Consumer product recommendation articles posted in Social Shopping Community (SSC) have become an important source of purchase information for other potential consumers. However, less effort has been put into understanding and...
This article describes how understanding human mobility behavior is of great significance for predicting a broad range of socioeconomic phenomena in contemporary society. Although many studies have been conducted to uncover...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio...
This study focuses on the restorative effects of immersive virtual reality (VR) forest experiences on elderly people during the COVID-19 lockdown. A field experiment with 63 elderly participants was conducted in an elderly care...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
Data interaction scenarios involving multiple parties in network communities have problems of trust, data security, and reliability of the parties, and secure multiparty computation(SMPC) can effectively solve these problems. To...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
The sudden outbreak of COVID-19 has dealt a huge blow to traditional education and training companies. Institutions use the WeChat platform to attract users, but how to identify high-quality users has always been a difficult...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
The authors examine the information-driven trades and informed traders' order size strategies in China's stock market. They find the aggregate U-shaped informed trading is not only explained by the time-of-day effect but is also...
Research has identified the significant effect of new ventures’ signaling information management on their ability to secure private equity financing. This study adopts an integrated signaling and screening perspective to...
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages...
The stability of the original spillover effect model of agricultural product market price volatility is poor, resulting in the low degree of fitting between the results and the actual situation. In order to further clarify the...
Existing pharmaceutical information extraction research often focus on standalone entity or relationship identification tasks over drug instructions. There is a lack of a holistic solution for drug knowledge extraction....
Characteristic development is a process of intentionally solidifying and cultivating something's uniqueness. This article analyzes the uniqueness of university library cultural services in comparison with those provided by other...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...