Search

Results: 245
Newcomer Integration and Academic Support in Newfoundland and Labrador
Xuemei Li, Hua Que
Dec 20, 2018
This article extracts eight points for discussion from many years of research in newcomer academic support and social integration in Newfoundland and Labrador. These points include: transportation to school for newcomer...
Exploring Technology Professional Development Needs of Digital Immigrant Teachers and Digital Native Teachers in China
Jing Lei, Yi Li, Qiu Wang
Jul 01, 2020
This study examined if professional development needs of digital natives and immigrant teachers differed for technology integration in a Chinese education setting. Quantitative and qualitative data was collected from 500...
Published by: IGI Global
Newcomers, Creative Spaces, and Connection Through Art
Historically, the island of Newfoundland has had  a culturally homogeneous population. For this reason, newcomers report a distressing insider/outsider dynamic of disconnect and challenges accessing local social support systems...
View on the Buildup of New Service Capability of National Library of China From the Point of Development Trend of Reference Work
Lei Wang
Jan 01, 2021
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
Published by: IGI Global
Accounting Information Quality, Financing Constraints, and Company Innovation Investment Efficiency by Big Data Analysis
This paper takes the listed companies in China from 2008 to 2017 as the research sample to study the relationship between accounting information quality (AIQ) and company innovation investment efficiency. The results show that...
Published by: IGI Global
Hospital Employee Performance Evaluation Based on Knowledge Map
With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
Published by: IGI Global
Visualizing Online Education in the COVID-19 Pandemic Based on the Bibliometric Method
Lei Liang
Jan 01, 2022
Online education has become the mainstream since the outbreak of COVID-19 pandemic. This paper did a bibliographic review based on VOSviewer and CiteSpace. The author reviewed the definitions, pros and cons for teachers and...
Published by: IGI Global
AI-Driven Virtual Simulation for Packaging Customization
Lei He
Apr 01, 2022
Recently, virtual reality technology has been paid attention to by the researchers from various fields. With the help of virtual reality technology, packaging customization environment can be simulated more intuitively. Thus...
Published by: IGI Global
Towards Smart Transportation System
Smart transportation system is a cross-field research topic that involves both the organizations that manage the large-scaled system and individual end-users who enjoy these services. Recent advancement of machine learning-based...
Published by: IGI Global
An Exploration Study on the Consequence of the COVID-19 Pandemic on Online Q&A Communities
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
Published by: IGI Global
Citizen Participation in the Co-Production of Urban Natural Resource Assets
Abundant natural resources are the basis of urbanisation and industrialisation. Citizens are the key factor in promoting a sustainable supply of natural resources and the high-quality development of urban areas. This study...
Published by: IGI Global
Challenges Encountered During Synchronous Online Collaborative Writing via Google Docs
Mufeeda Irshad
Nov 01, 2022
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
Published by: IGI Global
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices
Command injection vulnerabilities are among the most common and dangerous attack vectors in IoT devices. Current detection approaches can detect single-step injection vulnerabilities well by fuzzing tests. However, an attacker...
Published by: IGI Global
Study on Water-Atmosphere Interface Distribution and Concentration Fluctuation Intensities of Polybrominated Diphenyl Ethers in Great Lake
In this study, the water-atmosphere interfaces distribution and concentration fluctuation intensities of polybrominated diphenyl ethers (PBDEs) in Great Lake were analyzed. Based on the selected significant quantum descriptors...
Identification of Cherry Leaf Disease Infected by Podosphaera Pannosa via Convolutional Neural Network
The cherry leaves infected by Podosphaera pannosa will suffer powdery mildew, which is a serious disease threatening the cherry production industry. In order to identify the diseased cherry leaves in early stage, the authors...
Published by: IGI Global
Water Resources Security Evaluation Based on Matter Element Model in the Yellow River Basin
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental  protection and control of water. The solution to assess the grade of water security  in...
An Agent-based Simulation-optimization Coupling Approach for Device Allocation and Operation Control in Response to Offshore Oil Spills
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
Chinese Named Entity Recognition Method Combining ALBERT and a Local Adversarial Training and Adding Attention Mechanism
For Chinese NER tasks, there is very little annotation data available. To increase the dataset, improve the accuracy of Chinese NER task, and improve the model's stability, the authors propose a method to add local adversarial...
Published by: IGI Global
A Study on Pollution in Livestock and Poultry Breeding in Shiyan City
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
Do We Trust the Internet?
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen...
Published by: IGI Global
At the Juncture of TESL, Multicultural Education, and Newcomer Integration
Xuemei Li
Dec 20, 2018
Teaching English as a Second Language (TESL) may not be a familiar term for many people in Newfoundland and Labrador, and TESL professionals in the province are a very small group. One can easily count the numbers of ESL...
Analysis of Differences in Electrochemical Performance Between Coin and Pouch Cells for <scp>Lithium‐Ion</scp> Battery Applications
Small coin cell batteries are predominantly used for testing lithium‐ion batteries (LIBs) in academia because they require small amounts of material and are easy to assemble. However, insufficient attention is given to...
Published by:
Do You Speak Chinese, Mandarin, or Cantonese? An Explanation Based on a Native Chinese Speaker’s Early Experience
Cheng Li
Dec 20, 2018
This article reports on my early experiences with learning and speaking varieties of Chinese, responding to the curious questions on the power relationship between Mandarin and other dialects in China today. A series of...
A Model Study on Hierarchical Assisted Exploration of RBAC
Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of establishing RBAC roles is...
Published by: IGI Global
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC
The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications of IoT. Online report generation and sharing the reports reduce the time and make the treatment of patients very fast. Here, the...
Published by: IGI Global

|<

<

1

2

3

4

5

>

>|