The study aims to investigate how pre-editing based on controlled Chinese rules can be an effective approach to improving Chinese-to-English machine translation (MT) output. Based on the analysis of comparable texts, and by...
A novel method for integrating multi-omics data, including gene expression, copy number variation, DNA methylation, and miRNA data, is proposed to identify biomarkers of cancer prognosis. First, survival analysis was performed...
Nowadays the number of college students' suicides are increasing for the insufficient social support or poor interpersonal relations. Furthermore, not much attention has been concerned to students' interpersonal relations when...
The consumption experience is taken seriously by consumers, and increasingly, firms open offline showrooms for this. Showrooms can help to resolve the uncertainty of consumer perceived value and brand preference in online...
A quantitative study involving Mainland China (the PRC), Taiwan, India, the UAE, and the US, five areas with 852 responses of IT/IS personnel data towards building a more suitable Circumplex Career Anchor Model for IT/IS...
This study investigates the causes impacting the consumers' intention of the premium music streaming services' subscription in China. An integrated model called the Theory of Streaming Service Acceptance (TSSA) is proposed to...
The purpose is to effectively manage the financial market, comprehensive assess personal credit, reduce the risk of financial enterprises. Given the systemic risk problem caused by the lack of credit scoring in the existing...
This research studies the motivation of customers to choose the QR code as a payment tool by developing an integrated model based on UTAUT 424 valid responses were collected from diversified socio-economic backgrounds to...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
With the explosion of internet information, people feel helpless and difficult to choose in the face of massive information. However, the traditional method to organize a huge set of original documents is not only time-consuming...
The purpose of this paper is to investigate the influential factors of online social network advertising in three different cultural areas, being China, India, and the US. This study uses the Social Capital Theory (SCT), and...
With the rapid development of information communication technology (ICT) in teaching, deeper learning has become an essential competency for success in the 21st-century classroom. College students' deeper learning assessments...
This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is...
While career anchors have mainly studied in the US society; this study demonstrates the difference in the career anchors of the information technology/information system (IT/IS) personnel rooted in different cultures. The survey...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
Accurate analysis and recommendation on products based on online reviews and rating data play an important role in precisely targeting suitable consumer segmentations and therefore can promote merchandise sales. This study uses...
Global online sales for products, where many are substantially identical or deceptively similar, are the cause of a growing number of trademark (TM) infringement lawsuits. This research proposes an intelligent trademark legal...
This research developed an effective supply chain management (SCM) operation model and a corresponding diagnostic methodology in the global competitive environment by combining three phases and methodologies. In Phases 1, a list...
Online review is a crucial display content of many online shopping platforms and an essential source of product information for consumers. Low-quality reviews often cause inconvenience to the platform and review readers. This...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
Soybean disease has become one of vital factors restricting the sustainable development of high-yield and high-quality soybean industry. A hybrid artificial neural network (ANN) model optimized via particle swarm optimization...
Coalition formation of unmanned aerial vehicle (UAV) swarms, an effective solution for UAV swarm task allocation, is an important technology for UAV swarms to perform real-time and efficient collaborative task allocation in a...
In order to solve the problems of high cost and difficult management of traditional agricultural planting, internet of things (IoT) technology was applied to realize real-time detection and intelligent management of crop growth...
In recent years, 5G has been the focus of research and development in the telecom industry. This paper aims to understand the development trend and technical hot spots of 5G technology through the patent analysis and build a...
Numerous firms accumulate large quantities of data or transactions after importing information systems and services, which leads to troubles with data procedure. Firms also have demands to find customers’ information from large...