With the rapid development of information technologies, the new decade has been witnessing an advancement of massive open online courses (MOOCs)-based learning. However, MOOCs are infamous for the lower engagement and completion...
This article considers e-commerce platforms with and without promotion, builds biform game models consisting of one and two supplier platforms, and calculates the profit distribution of the three parties using the Shapley value...
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
It is necessary to systematically review the literature since the information and communication technology (ICT)-assisted flipped pedagogical approach in English education has been increasingly popular. By way of visualization...
The use of social media such as Twitter has gained popularity in education during the COVID-19 pandemic. This study included 22 high-quality peer-reviewed journal articles for the meta-analysis. The authors reveal that there are...
Library maker services are a current focus of the industry's theoretical research and practice. With the popularization of the maker movement and the development of “mass entrepreneurship and innovation” in China, the library...
The paper explores the relationship among technological innovation, technological trajectory transition, and firms’ innovation performance. Technological innovation is studied from the perspectives of innovation novelty and...
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in...
The rapid rise of C2C e-commerce in China has brought serious difficulties to China's tax collection and management. Based on the principle of progressive taxation, the necessity of Taxation on C2C e-commerce is analyzed and...
A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image...
The purpose is to solve the problems of sparse data information, low recommendation precision and recall rate and cold start of the current tourism personalized recommendation system. First, a context based personalized...
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Solute transport exists in most natural flows, which can be described by the advective-diffusive equation. In numerical modeling of such phenomenon, it is important to deal with irregular boundary and angular boundary points for...
Aimed to improve the efficiency of computing offloading in internet of vehicles (IoV), a collaborative multi-task computing offloading decision mechanism with adaptive estimation of distribution algorithm for MEC-IoV was...
Compared with traditional machine learning model, graph neural networks (GNNs) have distinct advantages in processing unstructured data. However, the vulnerability of GNNs cannot be ignored. Graph universal adversarial attack is...
With the increasing amount of medical data and the high dimensional and diversified complex information, based on artificial intelligence and machine learning, a new way is provided that is multi-source, heterogeneous, high...
To analyze the environmental pollution effects elicited by industrial agglomeration, a spatial econometric model is constructed based on the Green Solow model. Using data derived from 285 Chinese cities between 2003and 2014, the...
'Hearables' have become important in the aging population. This study investigates whether smart technologies help middle-aged and elderly people accept hearing aid devices in smart cities of China. The authors adopt the PLS-SEM...
This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long...
Command injection vulnerabilities are among the most common and dangerous attack vectors in IoT devices. Current detection approaches can detect single-step injection vulnerabilities well by fuzzing tests. However, an attacker...
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
In the multi-objective optimization algorithm, the parameter strategy has a huge impact on the performance of the algorithm, and it is difficult to set a set of parameters with excellent distribution and convergence performance...