Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of establishing RBAC roles is...
Task scheduling on the cloud involves processing a large set of variables from both the task side and the scheduling machine side. This processing often results in a computational model that produces efficient task to machine...
This study examined the effect of income diversification on financial performance of deposit money banks (DMBs) in Nigeria. Variables considered were commission, foreign exchange incomes, and firm age, which are proxies for...
In previous studies of synthetic speech detection (SSD), the most widely used features are based on a linear power spectrum. Different from conventional methods, this article proposes a new feature extraction method for SSD from...
Nowadays the number of college students' suicides are increasing for the insufficient social support or poor interpersonal relations. Furthermore, not much attention has been concerned to students' interpersonal relations when...
E-commerce has developed rapidly, and product promotion refers to how e-commerce promotes consumers' consumption activities. The demand and computational complexity in the decision-making process are urgent problems to be solved...
A new sludge processing method was developed by the Beta Company, a paper manufacturing company. The new method will shorten the time for transforming sludge into organic fertilizers, which will improve the process of handling...
BACKGROUND: While most existing studies reveal left-behind children (LBC) are prone to suffering from mental health issues, some other literature fails to develop a statistical significance between being left-behind and facing...
Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After...
The yacht industry is one of the leading industries used to guide residents’ increase in consumption. This study analyzes the evolving spatial pattern of yacht clubs in the United States from 1900-2017, aiming to explore the...
With the increasing needs for the protection of marine and fresh water environment, there is surging demand for effective technologies to monitor different environmental parameters. Among different new technologies, fiber-optic...
Before the Revolution of 1911, China was a mighty empire dominated by various Chinese ethnic groups in different time periods. In particular, the Han people of the Tang1 and Ming Dynasty and the Man people of the Qing Dynasty2...
This paper illustrates the cloud-based telemonitoring framework that implements healthcare automation system for myocardial infarction (MI) disease classification. For this purpose, the pathological feature of ECG signal such as...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
A century of British colonial rule over a population of Chinese majority has resulted in a special culture of Hong Kong. While the local people have maintained a considerable amount of the traditional Chinese culture, a very...
Traditional software defenses take corresponding actions after the attacks are discovered. The defenders in this situation are comparatively passive because the attackers may try many different ways to find vulnerability and...
Data collection can be exciting as the Dear Data project demonstrates. In this project, various forms of data were collected on my experiences on the Metrobus. I found that collection and visual representation of data were...
The information system literature has long emphasized the importance of employee acceptance of information technology for achieving strategic goal of the firm and organizational performance. Consequently, this study investigates...
The purpose of this paper is to examine the important structures of store image and how to improve a hypermarket's store image to affect customer willingness to return. This study found that the greater shopping convenience, a...
To understand the water balance and environmental effects under climate change condition, hydrological models are always used to simulate the hydrological cycle and predict future scenarios by using global climate models (GCMs)...
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
E-commerce and online shopping have changed the retail environment. At present, companies rely on extensive customization of information systems and business processes in order to provide enhanced online customer service...
This is an empirical research investigating the impact of business analytics (BA) and business intelligence (BI) use, IT infrastructure flexibility, and their interactions on organizational agility. Synthesizing the systems...
This paper studies the motivation of learning law, compares the teaching effectiveness of two different teaching methods, e-book teaching and traditional teaching, and analyses the influence of e-book teaching on the...