Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
This article analyzes the effects of rumor and official rumor clarification on Chinese stock returns under different rumor conditions using an event study. The results are based on a sample of 832 rumor clarification...
With China's continuous opening to the outside world, changes in the international environment and the operation of the cross-border RMB settlement system (CIPS), the scale of cross-border RMB settlement has fluctuated...
As the rampant pandemic witnessed significant growth in online learning, numerous studies focused on designing attractive videos to improve the quality of teaching. For an effective instructional video, whether a teacher should...
The paper examines role of the Information and Communication Technology (ICT) in Special Education in Ghana. Taking the relevant literature as the guiding principle, the paper addresses the opportunities, barriers and challenges...
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
Previous research has shown that tracking algorithms cannot capture long-distance information and lead to the loss of the object when the object was deformed, the illumination changed, and the background was disturbed by similar...
Under the new measurement for the internet supplied from the Cooperative Association for Internet Data Analysis (CAIDA), the authors relax the orthogonal and normality condition with the methodology based on empirical...
Online reviews facilitate customer brand engagement, but few studies have explored this problem from the perspective of interpersonal attraction and its psychological mechanisms in the social commerce context. This paper aims to...
Mobile edge computing is playing an increasingly important role in the rise of mobile internet technology. Services deployed on edge servers nearby mobile users would provide computing capabilities with low latency and high...
In recent decades, healthcare organizations around the world have increasingly appreciated the value of information technologies for a variety of applications. Three of the new technological advancements that are impacting smart...