期刊文献+
共找到597篇文章
< 1 2 30 >
每页显示 20 50 100
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
1
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 TRUST context-AWARE mobile social network RECOMMENDATION
原文传递
An Investigation of College English Autonomous Learning in Network Multimodal Context
2
作者 Chen Guan Jianhui Zhang 《Intelligent Information Management》 2023年第3期169-179,共11页
In the current society, based on the growing development of network information technology, the teaching in many colleges and universities has also introduced it to adapt to the situation. This trend can provide more ... In the current society, based on the growing development of network information technology, the teaching in many colleges and universities has also introduced it to adapt to the situation. This trend can provide more useful conditions for students to learn, which requires students to master enough self-learning abilities to adapt to this model. The study in the paper shows that students are usually interested in autonomous learning in a multimodal environment, but the degree of strategy choice is relatively low, and the learning process is blind and passive with the lack of self-confidence. Facing the future, schools should actively integrate into network thinking, and teachers should change their roles and train and guide students’ learning strategies and learning motivations, so as to achieve better teaching results. 展开更多
关键词 College English Autonomous Learning Ability Training network Multimodal context
在线阅读 下载PDF
Context-Aware Adaptive Routing for Opportunistic Network 被引量:1
3
作者 WANG Xiaomao HUANG Chuanhe +3 位作者 ZHOU Hao SHI Jiaoli HE Kai DAN Feng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期299-306,共8页
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwardin... Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead. 展开更多
关键词 routing algorithm context-aware opportunistic network movement key position
原文传递
An Analysis of the Cognitive Constraints of Parody in the Context of Network Media
4
作者 CHANG Yan 《Sino-US English Teaching》 2016年第7期567-572,共6页
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni... The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it. 展开更多
关键词 parody in the context of network media cognitive constraints cognitive realm
在线阅读 下载PDF
Context Aware Wireless Sensor Network Suitable for Precision Agriculture 被引量:2
5
作者 Nour Brinis Leila Azouz Saidane 《Wireless Sensor Network》 2016年第1期1-12,共12页
Using the Wireless Sensor Networks WSNs in a wide variety of applications is currently considered one of the most challenging solutions. For instance, this technology has evolved the agriculture field, with the precis... Using the Wireless Sensor Networks WSNs in a wide variety of applications is currently considered one of the most challenging solutions. For instance, this technology has evolved the agriculture field, with the precision agriculture challenge. In fact, the cost of sensors and communication infrastructure continuously trend down as long as the technological advances. So, more growers dare to implement WSN for their crops. This technology has drawn substantial interests by improving agriculture productivity. The idea consists of deploying a number of sensors in a given agricultural parcel in order to monitor the land and crop conditions. These readings help the farmer to make the right inputs at the right moment. In this paper, we propose a complete solution for gathering different type of data from variable fields of a large agricultural parcel. In fact, with the in-field variability, adopting a unique data gathering solution for all kinds of fields reveals an inconvenient approach. Besides, as a fault-tolerant application, precision agriculture does not require a high precision value of sensed data. So, our approach deals with a context aware data gathering strategy. In other words, depending on a defined context for the monitored field, the data collector will decide the data gathering strategy to follow. We prove that this approach improves considerably the lifetime of the application. 展开更多
关键词 Wireless Sensor network Precision Agriculture Data Collector context Aware
在线阅读 下载PDF
A Survey on Context-Aware Sensing for Body Sensor Networks 被引量:1
6
作者 Barbara T. Korel Simon G. M. Koo 《Wireless Sensor Network》 2010年第8期571-583,共13页
Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be... Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be used in pervasive healthcare monitoring for relating importance to events and specifically for accurate episode detection. In this paper, we address the issue of context-aware sensing in BSNs, and survey different techniques for deducing context awareness. 展开更多
关键词 context AWARENESS BODY Sensor networkS Artificial Neural networkS BAYESIAN networkS Hidden MARKOV Models
在线阅读 下载PDF
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
7
作者 Rathinam Gopal Velusamy Parthasarathy 《Circuits and Systems》 2016年第11期3504-3521,共19页
Cooperative wireless sensor networks have drastically grown due to node co-opera- tive in unaltered environment. Various real time applications are developed and deployed under cooperative network, which controls and ... Cooperative wireless sensor networks have drastically grown due to node co-opera- tive in unaltered environment. Various real time applications are developed and deployed under cooperative network, which controls and coordinates the flow to and from the nodes to the base station. Though nodes are interlinked to give expected state behavior, it is vital to monitor the malicious activities in the network. There is a high end probability to compromise the node behavior that leads to catastrophes. To overcome this issue a Novel Context Aware-IDS approach named Context Aware Nodal Deployment-IDS (CAND-IDS) is framed. During data transmission based on node properties and behavior CAND-IDS detects and eliminates the malicious nodes in the explored path. Also during network deployment and enhancement, node has to follow Context Aware Cooperative Routing Protocol (CCRP), to ensure the reliability of the network. CAND-IDS are programmed and simulated using Network Simulator software and the performance is verified and evaluated. The simulation result shows significant improvements in the throughput, energy consumption and delay made when compared with the existing system. 展开更多
关键词 Cooperative network Intrusion Detection System context Aware Routing Protocol network Simulator
在线阅读 下载PDF
Context-Aware System Modeling Based on Boolean Control Network
8
作者 M. Humayun Kabir M. Robiul Hoque 《Open Journal of Applied Sciences》 2015年第11期661-668,共8页
Boolean control network consists of a set of Boolean variables whose state is determined by other variables in the network. Boolean network is used for modeling complex system. In this paper, we have presented a model... Boolean control network consists of a set of Boolean variables whose state is determined by other variables in the network. Boolean network is used for modeling complex system. In this paper, we have presented a model of a context-aware system used in smart home based on Boolean control networks. This modeling describes the relationship between the context elements (person, time, location, and activity) and services (Morning Call, Sleeping, Guarding, Entertainment, and normal), which is effective to logical inference. We apply semi tensor matrix product to describe the dynamic of the system. This matrix form of expression is a convenient and reasonable way to design logic control system. 展开更多
关键词 MATHEMATICAL Modeling context-AWARE System Smart HOME BOOLEAN Control network Semi-Tensor Matrix Product
在线阅读 下载PDF
基于局部上下文引导特征深度融合的轻量级医学图像分割方法
9
作者 任向阳 赵梦媛 +2 位作者 胡微 刘刚琼 毕莹 《郑州大学学报(理学版)》 北大核心 2026年第1期65-71,共7页
现有的基于深度学习的医学图像分割方法,大多是利用大量的训练数据拟合检测网络,以获得优异的检测性能。这些方法往往需要较大的模型参数,导致检测实时性较差。为此,提出了基于局部上下文引导特征深度融合轻量级医学分割网络(local cont... 现有的基于深度学习的医学图像分割方法,大多是利用大量的训练数据拟合检测网络,以获得优异的检测性能。这些方法往往需要较大的模型参数,导致检测实时性较差。为此,提出了基于局部上下文引导特征深度融合轻量级医学分割网络(local context guided feature deep fusion lightweight medical segmentation network,LCGML-net)。LCGML-net通过精确的特征选择与特征融合来减少模型拟合所需的参数数量,从而在保证检测精度的同时实现更小的模型参数。在特征提取阶段和映射阶段,分别通过提取和融合目标的多层次多尺度局部上下文特征来丰富特征表达和精准分割。在STARE、CHASEDB1和KITS19等多个基准数据集上开展的实验证明,与其他方法相比,所提出的LCGML-net具有最佳的检测性能和最小的模型参数。 展开更多
关键词 医学图像分割 神经网络 局部上下文特征 特征深度融合
在线阅读 下载PDF
基于网络的Context Aware智能控制系统
10
作者 张平 徐扬生 李嘉强 《计算机工程与应用》 CSCD 北大核心 2005年第30期211-214,共4页
提出一种基于网络的Context Aware智能控制系统的体系结构、Context任务控制管理模型。系统将机器人作为Context Aware智能系统的智能接口。通过对Java JINI的服务查找机制进行修改,增强了JINI的服务查找、分发机制,使得系统可以通过综... 提出一种基于网络的Context Aware智能控制系统的体系结构、Context任务控制管理模型。系统将机器人作为Context Aware智能系统的智能接口。通过对Java JINI的服务查找机制进行修改,增强了JINI的服务查找、分发机制,使得系统可以通过综合分析服务提供者当前状态、服务申请者的状态、系统当前的性能以及Context感知信息,经模糊决策,通过”Pull”方式,或“Push”方式给服务申请者(或第三方用户)提供所需的服务。最后对系统性能进行分析。一个应用实例说明Context Aware智能控制系统的应用。 展开更多
关键词 智能控制 机器人 计算机网络 context Aware
在线阅读 下载PDF
Analysis of the Features of Network Words
11
作者 阳艳萍 《海外英语》 2015年第4期137-138,共2页
The information society makes people's lives gradually enter a digital state for living. And the popularity of the Internet has led to the unique phenomenon of network words. What impact will network and the combi... The information society makes people's lives gradually enter a digital state for living. And the popularity of the Internet has led to the unique phenomenon of network words. What impact will network and the combination of language bring about? This article will explore the relation between the phenomenon of network words and social context from the angle of social linguistic through the analysis of network words and grammatical features. 展开更多
关键词 network WORDS FEATURES context SOCIAL FACTORS
在线阅读 下载PDF
Application-Transparent Live Migration for Virtual Machine on Network Security Enhanced Hypervisor 被引量:2
12
作者 陈贤钦 高小鹏 +2 位作者 万寒 王素梅 龙翔 《China Communications》 SCIE CSCD 2011年第3期32-42,共11页
As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in... As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible. 展开更多
关键词 live migration network security security context VIRTUALIZATION
在线阅读 下载PDF
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks 被引量:1
13
作者 陈曦 田有亮 +1 位作者 李兴华 马建峰 《China Communications》 SCIE CSCD 2011年第4期132-140,共9页
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-... In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. 展开更多
关键词 opportunistic networks social context-based routing identity-based signature threshold cryptography
在线阅读 下载PDF
Intelligent Silent Zone for Source-Location Privacy Based on Context-Awareness in WSNs
14
作者 Zhou Qian Qin Xiaolin Ding Youwei 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2018年第1期203-218,共16页
In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.... In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.Many traditional solutions have been proposed based on the creation of random routes,such as random walk and fake sources approach,which will lead to serious packet delay and high energy consumption.Instead of applying the routing in a blind way,this article proposes a novel solution for source location privacy in WSNs by utilizing sensor ability of perceiving the presence a mobile attacker nearby,for patient attackers in particular to increase the safety period and decrease the data delivery delay.The proposed strategy forms an intelligent silent zone(ISZ)by sacrificing only a minority of sensor nodes to entice patient attackers away from real packet routing path.The analysis and simulation results show that the proposed scheme,besides providing source location privacy energy efficiently,can significantly reduce real event reporting latency compared with the existing approaches. 展开更多
关键词 SOURCE location privacy wireless sensor networks ENERGY-EFFICIENCY context-AWARE
在线阅读 下载PDF
Nonlinear Prediction with Deep Recurrent Neural Networks for Non-Blind Audio Bandwidth Extension 被引量:2
15
作者 Lin Jiang Ruimin Hu +2 位作者 Xiaochen Wang Weiping Tu Maosheng Zhang 《China Communications》 SCIE CSCD 2018年第1期72-85,共14页
Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually gen... Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually generated by a duplication of the corresponding low frequencies and some parameters of high frequencies. However, the perception quality of coding will significantly degrade if the correlation between high frequencies and low frequencies becomes weak. In this paper, we quantitatively analyse the correlation via computing mutual information value. The analysis results show the correlation also exists in low frequency signal of the context dependent frames besides the current frame. In order to improve the perception quality of coding, we propose a novel method of high frequency coarse spectrum generation to improve the conventional replication method. In the proposed method, the coarse high frequency spectrums are generated by a nonlinear mapping model using deep recurrent neural network. The experiments confirm that the proposed method shows better performance than the reference methods. 展开更多
关键词 AUDIO CODING non-blind audiobandwidth EXTENSION context correlation deeprecurrent neural network
在线阅读 下载PDF
基于跨度和图卷积网络的篇章级事件抽取模型 被引量:1
16
作者 廖涛 牛冰宇 《湖北民族大学学报(自然科学版)》 2025年第1期108-113,共6页
为解决现有的事件抽取方法在实体抽取子任务中难以充分利用上下文信息,导致事件抽取精度较低的问题,提出了基于跨度和图卷积网络的篇章级事件抽取(document-level event extraction based on span and graph convolutional network, DEE... 为解决现有的事件抽取方法在实体抽取子任务中难以充分利用上下文信息,导致事件抽取精度较低的问题,提出了基于跨度和图卷积网络的篇章级事件抽取(document-level event extraction based on span and graph convolutional network, DEESG)模型。首先,设计中间线性层对编码的向量进行线性处理,并结合标注信息计算最佳跨度,通过提升对跨度开始位置和结束位置判断的准确度来提高实体抽取的精度;接着,提出异构图的构建方法,使用池化策略将实体与句子表示为图的节点,根据提出的建边规则构建异构图,以此建立全局信息的交互,并利用多层图卷积网络(graph convolutional network, GCN)对异构图进行卷积,获得具有上下文信息的实体表示和句子表示,以此解决上下文信息利用不充分的问题;然后,利用多头注意力机制进行事件类型的检测;最后,为组合中的实体分配论元角色,完成事件抽取任务。在中文金融公告(Chinese financial announcements, ChFinAnn)数据集上进行实验。结果表明,与拥有追踪器的异构图交互模型(graph-based interaction model with a tracker, GIT)相比,DEESG模型的F1分数提升了1.3个百分点。该研究证实DEESG模型能有效应用于篇章级事件抽取领域。 展开更多
关键词 事件抽取 跨度 实体抽取 异构图 图卷积网络 上下文信息
在线阅读 下载PDF
On the QoS Assessment of Video Sessions in Heterogeneous 3G-WLAN Networks with Seamless and Secure Mobility Support
17
作者 Ilias Politis Michail Tsagkaropoulos +2 位作者 Stavros Kotsopoulos Tasos Dagiuklas Peter Stavroulakis 《China Communications》 SCIE CSCD 2007年第1期105-119,共15页
Real-time video data transmission is currently emerging as a popular application among mobile users but it is very sensitive to QoS degradation due to packet losses in wireless networks.In order to achieve service con... Real-time video data transmission is currently emerging as a popular application among mobile users but it is very sensitive to QoS degradation due to packet losses in wireless networks.In order to achieve service continuity and integrity upon handoffs among heterogeneous networks,provisioning of seamless and secure mobility is required.However,in order to reduce the delay and packet losses during vertical handovers we need to employ supportive protocols like context transfer.In this paper we evaluate the QoS of video transmission over a heterogeneous 3G-WLAN network.The aggregate video data traffic is represented by a dynamic two-dimensional Markov chain model,which has been evaluated against real video data measurement.Upon the vertical handover, appropriate AAA handshaking and enhanced mobility management using context transfer have been considered.Perceived QoS evaluation of video streams was performed based on peak signal-noise ratio(PSNR) measurements,while we analyticallyestimated the number of packet losses during handovers.The results show that both packet loss within the converged network and loss occurrence affecting the perceived video quality is reduced. Moreover,the proposed context transfer scheme minimizes handover delay and the number of lost packet up to 3 times compared to standard AAA handshaking. 展开更多
关键词 HETEROGENEOUS wireless networkS multiplexed VIDEO traffic RADIUS-AAA context transfer
在线阅读 下载PDF
Disclosure and Use of Privacy Settings in Facebook<sup>TM</sup>Profiles: Evaluating the Impact of Media Context and Gender
18
作者 Amanda Nosko Eileen Wood +3 位作者 Lucia Zivcakova Seija Molema Domenica De Pasquale Karin Archer 《Social Networking》 2013年第1期1-8,共8页
The present study examined disclosure and use of privacy settings in online social networking profiles as a function of the media context (i.e., online versus hard copy (paper and pencil) FacebookTM profiles). Gender ... The present study examined disclosure and use of privacy settings in online social networking profiles as a function of the media context (i.e., online versus hard copy (paper and pencil) FacebookTM profiles). Gender was also examined. Overall, participants disclosed more information when constructing a profile for another person when using a hard copy paper and pencil format than an online context. Gender differences were not uniform across media contexts, however, in contrast to traditional disclosure theory, females censored their disclosures more so than males but only for some topics. Only 20% of the sample increased their use of privacy settings. Consistent with patterns of disclosure, descriptive comparison suggests that more settings were employed in the paper and pencil than online context and more privacy settings were employed by females. 展开更多
关键词 FacebookTM SOCIAL Communication SOCIAL networking DISCLOSURE PRIVACY SETTINGS Media context GENDER
暂未订购
A Design of Incremental Granular Network for Software Data Modeling
19
作者 Keun-Chang Kwak 《Journal of Software Engineering and Applications》 2010年第11期1027-1031,共5页
In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations bet... In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations between information granules including fuzzy sets formed both in the input and output spaces. The context within which such relationships are being formed is established by the system developer. Here information granules are built using Context-driven Fuzzy Clustering (CFC). This clustering develops clusters by preserving the homogeneity of the clustered patterns associated with the input and output space. The experimental results on well-known software module of Medical Imaging System (MIS) revealed that the incremental granular network showed a good performance in comparison to other previous literature. 展开更多
关键词 INCREMENTAL GRANULAR network GRANULAR COMPUTING Information GRANULES context-Based Fuzzy Clustering
暂未订购
上一页 1 2 30 下一页 到第
使用帮助 返回顶部