It is expected that website design can lead to online trust, although research that systematically examines such a relationship is little. In addition, far too little attention has been paid to understand the effect of website...
The movie Alien first hit the box office in the spring of 1979, and it was met with critical acclaim; in 2008, it ranked seventh best film in the science fiction genre by the American Film Institute. The chestburster scene is...
Contemporary business environments reflect the growing influence of data as a mission-critical resource of relevance across the enterprise, suggesting a need for robust infrastructures to enable good data management practice....
There is a subject-object asymmetry in Chinese, such that the extraction of a possessor NP from a possessive NP is quite free from subject position but restricted from object position. A possessive tJP consists of a possessor NP...
In this article, the authors explore how mobile learning can complement the Certificate of Indigenous Languages program at the University of Saskatchewan in Western Canada. Through the FRAME model analysis, the authors extract...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
Kierkegaard steadily maintains, against Lessing, that Jesus’s contemporaries had no advantage as regards faith merely because they had personal experience of him. It is a view proposed both by Johannes Climacus and...
This article mainly studies the design and realization of English listening teaching system based on virtual environment technology. This paper designs and builds a virtual experimental operating platform to assist students in...
With the popularity of online shopping, a large body of studies have paid much attention to the factors influencing consumers’ information seeking and assessing. However, theoretical development and empirical testing are still...
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
A common model used in addressing today's overwhelming amounts of data is the OLAP Cube. The OLAP community has proposed several cube algebras, although a standard has still not been nominated. This study focuses on a recent...
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
In the era of big data-driven digital economies, technology commercialization capability has become the lifeblood of high-tech enterprises to shape competitive advantage and achieve multiplier growth, while the related research...
Although it is widely acknowledged that translation is a cognitive process, there is scarcely any study establishing connections between the text and mental representations and giving a systematic and comprehensive explanation...
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide...
Pharmacists are accessible healthcare providers who also gatekeep between drug manufacturers, healthcare providers, and patients. Pharmacists are responsible for safe, effective, and rational use of medicine in the communities...
To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and...
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This...
This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters...
Research indicates the multilingual aspects of organizations can create power divisions and rules that drive workplace practices. From an international human resources development perspective, language management is strategic...
Decision makers are exposed to an increasing amount of information. Algorithms can help people make better data-driven decisions. Previous research has focused on both companies’ orientation towards analytics use and the...
Cross-border e-commerce has gradually expanded in international trade markets over the past decades. This paper analyzes the determinants of the volume of cross-border e-commerce in a gravity model framework. Moreover, the paper...
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method...