Search

Results: 61
Which Review Can Make You Engage?
Online reviews facilitate customer brand engagement, but few studies have explored this problem from the perspective of interpersonal attraction and its psychological mechanisms in the social commerce context. This paper aims to...
Published by: IGI Global
Platformance-Based Cross-Border Import Retail E-Commerce Service Quality Evaluation Using an Artificial Neural Network Analysis
Min Chen, Zhitan Feng
Apr 07, 2022
The transaction scale of cross-border import e-commerce has grown rapidly around the world. Platform-style cross-border e-commerce does not control the quality, source and transaction process of goods strictly and...
Published by: IGI Global
The Effects of Techno-Stress in the Role Stress Context Applied on the Proximity Manager Performance
Min Feng
Jan 01, 2021
The ubiquitous use of ICT can create “techno-stress.” The purpose of the research is to examine the case of the specificity of the techno-stress phenomenon of local managers. The authors develop their research questions on the...
Published by: IGI Global
MAC Protocol Analysis for Wireless Sensor Networks
In wireless sensor networks, MAC protocol is used to achieve efficient, fair and balanced allocation of wireless channel resources and access control of nodes in the network, and to control the communication process of nodes in...
Published by: IGI Global
Integration of Multi-Omics Data to Identify Cancer Biomarkers
Peng Li, Bo Sun
Jan 01, 2022
A novel method for integrating multi-omics data, including gene expression, copy number variation, DNA methylation, and miRNA data, is proposed to identify biomarkers of cancer prognosis. First, survival analysis was performed...
Published by: IGI Global
Quantum structural fluxion in superconducting lanthanum polyhydride.
The discovery of 250-kelvin superconducting lanthanum polyhydride under high pressure marked a significant advance toward the realization of a room-temperature superconductor. X-ray diffraction (XRD) studies reveal a...
Published by: Nature Communications
S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new...
Published by: IGI Global
Exploration of Financial Market Credit Scoring and Risk Management and Prediction Using Deep Learning and Bionic Algorithm
Peng Du, Hong Shu
Jan 01, 2022
The purpose is to effectively manage the financial market, comprehensive assess personal credit, reduce the risk of financial enterprises. Given the systemic risk problem caused by the lack of credit scoring in the existing...
Published by: IGI Global
Using Language to Mobilize the Public in the Crisis
The outbreak of the COVID-19 pandemic calls for effective use of language to keep the public informed of the pandemic update and prevention measures. Meanwhile, the crisis context of the pandemic shaped the language use as well....
Published by: IGI Global
An Action Research on a French Law Firm
This study qualitatively analyzes interactional coping strategies used to managed technostress in the post-adoption stage of information technology implementation at a French legal firm. The nine strategies are participatory...
Published by: IGI Global
The Relationship Between Bitcoin and Stock Market
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
Published by: IGI Global
Research of Image Recognition of Plant Diseases and Pests Based on Deep Learning
Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Published by: IGI Global
Strategies to Respond to Technology Enhancement
This study identifies coping strategies to examine the behaviors adopted by team managers in addressing technostress. It evaluates the choice of coping strategies to increase performance. A study involving 3 companies and 45...
Published by: IGI Global
Construction of SCUIR Propagation Model Based on Time-Varying Parameters
Feng Li, Gengxin Sun
Jan 01, 2022
The novel coronavirus is a new type of virus, and its transmission characteristics are different from the previous virus. Based on the SEIR transmission model, this paper redefines the latent state as close contacts state...
Published by: IGI Global
Moving Target Detection and Tracking Based on Improved FCM Algorithm
Wang Feng, Sheng Chun
Jan 01, 2020
With the rapid development of computer intelligence technology, the majority of scholars have a great interest in the detection and tracking of moving targets in the field of video surveillance and have been involved in its...
Published by: IGI Global
English Article Style Recognition and Matching by Using Web Semantics
Mi Zhou, Lina Peng
Apr 01, 2022
With the explosion of internet information, people feel helpless and difficult to choose in the face of massive information. However, the traditional method to organize a huge set of original documents is not only time-consuming...
Published by: IGI Global
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree
This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
Published by: IGI Global
Functionality, Emotion, and Acceptance of Artificial Intelligence Virtual Assistants
This paper aims to expand the acceptance of the AI Virtual Assistant model from the perspective of user’s cognition. Based on the 240 samples, we used multi-layer regression analysis to investigate the influencing factors and...
Published by: IGI Global
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
He Xu, Peng Li, Chao Xu
Jan 01, 2021
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Published by: IGI Global
Feasibility of Hybrid PSO-ANN Model for Identifying Soybean Diseases
Soybean disease has become one of vital factors restricting the sustainable development of high-yield and high-quality soybean industry. A hybrid artificial neural network (ANN) model optimized via particle swarm optimization...
Published by: IGI Global
A Survey of UAV Swarm Task Allocation Based on the Perspective of Coalition Formation
Coalition formation of unmanned aerial vehicle (UAV) swarms, an effective solution for UAV swarm task allocation, is an important technology for UAV swarms to perform real-time and efficient collaborative task allocation in a...
Published by: IGI Global
Process-Aware Dialogue System With Clinical Guideline Knowledge
Task-oriented dialogue systems aim to engage in interactive dialogue with people to ultimately complete specific tasks. Typical application domains include ticket booking, online shopping, and healthcare providing. Medical...
Published by: IGI Global
Internet of Things-Enabled Crop Growth Monitoring System for Smart Agriculture
In order to solve the problems of high cost and difficult management of traditional agricultural planting, internet of things (IoT) technology was applied to realize real-time detection and intelligent management of crop growth...
Published by: IGI Global
The Analysis of Global RMB Exchange Rate Forecasting and Risk Early Warning Using ARIMA and CNN Model
The purposes are to predict exchange rate fluctuations more accurately and enhance Chinese enterprises’ ability to avoid exchange rate risks. Renminbi (RMB) exchange rate fluctuation’s prediction methods are studied based on...
Published by: IGI Global
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior...
Published by: IGI Global

|<

<

1

2

3

>

>|