This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
This paper expounds on the development prospects of SMEs and E-commerce finance, and illustrates the significance of developing online finance. It also introduces the commonly-used research methods of the two kinds of financial...
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
This chapter discusses visual culture in the immersive metaverse through the visual cognition lens. Visual cognition pertains to how we learn through visual means. As educators, we should be aware of how our students learn...
It is increasingly important to reuse the wastewater conservancy facilities, which can further promote the development of agricultural economy. The basis of full investigation and research on the wastewater conservancy...
This chapter discusses visual culture in the immersive metaverse through the visual cognition lens. Visual cognition pertains to how we learn through visual means. As educators, we should be aware of how our students learn...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
As irreplaceable knowledge infrastructures, universities have been acknowledged to play the roles of fostering knowledge workers, supporting knowledge economies, and building knowledge cities. Through spatial developments...
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
With the rapid development of e-commerce and the increasing popularity of smartphones, online shopping has become a trend of the times, and various online shopping platforms have emerged endlessly. As a new type of shopping...
Along with the rapid development of digital information technology, e-government is of great potential because it is a new form of conducting public administration and a way of demonstrating governmental innovation. The...
Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
Before the Revolution of 1911, China was a mighty empire dominated by various Chinese ethnic groups in different time periods. In particular, the Han people of the Tang1 and Ming Dynasty and the Man people of the Qing Dynasty2...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
The purpose of the current study is to examine factors affecting corporate image driven by social networking fan pages on Facebook. Under the modified elaboration likelihood model (ELM), we answer how fan page contributor post...
Language skills are an important factor affecting students' language application. The cultivation of students' language skills depends on teacher-led daily classroom teaching. In view of the importance of language skills in...
The interlibrary loan (ILL) service is essential to a multi-campus university library. This article builds a dynamic collection optimization model based on readers' needs using ILL data. This article first examined the status...
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...