This article extracts eight points for discussion from many years of research in newcomer academic support and social integration in Newfoundland and Labrador. These points include: transportation to school for newcomer...
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental protection and control of water. The solution to assess the grade of water security in...
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Historically, the island of Newfoundland has had a culturally homogeneous population. For this reason, newcomers report a distressing insider/outsider dynamic of disconnect and challenges accessing local social support systems...
Given the rapid development of internet and dramatic change it has brought to human life, this study examines the effect of internet use on well-being in rural China. Findings indicate that the act of engaging with internet and...
Despite the promise of cross-border e-commerce, attracting consumers is still a worldwide challenge. Many cross-border e-commerce platforms have responded to the challenges by embracing innovative tools like live streaming....
Shanghai was designed as the center of marine shipping in China. Shanghai is located at east of China and on the verge of the East China Sea. In addition, The Yangzi River and Qiantang River are surrounding the city and access...
The researcher’s role as an insider or outsider has been a controversial issue over the last few decades. There has been a heated debate about how researchers position themselves in the relationship to the groups they are...
As one of the most common language phenomena in bilingual settings, code-switching has been studied widely to explore its nature and features. In the current study, the author set out to explore the effect of syntactic alignment...
This article describes how current research on the institutional entrepreneurship process tends to ‘design principles.' There is lack of research on mechanism and strategy of the institutional bricolage, especially for Internet...
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
Healthcare insurance fraud influences not only organizations by overburdening the already fragile healthcare systems, but also individuals in terms of increasing premiums in health insurance and even fatalities. Identifying the...
Based on data mining technology, this paper introduces venture capital, which is an external strategic investor factor, and takes the maximization of enterprise value as the goal, and discusses the characteristics of the optimal...
This study aimed to investigate optimal multiple reservoir operations and water demand management considering climate change impact. In this study, conditional density estimation network creation and evaluation (CaDENCE) method...
In this study, the water-atmosphere interfaces distribution and concentration fluctuation intensities of polybrominated diphenyl ethers (PBDEs) in Great Lake were analyzed. Based on the selected significant quantum descriptors...
As an important mode of open innovation, crowdsourcing can effectively integrate external resources, enabling enterprises to obtain stronger competitiveness and more benefits at a faster speed and lower cost. However, this mode...
Many existing studies focus on the effect of external influence mechanisms (e.g., deterrence) impacting information security policy compliance (ISPC). This study explores the formation of ISPC from an autonomous motivation...
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen...
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
Teaching English as a Second Language (TESL) may not be a familiar term for many people in Newfoundland and Labrador, and TESL professionals in the province are a very small group. One can easily count the numbers of ESL...
Small coin cell batteries are predominantly used for testing lithium‐ion batteries (LIBs) in academia because they require small amounts of material and are easy to assemble. However, insufficient attention is given to...
This article reports on my early experiences with learning and speaking varieties of Chinese, responding to the curious questions on the power relationship between Mandarin and other dialects in China today. A series of...
The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications of IoT. Online report generation and sharing the reports reduce the time and make the treatment of patients very fast. Here, the...