The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
Image aesthetic quality assessment has been a hot research topic in the field of image analysis during the last decade. Most recently, people have proposed comment type assessment to describe the aesthetics of an image using...
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
This paper adopts the knowledge map method and selects the field of mobile communication technology and wireless communication technology to represent the electronic information and communication industry for disruptive...