With the rapid development of information technologies, the new decade has been witnessing an advancement of massive open online courses (MOOCs)-based learning. However, MOOCs are infamous for the lower engagement and completion...
It is necessary to systematically review the literature since the information and communication technology (ICT)-assisted flipped pedagogical approach in English education has been increasingly popular. By way of visualization...
The use of social media such as Twitter has gained popularity in education during the COVID-19 pandemic. This study included 22 high-quality peer-reviewed journal articles for the meta-analysis. The authors reveal that there are...
This study evaluates CNC milling parameters (spindle speed, depth of cut, and feed rate) on medical-grade PMMA. A single objective analysis conducted showed that the optimal material removal rate (MRR) occurs at a spindle speed...
A widely-accepted measure of supply chain excellence is the Supply Chain Top 25 List published annually by Gartner Research. It evaluates firms from five quality dimensions: return on assets, inventory turns, revenue growth...
The ubiquitous use of ICT can create “techno-stress.” The purpose of the research is to examine the case of the specificity of the techno-stress phenomenon of local managers. The authors develop their research questions on the...
With the increasing amount of medical data and the high dimensional and diversified complex information, based on artificial intelligence and machine learning, a new way is provided that is multi-source, heterogeneous, high...
“Ideology” shapes our discourse practices and is closely related to the translation activities. This paper attempts to explore how ideological factors influence the cultural transmission of Confucianism through a comparative...
This study qualitatively analyzes interactional coping strategies used to managed technostress in the post-adoption stage of information technology implementation at a French legal firm. The nine strategies are participatory...
In recent years, research on the QoS-aware service composition problem often assumes that each component service in the process to be solved is equally essential. They do not consider the impact of core component services and...
This study identifies coping strategies to examine the behaviors adopted by team managers in addressing technostress. It evaluates the choice of coping strategies to increase performance. A study involving 3 companies and 45...
The transportation problem is a one of the principal topics in operational research where goods are initially stored at different sources and need to be livered to destination in such a way the total transportation cost is...
Nowadays the number of college students' suicides are increasing for the insufficient social support or poor interpersonal relations. Furthermore, not much attention has been concerned to students' interpersonal relations when...
This research was motivated by the need to identify the most effective Data Envelopment Analysis (DEA) model and associated data analytics software for measuring, comparing, and optimizing building energy efficiency. By...
Various perishable agricultural products are recalled due to harmful health risks. Blockchain has been used to reduce the amount of such products wasted and disposed. Specifically, a supply chain with a wholesaler, a retailer...
The transaction scale of cross-border import e-commerce has grown rapidly around the world. Platform-style cross-border e-commerce does not control the quality, source and transaction process of goods strictly and...
This research studied user repurchase intentions on online group buying services. In the research model, satisfaction is hypothesized to have a positive relationship with trust that will have a positive impact on repurchase...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
Based on the literature review, this paper proposed the model between the influencing factors of financial support of creative enterprises, financial support capabilities and support performance, and made corresponding...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...