Search

Results: 55
Obligatory, Optional and Contrastive Occurrences of KE Modern Persian
Jalal Rahimian
Jul 18, 2013
The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
THE "INDIFFERENCE-ke CONSTRUCTION" IN MODERN CONVERSATIONAL PERSIAN
Nima Sadat-Tehrani
Aug 01, 2013
This paper deals with a construction in Persian called here the Indifference-ke Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Published by: IGI Global
Multiple Fusion Strategies in Localization of Local Deformation Tampering
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
Published by: IGI Global
Relationship Between Computer-Mediated Communication Competence and Attitude Toward Using Frog VLE Among Secondary School Teachers
Siew Oh, Yan Chua
Aug 02, 2021
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
Published by: IGI Global
Design Frameworks for Mobile Health Technology
Ke Zhang, Ayse Aslan
Jan 01, 2022
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Published by: IGI Global
An Empirical Study on Impact of Management Capabilities for the Multinational Company's Sustainable Competitive Advantage
Ke Zong, Zheng Wang*
Mar 22, 2022
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
Published by: IGI Global
I Think We Should…
Hengbin Yan
Jul 01, 2019
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
Published by: IGI Global
Chinese Students' Perceptions of Using Mobile Devices for English Learning
Bin Zou, Xinxin Yan
Jul 01, 2014
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Published by: IGI Global
Development of an Eye Response-Based Mental Workload Evaluation Method
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
Published by: IGI Global
The Impact of Virtual Integration on Innovation Speed
Yan Tang, Ping Zhang
Jan 01, 2022
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
Published by: IGI Global
Development of a risk rank model for environmental risk assessment of abrupt water pollution accidents - with the case of Laoguan River Basin
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
ROP Defense Using Trie Graph for System Security
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
Published by: IGI Global
Research on the Mediating Effect of Corporate Governance Behavior Between GEM and Governance Performance of Listed Companies on the Growth Enterprise
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
Published by: IGI Global
Effectiveness of Remote Interventions to Improve Medication Adherence in Patients after Stroke

Background

Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Published by:
CEO Exposure, Media Influence, and Stock Returns
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Published by: IGI Global
Biosorption of Silver using Metal-Imprinted Thiourea-Modified Glutaraldehyde-Crosslinked O-Carboxymethyl Chitosan Beads
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
Fitness Distance Correlation Strategy for Solving the RGV Dynamic Scheduling Problem
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
Published by: IGI Global
Filtering Infrequent Behavior in Business Process Discovery by Using the Minimum Expectation
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Published by: IGI Global
Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
Published by: IGI Global
A HEVC Video Steganalysis Against DCT/DST-Based Steganography
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
Published by: IGI Global
CVaR Prediction Model of the Investment Portfolio Based on the Convolutional Neural Network Facilitates the Risk Management of the Financial Market
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Published by: IGI Global
An Intra-Prediction Mode-Based Video Steganography With Secure Strategy
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
Published by: IGI Global
A Common General Access Structure Construction Approach in Secret Image Sharing
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Published by: IGI Global

|<

<

1

2

3

>

>|