A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Under the new measurement for the internet supplied from the Cooperative Association for Internet Data Analysis (CAIDA), the authors relax the orthogonal and normality condition with the methodology based on empirical...
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
There is a subject-object asymmetry in Chinese, such that the extraction of a possessor NP from a possessive NP is quite free from subject position but restricted from object position. A possessive tJP consists of a possessor NP...
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
This article mainly studies the design and realization of English listening teaching system based on virtual environment technology. This paper designs and builds a virtual experimental operating platform to assist students in...
With the popularity of online shopping, a large body of studies have paid much attention to the factors influencing consumers’ information seeking and assessing. However, theoretical development and empirical testing are still...
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
It is expected that website design can lead to online trust, although research that systematically examines such a relationship is little. In addition, far too little attention has been paid to understand the effect of website...
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
In the era of big data-driven digital economies, technology commercialization capability has become the lifeblood of high-tech enterprises to shape competitive advantage and achieve multiplier growth, while the related research...
Although it is widely acknowledged that translation is a cognitive process, there is scarcely any study establishing connections between the text and mental representations and giving a systematic and comprehensive explanation...
Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and...
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters...