According to the theory of planned behavior, the acquisition and dissemination of information under different topics on social media are mainly influenced by behavioral attitudes, subjective norms, and perceived behavioral control (Cameron,2010; Yang and Wu,2021). On the one hand, during the outbreak...
The information is stored in a database file which is interfaced with the user and/or system administrator through a customization user interface (CUI). The CUI includes windowing functionality and allows the user to invoke the method steps for adding, deleting, and updating user information and...
Most of the literature focuses on institutional pressure from the government or other stakeholders, and economic incentives for firms that implement environmental practices are rarely explored (Cui and Song, 2019; Song et al., 2019b; Wang et al., 2019b; Zhang et al., 2019b). Findings from ...
According to the joint modulation method, the PAPR can be manipulated by adjusting the ratio of CW signal to the information signal. The amplitudes of CW and information can be independently controlled at different frequencies, which is independent of the relative frequency difference. In terms of ...
However, it may be feasible to suggest that the review process more rigorously consider data citation, especially for those using open data as the source. In practical terms, data sections need to appear in the instructions to authors provided by the journals, and, most importantly, in the ...
In the face of today's fast updating and wide variety of word segmentation, it is difficult to accurately identify the keyword segmentation in the enterpri... Cui, Ranhong,Ma, Hengguo - Wireless Communications & Mobile Computing 被引量: 0发表: 2022年 Use of IFCC/IUPAC Format for Specimen...
According to the depth of neural networks, the network representation algorithms can be divided into 2 categories. The first category mainly includes some shallow neural network based algorithms such as DeepWalk9, node2vec10, LINE11, HOPE12 and struc2vec13, those algorithms decode graph structure ...
Converging evidence has proved the attentional bias of Internet addicts (IAs) on network information. However, previous studies have neither explained how characteristics of network information are detected by IAs with priority nor proved whether this ad
Cui et al. [31] illustrated a novel recognition framework in light of cloud environment and packet examination. The framework identifies the malicious mobile malware behavior through their bundles with the utilization of information mining strategies. This approach totally keeps away from the deformities...
Z Wei, T Tan, Z Sun, J Cui, in Proc. int’l conf. on biometrics (icb), ed. by D Zhang, AK Jain. Robust and Fast Assessment of Iris Image Quality, (2005), pp. 464–471. doi:http://dx.doi.org/10.1007/11608288_62. E Tabassi, in Proc. Int’l Conf. Biom. Special Int. ...