期刊文献+
共找到16,148篇文章
< 1 2 250 >
每页显示 20 50 100
Possible Classifications of Social Network Addiction:A Latent Profile Analysis of Chinese College Students
1
作者 Lin Luo Junfeng Yuan +4 位作者 Yanling Wang Rui Zhu HuilinXu Siyuan Bi Zhongge Zhang 《International Journal of Mental Health Promotion》 2025年第6期863-876,共14页
Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims ... Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims to validate the 21-item SocialNetwork Addiction Scale-Chinese(SNAS-C)in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population.Methods:A crosssectional survey was conducted,recruiting 3387 college students.Latent profile analysis(LPA)and receiver operating characteristic(ROC)curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C.Results:Three profile models were selected based on multiple statistical criteria,classifying participants into low-risk,moderate-risk,and high-risk groups.The highest-risk group was defined as“positive”for SNA,while the remaining groups were considered“negative”,serving as the reference standard for ROC analysis.The optimal cutoff score was determined to be 72(sensitivity:98.2%,specificity:96.86%),with an overall classification accuracy of 97.0%.The“positive”group reported significantly higher frequency of social network usage,greater digitalmedia dependence scores,and a higher incidence of network addiction.Conclusion:This study identified the optimal cutoff score for the SNAS-C as≥72,demonstrating high sensitivity,specificity,and diagnostic accuracy.This threshold effectively distinguishes between high-risk and low-risk SNA. 展开更多
关键词 social network addiction mental health latent profile analysis(LPA) receiver operating characteristic(ROC) social networking addiction scale-Chinese(SNAS-C)
暂未订购
Optimization of Park System in Haidian District,Beijing Based on Social Network Analysis
2
作者 WU Haotian CAO Ying 《Journal of Landscape Research》 2025年第2期11-16,共6页
The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlatio... The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlation in traditional planning.Taking Haidian District of Beijing as an example,the social network analysis method is introduced to construct the network model of park green spaces.Through indicators such as clustering coefficient,network density and node centrality,the characteristics of its spatial structure and hierarchical relationship are analyzed.It is found that the network integrity presents the characteristics of“highly local concentration and global fragmentation”,fragmented park green space network and missing spatial connection,isolated clusters and collaborative failure,as well as the spatial mismatch between population and resource supply and demand.Hierarchical issues include“structural imbalance and functional disorder”,disorder between network hierarchy and park level,misalignment of functional hierarchy leading to weakened network risk resistance capacity,and a relatively dense distribution of core nodes,etc.In response to the above problems,a multi-level spatial intervention strategy should be adopted to solve the overall problem of the network.Meanwhile,it is needed to clarify the positioning of a park itself and improve the hierarchical system,so as to construct a multi-level and multi-scale park green space network,contribute to the construction of a park city,and provide residents with more diverse activity venues. 展开更多
关键词 Urban park system social network analysis Haidian District BEIJING Park network structure
在线阅读 下载PDF
Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services
3
作者 Sangmin Kim Byeongcheon Lee +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computer Modeling in Engineering & Sciences》 2025年第5期2079-2108,共30页
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a... The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes. 展开更多
关键词 Online grooming KcELECTRA natural language processing optical character recognition social networking service text classification
在线阅读 下载PDF
Model and service for privacy in decentralized online social networks
4
作者 George Pacheco Pinto JoséRonaldo Leles Jr +3 位作者 Cíntia da Costa Souza Paulo Rde Souza Frederico Araújo Durão Cássio Prazeres 《Journal of Electronic Science and Technology》 2025年第1期76-97,共22页
Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and acc... Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests. 展开更多
关键词 Access control Decentralized online social network ONTOLOGY PRIVACY
在线阅读 下载PDF
Unveiling the role of social networks: Enhancing rural household livelihood resilience in China's Dabie Mountains
5
作者 TANG Lanyun LIU Chongchong WANG Ying 《Journal of Geographical Sciences》 2025年第2期335-358,共24页
Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing ... Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing studies do not disaggregate social networks into different dimensions,which limits the understanding of specific mechanisms.Based on 895 household samples collected in China's Dabie Mountains and structural equation modeling,this paper explored the pathway to enhance livelihood resilience through social networks by dis-aggregating it into five dimensions:network size,interaction intensity,social cohesion,social support,and social learning.The results indicate that:(1)Livelihood assets,adaptive capacity and safety nets significantly contribute to livelihood resilience,whereas sensitivity negatively affects it.Accessibility to basic services has no significant relationship with livelihood resilience in the study area.(2)Social networks and their five dimensions positively impact livelihood re-silience,with network support having the greatest impact.Therefore,both the government and rural households should recognize and enhance the role of social networks in improving liveli-hood resilience under frequent disturbances.These findings have valuable implications for mitigating the risks of poverty recurrence and contributing to rural revitalization. 展开更多
关键词 livelihood resilience social network rural revitalization structural equation modeling Dabie Mountains China
原文传递
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
6
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Using X Social Networks and web news mining to predict Marburg virus disease outbreaks
7
作者 Mohammad Jokar Kia Jahanbin Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 2025年第2期96-98,共3页
Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 ... Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 during concurrent outbreaks in Marburg and Frankfurt,Germany,and in Belgrade,Serbia,linked to laboratory use of African green monkeys imported from Uganda.Subsequent outbreaks and isolated cases have been reported in various African countries,including Angola,the Democratic Republic of the Congo,Equatorial Guinea,Ghana,Guinea,Kenya,Rwanda,South Africa(in an individual with recent travel to Zimbabwe),Tanzania,and Uganda.Initial human MVD infections typically occur due to prolonged exposure to mines or caves inhabited by Rousettus aegyptiacus fruit bats,the natural hosts of the virus. 展开更多
关键词 laboratory use marburg virus disease mvd african green monkeys outbreaks social networks marburg virus disease case fatality rate web news mining
暂未订购
CRB:A new rumor blocking algorithm in online social networks based on competitive spreading model and influence maximization 被引量:1
8
作者 董晨 徐桂琼 孟蕾 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期588-604,共17页
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea... The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time. 展开更多
关键词 online social networks rumor blocking competitive linear threshold model influence maximization
原文传递
Predicting Users’ Latent Suicidal Risk in Social Media: An Ensemble Model Based on Social Network Relationships 被引量:1
9
作者 Xiuyang Meng Chunling Wang +3 位作者 Jingran Yang Mairui Li Yue Zhang Luo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4259-4281,共23页
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ... Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences. 展开更多
关键词 Suicide risk prediction social media social network relationships Weibo Tree Hole deep learning
在线阅读 下载PDF
Identifying influential spreaders in social networks: A two-stage quantum-behaved particle swarm optimization with Lévy flight
10
作者 卢鹏丽 揽继茂 +3 位作者 唐建新 张莉 宋仕辉 朱虹羽 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期743-754,共12页
The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy ... The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms. 展开更多
关键词 social networks influence maximization metaheuristic optimization quantum-behaved particle swarm optimization Lévy flight
原文传递
Citation and bibliographic coupling between authors in the field of social network analysis
11
作者 Daria Maltseva Vladimir Batagelj 《Journal of Data and Information Science》 CSCD 2024年第4期110-154,共45页
Purpose:We analyzed the structure of a community of authors working in the field of social network analysis(SNA)based on citation indicators:direct citation and bibliographic coupling metrics.We observed patterns at t... Purpose:We analyzed the structure of a community of authors working in the field of social network analysis(SNA)based on citation indicators:direct citation and bibliographic coupling metrics.We observed patterns at the micro,meso,and macro levels of analysis.Design/methodology/approach:We used bibliometric network analysis,including the“temporal quantities”approach proposed to study temporal networks.Using a two-mode network linking publications with authors and a one-mode network of citations between the works,we constructed and analyzed the networks of citation and bibliographic coupling among authors.We used an iterated saturation data collection approach.Findings:At the macro-level,we observed the global structural features of citations between authors,showing that 80%of authors have not more than 15 citations from other works.At the meso-level,we extracted the groups of authors citing each other and similar to each other according to their citation patterns.We have seen a division of authors in SNA into groups of social scientists and physicists,as well as into other groups of authors from different disciplines.We found some examples of brokerage between different groups that maintained the common identity of the field.At the micro-level,we extracted authors with extremely high values of received citations,who can be considered as the most prominent authors in the field.We examined the temporal properties of the most popular authors.Research limitations:The main challenge in this approach is the resolution of the author’s name(synonyms and homonyms).We faced the author disambiguation,or“multiple personalities”(Harzing,2015)problem.To remain consistent and comparable with our previously published articles,we used the same SNA data collected up to 2018.The analysis and conclusions on the activity,productivity,and visibility of the authors are relative only to the field of SNA.Practical implications:The proposed approach can be utilized for similar objectives and identifying key structures and characteristics in other disciplines.This may potentially inspire the application of network approaches in other research areas,creating more authors collaborating in the field of SNA.Originality/value:We identified and applied an innovative approach and methods to study the structure of scientific communities,which allowed us to get the findings going beyond those obtained with other methods.We used a new approach to temporal network analysis,which is an important addition to the analysis as it provides detailed information on different measures for the authors and pairs of authors over time. 展开更多
关键词 Development of scientific fields social network analysis Bibliographic network Temporal network CITATION Bibliographic coupling
在线阅读 下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
12
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
在线阅读 下载PDF
Automated Time Based Multi-Criteria Bug Triage Approach:Developer Working Efficiency and Social Network Based Developer Recommendation
13
作者 YADAV Asmita SINGH Kumar Sandeep 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期566-578,共13页
In software development projects,bugs are common phenomena.Developers report bugs in open source repositories.There is a need to develop high quality developer prediction model that considers developer work satisfacti... In software development projects,bugs are common phenomena.Developers report bugs in open source repositories.There is a need to develop high quality developer prediction model that considers developer work satisfaction,keep within limited development cost,and improve bug resolution time.To address and resolve bug report as soon as possible is the main focus of triager when a new bug is reported.Thus,developer work efficiency is an important factor in bug-fixing.To address these issues,a proposed approach recommends a set of developers that could potentially share their knowledge with each other to fix new bug reports.The proposed approach is called developer working efficiency and social network based developer recommendation(DweSn).It is a composite model that builds developers'profile by using developer average bug fixing time,work efficiency to fix variety of bugs,as well as the developer's social interactions with other developers.A similarity measure is applied between new bug and bugs in corpus to extract the list of capable developers from the corpus.The proposed approach only selects those developers who are active and less loaded with work.The developer with the highest profile score is assigned the bugs.We evaluated our approach on the subset of five large open-source projects including Mozilla,Netbeans,Eclipse,Firefox and OpenOffice,and compared it with the state-of-the-art.The results demonstrate that combination of developers'efficiency with their average bug fixing time and interactions in their social network gives good accuracy and efficiently reduces bug tossing length.This approach shows an improvement in prediction accuracy,precision,recall,F-score and reduced bug tossing length up to 93.89%,93.12%,93.46%,93.27%and 93.25%,respectively.The proposed approach achieved a 93%hit ratio and 93.34%mean reciprocal rank,indicating that our proposed triager is able to efficiently assign bugs to correct developers. 展开更多
关键词 open-source repository bug report bug assignment tossing length bug triager developer social network developer recommendation
原文传递
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
14
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
在线阅读 下载PDF
A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating
15
作者 Rongrong Ren Luyang Su +2 位作者 Xinyu Meng Jianfang Wang Meng Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期429-458,共30页
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid... With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted. 展开更多
关键词 Large-scale group decision making social network updating trust relationship group consensus feedback mechanism
在线阅读 下载PDF
Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP
16
作者 Menghan Zhang Fangfang Shan +1 位作者 Mengyao Liu Zhenyu Wang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1565-1580,共16页
With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment... With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy.Due to the complexity and subtlety of sensitive information,traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data,thus weakening the deep connections between text and images.In this context,this paper adopts the CLIP model as a modality discriminator.By using comparative learning between sensitive image descriptions and images,the similarity between the images and the sensitive descriptions is obtained to determine whether the images contain sensitive information.This provides the basis for identifying sensitive information using different modalities.Specifically,if the original data does not contain sensitive information,only single-modality text-sensitive information identification is performed;if the original data contains sensitive information,multimodality sensitive information identification is conducted.This approach allows for differentiated processing of each piece of data,thereby achieving more accurate sensitive information identification.The aforementioned modality discriminator can address the limitations of existing sensitive information identification technologies,making the identification of sensitive information from the original data more appropriate and precise. 展开更多
关键词 Deep learning social networks sensitive information recognition multi-modal fusion
在线阅读 下载PDF
Discrete Choice Analysis of Temporal Factors on Social Network Growth
17
作者 Kwok-Wai Cheung Yuk Tai Siu 《Intelligent Information Management》 2024年第1期21-34,共14页
Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital w... Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved. 展开更多
关键词 Discrete Choice Models Temporal Factors social network Link Prediction network Growth
在线阅读 下载PDF
Habits on Social Networks at Workplace: A Survey of Motivations and Behaviour
18
作者 Thomas Kakou Kouassi Douatia Koné +3 位作者 Aliou Bamba Aladji Kamagaté Olivier Asseu Yvon Kermarrec 《Open Journal of Applied Sciences》 2024年第8期2154-2168,共15页
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo... This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace. 展开更多
关键词 social network social Media Applications Poisson’s Law STATISTICS Digital Supports Workers Productivity
在线阅读 下载PDF
Venture Capital Syndication under Social Network Theory:Literature Review and Prospect
19
作者 Junru Zhao Shasha Yang Zhengbin Wang 《Proceedings of Business and Economic Studies》 2024年第4期10-15,共6页
As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance... As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance investment returns,venture capital syndication holds significant research value in the field of venture capital.This paper reviews the literature,summarizing the motivations behind the formation of joint investment networks,the conceptual characteristics of the three core theories of social network theory,and the empirical research on venture capital syndication within the framework of social network theory.It also highlights the existing research results,identifies gaps,and anticipates future research directions. 展开更多
关键词 social network theory Venture capital syndication investment
在线阅读 下载PDF
Effect of Technology Support for Social Network on Agricultural Technology Diffusion 被引量:1
20
作者 旷浩源 应若平 《Agricultural Science & Technology》 CAS 2012年第1期98-102,共5页
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant... [Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion. 展开更多
关键词 Agricultural technology diffusion social network Technology support
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部