Image style transfer (IST) has drawn broad attention recently. At present, convolutional neural network (CNN)-based methods and generative adversarial network (GAN)-based methods have been broadly utilized in IST. However, the...
In order to solve the problem of cross-time and cross-regional medical collaboration and distributed knowledge sharing across patients and medical teams for 24 hours a day in the context of global resource allocation, a new...
Information and communication technologies (ICT) have played a pivotal role in facilitating knowledge acquisition and enabling distance education. Yet, knowledge about digital divide in distance education remains limited. This...
Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations....
A warmer climate is expected to lead to more serious natural disasters, such as heavy storms, prolonged droughts and frequent floods. For a high-density urban region, the flash flood problem may become worse due to possible...
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that...
This article proposes an adversarial reconstruction convolution neural network (ARCNN) for non-uniform illumination frontal face image recovery and recognition. The proposed ARCNN includes a reconstruction network and a...
Traditional image denoising algorithms are generally based on spatial domains or transform domains to denoise and smooth the image. The denoised images are not exhaustive, and the depth-of-learning algorithm has better denoising...
With the spread of the global COVID-19 pandemic, agricultural food supply chains (AFSC) have suffered from unprecedented challenges and disruption. AFSC must possess extremely high levels of resilience when confronted by the...
Users of wearable services are different in age, occupation, income, education, personality, values and lifestyle, which also determine their different consumption patterns. Therefore, for the trust of wearable services, the...
Lane detection still demonstrates low accuracy and missing robustness when recorded markings are interrupted by strong light or shadows or missing marking. This article proposes a new algorithm using a model of road structure...
With the development of artificial intelligence, there are more and more applications related to face images. The recording of face information causes potential cyber security risks and personal privacy disclosure risks to the...
This study investigates the causes impacting the consumers' intention of the premium music streaming services' subscription in China. An integrated model called the Theory of Streaming Service Acceptance (TSSA) is proposed to...
As an important mode of e-commerce, C2C has become a trading mechanism favored by consumers. However, for C2C transaction in a virtual environment, there is an issue of congenital transaction asymmetry, leading to increased...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
This research studies the motivation of customers to choose the QR code as a payment tool by developing an integrated model based on UTAUT 424 valid responses were collected from diversified socio-economic backgrounds to...
This paper investigates the impact of big data analytics capability (BDAC) on organizational agility under the moderating effect of BDAC–business alignment and its impact on performance through organizational agility. Data from...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Quantitative detection of virus-like particles under a low concentration is of vital importance for early infection diagnosis and water pollution analysis. In this paper, a novel virus detection method is proposed using indirect...