Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
Using a corpus approach, this article investigates the translation styles of the first chapter of Fu Sheng Liu Ji at three levels: the statistical parameters, the translation of culture-specific lexis, and readability...
A quantitative study involving Mainland China (the PRC), Taiwan, India, the UAE, and the US, five areas with 852 responses of IT/IS personnel data towards building a more suitable Circumplex Career Anchor Model for IT/IS...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
The purpose of this paper is to investigate the influential factors of online social network advertising in three different cultural areas, being China, India, and the US. This study uses the Social Capital Theory (SCT), and...
With the rapid development of computer intelligence technology, the majority of scholars have a great interest in the detection and tracking of moving targets in the field of video surveillance and have been involved in its...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
Mobilization has been an important management issue in business interaction, but the role of technology in the mobilization process is little investigated, particularly with regard to the rising phenomena of platforms and...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
While career anchors have mainly studied in the US society; this study demonstrates the difference in the career anchors of the information technology/information system (IT/IS) personnel rooted in different cultures. The survey...
The purpose of this research is to evaluate the continuance usage intention on online healthcare community (OHC) platform for patients and examine the "doctor-OHC-patient" relationship. The proposed model attempted to integrate...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
Hydrogen evolution reaction (HER) is directly relevant to green hydrogen production from water splitting. Recently, a low-cost Ni5P4 material has been demonstrated experimentally and theoretically to...
Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge...
With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very...
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many...