Fraudulent website is an important car-rier tool for telecom fraud.At present,criminals can use artificial intelligence generative content technol-ogy to quickly generate fraudulent website templates and build fraudul...Fraudulent website is an important car-rier tool for telecom fraud.At present,criminals can use artificial intelligence generative content technol-ogy to quickly generate fraudulent website templates and build fraudulent websites in batches.Accurate identification of fraudulent website will effectively re-duce the risk of public victimization.Therefore,this study developed a fraudulent website template iden-tification method based on DOM structure extraction of website fingerprint features,which solves the prob-lems of single-dimension identification,low accuracy,and the insufficient generalization ability of current fraudulent website templates.This method uses an im-proved SimHash algorithm to traverse the DOM tree of a webpage,extract website node features,calcu-late the weight of each node,and obtain the finger-print feature vector of the website through dimension-ality reduction.Finally,the random forest algorithm is used to optimize the training features for the best combination of parameters.This method automati-cally extracts fingerprint features from websites and identifies website template ownership based on these features.An experimental analysis showed that this method achieves a classification accuracy of 89.8%and demonstrates superior recognition.展开更多
This study analyzes the User Interface(UI)and User Experience(UX)of information systems that provide local government information.The systems analyzed are the Local Administrative Comprehensive Information Disclosure ...This study analyzes the User Interface(UI)and User Experience(UX)of information systems that provide local government information.The systems analyzed are the Local Administrative Comprehensive Information Disclosure System(Zheripan),the Integrated Local Financial Disclosure System(Qinching Online),and the Local Regulations Information System(12348 Zhejiang Legal Network).The Local Administrative Comprehensive Information Disclosure System offers public service and personnel information,while the Integrated Local Financial Disclosure System provides financial information,and the Local Regulations Information System offers legal information as its main content.The analysis framework utilized three elements:objective data,psychological factors,and heuristic evaluation.The results of the first objective data analysis show that approximately 70%of visits to Zheripan and Qinching Online are through search,and the time spent on the homepage is short.In contrast,about 70%of visits to the 12348 Zhejiang Legal Network are direct visits,with users browsing multiple pages with a clear purpose.In terms of data provision methods,Zheripan provides two types of data in three formats,Qinching Online offers 28 types of data in five formats,and 12348 Zhejiang Legal Network provides one type of information in a single format.The second psychological factor analysis found that all three websites had a number of menus suitable for short-term cognitive capacity.However,only one of the sites had a layout that considered the user’s eye movement.Finally,the heuristic evaluation revealed that most of the evaluation criteria were not met.While the design is relatively simple and follows standards,feedback for users,error prevention,and help options were lacking.Moreover,the user-specific usability was low,and the systems remained at the information-providing level.Based on these findings,both short-term and long-term improvement measures for creating an interactive system beyond simple information disclosure are proposed.展开更多
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea...Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF model innovatively adopts a parallel structure, fusing temporal features related to both the front and back of the fingerprint sequence, along with spatial features captured through channel attention enhancement, to enhance the accuracy of the attack. Meanwhile, the APWF method introduces isomorphic migration learning and adjusts the model by freezing the optimal model weights and fine-tuning the parameters so that only a small number of the target, samples are needed to adapt to web page changes. A series of experiments show that the attack model can achieve 83% accuracy with the help of only 10 samples per category, which is a 30% improvement over the traditional attack model. Compared to comparative modeling, APWF improves accuracy while reducing time costs. After further fine-tuning the freezing model, the method in this paper can maintain the accuracy at 92.4% in the scenario of 56 days between the training data and the target data, which is only 4% less loss compared to the instant attack, significantly improving the robustness and accuracy of the model in coping with conceptual drift.展开更多
Onemust interact with a specific webpage or website in order to use the Internet for communication,teamwork,and other productive activities.However,because phishing websites look benign and not all website visitors ha...Onemust interact with a specific webpage or website in order to use the Internet for communication,teamwork,and other productive activities.However,because phishing websites look benign and not all website visitors have the same knowledge and skills to inspect the trustworthiness of visited websites,they are tricked into disclosing sensitive information and making them vulnerable to malicious software attacks like ransomware.It is impossible to stop attackers fromcreating phishingwebsites,which is one of the core challenges in combating them.However,this threat can be alleviated by detecting a specific website as phishing and alerting online users to take the necessary precautions before handing over sensitive information.In this study,five machine learning(ML)and DL algorithms—cat-boost(CATB),gradient boost(GB),random forest(RF),multilayer perceptron(MLP),and deep neural network(DNN)—were tested with three different reputable datasets and two useful feature selection techniques,to assess the scalability and consistency of each classifier’s performance on varied dataset sizes.The experimental findings reveal that the CATB classifier achieved the best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.9%,95.73%,and 98.83%.The GB classifier achieved the second-best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.16%,95.18%,and 98.58%.MLP achieved the best computational time across all datasets(DS-1,DS-2,and DS-3)with respective values of 2,7,and 3 seconds despite scoring the lowest accuracy across all datasets.展开更多
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.展开更多
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.展开更多
In an era dominated by high technology,there is an increasing need for environments rich in emotional design.The emotive design of websites has become a highlight in modern web development,where an aesthetically pleas...In an era dominated by high technology,there is an increasing need for environments rich in emotional design.The emotive design of websites has become a highlight in modern web development,where an aesthetically pleasing appearance can significantly enhance the usability of a website.This paper delves into the innovative practices at the instinctual layer of baby brand official websites.A multitude of visual elements come together to form the overall appearance of these web pages,with each element’s appearance being determined by its color,shape,and arrangement.Through a literature-based theoretical analysis,this study captures the fundamental principles of emotive design concerning these visual elements,focusing on color,shape,and composition.It also consolidates relevant theories to suggest innovative enhancements based on existing designs,presenting new trends in baby brand website design that create a highly emotive online environment for users.展开更多
The aim of this study is to identify and analyze ways to increase usage of destination website and motivate website visitors’intention to actually visit the destination.The sample population is South Koreans who visi...The aim of this study is to identify and analyze ways to increase usage of destination website and motivate website visitors’intention to actually visit the destination.The sample population is South Koreans who visit the VisitBritain website,the homepage of Britain’s national tourism agency.The data for this study were collected by a self-participated online survey on the blog of VisitBritain Korea,which is directly linked to the VisitBritain Korea website.Using structural equation modeling,six hypotheses were tested.The results show that the destination image on the destination marketing organization(DMO)website,quality of the destination website design including three dimensions(information quality,system quality,and service quality),and customers’satisfaction formed by high quality of the website design have a significant impact on website visitors’use intention and increase their visiting intention to the destination.Based upon the results of the analysis,managerial implications and areas for future research are proposed.展开更多
In order to improve the accuracy and integrality of mining data records from the web, the concepts of isomorphic page and directory page and three algorithms are proposed. An isomorphic web page is a set of web pages ...In order to improve the accuracy and integrality of mining data records from the web, the concepts of isomorphic page and directory page and three algorithms are proposed. An isomorphic web page is a set of web pages that have uniform structure, only differing in main information. A web page which contains many links that link to isomorphic web pages is called a directory page. Algorithm 1 can find directory web pages in a web using adjacent links similar analysis method. It first sorts the link, and then counts the links in each directory. If the count is greater than a given valve then finds the similar sub-page links in the directory and gives the results. A function for an isomorphic web page judgment is also proposed. Algorithm 2 can mine data records from an isomorphic page using a noise information filter. It is based on the fact that the noise information is the same in two isomorphic pages, only the main information is different. Algorithm 3 can mine data records from an entire website using the technology of spider. The experiment shows that the proposed algorithms can mine data records more intactly than the existing algorithms. Mining data records from isomorphic pages is an efficient method.展开更多
The aim of this exploratory study is to analyze the effectiveness of website communications regarding thermal tourism and to evaluate the website attributes of thermal tourism facilities in Turkey. In order to achieve...The aim of this exploratory study is to analyze the effectiveness of website communications regarding thermal tourism and to evaluate the website attributes of thermal tourism facilities in Turkey. In order to achieve this aim, seven main categories (contact information, general information, facility information, thermal/medical and wellness services information, surrounding area information, booking and external contracts information, and technical items) and 55 sub-items are identified. Then websites are analyzed with a content analysis method. One hundred and sixty four thermal facilities in Turkey could be listed and accepted as the population. Systematic sampling method was used with a sample size of 33 thermal facilities. After the frequency analysis, results showed that most of the thermal facilities do not have an efficient website management in Turkey. Although official websites are very critical tools for effective marketing communication, thermal facilities are utilizing only a small potential of their websites.展开更多
This article explored China’s urban employment dynamics with particular focus on the city size effect.Big data derived from the largest recruitment website were used to examine the direct and indirect impacts of city...This article explored China’s urban employment dynamics with particular focus on the city size effect.Big data derived from the largest recruitment website were used to examine the direct and indirect impacts of city size on employment demand by using mediating and moderating models.We also investigated the roles of the government and location factors which have seldom been considered in literature.Results showed that the concentration degree of new jobs is higher than that of stock employment and population across cities,implying a path dependency mechanism of job creation and employment expansion.Meanwhile,numerous job posts in inland central cities are probably a symptom of more even distribution of employment in future China.Econometric models further verified the significant correlation between city size and job creation.Moreover,industrial diversity,fixed asset investment,and spatial location have heterogeneous effects on employment demand in cities of different sizes and different levels of administration.These results can not only deepen our understanding of the crucial role of city size in urban employment growth but also demonstrate the future trend of labor and population geography of China.Policy implications are then proposed for job creation in cities of China and other developing countries.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
A hl-quality website is crucial to a company for a successful e-business. The technique maintainers are always faced with the problem how to locate the prime factors which affect the quality of the websites. In view o...A hl-quality website is crucial to a company for a successful e-business. The technique maintainers are always faced with the problem how to locate the prime factors which affect the quality of the websites. In view of the complexity and fuzziness of BtoC webslte, a quality diagnosis method based on the multl-attribute and multi-layer fuzzy comprehensive evaluation model including all the quality factors is proposed. A simple example of diagnosis on a famous domestic BtoC websites shows the specific steps of this method and proves its validity. The process of quality evaluation and diagnosis system is illustrated and the computer program of diagnosis is Oven.展开更多
Agricultural product trading website is not only an important way to realize the agriculture informatization,but also the main manifestation of the agricultural informatization. Based on the preliminary understanding ...Agricultural product trading website is not only an important way to realize the agriculture informatization,but also the main manifestation of the agricultural informatization. Based on the preliminary understanding of the content and characteristics of China's agricultural product trading website,the paper builds a scientific evaluation indicator system and evaluates 50 typical agricultural product trading websites objectively by using classification and grading method. The results show that the overall construction level of China's agricultural product trading websites is general,and there are obvious differences between regions; the lack of website commercial function and the lag of informatization are the main factors restricting the development of agricultural product trading websites.展开更多
Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such atta...Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.展开更多
The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in term...The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.展开更多
In this paper, we conduct research on the big data and the artificial intelligence aided decision-making mechanism with the applications on video website homemade program innovation. Make homemade video shows new medi...In this paper, we conduct research on the big data and the artificial intelligence aided decision-making mechanism with the applications on video website homemade program innovation. Make homemade video shows new media platform site content production with new possible, as also make the traditional media found in Internet age, the breakthrough point of the times. Site homemade video program, which is beneficial to reduce copyright purchase demand, reduce the cost, avoid the homogeneity competition, rich advertising marketing at the same time, improve the profit pattern, the organic combination of content production and operation, complete the strategic transformation. On the basis of these advantages, once the site of homemade video program to form a brand and a higher brand influence. Our later research provides the literature survey for the related issues.展开更多
基金This research is a phased achievement of The National Social Science Fund of China(23BGL272).
文摘Fraudulent website is an important car-rier tool for telecom fraud.At present,criminals can use artificial intelligence generative content technol-ogy to quickly generate fraudulent website templates and build fraudulent websites in batches.Accurate identification of fraudulent website will effectively re-duce the risk of public victimization.Therefore,this study developed a fraudulent website template iden-tification method based on DOM structure extraction of website fingerprint features,which solves the prob-lems of single-dimension identification,low accuracy,and the insufficient generalization ability of current fraudulent website templates.This method uses an im-proved SimHash algorithm to traverse the DOM tree of a webpage,extract website node features,calcu-late the weight of each node,and obtain the finger-print feature vector of the website through dimension-ality reduction.Finally,the random forest algorithm is used to optimize the training features for the best combination of parameters.This method automati-cally extracts fingerprint features from websites and identifies website template ownership based on these features.An experimental analysis showed that this method achieves a classification accuracy of 89.8%and demonstrates superior recognition.
文摘This study analyzes the User Interface(UI)and User Experience(UX)of information systems that provide local government information.The systems analyzed are the Local Administrative Comprehensive Information Disclosure System(Zheripan),the Integrated Local Financial Disclosure System(Qinching Online),and the Local Regulations Information System(12348 Zhejiang Legal Network).The Local Administrative Comprehensive Information Disclosure System offers public service and personnel information,while the Integrated Local Financial Disclosure System provides financial information,and the Local Regulations Information System offers legal information as its main content.The analysis framework utilized three elements:objective data,psychological factors,and heuristic evaluation.The results of the first objective data analysis show that approximately 70%of visits to Zheripan and Qinching Online are through search,and the time spent on the homepage is short.In contrast,about 70%of visits to the 12348 Zhejiang Legal Network are direct visits,with users browsing multiple pages with a clear purpose.In terms of data provision methods,Zheripan provides two types of data in three formats,Qinching Online offers 28 types of data in five formats,and 12348 Zhejiang Legal Network provides one type of information in a single format.The second psychological factor analysis found that all three websites had a number of menus suitable for short-term cognitive capacity.However,only one of the sites had a layout that considered the user’s eye movement.Finally,the heuristic evaluation revealed that most of the evaluation criteria were not met.While the design is relatively simple and follows standards,feedback for users,error prevention,and help options were lacking.Moreover,the user-specific usability was low,and the systems remained at the information-providing level.Based on these findings,both short-term and long-term improvement measures for creating an interactive system beyond simple information disclosure are proposed.
基金supported by the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026)the funding of Key Laboratory of Mobile Application Innovation and Governance Technology,Ministry of Industry and Information Technology(2023IFS080601-K).
文摘Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF model innovatively adopts a parallel structure, fusing temporal features related to both the front and back of the fingerprint sequence, along with spatial features captured through channel attention enhancement, to enhance the accuracy of the attack. Meanwhile, the APWF method introduces isomorphic migration learning and adjusts the model by freezing the optimal model weights and fine-tuning the parameters so that only a small number of the target, samples are needed to adapt to web page changes. A series of experiments show that the attack model can achieve 83% accuracy with the help of only 10 samples per category, which is a 30% improvement over the traditional attack model. Compared to comparative modeling, APWF improves accuracy while reducing time costs. After further fine-tuning the freezing model, the method in this paper can maintain the accuracy at 92.4% in the scenario of 56 days between the training data and the target data, which is only 4% less loss compared to the instant attack, significantly improving the robustness and accuracy of the model in coping with conceptual drift.
文摘Onemust interact with a specific webpage or website in order to use the Internet for communication,teamwork,and other productive activities.However,because phishing websites look benign and not all website visitors have the same knowledge and skills to inspect the trustworthiness of visited websites,they are tricked into disclosing sensitive information and making them vulnerable to malicious software attacks like ransomware.It is impossible to stop attackers fromcreating phishingwebsites,which is one of the core challenges in combating them.However,this threat can be alleviated by detecting a specific website as phishing and alerting online users to take the necessary precautions before handing over sensitive information.In this study,five machine learning(ML)and DL algorithms—cat-boost(CATB),gradient boost(GB),random forest(RF),multilayer perceptron(MLP),and deep neural network(DNN)—were tested with three different reputable datasets and two useful feature selection techniques,to assess the scalability and consistency of each classifier’s performance on varied dataset sizes.The experimental findings reveal that the CATB classifier achieved the best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.9%,95.73%,and 98.83%.The GB classifier achieved the second-best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.16%,95.18%,and 98.58%.MLP achieved the best computational time across all datasets(DS-1,DS-2,and DS-3)with respective values of 2,7,and 3 seconds despite scoring the lowest accuracy across all datasets.
基金supported by the National Social Science Fund of China(23BGL272)。
文摘The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.
基金the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
文摘Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.
文摘In an era dominated by high technology,there is an increasing need for environments rich in emotional design.The emotive design of websites has become a highlight in modern web development,where an aesthetically pleasing appearance can significantly enhance the usability of a website.This paper delves into the innovative practices at the instinctual layer of baby brand official websites.A multitude of visual elements come together to form the overall appearance of these web pages,with each element’s appearance being determined by its color,shape,and arrangement.Through a literature-based theoretical analysis,this study captures the fundamental principles of emotive design concerning these visual elements,focusing on color,shape,and composition.It also consolidates relevant theories to suggest innovative enhancements based on existing designs,presenting new trends in baby brand website design that create a highly emotive online environment for users.
文摘The aim of this study is to identify and analyze ways to increase usage of destination website and motivate website visitors’intention to actually visit the destination.The sample population is South Koreans who visit the VisitBritain website,the homepage of Britain’s national tourism agency.The data for this study were collected by a self-participated online survey on the blog of VisitBritain Korea,which is directly linked to the VisitBritain Korea website.Using structural equation modeling,six hypotheses were tested.The results show that the destination image on the destination marketing organization(DMO)website,quality of the destination website design including three dimensions(information quality,system quality,and service quality),and customers’satisfaction formed by high quality of the website design have a significant impact on website visitors’use intention and increase their visiting intention to the destination.Based upon the results of the analysis,managerial implications and areas for future research are proposed.
文摘In order to improve the accuracy and integrality of mining data records from the web, the concepts of isomorphic page and directory page and three algorithms are proposed. An isomorphic web page is a set of web pages that have uniform structure, only differing in main information. A web page which contains many links that link to isomorphic web pages is called a directory page. Algorithm 1 can find directory web pages in a web using adjacent links similar analysis method. It first sorts the link, and then counts the links in each directory. If the count is greater than a given valve then finds the similar sub-page links in the directory and gives the results. A function for an isomorphic web page judgment is also proposed. Algorithm 2 can mine data records from an isomorphic page using a noise information filter. It is based on the fact that the noise information is the same in two isomorphic pages, only the main information is different. Algorithm 3 can mine data records from an entire website using the technology of spider. The experiment shows that the proposed algorithms can mine data records more intactly than the existing algorithms. Mining data records from isomorphic pages is an efficient method.
文摘The aim of this exploratory study is to analyze the effectiveness of website communications regarding thermal tourism and to evaluate the website attributes of thermal tourism facilities in Turkey. In order to achieve this aim, seven main categories (contact information, general information, facility information, thermal/medical and wellness services information, surrounding area information, booking and external contracts information, and technical items) and 55 sub-items are identified. Then websites are analyzed with a content analysis method. One hundred and sixty four thermal facilities in Turkey could be listed and accepted as the population. Systematic sampling method was used with a sample size of 33 thermal facilities. After the frequency analysis, results showed that most of the thermal facilities do not have an efficient website management in Turkey. Although official websites are very critical tools for effective marketing communication, thermal facilities are utilizing only a small potential of their websites.
基金Major Project of National Social Sciences Foundation of China,No.20&ZD173。
文摘This article explored China’s urban employment dynamics with particular focus on the city size effect.Big data derived from the largest recruitment website were used to examine the direct and indirect impacts of city size on employment demand by using mediating and moderating models.We also investigated the roles of the government and location factors which have seldom been considered in literature.Results showed that the concentration degree of new jobs is higher than that of stock employment and population across cities,implying a path dependency mechanism of job creation and employment expansion.Meanwhile,numerous job posts in inland central cities are probably a symptom of more even distribution of employment in future China.Econometric models further verified the significant correlation between city size and job creation.Moreover,industrial diversity,fixed asset investment,and spatial location have heterogeneous effects on employment demand in cities of different sizes and different levels of administration.These results can not only deepen our understanding of the crucial role of city size in urban employment growth but also demonstrate the future trend of labor and population geography of China.Policy implications are then proposed for job creation in cities of China and other developing countries.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金Supported by Key Discipline Project fromScience and Technology Committee of Shanghai(No.04JC14009) and the Research Fund ofDonghua University(No.108 10 0044934)
文摘A hl-quality website is crucial to a company for a successful e-business. The technique maintainers are always faced with the problem how to locate the prime factors which affect the quality of the websites. In view of the complexity and fuzziness of BtoC webslte, a quality diagnosis method based on the multl-attribute and multi-layer fuzzy comprehensive evaluation model including all the quality factors is proposed. A simple example of diagnosis on a famous domestic BtoC websites shows the specific steps of this method and proves its validity. The process of quality evaluation and diagnosis system is illustrated and the computer program of diagnosis is Oven.
基金Supported by Shandong Provincial Natural Science Foundation(ZR2011DM008)
文摘Agricultural product trading website is not only an important way to realize the agriculture informatization,but also the main manifestation of the agricultural informatization. Based on the preliminary understanding of the content and characteristics of China's agricultural product trading website,the paper builds a scientific evaluation indicator system and evaluates 50 typical agricultural product trading websites objectively by using classification and grading method. The results show that the overall construction level of China's agricultural product trading websites is general,and there are obvious differences between regions; the lack of website commercial function and the lag of informatization are the main factors restricting the development of agricultural product trading websites.
基金This research has been funded by the Scientific Research Deanship at University of Ha'il-Saudi Arabia through Project Number RG-20023.
文摘Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.
文摘The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.
文摘In this paper, we conduct research on the big data and the artificial intelligence aided decision-making mechanism with the applications on video website homemade program innovation. Make homemade video shows new media platform site content production with new possible, as also make the traditional media found in Internet age, the breakthrough point of the times. Site homemade video program, which is beneficial to reduce copyright purchase demand, reduce the cost, avoid the homogeneity competition, rich advertising marketing at the same time, improve the profit pattern, the organic combination of content production and operation, complete the strategic transformation. On the basis of these advantages, once the site of homemade video program to form a brand and a higher brand influence. Our later research provides the literature survey for the related issues.