Nowadays, machine learning is popular in remote access Trojan (RAT) detection which can create patterns for decision-making. However, most research focus on improving the detection rate and reducing the false negative rate...
With continual increase of environmental pressure from human activities, it has become necessary to study the process of socioeconomic water usage influencing the water quality. Based on the system dynamic model developed before...
Purpose- The aim of this study is to analyze the effect of corporate social responsibility (CSR) and social preference on quality improvement of the agricultural products supply chain composed of agricultural products producer...
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features...
This article aims to investigate the determinants of the Intention to Use (IU) the Moodle Distance Learning Platform (MDLP) of the Virtual University of Tunis during the total containment period (since march 2020) and its...
Machine learning is a broad field that contains multiple fields of discipline including mathematics, computer science, and data science. Some of the concepts, like deep neural networks, can be complicated and difficult to...
To reveal the influence mechanism of e-banking channel selection of elderly customers, according to the analysis of elderly customers’decision-making process, a threshold model is proposed by using small world customer...
With the progress of digital and mobile technologies, mobile short video apps (MSAs) have been booming in recent years. These MSAs are expanding their role in social commerce, which has aroused scholar’s and practitioners’...
With the problems of neonatal survival and aging of the population becoming increasingly serious, the voice that longs for a new model of the medical industry is pushed to the limelight in the society. Gradually, a neologism...
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a...
In online sharing economy platforms, users often need to cooperate with strangers with minimal information. When personal photos are available on these platforms, how do users form social perceptions and consequently cooperative...
Cross-border e-commerce (CBEC) has become an imperative mode for global trade. Research on cross-border e-commerce historically focuses mainly on the customer's behavior intention to purchase on a CBEC platform. However...
Live streaming has become popular among various e-commerce models. As an efficient way of marketing, live streaming can stimulate consumers' impulse purchasing behavior by creating a compelling experience, flow experience. Even...
Globally, aging is now a societal trend and challenge in many developed and developing countries. A key medical strategy that a fast-paced aging society must consider is the provision of quality long-term care (LTC) services....
This paper aims to study the protection of data privacy in news crowdfunding in the era of artificial intelligence. This paper respectively quotes the encryption algorithm of artificial intelligence data protection and the BP...
Oil pollution is still a problem that is very difficult to control. To this end, this study investigates the application effect of microbial degradation technology in oil pollution control. First, the degradation microbial...
With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the...
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has...
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for...
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method...
Task optimization scheduling is one of the key concerns of both cloud service providers (CSPs) and cloud users. The CSPs hope to reduce the energy consumption of executing tasks to save costs, while the users are more concerned...
Electroencephalographic data modeling is widely used in developing applications in the areas of healthcare, as well as brain-computer interface. One particular study is to use meditation research to reach out to the high-end...
In recent years, entrepreneurial bricolage acts as an effective way to solve the problem of resource constraint in new firms, and then gradually attracted attention from related scholars in entrepreneurship field. However, the...
This article describes how current research on the institutional entrepreneurship process tends to ‘design principles.' There is lack of research on mechanism and strategy of the institutional bricolage, especially for Internet...
5G service refers to the mobile services built on the 5th generation telecommunication technology. It enhances end user experience of mobile internet surfing significantly. The high bandwidth of 5G technologies offers vendors...