Aeronautical information service (AIS) involves manifold correlations among aeronautical events. The data mining technology has been used to extract the characteristics of aeronautical information. With the aeronautical dynamic...
This paper expounds on the development prospects of SMEs and E-commerce finance, and illustrates the significance of developing online finance. It also introduces the commonly-used research methods of the two kinds of financial...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
This chapter discusses visual culture in the immersive metaverse through the visual cognition lens. Visual cognition pertains to how we learn through visual means. As educators, we should be aware of how our students learn...
It is increasingly important to reuse the wastewater conservancy facilities, which can further promote the development of agricultural economy. The basis of full investigation and research on the wastewater conservancy...
The application of digital information and computing technology can significantly improve cooperation between different enterprises and the efficiency of knowledge and resources management, while facilitating the participation...
This chapter discusses visual culture in the immersive metaverse through the visual cognition lens. Visual cognition pertains to how we learn through visual means. As educators, we should be aware of how our students learn...
As irreplaceable knowledge infrastructures, universities have been acknowledged to play the roles of fostering knowledge workers, supporting knowledge economies, and building knowledge cities. Through spatial developments...
With the rapid development of e-commerce and the increasing popularity of smartphones, online shopping has become a trend of the times, and various online shopping platforms have emerged endlessly. As a new type of shopping...
Before the Revolution of 1911, China was a mighty empire dominated by various Chinese ethnic groups in different time periods. In particular, the Han people of the Tang1 and Ming Dynasty and the Man people of the Qing Dynasty2...
The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Language skills are an important factor affecting students' language application. The cultivation of students' language skills depends on teacher-led daily classroom teaching. In view of the importance of language skills in...
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform...
The interlibrary loan (ILL) service is essential to a multi-campus university library. This article builds a dynamic collection optimization model based on readers' needs using ILL data. This article first examined the status...
Consumer product recommendation articles posted in Social Shopping Community (SSC) have become an important source of purchase information for other potential consumers. However, less effort has been put into understanding and...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
Drawing from extant retailing and supply chain research, this paper studies the dual channel supply chain decision-making of member channel, and obtains the optimal price strategy, maximum demand and maximum total revenue of the...
The purpose is to explore the application potential of HCI (Human-Computer Interaction) technology under AI (Artificial Intelligence) in enterprise performance evaluation and the influence of abusive management and self-efficacy...
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and...
Infrastructure digital transformation may create value for logistics enterprises; but its whole process is still full of uncertainties. Prior research focused on smart control in view of the infrastructure and ignored the...