The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...