Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
Face emojis are regularly used in reviews on online shopping sites to add richness and/or levity to the text. However, few researchers have investigated the use of face emojis in consumer reviews. This paper examined the effects...
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
The paper proposes a generalized ordered weighted simplified neutrosophic cosine similarity (GOWSNCS) measure by combining the cosine similarity measure of simplified neutrosophic sets (SNSs) with the generalized ordered...
With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems...
As an emerging online shopping method, e-commerce has been widely popular since the popularization of the Internet. Online sales and online shopping have become the trend of modern business development. However, the...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the Top-k candidate frequent...
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
Under the background of digital economy, technological diversification and R&D internationalization are important strategic choices for eMNCs, represented by China, to seek advanced technological resources and create competitive...
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
Cloud Computing (CC) is an emerging technology that can potentially revolutionise the application and delivery of IT. There has been little research, however, into the adoption of CC in Small and Medium-Sized Enterprises (SMEs)....
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
Traditional image denoising algorithms are generally based on spatial domains or transform domains to denoise and smooth the image. The denoised images are not exhaustive, and the depth-of-learning algorithm has better denoising...
Since the explosive growth of we-medias today, personalized recommendation is playing an increasingly important role to help users to find their target articles in vast amounts of data. Deep learning, on the other hand, has...
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...
In the context of digital transformation, this emerging technologies input creates powerful digital capabilities. Despite of the long distance, The enterprises cooperate more closely through wireless networks in digital space...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
This study examines factors that influence users' continuance intention to use a mobile application. There exist few empirical researches focused solely on examining factors influencing users' continuance intention of using...