of ESL...
Analysis of Differences in Electrochemical Performance Between Coin and Pouch Cells for <scp>Lithium‐Ion</scp> Battery Applications
Small coin cell batteries are predominantly used for testing lithium‐ion batteries (LIBs) in academia because they require small amounts of material and are easy to assemble. However, insufficient attention is given to...
Published by:
Do You Speak Chinese, Mandarin, or Cantonese? An Explanation Based on a Native Chinese Speaker’s Early Experience
Cheng Li
Dec 20, 2018
This article reports on my early experiences with learning and speaking varieties of Chinese, responding to the curious questions on the power relationship between Mandarin and other dialects in China today. A series of...
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC
The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications of IoT. Online report generation and sharing the reports reduce the time and make the treatment of patients very fast. Here, the...
Published by: IGI Global
Supply Chain Efficiency and Effectiveness Management Using Decision Support Systems
Xiangyi Li
Jun 01, 2022
In supply chain management, decision support systems and time series forecasting play an essential role. The accuracy of time-series predictions is critical for the performance optimization of every supply chain. This article...
Published by: IGI Global
An Efficient Method of Tooth Segmentation Under Massive Medical Data
To accurately and efficiently complete tooth segmentation from a large amount of oral medical data, the burden of doctors should be reduced. An automatic seed picking method based on 2D projection of the occlusal plane was...
Published by: IGI Global
Supply Chain Efficiency and Effectiveness Management Using Decision Support Systems
Guozheng Li
Oct 01, 2022
The management of global supply chains that emerge from outsourcing and offshoring activities emphasizes a globally dispersed supply chain. All stakeholders and entrepreneurs worldwide have a common understanding of information...
Published by: IGI Global
Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis
Multitarget threat evaluation of warship air attacks is one of the most urgent problems in warship defense operations. To evaluate the target threat quickly and accurately, an air attack multitarget threat evaluation method...
Published by: IGI Global

|<

<

1

2

3

4

5

>

>|