Search

Results: 42
Quality Improvement Incentive Strategy in Agricultural Products Supply Chain Under Social Preference
Yanhong Qin, Kai Guo
Nov 01, 2021
This paper sets Stackelberg model of bilateral quality efforts decision dominated by supermarket in the agricultural products supply chain by considering fairness concern and altruistic reciprocity. We use backward induction...
Published by: IGI Global
Image Aesthetic Description Based on Semantic Addition Transformer Model
Image aesthetic quality assessment has been a hot research topic in the field of image analysis during the last decade. Most recently, people have proposed comment type assessment to describe the aesthetics of an image using...
Published by: IGI Global
The Impact Mechanisms of Psychological Learning Climate on Employees' Innovative Use of Information Systems
The aim of this study is to explore the impact mechanisms of psychological learning climate on employees' innovative use of information systems (IS). Using structural equation modeling, this study develops a theoretical model to...
Published by: IGI Global
E-Commerce Precision Marketing and Consumer Behavior Models Based on IoT Clustering Algorithm
This article aims to study e-commerce precision models and consumer behavior models based on clustering algorithms, and at the same time conduct detailed research on the Gaussian mixture distribution algorithm, consumer behavior...
Published by: IGI Global
Impact of Value Co-Creation on Customer Loyalty
The study examines the crucial role of value co-creation impacts on customer loyalty (attitudinal and behavioural loyalty) in the Chinese self-service food industry, especially in “Hot Pot,” also known as “Huo Guo,” taking into...
Published by: IGI Global
Intelligent Data Mining-Based Method for Efficient English Teaching and Cultural Analysis
Qing Ai, Hongyu Guo
Apr 01, 2022
The emergence of online education helps improving the traditional English teaching quality greatly. However, it only moves the teaching process from offline to online, which does not really change the essence of traditional...
Published by: IGI Global
Digital Transformation of Enterprises and the Governance of Executive Corruption
Yao Zhang, Xuemeng Guo
Apr 07, 2022
This paper measures enterprise digital transformation by the method of text analysis and empirically tests the impact of enterprise digital transformation on the executives' corruption. We find that the higher degree of digital...
Published by: IGI Global
Coverless Information Hiding Based on WGAN-GP Model
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this...
Published by: IGI Global
IT Application Maturity in China
In order to investigate the relationship between IT application maturity and management capabilities, the authors conducted a survey study to collect related company information for analysis. Data processing was conducted to...
Published by: IGI Global
Assessing the Technological Pedagogical Content Knowledge of Pre-Service Science Teachers at a South African University
The purpose of this study was to investigate preservice science teachers' proficiency levels regarding their practical knowledge of technological pedagogical content knowledge (TPACK-P). A sample of 103 third- and fourth-year...
Published by: IGI Global
Knowledge Fusion Based on Cloud Computing Environment for Long-Term Care
Globally, aging is now a societal trend and challenge in many developed and developing countries. A key medical strategy that a fast-paced aging society must consider is the provision of quality long-term care (LTC) services....
Published by: IGI Global
Can Government Direct Bailout Intervention Relieve the Crisis Sentiment in the Context of the COVID-19 Pandemic
Linlin Guo, De-Shui Ma
Aug 01, 2021
It has been increasingly common for the government to adopt non-market approaches to manage or interfere with the market during a stock market crisis. Taking Chinese government’s bailout of the market during the COVID-19...
Published by: IGI Global
Smart Agriculture and Food Storage System for Asia Continent
Asia is the largest and most populous continent of Earth with an overall population of 446.27 crores. Housing this population drives various challenges in different aspects, in which providing healthy and nutritious food to each...
Published by: IGI Global
Discovering Knowledge-Point Importance From the Learning-Evaluation Data
As students in online courses usually show differences in their cognitive levels and lack communication with teachers, it is difficult for teachers to grasp student perceptions of the importance of knowledge-points and to...
Published by: IGI Global
Believe It or Not
Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus...
Published by: IGI Global
Rare and Endangered Plant Leaf Identification Method Based on Transfer Learning and Knowledge Distillation
Considering the limited sample size of rare and endangered plant leaves and the issue that leaf identification is mainly conducted using mobile smart devices and other technology with low computing power, this paper proposes a...
Published by: IGI Global
The Effect of Technology Readiness on Individual Absorptive Capacity Toward Learning Behavior in Australian Universities
Recipient's absorptive capacity (ACAP) is a barrier to knowledge transfer in organizations. The technology readiness (TR) dimensions measure an individual's technological beliefs and aligns with the individual's ACAP. The...
Published by: IGI Global
RIKEN MetaDatabase
Recently, the number and heterogeneity of life science datasets published on the Web have increased significantly. However, biomedical scientists face numerous serious difficulties finding, using and publishing useful databases....
Published by: IGI Global
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine
This article presents the linear Proximal Support Vector Machine (PSVM) to the image steganalysis, and further generates a very efficient method called PSVM-LSMR through implementing PSVM by the state-of-the-art optimization...
Published by: IGI Global
When Big Data Meets NFT
Non-fungible tokens (NFTs) are unique digital assets that are based on smart contracts of blockchain technology and traded via cryptocurrencies. They became known to the public in 2021 and kept growing rapidly. Until the second...
Published by: IGI Global
The Influences of Live Streaming Affordance in Cross-Border E-Commerce Platforms
Despite the promise of cross-border e-commerce, attracting consumers is still a worldwide challenge. Many cross-border e-commerce platforms have responded to the challenges by embracing innovative tools like live streaming....
Published by: IGI Global
Privacy Rating of Mobile Applications Based on Crowdsourcing and Machine Learning
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
Published by: IGI Global
Effects of Utilitarian and Hedonic Emotion on the Use of Online Banking Services
The online banking service is the key element for the development of e-commerce and e-businesses. It provides users with convenient daily transaction services, such as wire transfer and online payment. Past studies on online...
Published by: IGI Global
Making Mobile Health Information Advice Persuasive
As M-Health apps become more popular, users can access more mobile health information (MHI) through these platforms. Yet one preeminent question among both researchers and practitioners is how to bridge the gap between simply...
Published by: IGI Global
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling
Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis...
Published by: IGI Global

|<

<

1

2

>

>|