This article describes how blind steganalysis aiming at uncovering the existence of hidden data in digital images remains an open problem. Conventional spatial image steganographic algorithms hide data into pixels spreading...
Healthcare insurance fraud influences not only organizations by overburdening the already fragile healthcare systems, but also individuals in terms of increasing premiums in health insurance and even fatalities. Identifying the...
With continual increase of environmental pressure from human activities, it has become necessary to study the process of socioeconomic water usage influencing the water quality. Based on the system dynamic model developed before...
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
The network in information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their...
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the Top-k candidate frequent...
The sudden attack of the new crown virus in 2020 has brought an unprecedented impact on the real estate market economy and has completely disrupted people's work and life rhythm! With the rapid development of the Internet, the...
With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems...
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
Incorporate contextual information into recommendation systems can obtain better accuracy of recommendation, however, the users’ individual privacy may be disclosed by attackers. In order to resolve this problem, the authors...
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
This study investigated integrated elderly care services supply chains using a combination of Decision Making Trial and Evaluation Laboratory (DEMATEL), Interpretative Structural Modeling (ISM), and the Technique for Order...
Customers' concerns about inappropriate use of personal information can create potential threats that jeopardize the proliferation of emerging markets. This study aims at investigating how the adaptive and maladaptive responses...
Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link. In order to solve the problem of privacy protection in...
Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot...
Under the background of electrification, it is significant to explore the changes in residential electricity consumption for energy conservation and emission reduction. Based on the staggered difference-in-difference (DID)...
The realization of short-term load forecasting is the basis of system planning and decision-making, and it is an important index to evaluate the safety and economy of power grid.In order to accurately predict the power load...
To improve the anti-jamming performance of frequency hopping system in complex electromagnetic environment, a Deep Q-Network algorithm with priority experience replay (PER) based on Pareto samples (PPER-DQN) is proposed, which...
Although business and researchers acknowledge the importance of social media, little research has been conducted to explore what attracts people to follow brand Twitter accounts. This research attempts to achieve an analytical...
Although business and researchers acknowledge the importance of social media, little research has been conducted to explore what attracts people to follow brand Twitter accounts. This research attempts to achieve an analytical...
With the progress of digital and mobile technologies, mobile short video apps (MSAs) have been booming in recent years. These MSAs are expanding their role in social commerce, which has aroused scholar’s and practitioners’...
Biosurfactant production by Rhodococcus erythropolis SB-1A was studied based on Atlas oil agar medium in a batch reactor. The strain was isolated from a water sample collected from Northern Atlantic Ocean. Several parameters...
The purpose of this paper is to investigate the relationships between digitalization, supply chain integration, and firm performance. Data are analyzed by the partial least square structural equation modeling (PLS-SEM). The...
Agriculture is considered a sector with an essential contribution to carbon emissions in the Belt and Road Initiative (BRI) countries. This paper innovatively uses the by-production process to analyze the agricultural carbon...