This article extracts eight points for discussion from many years of research in newcomer academic support and social integration in Newfoundland and Labrador. These points include: transportation to school for newcomer...
This study uses the critical incident technique to collect and analyze incidents of service failure and success involving a logistics sharing service in which the service providers are individuals. The authors also explore the...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
Historically, the island of Newfoundland has had a culturally homogeneous population. For this reason, newcomers report a distressing insider/outsider dynamic of disconnect and challenges accessing local social support systems...
Advances in information technology have hugely influenced the tourism industry. Many tourists can generate and share their travel tips through social media, and people consult online reviews before making travel arrangements...
Advances in information technology have hugely influenced the tourism industry. Many tourists can generate and share their travel tips through social media, and people consult online reviews before making travel arrangements...
This paper applies the logarithmic mean divisia index to explore the decomposition and decoupling of sectoral carbon emissions across four provinces in the Yangtze River Delta (YRD). The results show that (1) the YRD experienced...
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
This article describes how current research on the institutional entrepreneurship process tends to ‘design principles.' There is lack of research on mechanism and strategy of the institutional bricolage, especially for Internet...
This study investigated (1) the challenges encountered by a heterogeneous group of first year undergraduates during a synchronous on-line collaborative writing activity conducted through Google Classroom using Google Docs and...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
In this study, the authors propose a computational cognitive model for sign language (SL) perception and comprehension with detailed algorithmic descriptions based on cognitive functionalities in human language processing. The...
With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
In this study, the water-atmosphere interfaces distribution and concentration fluctuation intensities of polybrominated diphenyl ethers (PBDEs) in Great Lake were analyzed. Based on the selected significant quantum descriptors...
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental protection and control of water. The solution to assess the grade of water security in...
The efficiency of offshore oil spill response not only relies on an efficaciously global decision/planning in devices combination and allocation, but also depends on the timely control for response devices (e.g., skimmers and...
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen...
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...