In this article, the author reports, in a narrative style, details of teaching speaking in experiential learning with a Syrian woman, and the author’s perceptions of applying a role play task-based approach. It has been widely...
In order to study the role of information technology in the promotion of agricultural development and information in today's social and economic development of the most important strategic impact, on the basis of modern...
This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm (NMIFS MOP- AQGA). The proposed...
Solute transport exists in most natural flows, which can be described by the advective-diffusive equation. In numerical modeling of such phenomenon, it is important to deal with irregular boundary and angular boundary points for...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized mutual antibodies information...
With the problems of neonatal survival and aging of the population becoming increasingly serious, the voice that longs for a new model of the medical industry is pushed to the limelight in the society. Gradually, a neologism...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
With the impacts of Covid-19 epidemic, e-learning has become a popular research issue. Therefore, how to upgrade the interactivity of e-learning, and allow learners to quickly access personalized and popular learning information...
The emergence of the cloud computing service has resulted in the entry of many companies into the market, with numerous competitors for cloud computing leading the technological trend. Recent studies have mainly focused on the...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Given the rapid development of internet and dramatic change it has brought to human life, this study examines the effect of internet use on well-being in rural China. Findings indicate that the act of engaging with internet and...
The digital economy continuously injects new momentum into the traditional economy and has become an important driving force for national economic development. Against this backdrop and using input-output data from the WIOD from...
This presentation describes how singing is re-ignited in Singapore primary schools through the professional development initiative by Singapore Teachers’ Academy for the aRts (STAR). Singing brings joy to the child and often...
High resolution analog-digital conversion (ADC) is a key instrument to convert analog signals to digital signals, which is deployed in data acquisition system to match high resolution analog signals from seismometers systems. To...
As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic...
Motion-compensated frame-interpolation (MCFI), synthesize intermediate frames between input frames guided by estimated motion, can be employed to falsify high bit-rate videos or high frame-rate videos with different frame-rates....
To solve some problems of particle swarm optimization, such as the premature convergence and falling into a sub-optimal solution easily, we introduce the probability initialization strategy and genetic operator into the...
Intelligent manufacturing is an important method for transforming and upgrading enterprise intelligence. Studying the influencing factors of enterprises, intelligent manufacturing can help enterprises formulate more targeted...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
This paper explores technological trajectory transition in the perspective of innovation ecosystem and their effect on innovation performance of latecomers in market. A structural equation model is developed and tested with data...
The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only...
To overcome the shortcomings of the standard particle swarm optimization algorithm (PSO), such as premature convergence and low precision, a dynamic multi-swarm PSO with global detection mechanism (DMS-PSO-GD) is proposed. In...