This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
Multilevel thresholding image segmentation has always been a hot issue of research in last several years since it has a plenty of applications. Traditional exhaustive search method consumes a lot of time for searching the...
Aiming at the low recognition rate of traditional gesture, a gesture recognition algorithm based on spatiotemporal graph convolution network is proposed in this paper. Firstly, the dynamic gesture data were preprocessed...
On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption...
This study examined if professional development needs of digital natives and immigrant teachers differed for technology integration in a Chinese education setting. Quantitative and qualitative data was collected from 500...
With the increasing amount of medical data and the high dimensional and diversified complex information, based on artificial intelligence and machine learning, a new way is provided that is multi-source, heterogeneous, high...
With an 86.1% global market share, Android takes the top spot smartphone operating system. Due to its open environment, Android suffers from various kinds of attacks, which cause a serious privacy leakage problem. To protect...
This article is concerned with the problem of constructing lightweight MDS matrices. The authors present a new construction of 4 × 4 MDS matrices over GL(F2, m) for any integer m. They give sufficient and necessary conditions to...
Activation functions such as Tanh and Sigmoid functions are widely used in Deep Neural Networks (DNNs) and pattern classification problems. To take advantages of different activation functions, the Broad Autoencoder Features...
This paper presents an ontology-based approach to benefit automatic fertilization management for citrus orchards located in mountainous region. The core of the fertilization approach is the citrus fertilization ontology, which...
In this chapter, the authors demonstrate how a university Art Education program assists the university art museum and trains students to lead tours for BRAINY (BRinging Arts INtegration to Youth), the museum's educational...
With the development of economic globalization, human resource competition has long become the key core of enterprise development and peer competition. Reasonably Formulating an enterprise’s employee performance appraisal...
Online merchants often use social media to communicate deal messages to directed consumers, but they face the fundamental challenge of how to effectively communicate deal messages to these consumers using that medium. This...
Cross-border e-commerce(CBRC) is increasingly affecting the value of traditional trade due to its rich variety, convenient operation, and free of time and space restrictions, and has also changed the consumer's Shopping habits....
In the Netherlands, housing corporations are increasingly adopting self-service technologies (SSTs) to support affairs their tenants need to arrange. The purpose of the study is to examine the customers' motivations of using...
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built...
Ever since Chinese telecommunications magnate, Wang Jing announced in 2013 that construction would be going ahead for an interoceanic canal in Nicaragua, the proposed megaproject has garnered considerable attention and...
Under the backdrop of the continuous escalation of the Sino—U.S. trade friction, China's industrial development environment in global value chains (GVCs) has further deteriorated, research on the improvement GVC status of the...
Methods based on deep learning have great utility in the current field of sentiment classification. To better optimize the setting of hyper-parameters in deep learning, a hybrid learning particle swarm optimization with fuzzy...
In this chapter, how the complex technology of Second Life affects participation in an English course is investigated. With the aim of exploring gender issues, the special affordance of Second Life, i.e. voice-morphing together...
This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and...
Short text classification is a research focus for natural language processing (NLP), which is widely used in news classification, sentiment analysis, mail filtering and other fields. In recent years, deep learning techniques are...
With the change of information environment, the emergence of new technology, services, and new media, reference librarians and users have more choices in information acquisition methods, tools, and means. The reference...
The Liaoning Provincial Library is one of the largest and most well-functional libraries. It has the largest building area and provides abundant services to the public. The Liaoning Provincial Library mainly provides readers...
The gradual emergence of social commerce is enhancing the development of businesses. The opinions exchanged and information shared by each consumer in the community affects consumers’ purchasing decisions and participation...