期刊文献+
共找到4,036篇文章
< 1 2 202 >
每页显示 20 50 100
An Analysis of the Cognitive Constraints of Parody in the Context of Network Media
1
作者 CHANG Yan 《Sino-US English Teaching》 2016年第7期567-572,共6页
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni... The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it. 展开更多
关键词 parody in the context of network media cognitive constraints cognitive realm
在线阅读 下载PDF
Topic-shift in Network Media Reports 被引量:1
2
作者 杨跃珍 《海外英语》 2011年第3X期252-253,256,共3页
It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials&... It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment. 展开更多
关键词 topic-shift MARKING COHESION network media REPORTS TOPIC FRAGMENT
在线阅读 下载PDF
Study of the permeability characteristics of porous media with methane hydrate by pore network model 被引量:8
3
作者 Haifeng Liang Yongchen Song Yu Liu Mingjun Yang Xing Huang 《Journal of Natural Gas Chemistry》 EI CAS CSCD 2010年第3期255-260,共6页
The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional ... The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media. 展开更多
关键词 pore network model hydrate saturation PERMEABILITY porous media
在线阅读 下载PDF
Complex Network Formation and Analysis of Online Social Media Systems
4
作者 Hafiz Abid Mahmood Malik 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1737-1750,共14页
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr... To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc. 展开更多
关键词 Complex network data extraction nodes and edges network visualization social media network main hubs centrality measures
在线阅读 下载PDF
Followers of the Social Media Network and National Security
5
作者 Yu Chen 《International English Education Research》 2014年第9期44-46,共3页
With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, ... With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security. 展开更多
关键词 Social media networks FOLLOWERS National Security
在线阅读 下载PDF
Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network 被引量:1
6
作者 Fuseini Inusah Ibrahim Mohammed Gunu Gaddafi Abdul-Salaam 《International Journal of Communications, Network and System Sciences》 2021年第2期15-29,共15页
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons... This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance. 展开更多
关键词 Data Consumption Device Accounting Mobile Devices Social media WiFi network Rockus Outdoor AP
在线阅读 下载PDF
AN ADAPTIVE OPPORTUNISTIC RETRANSMISSION CONTROL SCHEME ENVIRONMENT-AWARE-BASED FOR WIRELESS MULTIMEDIA MESH NETWORKS
7
作者 Zhao Haitao Dong Yuning +1 位作者 Zhang Hui Li Yang 《Journal of Electronics(China)》 2010年第6期756-764,共9页
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env... In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput. 展开更多
关键词 Wireless Mesh networks (WMNs) media Access Control (MAC) Retransmission control Environment-aware
在线阅读 下载PDF
BulkTree: an overlay network architecture for live media streaming
8
作者 GONG An DING Gui-guang DAI Qiong-hai LIN Chuang 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期125-130,共6页
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h... Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure. 展开更多
关键词 Peer-to-peer (P2P) Overlay networks Scalability LIVE media Distributed HASH TABLES (DHT) Hierarchical clustering
在线阅读 下载PDF
PARAMETERS INVERSION OF FLUID-SATURATED POROUS MEDIA BASED ON NEURAL NETWORKS
9
作者 Wei Peijun Zhang Zimao Han Hua 《Acta Mechanica Solida Sinica》 SCIE EI 2002年第4期342-349,共8页
The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element meth... The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method. 展开更多
关键词 fluid-saturated porous media parameter inversion neural networks boundary elements
在线阅读 下载PDF
威胁与应对:社交媒体信息对未婚未育女性分娩恐惧的影响研究
10
作者 翟红蕾 樊思琦 《新闻与传播评论》 北大核心 2026年第2期64-78,共15页
当前我国人口负增长与初婚推迟交织加剧,社交媒体负向影响青年生育态度引发社会广泛关注。以保护动机理论为透镜,锚定传统语境中尚疏离于生育行为的未婚未育女性,运用扎根理论的研究方法可剖析其接触社交媒体信息时的差异化认知评估过... 当前我国人口负增长与初婚推迟交织加剧,社交媒体负向影响青年生育态度引发社会广泛关注。以保护动机理论为透镜,锚定传统语境中尚疏离于生育行为的未婚未育女性,运用扎根理论的研究方法可剖析其接触社交媒体信息时的差异化认知评估过程。研究发现,社交媒体信息一方面触发和加剧分娩恐惧,一方面也具有纾解作用,据此构建的“威胁—应对”理论模型揭示:威胁评估通道中,家庭遮蔽导致参照规范缺位,社交媒体生育风险信息得以形塑认知、引发媒介化共情并传递社会规训,放大未婚未育女性的威胁感知,从而建构、强化分娩恐惧;应对评估通道中,社交媒体信息提供知识资本、社会资本与话语资本,叠加正向信息框架,帮助未婚未育女性建构科学生育认知、提升效能感知、消解分娩恐惧,其中家庭支持作为线下基础资源发挥重要的增益作用。未婚未育女性的分娩恐惧,既是数智时代信息高速传播催生的新症候,又折射女性主体在信息洪流中的自我确认与价值重构。这一现象为洞察当代青年群体的复杂婚育心态提供视角,凸显公共政策纳入对个体人文关切之重要性。 展开更多
关键词 分娩恐惧 社交媒体治理 媒介化情感 家庭支持网络
在线阅读 下载PDF
基于Windows Media技术的网络教学系统的应用研究与实现 被引量:3
11
作者 吴兰君 王鲜芳 杨东平 《河南科技学院学报》 2005年第3期95-98,共4页
介绍了W indow s m ed ia技术的功能、组成以及工作方式,给出了W indow s m ed ia技术在网络教学中的系统组成模型,详细介绍了客户端播放媒体流的实现过程。
关键词 ASF WINDOWS media 网络教学 流媒体 工作方式
在线阅读 下载PDF
网络圈层传播下产品的符号流动模式与动力机制
12
作者 曾莉 王爱红 李锋 《包装工程》 北大核心 2026年第2期315-324,共10页
目的网络圈层现象下产品符号的流动能影响社交媒体用户群的文化认同和消费行为,产品符号的传播效果受圈层内流动和圈层间流动模式的共同作用,以及圈层内部动力、外部动力双重驱动的影响。方法以小红书媒体平台(数据通过小红书公开API获... 目的网络圈层现象下产品符号的流动能影响社交媒体用户群的文化认同和消费行为,产品符号的传播效果受圈层内流动和圈层间流动模式的共同作用,以及圈层内部动力、外部动力双重驱动的影响。方法以小红书媒体平台(数据通过小红书公开API获取,已去除用户隐私信息)陶瓷产品符号流动为例的圈层传播过程能阐释产品的符号圈层流动模式及符号流动受到的内外动力。结果得出有效的圈层传播动力机制能够促进陶瓷产品符号在圈层内外的认同,加速符号的圈层流动性。结论产品符号的流动模式与动力机制对社交媒体中产品符号的传播规律、社交用户群对产品符号的认同等,有一定理论及现实意义。 展开更多
关键词 网络社交媒体 圈层传播 符号流动 动力 陶瓷产品
在线阅读 下载PDF
社交媒体用户关系网络研究综述
13
作者 李希熙 王倩 +2 位作者 闫相斌 刘正琳 梁爽 《中国管理科学》 北大核心 2026年第2期25-40,共16页
社交媒体(social media)作为新兴的信息传播和人际互动的在线网络平台,已经广泛融入人们日常生活和生产活动中,并引起相关领域学者的广泛关注。目前关于社交媒体用户关系网络的相关研究已经取得较为丰富的成果,但仍缺乏基于具体理论框... 社交媒体(social media)作为新兴的信息传播和人际互动的在线网络平台,已经广泛融入人们日常生活和生产活动中,并引起相关领域学者的广泛关注。目前关于社交媒体用户关系网络的相关研究已经取得较为丰富的成果,但仍缺乏基于具体理论框架的系统性梳理和全局性解读。鉴于此,本文以一般系统论(general system theory)为理论框架,从要素和过程两个角度对社交媒体用户关系网络的研究进行梳理和总结。具体而言,从要素角度来看,社交媒体用户关系网络的研究内容围绕用户关系网络特征刻画、检测和预测这三个方面来展开,其研究对象聚焦于用户关系或网络,其研究视角立足于静态或动态;从过程角度来看,社交媒体用户关系网络的作用机制从多个层面探讨了影响因素和影响效应,且这些影响因素和效应依托于多种具体场景。结合相关研究的现状及进展,本文从线上与线下融合、情境多样性以及负面效应等三个方面提出了未来研究趋势。 展开更多
关键词 社交媒体 用户关系 关系网络 研究综述
原文传递
基于深度学习的灾害事件社交媒体情感分析
14
作者 刘烯 颜烨 《软件导刊》 2026年第2期21-27,共7页
传统BERT模型在处理复杂社交媒体文本时,存在局部语义依赖建模不充分、多模态信息融合能力不足等问题。为此,构建一种融合图注意力网络(GAT)与Transformer的新型情感分析模型(BERT-GAT-Transformer),通过增强文本语义关联建模与长距离... 传统BERT模型在处理复杂社交媒体文本时,存在局部语义依赖建模不充分、多模态信息融合能力不足等问题。为此,构建一种融合图注意力网络(GAT)与Transformer的新型情感分析模型(BERT-GAT-Transformer),通过增强文本语义关联建模与长距离依赖捕捉能力,提升灾害事件相关文本的情感分类精度,为应急决策提供数据驱动的技术支持。首先,通过BERT编码层捕获文本双向语义,利用GAT动态构建词语关系图以增强局部上下文依赖;其次,通过Transformer的全局自注意力机制优化长距离序列特征。实验表明,在针对短文本时,BERT-GAT的准确率为81.7%、F1值为81.6%,略差于BERT-GAT-Transformer模型;在针对长文本时,BERT-GAT-Transformer模型的准确率为84.6%、F1值为85.1%,相较于基准模型BERT、BERT-GAT更优秀,能准确分析数据中的情感,为情报研究者提供了社交媒体情感分析的有效方法和模型依据。 展开更多
关键词 情感分析 BERT 图注意力网络(GAT) TRANSFORMER 社交媒体 灾害事件
在线阅读 下载PDF
基于Flash Media Server技术的远程视频教学系统 被引量:2
15
作者 闫俊伢 《内蒙古师范大学学报(自然科学汉文版)》 CAS 北大核心 2016年第1期98-103,共6页
采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行... 采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴. 展开更多
关键词 教学系统 Flash media SERVER 流媒体 电子白板 网络公开课程 远程视频
在线阅读 下载PDF
基于Windows Media技术的网络课件制作 被引量:2
16
作者 刘红光 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第18期127-129,共3页
论文首先介绍了Windows Media技术的特点、功能、组成及工作方式,然后根据现代网络教学的需要给出了基于Microsoft Windows Media Service的网络课件制作方法,并根据作者的开发实践说明了ASF格式流媒体文件在E-learning中的具体应用。
关键词 流媒体技术 Windows media 网络教学 课件制作方法
在线阅读 下载PDF
基于Windows Media技术的流媒体系统的设计与实现 被引量:1
17
作者 杨书刚 刘轶 《山东理工大学学报(自然科学版)》 CAS 2003年第6期103-106,共4页
在简介流媒体技术及WindowsMedia技术的基础上,结合实际简述了WindowsMedia服务器的安装、ASF文件的制作以及“点播单播发布点”、“广播单播发布点”、“多播广播站”的创建方法,并通过网页链接等方式进行了相关测试,从实践角度阐述了... 在简介流媒体技术及WindowsMedia技术的基础上,结合实际简述了WindowsMedia服务器的安装、ASF文件的制作以及“点播单播发布点”、“广播单播发布点”、“多播广播站”的创建方法,并通过网页链接等方式进行了相关测试,从实践角度阐述了在网络中实现流媒体服务的技术和方法. 展开更多
关键词 Windows media 流媒体系统 系统设计 网络视频 服务器 网页链接
在线阅读 下载PDF
Review of permeability evolution model for fractured porous media 被引量:5
18
作者 Jianjun Ma 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2015年第3期351-357,共7页
The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid ... The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations. 展开更多
关键词 Permeability Fractured porous media Porosity Damage network model Equivalent channel concept
在线阅读 下载PDF
上一页 1 2 202 下一页 到第
使用帮助 返回顶部