The green transformation and upgrading of manufacturing enterprises cannot do without the support of green investment. The purpose of this study is to verify whether there is a correlation between the influencing factors of...
This study examined if professional development needs of digital natives and immigrant teachers differed for technology integration in a Chinese education setting. Quantitative and qualitative data was collected from 500...
The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the...
BACKGROUND: With the gradual improvement of market economy, people' s consumption level is constantly improving, and the quality requirements are getting higher and higher. OBJECTIVES: In order to study the management accounting...
Machine translation has developed rapidly. But there are some problems in machine translation, such as good reading, unable to reflect the mood and context, and even some language machines can not recognize. In order to improve...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
Aiming at the current software cost model and optimal release research, which does not fully consider the actual faults in the testing phase, a cost-reliability SRGM evaluation and selection algorithm SESABCRC is proposed. From...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
Having summarized the previous research on ceramic identification and the anti-counterfeiting, the authors propose a ceramic identification system that combines computer vision algorithms with blockchain technology. The system...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages...
Characteristic development is a process of intentionally solidifying and cultivating something's uniqueness. This article analyzes the uniqueness of university library cultural services in comparison with those provided by other...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
Network emerging e-commerce refers to the development of wireless broadband technology, smart terminal technology, near-field network, etc. as the driving force. It is the emerging e-commerce represented by the continuous...
The significance of Patterson's work Understanding Metaphor Through Corpora: A Case Study of Metaphors in Nineteenth Century Writing is that only through corpus linguistics have we been able to apply real empirical evidence to...
This empirical study takes a cognitive perspective and examines the translation of metaphors in speeches by Chinese President Xi Jinping as collected in the first volume of the book The Governance of China published in 2014. The...