ZigBee communication technology was used to design the internal information transmission system of intelligent gateway in the monitoring system. Finally, the system was used to detect the changes of temperature and humidity in...
The first years of an infant's life represent a sensitive period for neurodevelopment where one can see the emergence of nascent forms of executive function (EF), which are required to support complex cognition. Few tests exist...
This empirical study takes a cognitive perspective and examines the translation of metaphors in speeches by Chinese President Xi Jinping as collected in the first volume of the book The Governance of China published in 2014. The...
The basic tool in the analytic hierarchy process (AHP) is the complete judgment matrix. To address the weakness of the AHP in determining weight in the comprehensive evaluation system, the particle swarm optimization (PSO)-AHP...
Business intelligence (BI) has become a popular among management executives of different industries. Many publications have mentioned Big Data and how to use data intelligently. However, little is known about how to...
This research investigates the interaction between English students learning Chinese in the UK and Chinese students learning English in China via a wiki platform. Activity theory and legitimate peripheral participation theory...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
“The darkest of all things” (SW II: 359), “the cliff upon which all false systems founder from the outset” (SW II: 223), “the crisis of consciousness” (SW XIV: 210), “maybe the hardest of all metaphysical concepts” (SW X: 310)...
To solve some problems of particle swarm optimization, such as the premature convergence and falling into a sub-optimal solution easily, we introduce the probability initialization strategy and genetic operator into the...
Media-aware stock performance has been well recognized in recent studies. Previous research, however, focused on the content influence of the media, ignoring the manner in which the media is delivered. Based on the trust theory...
Coalition formation of unmanned aerial vehicle (UAV) swarms, an effective solution for UAV swarm task allocation, is an important technology for UAV swarms to perform real-time and efficient collaborative task allocation in a...
Previous research has shown that tracking algorithms cannot capture long-distance information and lead to the loss of the object when the object was deformed, the illumination changed, and the background was disturbed by similar...
Recently, local gradient microstructure of image textures has become an important field of texture classification, but it is generally to investigate the multiscale local microstructures of image gradient, and rarely consider...
This research investigated the relationships of the Dark Triad, impulsiveness, and social network sites (SNS) addiction with adolescents. In particular, this research examined the indirect effects of the measured motor...
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has...
Having summarized the previous research on ceramic identification and the anti-counterfeiting, the authors propose a ceramic identification system that combines computer vision algorithms with blockchain technology. The system...
Business-to-business (B2B) e-marketplaces serve local small and medium-sized enterprises (SMEs) by assisting them in connecting with potential overseas buyers. They leverage multiple channels to connect with and bring potential...
The purpose of this paper is to examine the effects of system and interaction quality, security factors, trust and perceived ease to use on the user intention to participate in the sharing economy. Information and communications...
Internet, big data, global society, economy, life, politics, military, and culture are deeply integrated and have developed into an era of overlapping cyberspace and real society. Cyberspace security has become the most complex...
Because of the growing competition and challenges within the global business environment, understanding performance management has become essential to small- and medium-sized enterprises (SMEs) as they have traditionally...
This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose...
The visions of what constitutes Industry 4.0 is an industry based on gains in efficiency and productivity enhancements supported by integrated, smart information systems. This has caused information systems strategic...
Smart Parking schemes cannot succeed without the engagement and support of the drivers who may benefit from their use. This study investigates engagement with a Smart Parking service in the London Borough of Westminster. ...
Industrial big data is the key to realize the vision of smart factories. This research aims to identify and explore potential barriers that prevent organizations from deploying industrial big data solutions in the development of...