In this article, the author reports, in a narrative style, details of teaching speaking in experiential learning with a Syrian woman, and the author’s perceptions of applying a role play task-based approach. It has been widely...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
While Michel Henry is, in the words of Jean Leclercq, “l’un des plus grandspenseurs français du XXème siècle,” his philosophical contributions remained,throughout his career, anomalous or eccentric, in the etymological sense of...
Solute transport exists in most natural flows, which can be described by the advective-diffusive equation. In numerical modeling of such phenomenon, it is important to deal with irregular boundary and angular boundary points for...
With the problems of neonatal survival and aging of the population becoming increasingly serious, the voice that longs for a new model of the medical industry is pushed to the limelight in the society. Gradually, a neologism...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
Aeronautical information service (AIS) involves manifold correlations among aeronautical events. The data mining technology has been used to extract the characteristics of aeronautical information. With the aeronautical dynamic...
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform...
Given the rapid development of internet and dramatic change it has brought to human life, this study examines the effect of internet use on well-being in rural China. Findings indicate that the act of engaging with internet and...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
The digital economy continuously injects new momentum into the traditional economy and has become an important driving force for national economic development. Against this backdrop and using input-output data from the WIOD from...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
High resolution analog-digital conversion (ADC) is a key instrument to convert analog signals to digital signals, which is deployed in data acquisition system to match high resolution analog signals from seismometers systems. To...
As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
Motion-compensated frame-interpolation (MCFI), synthesize intermediate frames between input frames guided by estimated motion, can be employed to falsify high bit-rate videos or high frame-rate videos with different frame-rates....
Intelligent manufacturing is an important method for transforming and upgrading enterprise intelligence. Studying the influencing factors of enterprises, intelligent manufacturing can help enterprises formulate more targeted...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only...
To overcome the shortcomings of the standard particle swarm optimization algorithm (PSO), such as premature convergence and low precision, a dynamic multi-swarm PSO with global detection mechanism (DMS-PSO-GD) is proposed. In...
The Yangtze River Economic Belt (YREB) is one of the most economically active regions in China, where an imbalance between the demand for land and the non-renewable is increasingly prominent. We present the patterns of land use...
The application of digital information and computing technology can significantly improve cooperation between different enterprises and the efficiency of knowledge and resources management, while facilitating the participation...
Managing knowledge transfer is a complex issue: when firms attempt to accelerate knowledge transfer at a rational cost, there is often a byproduct of knowledge spillover which harms the firms' competitive advantages. As the...