The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Football fans are consumers with special relationship with their favourite teams. Consumer-brand relationship is unique and ultimate in football context. However, the absence of these relationships is mainly due to a lack of...
In order to meet the needs of life-long learning of the Internet of Things and the economic and social development of digital learning countries, we must actively explore the teaching mode of digital self-learning courses for...
Urban density, in the form of residents' and visitors' concentration, is long considered to foster diverse exchanges of interpersonal knowledge and skills, which are intrinsic to sustainable human settlements. However, with...
“Ideology” shapes our discourse practices and is closely related to the translation activities. This paper attempts to explore how ideological factors influence the cultural transmission of Confucianism through a comparative...
This study sets out to describe simultaneous interpreters' attention-sharing initiatives when exposed under input from both videotaped speech recording and real-time transcriptions. Separation of mental energy in acquiring...
The brain-computer interface (BCI) system uses electroencephalography (EEG) signals for correspondence between the human and the outside world. This BCI communication system does not require any muscle action; hence, it can be...
In the face of fierce competition, many peer-to-peer (P2P) lending platforms have introduced automated investment tools to serve customers better. Based on a large sample of data from PPdai.com, the authors studied the impact of...
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system...
Library maker services are a current focus of the industry's theoretical research and practice. With the popularization of the maker movement and the development of “mass entrepreneurship and innovation” in China, the library...
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking...
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate...
In order to better promote the healthy and long-term development of enterprise procurement management process, under the background of e-commerce environment, Suppliers-Inputs-Process-Outputs-Customers (SIPOC) model, deep...
With the average daily growth of 15000 new subscribers, the number of WeChat subscription has broken the 5,800,000 subscribers recently. WeChat subscription's topic influence calculation has been very significant. This article...
To resolve the limited transmission and complicated layout, the common parameter measurement and control system of agricultural equipment use virtual instrument technology and embedded technology. The research results show that...
In order to improve the ability to detect network attacks, traditional intrusion detection models often used convolutional neural networks to encode spatial information or recurrent neural networks to obtain temporal features of...
In recent years, the related research of entity alignment has mainly focused on entity alignment via knowledge embeddings and graph neural networks; however, these proposed models usually suffer from structural heterogeneity and...
Traditional software defenses take corresponding actions after the attacks are discovered. The defenders in this situation are comparatively passive because the attackers may try many different ways to find vulnerability and...
Drawing on the conservation of resources (COR) theory, the authors investigate whether and how social support impacts the emotional labor of live streamers through professional identity. They also explore the boundary conditions...
eHealth service has received increasing attention. Patients can consult online doctors via the Internet, and then physically visit the doctors for further diagnosis and treatments. Although extant research has focused on the...
Along with the rapid development of digital information technology, e-government is of great potential because it is a new form of conducting public administration and a way of demonstrating governmental innovation. The...