Characteristic development is a process of intentionally solidifying and cultivating something's uniqueness. This article analyzes the uniqueness of university library cultural services in comparison with those provided by other...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
This article considers e-commerce platforms with and without promotion, builds biform game models consisting of one and two supplier platforms, and calculates the profit distribution of the three parties using the Shapley value...
To overcome shortcomings when the ant colony optimization clustering algorithm (ACOC) deal with the clustering problem, this paper introduces a novel ant colony optimization clustering algorithm with chaos. The main idea of the...
Technology search is crucial to establishing competitive advantage and improving firm performance. However, it is still unclear how different technology search strategies affect competitive advantage and performance at the firm...
Growing demand of computational power brings increasing scale and complexity of cloud datacenters. However, such increase also generates growing energy consumption and related cost incurred for cooling and maintenance. With...
Credit scoring, aiming to distinguish potential loan defaulter, has played an important role in the financial industry. To further improve the accuracy and efficiency of classification, this paper develops an ensemble model...
5G service refers to the mobile services built on the 5th generation telecommunication technology. It enhances end user experience of mobile internet surfing significantly. The high bandwidth of 5G technologies offers vendors...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
Since the explosive growth of we-medias today, personalized recommendation is playing an increasingly important role to help users to find their target articles in vast amounts of data. Deep learning, on the other hand, has...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
In a big data environment, traditional recommendation methods have limitations such as data sparseness and cold start, etc. In view of the rich semantics, excellent quality, and good structure of knowledge graphs, many...
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a...
Improving the performance and reducing the cost of healthcare have been a great concern and a huge challenge for healthcare organizations and governments at every level in the US. Measures taken have included laws, regulations...
The industry sustainability in today's globalization relies on cost-effective supply chain management of diverse markets and logistics. Supply chain risks typically limit profits over the overall expense of the supply chain. In...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
The coronavirus disease 2019 (COVID-19) epidemic poses a threat to the everyday life of people worldwide and brings challenges to the global health system. During this outbreak, it is critical to find creative ways to extend the...
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...