Search

Results: 76
Statistical Downscaling of Rainfall using Large-Scale Predictors
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
A Common General Access Structure Construction Approach in Secret Image Sharing
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Published by: IGI Global
The Investigation of Dependence Between the Internet Measurement and Globalization
Under the new measurement for the internet supplied from the Cooperative Association for Internet Data Analysis (CAIDA), the authors relax the orthogonal and normality condition with the methodology based on empirical...
Published by: IGI Global
Relationship Between Computer-Mediated Communication Competence and Attitude Toward Using Frog VLE Among Secondary School Teachers
Siew Oh, Yan Chua
Aug 02, 2021
This study aims at examining the relationship between teacher computer-mediated communication (CMC) competence and teacher attitude toward using Frog VLE a virtual learning platform. This is a non-experimental research using a...
Published by: IGI Global
Movement from Object Position in Chinese
Zhong-ying Lu
Sep 05, 2013
There is a subject-object asymmetry in Chinese, such that the extraction of a possessor NP from a possessive NP is quite free from subject position but restricted from object position. A possessive tJP consists of a possessor NP...
I Think We Should…
Hengbin Yan
Jul 01, 2019
High-frequency recurrent word combinations known as lexical bundles are an essential component in the second language development. However, existing research on second language lexical bundle use has focused on writing...
Published by: IGI Global
Applying Secret Image Sharing to Economics
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
Published by: IGI Global
Learning Trajectory Patterns via Canonical Correlation Analysis
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
Published by: IGI Global
Smart Classroom College English Listening Teaching System Based on Virtual Environment Technology
Lu Wei, Binquan Liu
Feb 21, 2022
This article mainly studies the design and realization of English listening teaching system based on virtual environment technology. This paper designs and builds a virtual experimental operating platform to assist students in...
Published by: IGI Global
Information Usefulness and Attitude Formation a Double-Dependent Variable Model (DDV) to Examine the Impacts of Online Reviews on Consumers
With the popularity of online shopping, a large body of studies have paid much attention to the factors influencing consumers’ information seeking and assessing. However, theoretical development and empirical testing are still...
Published by: IGI Global
Making Connections Through Knowledge Nodes in Translator Training
Chunshen Zhu, Lu Tian
Jul 01, 2020
This study defines translator training as a pedagogical scheme to help learners build up a knowledge network that should sustain their professional competence. It explores specifically how a computer-assisted mode of training...
Published by: IGI Global
Establishing Trust in E-Commerce Through Website Design Elements
It is expected that website design can lead to online trust, although research that systematically examines such a relationship is little. In addition, far too little attention has been paid to understand the effect of website...
Published by: IGI Global
Chinese Students' Perceptions of Using Mobile Devices for English Learning
Bin Zou, Xinxin Yan
Jul 01, 2014
The advance of mobile technology has turned portable, handheld devices into an integral part of students' daily life, and also paved the way for the rise of mobile assisted language learning. This study focused on how Chinese...
Published by: IGI Global
Development of an Eye Response-Based Mental Workload Evaluation Method
This study proposed an eye responses-based mental workload (E-MWL) evaluation method in nuclear power plants (NPPs) when performing the task via a user interface control. The fuzzy theory was used to combine four eye response...
Published by: IGI Global
The Impact of Virtual Integration on Innovation Speed
Yan Tang, Ping Zhang
Jan 01, 2022
In the current environment, rapid innovation has become an essential source of time-based competitive advantage. Based on the theory of organizational information processing, this work explores the effects of virtual integration...
Published by: IGI Global
ROP Defense Using Trie Graph for System Security
Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection....
Published by: IGI Global
Constructing Technology Commercialization Capability
In the era of big data-driven digital economies, technology commercialization capability has become the lifeblood of high-tech enterprises to shape competitive advantage and achieve multiplier growth, while the related research...
Published by: IGI Global
Towards a Text-World Approach to Translation and Its Pedagogical Implications
Lu Tian, Hui Wang
Jul 01, 2019
Although it is widely acknowledged that translation is a cognitive process, there is scarcely any study establishing connections between the text and mental representations and giving a systematic and comprehensive explanation...
Published by: IGI Global
Effectiveness of Remote Interventions to Improve Medication Adherence in Patients after Stroke

Background

Stroke affects more than 30 million people every year, but only two-thirds of patients comply with prescribed medication, leading to high stroke recurrence rates. Digital technologies can facilitate...
Published by:
CEO Exposure, Media Influence, and Stock Returns
Media-aware stock movements are well acknowledged by the behavioral finance. As the soul of a firm, CEO’s media behavior is critical to the operation of a firm. CEO’s exposure could have captured the investors’ attention and...
Published by: IGI Global
Biosorption of Silver using Metal-Imprinted Thiourea-Modified Glutaraldehyde-Crosslinked O-Carboxymethyl Chitosan Beads
Chitosan, an abundant biopolymer obtained from deacetylation of chitin, has been proved to be a promising biosorbent for metal uptake. Grafting new functional groups on the chitosan backbone was also reported to be efficient in...
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications
To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and...
Published by: IGI Global
Filtering Infrequent Behavior in Business Process Discovery by Using the Minimum Expectation
The aim of process discovery is to discover process models from the process execution data stored in event logs. In the era of “Big Data,” one of the key challenges is to analyze the large amounts of collected data in meaningful...
Published by: IGI Global
A Hierarchical Clustering Federated Learning System Based on Industry 4.0
Chun-Yi Lu, Hsin-Te Wu
Jan 01, 2022
This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters...
Published by: IGI Global

|<

<

1

2

3

4

>

>|