(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
There is a subject-object asymmetry in Chinese, such that the extraction of a possessor NP from a possessive NP is quite free from subject position but restricted from object position. A possessive tJP consists of a possessor NP...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
This article mainly studies the design and realization of English listening teaching system based on virtual environment technology. This paper designs and builds a virtual experimental operating platform to assist students in...
With the popularity of online shopping, a large body of studies have paid much attention to the factors influencing consumers’ information seeking and assessing. However, theoretical development and empirical testing are still...
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
It is expected that website design can lead to online trust, although research that systematically examines such a relationship is little. In addition, far too little attention has been paid to understand the effect of website...
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
In the era of big data-driven digital economies, technology commercialization capability has become the lifeblood of high-tech enterprises to shape competitive advantage and achieve multiplier growth, while the related research...
Although it is widely acknowledged that translation is a cognitive process, there is scarcely any study establishing connections between the text and mental representations and giving a systematic and comprehensive explanation...
To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and...
This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters...
Cross-border e-commerce has gradually expanded in international trade markets over the past decades. This paper analyzes the determinants of the volume of cross-border e-commerce in a gravity model framework. Moreover, the paper...
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method...
Taking the one-year-old T. chinensis (Tamarix chinensis Lour.) in Yellow River Delta as the study object, the variations of C, N and P stoichiometry in T. chinensis under drought stress was studied using pot experiments. The...
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
With the increasing number of camera networks deployed in public places, intelligent video processing has become a key technology for video surveillance. In order to alleviate the workload of the tracers in the artificial...
Recently, the spread of videos forged by deepfake tools has been widely concerning, and effective ways for detecting them are urgently needed. It is known that such artificial intelligence-aided forgery makes at least three...
Personalized information retrieval is an effective tool to solve the problem of information overload. Along with the rapid development of emerging network technologies such as cloud computing, however, network servers are...
In recent years, violence detection has gradually turned into an important research area in computer vision, and have proposed many models with high accuracy. However, the unsatisfactory generalization ability of these methods...
Under the new measurement for the internet supplied from the Cooperative Association for Internet Data Analysis (CAIDA), the authors relax the orthogonal and normality condition with the methodology based on empirical...
Entrepreneurship research is paying increasing attention to big data. However, there is only a fragmented understanding on how big data influences entrepreneurial activities. To review previous research systematically and...
With the average daily growth of 15000 new subscribers, the number of WeChat subscription has broken the 5,800,000 subscribers recently. WeChat subscription's topic influence calculation has been very significant. This article...
Prediction of stock price movement is regarded as a challenging task of financial time series prediction. Due to the complexity and massive financial market data, the research of deep learning approaches for predicting the...
The discovery of 250-kelvin superconducting lanthanum polyhydride under high pressure marked a significant advance toward the realization of a room-temperature superconductor. X-ray diffraction (XRD) studies reveal a...