Predicting stock indexes is a common concern in the financial world. This work uses neural network, support vector machine (SVM), mixed data sampling (MIDAS), and other methods in data mining technology to predict the daily...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Nach dem Tod von Ludwig Landgrebe am 14. August 1991 fand eine Wochespäter in seinem Wohnort Bergisch-Gladbach (nahe der Stadt Köln, an derenUniversität er gelehrt hatte) am 22. August ein Trauergottesdienst statt. DieFamilie...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Most of the existing influence maximization problem in social networks only focus on single relationship social networks, that is, there is only one relationship in social networks. However, in reality, there are often many...
Improving software development efficiency based on existing APIs is one of the hot researches in software engineering. Understanding and learning so many APIs in large software libraries is not easy and software developers...
This study aims to integrate perceived risk into elaboration likelihood model, develop a comprehensive research model to explain dual routes of persuasive communication through various factors affecting individual acceptance and...
Asia is the largest and most populous continent of Earth with an overall population of 446.27 crores. Housing this population drives various challenges in different aspects, in which providing healthy and nutritious food to each...
This paper matches the large-scale survey data and the corresponding historical weather data to explore how air pollution impacts on low-carbon travel choices. The K-means algorithm is employed to cluster the personal...
Quantity commitment chosen by firms in competition has been demonstrated by previous studies to mitigate price competition. This study demonstrates that asymmetric quantity commitment can always arise when one firm (e-tailer)...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
As an essential communication medium, the internet brings the freedom and convenience of publishing, transmitting, and acquiring information. At the same time, the problems caused by various kinds of information that endanger...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
The emergence of the cloud computing service has resulted in the entry of many companies into the market, with numerous competitors for cloud computing leading the technological trend. Recent studies have mainly focused on the...
Promotion tournaments theory and regional economic competition can be used to explain China's overcapacity. This study used the non-radial distance function to evaluate the overcapacity considering resource and environmental...
With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
In recent years, wearable and mobile technologies have been applied in different domains such as medical, personal safety, sports, and lifestyle computing (Cheng & Mitomo, 2017). Wearable technologies may help users bring their...
With the advent of the 5G network era, the convenience of mobile smartphones has become increasingly prominent, the use of mobile applications has become wider and wider, and the number of mobile applications. However, the...
This article describes how a visual cryptography scheme, with one prominent feature—decrypting simply, has attracted much research attention since it was first proposed. However, meaningless shares remain a continuing challenge...
Fake news has brought significant challenges to the healthy development of social media. Although current fake news detection methods are advanced, many models directly utilize unselected user comments and do not consider the...
The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future...
Coal has always been an important foundation for China’s economy. The booming and declining of the coal industry can directly impact the regional economy. This study researches the impact of the rise and fall of the coal...
A new reversible watermarking algorithm on stereo audio signals is proposed in this article. By utilizing correlations between two channels of audio signal, the authors segment one channel based on another one according to the...