The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
There is a subject-object asymmetry in Chinese, such that the extraction of a possessor NP from a possessive NP is quite free from subject position but restricted from object position. A possessive tJP consists of a possessor NP...
In der vorliegenden Arbeit befasse ich mich mit der Problematik derEmpfindung, bzw. der Hyle, in Husserls Phänomenologie und derentsprechenden Auslegung von Ludwig Landgrebe. Husserl verwendet denBegriff der Empfindung, bzw. der...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
The study aims to investigate how pre-editing based on controlled Chinese rules can be an effective approach to improving Chinese-to-English machine translation (MT) output. Based on the analysis of comparable texts, and by...
Studies have focused on elucidating the sharing behavior of media users. However, few studies have specifically investigated users' health information sharing behavior in the social media context, especially WeChat. This study...
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...
In the context of digital transformation, this emerging technologies input creates powerful digital capabilities. Despite of the long distance, The enterprises cooperate more closely through wireless networks in digital space...
Product country-of-origin (COO) is now playing a central role in consumers’ purchase behavior. Previous studies have investigated several factors that impact COO. However, little attention has been paid to the impact of COO on...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
For e-commerce companies, it is easier to obtain a large amount of aggregated data about user behavior with the help of embedded network platforms, which contains valuable information that helps to form effective...
This study focuses on the restorative effects of immersive virtual reality (VR) forest experiences on elderly people during the COVID-19 lockdown. A field experiment with 63 elderly participants was conducted in an elderly care...
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
To solve some problems of particle swarm optimization, such as the premature convergence and falling into a sub-optimal solution easily, we introduce the probability initialization strategy and genetic operator into the...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...