Search

Results: 49
Provincial Linkage Characteristics of Hog Price in China Based on Linkage Social Network Analysis Method
In order to obtain the visual data of linkage structure and network characteristics of hog price among provinces in China, an improved analysis method of social network correlation was proposed in this article. The lift of...
Published by: IGI Global
How Far Can the Message Go Through Online Communication
Jie Meng
Jan 01, 2022
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Published by: IGI Global
Information Acquisition, Persuasion, and Group Conformity of Online Tribalism
Jie Meng
Apr 01, 2022
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
Published by: IGI Global
Generalized Ordered Weighted Simplified Neutrosophic Cosine Similarity Measure for Multiple Attribute Group Decision Making
Jun Ye
Jan 01, 2020
The paper proposes a generalized ordered weighted simplified neutrosophic cosine similarity (GOWSNCS) measure by combining the cosine similarity measure of simplified neutrosophic sets (SNSs) with the generalized ordered...
Published by: IGI Global
A Study on Pollution in Livestock and Poultry Breeding in Shiyan City
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
Recommendations for Crowdsourcing Services Based on Mobile Scenarios and User Trajectory Awareness
Jie Su, Jun Li
Jan 01, 2022
With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems...
Published by: IGI Global
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
Published by: IGI Global
Utilizing MAR for Remedial Teaching of Compound-Cube-Surface Area at Elementary School in Taiwan
Meng Chen, Koun Sun
Apr 01, 2020
In this paper, the development of the MAR (mobile augmented reality) remedial teaching program is described. It allowed students to manipulate augmented objects through AURASMA app via internet and find leads to solve geometry...
Published by: IGI Global
Research and Analysis of an Enterprise E-Commerce Marketing System Under the Big Data Environment
Linze Li, Jun Zhang
Nov 01, 2021
As an emerging online shopping method, e-commerce has been widely popular since the popularization of the Internet. Online sales and online shopping have become the trend of modern business development. However, the...
Published by: IGI Global
Semantic Trajectory Frequent Pattern Mining Model
Jie Su, Jun Li
Jan 01, 2022
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the Top-k candidate frequent...
Published by: IGI Global
Does the Technological Diversification and R&D Internationalization of eMNCs Promote Enterprise Innovation?
Jing Li, Jun Wang
Sep 01, 2021
Under the background of digital economy, technological diversification and R&D internationalization are important strategic choices for eMNCs, represented by China, to seek advanced technological resources and create competitive...
Published by: IGI Global
Understanding the Health Information Sharing Behavior of Social Media Users
Studies have focused on elucidating the sharing behavior of media users. However, few studies have specifically investigated users' health information sharing behavior in the social media context, especially WeChat. This study...
Published by: IGI Global
Investigating the Key Drivers of Impulsive Buying Behavior in Live Streaming
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Published by: IGI Global
Water Resources Security Evaluation Based on Matter Element Model in the Yellow River Basin
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental  protection and control of water. The solution to assess the grade of water security  in...
A Light Recommendation Algorithm of We-Media Articles Based on Content
Since the explosive growth of we-medias today, personalized recommendation is playing an increasingly important role to help users to find their target articles in vast amounts of data. Deep learning, on the other hand, has...
Published by: IGI Global
Color Image Encryption Using Angular Graph Fourier Transform
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties...
Published by: IGI Global
Biosorption of Silver using Metal-Imprinted Thiourea-Modified Glutaraldehyde-Crosslinked O-Carboxymethyl Chitosan Beads
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Users' Continuance Intention to Use a Mobile Application
This study examines factors that influence users' continuance intention to use a mobile application. There exist few empirical researches focused solely on examining factors influencing users' continuance intention of using...
Published by: IGI Global
An Empirical Study of the Role of Knowledge Characteristics and Tools on Knowledge Transfer in China-Based Multinationals
This article describes how technology—i.e. the infrastructure of tools, systems, platforms—enhances knowledge transfer. The effect of tools on the relationship between knowledge characteristics and knowledge transfer...
Published by: IGI Global
Prediction of Rice Yield via Stacked LSTM
In order to guarantee the rice yield more effectively, the prediction of rice yield should be taken into account. Because the rice yield every year can be seen as a sequence of time series, many methods applied in prediction of...
Published by: IGI Global
Swarm Intelligence Technique for Supply Chain Market in Logistic Analytics Management
Supply chain management has become increasingly important as an academic subject due to globalization developments contributing to massive production-related benefits reallocation. The huge volume of data produced in the global...
Published by: IGI Global
Modeling and Solution Algorithm for Optimization Integration of Express Terminal Nodes With a Joint Distribution Mode
The rapid development of e-commerce has led to increased pressure on the express delivery industry to transport products to customers in a timely manner. The problem of how to deliver an increasing volume of express orders to...
Published by: IGI Global
Process-Aware Dialogue System With Clinical Guideline Knowledge
Task-oriented dialogue systems aim to engage in interactive dialogue with people to ultimately complete specific tasks. Typical application domains include ticket booking, online shopping, and healthcare providing. Medical...
Published by: IGI Global
Ballot Blockchain System Design and Development on Ethereum Platform
Ballots are often hold for fair decisions such as party theme selecting, however, the existing traditional ballot has some problems involving amount of human resources, cost of places, equipment, time and traffic, and repeated...
Published by: IGI Global
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification
On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption...
Published by: IGI Global

|<

<

1

2

>

>|