Search

Results: 28
A Highly Efficient Remote Access Trojan Detection Method
Nowadays, machine learning is popular in remote access Trojan (RAT) detection which can create patterns for decision-making. However, most research focus on improving the detection rate and reducing the false negative rate...
Published by: IGI Global
System Dynamics Modeling Of Socioeconomic Development Mode Associated With Water Usage In Baiyangdian Lake, Northern China
With continual increase of environmental pressure from human activities, it has become necessary to study the process of socioeconomic water usage influencing the water quality. Based on the system dynamic model developed before...
Quality Improvement of Agricultural Products Supply Chain Under Social Preference and CSR by Big Data Analysis
Yanhong Qin, Lin Xiang
Sep 01, 2021
Purpose- The aim of this study is to analyze the effect of corporate social responsibility (CSR) and social preference on quality improvement of the agricultural products supply chain composed of agricultural products producer...
Published by: IGI Global
Multiple Fusion Strategies in Localization of Local Deformation Tampering
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
Published by: IGI Global
The Moodle Distance Learning Platform Usage by Tunisian University Teachers Under the COVID-19 Context
This article aims to investigate the determinants of the Intention to Use (IU) the Moodle Distance Learning Platform (MDLP) of the Virtual University of Tunis during the total containment period (since march 2020) and its...
Published by: IGI Global
Airbnb (Air Bed and Breakfast) Listing Analysis Through Machine Learning Techniques
Machine learning is a broad field that contains multiple fields of discipline including mathematics, computer science, and data science. Some of the concepts, like deep neural networks, can be complicated and difficult to...
Published by: IGI Global
Understanding the E-Banking Channel Selection Behavior of Elderly Customers
To reveal the influence mechanism of e-banking channel selection of elderly customers, according to the analysis of elderly customers’decision-making process, a threshold model is proposed by using small world customer...
Published by: IGI Global
Exploring the Social and Systemic Influencing Factors of Mobile Short Video Applications on the Consumer Urge to Buy Impulsively
With the progress of digital and mobile technologies, mobile short video apps (MSAs) have been booming in recent years. These MSAs are expanding their role in social commerce, which has aroused scholar’s and practitioners’...
Published by: IGI Global
A Comparative Policy Analysis in the E-Health Industry Between China and the USA
With the problems of neonatal survival and aging of the population becoming increasingly serious, the voice that longs for a new model of the medical industry is pushed to the limelight in the society. Gradually, a neologism...
Published by: IGI Global
Winning the War on Terror
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a...
Published by: IGI Global
The Effect of Facial Resemblance on Cooperative Behavior in the Sharing Economy
In online sharing economy platforms, users often need to cooperate with strangers with minimal information. When personal photos are available on these platforms, how do users form social perceptions and consequently cooperative...
Published by: IGI Global
Trust, Risk and Alternative Website Quality in B-Buyer Acceptance of Cross-Border E-Commerce
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
Published by: IGI Global
Investigating the Key Drivers of Impulsive Buying Behavior in Live Streaming
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Published by: IGI Global
Knowledge Fusion Based on Cloud Computing Environment for Long-Term Care
Globally, aging is now a societal trend and challenge in many developed and developing countries. A key medical strategy that a fast-paced aging society must consider is the provision of quality long-term care (LTC) services....
Published by: IGI Global
Data Privacy Protection in News Crowdfunding in the Era of Artificial Intelligence
This paper aims to study the protection of data privacy in news crowdfunding in the era of artificial intelligence. This paper respectively quotes the encryption algorithm of artificial intelligence data protection and the BP...
Published by: IGI Global
Application of Microbial Degradation Technology in Oil Pollution Control
Oil pollution is still a problem that is very difficult to control. To this end, this study investigates the application effect of microbial degradation technology in oil pollution control. First, the degradation microbial...
Published by: IGI Global
Empirical Study on the Influencing Factors of WeChat Business Integrity
With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the...
Published by: IGI Global
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has...
Published by: IGI Global
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Published by: IGI Global
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method...
Published by: IGI Global
MHDNNL
Task optimization scheduling is one of the key concerns of both cloud service providers (CSPs) and cloud users. The CSPs hope to reduce the energy consumption of executing tasks to save costs, while the users are more concerned...
Published by: IGI Global
Brain State Intelligence and Cognitive Health Through EEG Date Modeling
Electroencephalographic data modeling is widely used in developing applications in the areas of healthcare, as well as brain-computer interface. One particular study is to use meditation research to reach out to the high-end...
Published by: IGI Global
The Effect of Dual-Level Transformational Leadership on New Firm Performance
In recent years, entrepreneurial bricolage acts as an effective way to solve the problem of resource constraint in new firms, and then gradually attracted attention from related scholars in entrepreneurship field. However, the...
Published by: IGI Global
Integration of Bricolage and Institutional Entrepreneurship for Internet Finance
This article describes how current research on the institutional entrepreneurship process tends to ‘design principles.' There is lack of research on mechanism and strategy of the institutional bricolage, especially for Internet...
Published by: IGI Global
Are Satisfied Customers Willing to Pay More for Extra Services?
5G service refers to the mobile services built on the 5th generation telecommunication technology. It enhances end user experience of mobile internet surfing significantly. The high bandwidth of 5G technologies offers vendors...
Published by: IGI Global

|<

<

1

2

>

>|