Results: 14
Obligatory, Optional and Contrastive Occurrences of KE Modern Persian
Jalal Rahimian
Jul 18, 2013
The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
Nima Sadat-Tehrani
Aug 01, 2013
This paper deals with a construction in Persian called here the Indifference-ke Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Multiple Fusion Strategies in Localization of Local Deformation Tampering
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
Published by: IGI Global
A Two-Stage Registration Method for Dental Volumetric Data and Mesh Data
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
Published by: IGI Global
Image Aesthetic Description Based on Semantic Addition Transformer Model
Image aesthetic quality assessment has been a hot research topic in the field of image analysis during the last decade. Most recently, people have proposed comment type assessment to describe the aesthetics of an image using...
Published by: IGI Global
Design Frameworks for Mobile Health Technology
Ke Zhang, Ayse Aslan
Jan 01, 2022
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Published by: IGI Global
An Empirical Study on Impact of Management Capabilities for the Multinational Company's Sustainable Competitive Advantage
Ke Zong, Zheng Wang*
Mar 22, 2022
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
Published by: IGI Global
Development of a risk rank model for environmental risk assessment of abrupt water pollution accidents - with the case of Laoguan River Basin
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
Research on the Mediating Effect of Corporate Governance Behavior Between GEM and Governance Performance of Listed Companies on the Growth Enterprise
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
Published by: IGI Global
Fitness Distance Correlation Strategy for Solving the RGV Dynamic Scheduling Problem
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
Published by: IGI Global
A HEVC Video Steganalysis Against DCT/DST-Based Steganography
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
Published by: IGI Global
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Published by: IGI Global
An Intra-Prediction Mode-Based Video Steganography With Secure Strategy
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
Published by: IGI Global
Research on Disruptive Technology Recognition of China's Electronic Information and Communication Industry Based on Patent Influence
This paper adopts the knowledge map method and selects the field of mobile communication technology and wireless communication technology to represent the electronic information and communication industry for disruptive...
Published by: IGI Global