Search

Results: 217
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification
On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption...
Published by: IGI Global
Process-Aware Dialogue System With Clinical Guideline Knowledge
Task-oriented dialogue systems aim to engage in interactive dialogue with people to ultimately complete specific tasks. Typical application domains include ticket booking, online shopping, and healthcare providing. Medical...
Published by: IGI Global
How Far Can the Message Go Through Online Communication
Jie Meng
Jan 01, 2022
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Published by: IGI Global
Information Acquisition, Persuasion, and Group Conformity of Online Tribalism
Jie Meng
Apr 01, 2022
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
Published by: IGI Global
Modeling and Solution Algorithm for Optimization Integration of Express Terminal Nodes With a Joint Distribution Mode
The rapid development of e-commerce has led to increased pressure on the express delivery industry to transport products to customers in a timely manner. The problem of how to deliver an increasing volume of express orders to...
Published by: IGI Global
A Study on Pollution in Livestock and Poultry Breeding in Shiyan City
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
Published by: IGI Global
Utilizing MAR for Remedial Teaching of Compound-Cube-Surface Area at Elementary School in Taiwan
Meng Chen, Koun Sun
Apr 01, 2020
In this paper, the development of the MAR (mobile augmented reality) remedial teaching program is described. It allowed students to manipulate augmented objects through AURASMA app via internet and find leads to solve geometry...
Published by: IGI Global
Factors Affecting the Adoption of Self-Service Technology (SST) in the Public Sector
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
Published by: IGI Global
A Model of Semantic-Based Image Retrieval Using C-Tree and Neighbor Graph
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Published by: IGI Global
Canals, Consent and Coercion
Francis James Dawson
Sep 11, 2018
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Understanding the Health Information Sharing Behavior of Social Media Users
Studies have focused on elucidating the sharing behavior of media users. However, few studies have specifically investigated users' health information sharing behavior in the social media context, especially WeChat. This study...
Published by: IGI Global
Investigating the Key Drivers of Impulsive Buying Behavior in Live Streaming
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Published by: IGI Global
Water Resources Security Evaluation Based on Matter Element Model in the Yellow River Basin
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental  protection and control of water. The solution to assess the grade of water security  in...
A Hybrid Learning Particle Swarm Optimization With Fuzzy Logic for Sentiment Classification Problems
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
Published by: IGI Global
Using a Complex Technology in a Language Course
Airong Wang
Dec 06, 2019
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
Published by: IGI Global
Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime
Hongning Wang
Sep 01, 2021
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
Published by: IGI Global
View on the Buildup of New Service Capability of National Library of China From the Point of Development Trend of Reference Work
Lei Wang
Jan 01, 2021
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
Published by: IGI Global
Color Image Encryption Using Angular Graph Fourier Transform
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties...
Published by: IGI Global
Innovative Practice and Development Thinking of Space Re-design in the Liaoning Provincial Library
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
Published by: IGI Global
Strategic Information Technology Compensation
Chingning Wang
Oct 01, 2019
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Published by: IGI Global
Biosorption of Silver using Metal-Imprinted Thiourea-Modified Glutaraldehyde-Crosslinked O-Carboxymethyl Chitosan Beads
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
The Strengths, Weaknesses, Opportunities, and Threats Analysis of Big Data Analytics in Healthcare
Chaojie Wang
Jan 01, 2019
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
Published by: IGI Global
Logistic Analytics Management in the Service Supply Chain Market Using Swarm Intelligence Modelling
Congcong Wang
Oct 01, 2022
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
Published by: IGI Global

|<

<

1

2

3

4

5

>

>|