Shuihua Han

ORCID: 0000-0003-1374-3885
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Sustainable Supply Chain Management
  • RFID technology advancements
  • Urban and Freight Transport Logistics
  • Chaos-based Image/Signal Encryption
  • Vehicle Routing Optimization Methods
  • Advanced Steganography and Watermarking Techniques
  • E-commerce and Technology Innovations
  • Digital Marketing and Social Media
  • Consumer Retail Behavior Studies
  • Consumer Market Behavior and Pricing
  • User Authentication and Security Systems
  • Advanced Manufacturing and Logistics Optimization
  • Digital Media Forensic Detection
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Collaboration in agile enterprises
  • Supply Chain and Inventory Management
  • Technology Adoption and User Behaviour
  • Recycling and Waste Management Techniques
  • IoT and Edge/Fog Computing
  • QR Code Applications and Technologies
  • Corporate Social Responsibility Reporting
  • Quality and Supply Management
  • Image Processing and 3D Reconstruction
  • Digital Transformation in Industry

Xiamen University
2013-2024

Pennsylvania State University
2007-2008

Huazhong University of Science and Technology
2001-2005

Infrastructure digital transformation may create value for logistics enterprises; but its whole process is still full of uncertainties. Prior research focused on smart control in view the infrastructure and ignored driving role governance transformation. Here, authors investigate relationship between adaptive transformation, actively explore effect digitalization service quality improvement enterprises. The take servitization as moderator to examine interaction quality. Through 227 valid...

10.4018/jgim.309377 article EN Journal of Global Information Management 2022-09-28

10.1007/s10207-009-0093-2 article EN International Journal of Information Security 2009-10-07

10.1016/j.physa.2015.12.137 article EN Physica A Statistical Mechanics and its Applications 2016-01-14

This study proposes a new prescriptive analytics method that aims to provide decision-makers with systematic and objective approach identify suitable locations, considering the spatial distribution of different types restaurants. The comprises two main components: co-location pattern mining locationGCN, where locationGCN is based on graph convolutional network (GCN). utilized capture correlation specific restaurant determine candidate location selection range. designed further screen out...

10.1016/j.jbusres.2024.114691 article EN cc-by Journal of Business Research 2024-04-30

In remanufacturing research, most researchers predominantly emphasised on the recovery of whole product (core) rather than at component level due to its complexity. contrast, this paper addresses challenges focus through recovery, so as solve production planning problems hybrid and manufacturing systems. To deal with uncertainties quality quantity returns, processing time remanufacturing, costs, well market demands, a robust optimisation model was developed in research case study used...

10.1080/00207543.2016.1145815 article EN International Journal of Production Research 2016-02-15

This study proposes a novel research framework to examine the effect of digital CSR communications on financial performance while incorporating deep learning techniques identify firms' social media. Particularly, this aims quantify efforts in by employing cutting-edge learning-based natural language processing (NLP) models detect CSR-related tweets Utilizing unique dataset 65 Chinese public companies manufacturing sector between 2015 and 2019, we detected 64,769 long-form posted WeChat...

10.1016/j.dss.2023.114047 article EN cc-by Decision Support Systems 2023-07-20

With the environment concern increasing, corporations are facing new challenges on carbon management in supply chain network. In this paper, environmental consideration is introduced to traditional management, and sustainable (SSC) designed considering footprint. We develop a mixed integer linear programming (MILP) model get optimal decisions partner selection, technology transportation mode as well material procurement, product supply, recovery mode. For validating model, beverage company...

10.1155/2019/3162471 article EN cc-by Mathematical Problems in Engineering 2019-01-01

Improving the quality of cold chain logistics services is a great challenge for fresh food e-commerce companies. Traditionally, evaluation service has been carried out mainly through questionnaire surveys and expert groups, which are time-consuming laborious. Unlike previous studies, in this study, we used latent Dirichlet allocation model to explore using customer reviews on 'fresh food' category JD.com, one China's most popular websites. By revising index system quality, put forward an...

10.1080/13675567.2021.1998398 article EN International Journal of Logistics Research and Applications 2021-11-05

Purpose The purpose of this paper is to define the conceptualization and measurement informatization according a capability perspective reflected in three aspects: IT managerial capability, IT-enabled infrastructure capability. Design/methodology/approach Manufacturing enterprises China’s Northeast Pearl River Delta regions China were selected empirically examine, using structural equation modeling, association between firm’s senior executive support radical innovation performance. Findings...

10.1108/imds-06-2018-0228 article EN Industrial Management & Data Systems 2019-04-10

In this paper, it is shown how to adapt a certain matrix transformation create novel asymmetric block encryption scheme. The proposed scheme especially useful for of large amounts data, such as digital images. First, pair keys are given by using the transformation; second, image encrypted in its domain. This can be conveniently realized and locate possible changed regions.

10.1109/iscit.2004.1412451 article EN 2005-04-12

In this paper, it is shown how to adapt certain matrix transformation create a novel asymmetric block encryption scheme. The proposed scheme especially useful for of large amounts data, such as digital images. First, pair keys are given by using transformation; Second, the image encrypted private key in its domain; Finally receiver uses public decrypt messages. This satisfies characters convenient realization, less computation complexity and good security.

10.37936/ecti-cit.200512.51841 article EN ECTI Transactions on Computer and Information Technology (ECTI-CIT) 1970-01-01

Digital image manipulation software is readily accessible from the Internet today, thus, digital data very easy to be tampered without having any clue. Under this circumstance, integrity verification has become an important issue in world. The aim of paper present in-depth analysis on methods detecting tampering. We introduce notion content authentication and features required design effective scheme. review some algorithms frequently used security mechanisms. also analyze discuss...

10.1109/icsc.2007.100 article EN International Conference on Semantic Computing (ICSC 2007) 2007-09-01
Coming Soon ...