Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the...
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry...
This paper introduces the WeChat mobile library service programme at Shanghai University Library and identifies problems and resolutions by reviewing the development process and experience and user feedback. A case study was...
The purpose is to solve the problems of sparse data information, low recommendation precision and recall rate and cold start of the current tourism personalized recommendation system. First, a context based personalized...
The high volatility of world soybean prices has caused uncertainty and vulnerability particularly in the developing countries. The clustering of time series is a serviceable tool for discovering soybean price patterns in...
The China threat theory has been prevalent in recent years. Focusing on each of the four East Asian states, this article examines why China is perceived as a threat. This article discusses the origin of China’s rapid economic...
For the taxed goods, the actual freight is generally determined by multiplying the allocated freight for each KG and actual outgoing weight based on the outgoing order number on the outgoing bill. Considering the conventional...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
We are grateful for the opportunity to work on Mapping Politics, the peer-reviewed political science journal of Memorial University. This volume has excellent scholarship that will be exposed to a wider audience than ever.This...
Digital twins provide a solution for information-sharing between enterprises, thereby alleviating uncertainties in the supply chain. In light of the public crisis caused by COVID-19, the authors suggest a signal game model for a...
This work aims to document a two-sided impact of the COVID-19 pandemic on online question and answer communities. It implements empirical analyses on subsidiary communities affiliating to the Stack Exchange network. Using a...
A substantial body of research has been devoted to the analysis of motion trajectories. Usually, a motion trajectory consists of a set of coordinates, which is called a raw trajectory. In this paper, the authors first use...
To improve the accuracy of image classification, a kind of improved model is proposed. The shortcut is added to GoogLeNet inception v1 and several other ways of shortcut are given, and they are GRSN1_2, GRSN1_3, GRSN1_4. Among...
This paper proposes a monocular depth label propagation model, which describes monocular images into depth label distribution for the target classification matching. 1) Depth label propagation by hybrid sampling and salient...
This article extracts eight points for discussion from many years of research in newcomer academic support and social integration in Newfoundland and Labrador. These points include: transportation to school for newcomer...
Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory...
In the context of digital transformation, this emerging technologies input creates powerful digital capabilities. Despite of the long distance, The enterprises cooperate more closely through wireless networks in digital space...
Image style transfer (IST) has drawn broad attention recently. At present, convolutional neural network (CNN)-based methods and generative adversarial network (GAN)-based methods have been broadly utilized in IST. However, the...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
To deal with global warming and energy shortage, nuclear power plants are constructed or planning to be constructed in China presently. The operation of a nuclear power plant consumes a great amount of water and discharges a lot...
The province’s five-year action plan to attract more immigrants into the province (Government of Newfoundland and Labrador, n.d.) indicates an increase in the number of newcomer students in our education system. Most of these...
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
The development of artificial intelligence technology has greatly helped social productivity and economic growth. At the same time, we have changed modern marketing methods, provided technical assistance for precision marketing...
This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose...