On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption...
Task-oriented dialogue systems aim to engage in interactive dialogue with people to ultimately complete specific tasks. Typical application domains include ticket booking, online shopping, and healthcare providing. Medical...
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
The rapid development of e-commerce has led to increased pressure on the express delivery industry to transport products to customers in a timely manner. The problem of how to deliver an increasing volume of express orders to...
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
In this paper, the development of the MAR (mobile augmented reality) remedial teaching program is described. It allowed students to manipulate augmented objects through AURASMA app via internet and find leads to solve geometry...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Studies have focused on elucidating the sharing behavior of media users. However, few studies have specifically investigated users' health information sharing behavior in the social media context, especially WeChat. This study...
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental protection and control of water. The solution to assess the grade of water security in...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...