The function of particles like ke in modern Persian varies according to context. As a morphosyntactic element with a range of roles, it functions as a subordinator, an adverbial conjunction, a focus marker and an interrogative...
This paper deals with a construction in Persian called here the Indifference-ke
Construction (or IKC). This construction has the structure A ke B, where A is a clause (minimally a verb), ke is a particle, and B is a verb, a...
Cement mixing pile is frequently used in construction, and has a great impact on the overall construction quality. This paper proposes the use of Internet of things equipment in the process of cement mixing pile construction for...
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
The World Health Organization envisions that mobile health (mHealth) technologies will revolutionize healthcare to help people around the world. This review examined recent literature to assess the state-of-the-art of mHealth...
Based on the deep learning (DL) theory, the study takes the multinational corporation technology company A as the research target, and explores the impact of information technology (IT) management capabilities on the sustainable...
This paper measures enterprise digital transformation by the method of text analysis and empirically tests the impact of enterprise digital transformation on the executives' corruption. We find that the higher degree of digital...
This paper adopts the knowledge map method and selects the field of mobile communication technology and wireless communication technology to represent the electronic information and communication industry for disruptive...
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
In recent years, abrupt water pollution accidents have broken out frequently in watersheds and caused huge environmental and economic losses. These accidents have become one of the most serious environmental problems in China....
At the end of 2019, the sudden attack of the COVID-19 brought huge challenges to the management, operation and development of listed companies. In view of the suddenness of the epidemic, the internal governance of listed...
A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the...
With the impacts of Covid-19 epidemic, e-learning has become a popular research issue. Therefore, how to upgrade the interactivity of e-learning, and allow learners to quickly access personalized and popular learning information...
Rail guide vehicle (RGV) problems have the characteristics of fast running, stable performance, and high automation. RGV dynamic scheduling has a great impact on the working efficiency of an entire automated warehouse. However...
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency...
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the...
By analyzing the impact of different fairness concerns on a green supply chain, this study determines the optimal decisions under different power structures and conducts a comparative analysis of them. The findings of this study...
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
This article considers e-commerce platforms with and without promotion, builds biform game models consisting of one and two supplier platforms, and calculates the profit distribution of the three parties using the Shapley value...
With the continuous developments of real estates and the increasing personalization of people, more and more house owners are willing to search for and discover their preferred decorative art patterns via various house...
Our current food production systems are unsustainable, driven in part through the application of chemically fixed nitrogen. We need alternatives to empower farmers to maximise their productivity sustainably. Therefore, we...
This study explores factors influencing the sharing behaviour of medical crowdfunding campaigns on mobile social media regarding retweeter and retweeted text features from the social influence perspective and verifies the...
Digital technology has had changed the uncertain nature of the process of new venture idea generation, and it has also brought unprecedented opportunities for the generation of new digital venture ideas. To explore how startups...