Search

Results: 69
A Predictive and Trajectory-Aware Edge Service Allocation Approach in a Mobile Computing Environment
Ling Huang, Bin Shuai
Jan 01, 2022
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Published by: IGI Global
Reversible Data Hiding Based on Adaptive Block Selection Strategy
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
Published by: IGI Global
Realization of Agricultural Machinery Equipment Management Information System Based on Network
In order to study the role of information technology in the promotion of agricultural development and information in today's social and economic development of the most important strategic impact, on the basis of modern...
Published by: IGI Global
Engaging in English Speaking Teaching Based on a Task-Based Approach
Ling Ding
Dec 20, 2018
In this article, the author reports, in a narrative style, details of teaching speaking in experiential learning with a Syrian woman, and the author’s perceptions of applying a role play task-based approach. It has been widely...
Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm
Zhang Ling, Zhang Hao
Jan 01, 2022
This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm (NMIFS MOP- AQGA). The proposed...
Published by: IGI Global
The Rise of China
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System
Zhang Ling, Zhang Hao
Jan 01, 2022
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized mutual antibodies information...
Published by: IGI Global
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
Published by: IGI Global
Introduction
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
The Impact of Digital Twins on Local Industry Symbiosis Networks in Light of the Uncertainty Caused by the Public Crisis
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
Published by: IGI Global
An Exploration Study on the Consequence of the COVID-19 Pandemic on Online Q&A Communities
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
Published by: IGI Global
Learning Trajectory Patterns via Canonical Correlation Analysis
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
Published by: IGI Global
Improved Model Based on GoogLeNet and Residual Neural Network ResNet
Xuehua Huang
Jan 01, 2022
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
Published by: IGI Global
Using an Ontology-Based Neural Network and DEA to Discover Deficiencies of Hotel Services
Companies can gain critical real-time insights into customer requirements and service evaluation by mining social media. To acquire the service performance and improve the service deficiencies for hotels, this research proposes...
Published by: IGI Global
User's Segmentation on Continued Knowledge Management System Use in the Public Sector
Chi-Cheng Huang
Jan 01, 2020
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...
Published by: IGI Global
Measuring Enterprise Mutual Information Based on the Helix Model
In the context of digital transformation, this emerging technologies input creates powerful digital capabilities. Despite of the long distance, The enterprises cooperate more closely through wireless networks in digital space...
Published by: IGI Global
Water Resources Assessment and Management for Nuclear Power Plants in China
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
Research of Image Recognition of Plant Diseases and Pests Based on Deep Learning
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Published by: IGI Global
Intelligent and Interactive Chatbot Based on the Recommendation Mechanism to Reach Personalized Learning
With the impacts of Covid-19 epidemic, e-learning has become a popular research issue. Therefore, how to upgrade the interactivity of e-learning, and allow learners to quickly access personalized and popular learning information...
Published by: IGI Global
On Cost-Aware Heterogeneous Cloudlet Deployment for Mobile Edge Computing
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
Published by: IGI Global
Does Cloud Computing Influence Enterprise Performance?
The emergence of the cloud computing service has resulted in the entry of many companies into the market, with numerous competitors for cloud computing leading the technological trend. Recent studies have mainly focused on the...
Published by: IGI Global
CVaR Prediction Model of the Investment Portfolio Based on the Convolutional Neural Network Facilitates the Risk Management of the Financial Market
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Published by: IGI Global
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Published by: IGI Global
Airbnb or Hotel?
Advances in information technology have hugely influenced the tourism industry. Many tourists can generate and share their travel tips through social media, and people consult online reviews before making travel arrangements...
Published by: IGI Global

|<

<

1

2

3

>

>|