The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
Though various ranking methods in the data envelopment analysis (DEA) context have emerged since the conventional DEA was introduced, none of them has not been accepted as a universal or a superior method for ranking...
Firms are awash in big data and analytical technology as part of the process of deriving values in the current turbulent environment. The literature has reached a consensus that investments in technology only may not reap...
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
This paper aims to study the protection of data privacy in news crowdfunding in the era of artificial intelligence. This paper respectively quotes the encryption algorithm of artificial intelligence data protection and the BP...
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
The risk assessment of liquefied natural gas (LNG) transportation routes has raised researchers' concerns in recent years, which is a group multi-criteria decision-making (GMCDM) problems that involves experts' opinions from...
Predicting graduation destination can help students determine their learning goals in advance, help faculty optimize curriculum and provide career guidance for students. In this paper, the authors first propose a prediction...
The study aims to establish a platform-based enterprise credit supervision mechanism, and combined with big data, accurately evaluate the credit assets of enterprises under the influence of social stability risk, and improve the...
By analyzing the impact of different fairness concerns on a green supply chain, this study determines the optimal decisions under different power structures and conducts a comparative analysis of them. The findings of this study...
In order to guarantee the power grid operation under the premise of reliability and stability, acquire relative economic investment and operating cost, and adaptable to all kinds of change flexibly, this article improves the...
A large number of customers have used traditional e-commerce portals, where there are no assurance of product quality, display of all features, picture search, virtual chat service, product recommendation and tracking facility....
Image aesthetic quality assessment has been a hot research topic in the field of image analysis during the last decade. Most recently, people have proposed comment type assessment to describe the aesthetics of an image using...
Self-regulated learning (SRL) is a very significant ability for students in the learning process, and SRL strategies are used to assist students in learning efficiently in higher education. Many SRL environments face challenges...
In the era of big data with exponential growth in data volume, how to reduce data security issues such as data leakage caused by machine learning is a hot area of recent research. The existing privacy budget allocation...
Although inclusive innovation has been regarded as a process according to prior studies, this complex process remains relatively under-researched, particularly when the process is successfully completed by entrepreneurial firms...