With the impacts of Covid-19 epidemic, e-learning has become a popular research issue. Therefore, how to upgrade the interactivity of e-learning, and allow learners to quickly access personalized and popular learning information...
The purpose of this study was to investigate preservice science teachers' proficiency levels regarding their practical knowledge of technological pedagogical content knowledge (TPACK-P). A sample of 103 third- and fourth-year...
Based on self-built parallel and comparable corpora, this paper explores the translator's style manifested in two Chinese translations of Moment in Peking (one by Zhang Zhenyu and the other by Yu Fei). The findings demonstrate...
The paper explores the relationship among technological innovation, technological trajectory transition, and firms’ innovation performance. Technological innovation is studied from the perspectives of innovation novelty and...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Online medical communities have revolutionized the way patients obtain medical-related information and services. Investigating what factors might influence patients’ satisfaction with doctors and predicting their satisfaction...
The emergence of the cloud computing service has resulted in the entry of many companies into the market, with numerous competitors for cloud computing leading the technological trend. Recent studies have mainly focused on the...
In order to study the role of information technology in the promotion of agricultural development and information in today's social and economic development of the most important strategic impact, on the basis of modern...
In this article, the author reports, in a narrative style, details of teaching speaking in experiential learning with a Syrian woman, and the author’s perceptions of applying a role play task-based approach. It has been widely...
The rapid rise of C2C e-commerce in China has brought serious difficulties to China's tax collection and management. Based on the principle of progressive taxation, the necessity of Taxation on C2C e-commerce is analyzed and...
This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm (NMIFS MOP- AQGA). The proposed...
As social media has developed, online interaction between consumers and companies has increased rapidly. This research explores how companies' replies to consumers' past online comments affect consumers' predictions of their...
The purpose is to solve the problems of sparse data information, low recommendation precision and recall rate and cold start of the current tourism personalized recommendation system. First, a context based personalized...
Digital image smoothing filtering operations, including the average filtering, Gaussian filtering and median filtering are always used to beautify the forged images. The detection of these smoothing operations is important in...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
This paper explores technological trajectory transition in the perspective of innovation ecosystem and their effect on innovation performance of latecomers in market. A structural equation model is developed and tested with data...
To understand the water balance and environmental effects under climate change condition, hydrological models are always used to simulate the hydrological cycle and predict future scenarios by using global climate models (GCMs)...
Solute transport exists in most natural flows, which can be described by the advective-diffusive equation. In numerical modeling of such phenomenon, it is important to deal with irregular boundary and angular boundary points for...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized mutual antibodies information...
Aimed to improve the efficiency of computing offloading in internet of vehicles (IoV), a collaborative multi-task computing offloading decision mechanism with adaptive estimation of distribution algorithm for MEC-IoV was...
Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations....
This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very...
As social media has developed, online interaction between consumers and companies has increased rapidly. This research explores how companies' replies to consumers' past online comments affect consumers' predictions of their...
Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the...