Search

Results: 42
A Common General Access Structure Construction Approach in Secret Image Sharing
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Published by: IGI Global
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform
This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose...
Published by: IGI Global
Relationship Between Computer-Mediated Communication Competence and Attitude Toward Using Frog VLE Among Secondary School Teachers
Siew Oh, Yan Chua
Aug 02, 2021
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
Published by: IGI Global
I Think We Should…
Hengbin Yan
Jul 01, 2019
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
Published by: IGI Global
Applying Secret Image Sharing to Economics
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
Published by: IGI Global
Chinese Students' Perceptions of Using Mobile Devices for English Learning
Bin Zou, Xinxin Yan
Jul 01, 2014
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Published by: IGI Global
Development of an Eye Response-Based Mental Workload Evaluation Method
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
Published by: IGI Global
The Impact of Virtual Integration on Innovation Speed
Yan Tang, Ping Zhang
Jan 01, 2022
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
Published by: IGI Global
ROP Defense Using Trie Graph for System Security
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
Published by: IGI Global
A Novel Behavior Steganography Model Based on Secret Sharing
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the...
Published by: IGI Global
Effectiveness of Remote Interventions to Improve Medication Adherence in Patients after Stroke

Background

Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Published by:
CEO Exposure, Media Influence, and Stock Returns
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Published by: IGI Global
Biosorption of Silver using Metal-Imprinted Thiourea-Modified Glutaraldehyde-Crosslinked O-Carboxymethyl Chitosan Beads
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Filtering Infrequent Behavior in Business Process Discovery by Using the Minimum Expectation
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Published by: IGI Global
Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
Published by: IGI Global
CVaR Prediction Model of the Investment Portfolio Based on the Convolutional Neural Network Facilitates the Risk Management of the Financial Market
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Published by: IGI Global
Can Rumor Clarification Eliminate the Effects of Rumors?
This article analyzes the effects of rumor and official rumor clarification on Chinese stock returns under different rumor conditions using an event study. The results are based on a sample of 832 rumor clarification...
Published by: IGI Global
Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020
With China's continuous opening to the outside world, changes in the international environment and the operation of the cross-border RMB settlement system (CIPS), the scale of cross-border RMB settlement has fluctuated...
Published by: IGI Global
Relationships Between Teacher Presence and Learning Outcomes, Learning Perceptions, and Visual Attention Distribution in Videotaped Lectures
As the rampant pandemic witnessed significant growth in online learning, numerous studies focused on designing attractive videos to improve the quality of teaching. For an effective instructional video, whether a teacher should...
Published by: IGI Global
Enhancing Effective Teaching and Learning of ICT in the Schools for the Blind in Ghana
The paper examines role of the Information and Communication Technology (ICT) in Special Education in Ghana. Taking the relevant literature as the guiding principle, the paper addresses the opportunities, barriers and challenges...
Published by: IGI Global
Statistical Downscaling of Rainfall using Large-Scale Predictors
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
Object Tracking Based on Global Context Attention
Previous research has shown that tracking algorithms cannot capture long-distance information and lead to the loss of the object when the object was deformed, the illumination changed, and the background was disturbed by similar...
Published by: IGI Global
A Hybrid Learning Particle Swarm Optimization With Fuzzy Logic for Sentiment Classification Problems
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
Published by: IGI Global
The Investigation of Dependence Between the Internet Measurement and Globalization
Under the new measurement for the internet supplied from the Cooperative Association for Internet Data Analysis (CAIDA), the authors relax the orthogonal and normality condition with the methodology based on empirical...
Published by: IGI Global

|<

<

1

2

>

>|