Water resource is a major limitation of human survival and development. Water security assessment is an important task in the environmental protection and control of water. The solution to assess the grade of water security in...
With the investigation and research of agricultural ecology situation, the pollution characteristics of livestock manure were indicated by the statistical analysis of data as well as the effect of livestock and poultry breeding...
The phenomenon of information stickiness is widely seen by a declined information vitality and is hypothesised with multiple causes, but research on it is scant. Therefore, it is necessary to unmask the myth and concretise the...
Though empirically some research suggests the linkage of better communication effect with active users' presence, no existing clues are found on the user activeness at the micro level to contribute to the virtual community's...
Shanghai was designed as the center of marine shipping in China. Shanghai is located at east of China and on the verge of the East China Sea. In addition, The Yangzi River and Qiantang River are surrounding the city and access...
The researcher’s role as an insider or outsider has been a controversial issue over the last few decades. There has been a heated debate about how researchers position themselves in the relationship to the groups they are...
As one of the most common language phenomena in bilingual settings, code-switching has been studied widely to explore its nature and features. In the current study, the author set out to explore the effect of syntactic alignment...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
In this paper, the development of the MAR (mobile augmented reality) remedial teaching program is described. It allowed students to manipulate augmented objects through AURASMA app via internet and find leads to solve geometry...
Based on data mining technology, this paper introduces venture capital, which is an external strategic investor factor, and takes the maximization of enterprise value as the goal, and discusses the characteristics of the optimal...
This study aimed to investigate optimal multiple reservoir operations and water demand management considering climate change impact. In this study, conditional density estimation network creation and evaluation (CaDENCE) method...
Studies have focused on elucidating the sharing behavior of media users. However, few studies have specifically investigated users' health information sharing behavior in the social media context, especially WeChat. This study...
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Many existing studies focus on the effect of external influence mechanisms (e.g., deterrence) impacting information security policy compliance (ISPC). This study explores the formation of ISPC from an autonomous motivation...
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
This study proposes and evaluates the effect of “mixed” comparative reviews on review value and compares the results with “separate” comparative and regular reviews. A total of 201 subjects have participated in the experiment...
In order to guarantee the rice yield more effectively, the prediction of rice yield should be taken into account. Because the rice yield every year can be seen as a sequence of time series, many methods applied in prediction of...
Supply chain management has become increasingly important as an academic subject due to globalization developments contributing to massive production-related benefits reallocation. The huge volume of data produced in the global...
The rapid development of e-commerce has led to increased pressure on the express delivery industry to transport products to customers in a timely manner. The problem of how to deliver an increasing volume of express orders to...
This article is mainly to study the realization of travel recommendations for different users through deep learning under global information management. The personalized travel route recommendation is realized by establishing...
Aiming at the problem that the data hiding algorithm of high efficiency video coding (HEVC) has great influence on the video bit rate and visual quality, an information hiding algorithm based on intra prediction mode and matrix...
The basic tool in the analytic hierarchy process (AHP) is the complete judgment matrix. To address the weakness of the AHP in determining weight in the comprehensive evaluation system, the particle swarm optimization (PSO)-AHP...
To reveal the influence mechanism of e-banking channel selection of elderly customers, according to the analysis of elderly customers’decision-making process, a threshold model is proposed by using small world customer...