Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-...Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies.展开更多
The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for ge...The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets.展开更多
Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this...Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access.展开更多
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa...An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.展开更多
Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Ac...Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity.展开更多
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He...With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information c...Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent.展开更多
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir...‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.展开更多
Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoin...Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro...Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.展开更多
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods...Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.展开更多
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ...Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.展开更多
Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by usi...Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by using the technology acceptance model (TAM) and information system success model as the theoretical foundation. The proposed model was empirically tested with the structural equation modeling technique based on data collected from a survey of 357 college students. Findings: The results show that 1) perceived ease of use, perceived usefulness and perceived playfulness all have a positive impact on the intention to use the Internet for acquiring information, 2) use context and system quality significantly influence perceived usefulness and perceived ease of use, and 3) service quality has a positive impact on perceived ease of use but not on perceived usefulness. Likewise information quality has no positive effect on perceived usefulness. Research limitations: The survey respondents were mainly from college students in Nanjing. We need to recruit college students in the western or other developing areas in China to further validate our findings. Practical implications: This study puts forward some feasible suggestions for university libraries to improve information organization and the use of digital library resources to better meet the needs of library users. Originality/value: This study provides insights into the understanding of the factors affecting college students' online information acquisition from multiple perspectives.展开更多
Purpose:It is necessary to determine whether the value of network information exists or not from users’perspective.This study is to develop a new approach,called'double-proportion'method(DPM),to determine the...Purpose:It is necessary to determine whether the value of network information exists or not from users’perspective.This study is to develop a new approach,called'double-proportion'method(DPM),to determine the point of information obsolescence.Design/methodology/approach:Firstly,DPM is produced and introduced with statistics in great detail.Secondly,two data sets from Qiangguo Forum and NetEase News are used to validate DPM.Finally,the distributions of lifetime of the two sets are compared and reasons for the differences are revealed.Findings:In Qiangguo Forum,posts with no comments within 17 h can be identified as obsolescence,which indicates that approximately 83%of posts information has died within24 h,92%died within 36 h and almost all died within 54 h;While in NetEase News,news without comments within 28 h can be identified as obsolescence.Research limitations:This study adopted comments as the only behavior indicator,for further study other indicators like page views,republished times need to be used,to exploit better solutions for information obsolescence.Practical implications:According to obsolescence determination,network managers can optimize webpages more rationally,delete aged information in time,preserve valuable information,help search engines ignore aged webpages,optimize reptiles’mechanisms,and help advertisers choose webpages rationally to advertise online.Originality/value:Firstly,DPM is designed from users’perspective to describe the lifetime of information;Secondly,DPM is easy to use.DPM merges and improves former methods by taking the long-tail theory and Pareto principle into consideration.展开更多
Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 tec...Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 technologies. In so doing, the authors carefully examined the data collected from the returned questionnaires about such key issues as the students’ perceptions about the customized information service via a Library2.0platform, self-initiated use experience of such a mechanism, their achieved information searching results vis-à-vis their expectations, etc. In addition, the authors also made a comparative study between information providers(i.e. librarians) and information consumers(i.e. students) at Chinese and American academic libraries.展开更多
With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in thi...With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in this paper. The hot issues of studies on DIR and the relationship between those subjects are analyzed in this investigation as well.展开更多
文摘Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies.
基金supported by the Shanxi Province Basic Research Program(No.20210302123374)Yuncheng University Doctoral Research Initiation Fund(No.YQ-2021008)+3 种基金Excellent doctors come to Shanxi to reward scientific research projects(No.QZX-2023020)Open Fund of State Key Laboratory of Precision Geodesy(No.SKLPG2025-1-1)Joint Open Fund of the Research Platforms of School of Computer Science,China University of Geosciences,Wuhan(No.PTLH2024-B-03)Hubei Provincial Natural Science Foundation Project(No.2025AFC095).
文摘The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets.
基金This research was partially funded by NUFFIC,the Dutch organization for internationalization in education,through a doctoral grant[grant number:NICHE-MOZ-136].
文摘Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access.
文摘An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.
基金supported in part by the Key Projects of Philosophy and Social Sciences Research supported by the Ministry of Education of the People’s Republic of China(Grant No.:15JJD870001)Luo Jia Youth Scholar of Wuhan University
文摘Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity.
文摘With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
文摘Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent.
基金Supported by the National Social Science Fund of China(No.16BTQ058)
文摘‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.
文摘Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
文摘Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.
基金supported by Sun Yat-sen University Cultivation Fund for Young Teachers(Grant No.:20000-3161102)the National Social Science Fundation of China(Grant No.:08CTQ015)
文摘Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.
文摘Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.
基金supported by the Special Fund for Fast Sharing of Science Paper in Net Era by the Chinese Ministry of Education, Science and Technology Development Center (Grant No.: FSSP2013044001)the Doctoral Fund of the Chinese Ministry of Education (Grant No.: 20130091110061)
文摘Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by using the technology acceptance model (TAM) and information system success model as the theoretical foundation. The proposed model was empirically tested with the structural equation modeling technique based on data collected from a survey of 357 college students. Findings: The results show that 1) perceived ease of use, perceived usefulness and perceived playfulness all have a positive impact on the intention to use the Internet for acquiring information, 2) use context and system quality significantly influence perceived usefulness and perceived ease of use, and 3) service quality has a positive impact on perceived ease of use but not on perceived usefulness. Likewise information quality has no positive effect on perceived usefulness. Research limitations: The survey respondents were mainly from college students in Nanjing. We need to recruit college students in the western or other developing areas in China to further validate our findings. Practical implications: This study puts forward some feasible suggestions for university libraries to improve information organization and the use of digital library resources to better meet the needs of library users. Originality/value: This study provides insights into the understanding of the factors affecting college students' online information acquisition from multiple perspectives.
基金supported by the National Social Science Foundation of China(Grant No.12CTQ025)the National Natural Science Foundation of China(Grant No.70833005)
文摘Purpose:It is necessary to determine whether the value of network information exists or not from users’perspective.This study is to develop a new approach,called'double-proportion'method(DPM),to determine the point of information obsolescence.Design/methodology/approach:Firstly,DPM is produced and introduced with statistics in great detail.Secondly,two data sets from Qiangguo Forum and NetEase News are used to validate DPM.Finally,the distributions of lifetime of the two sets are compared and reasons for the differences are revealed.Findings:In Qiangguo Forum,posts with no comments within 17 h can be identified as obsolescence,which indicates that approximately 83%of posts information has died within24 h,92%died within 36 h and almost all died within 54 h;While in NetEase News,news without comments within 28 h can be identified as obsolescence.Research limitations:This study adopted comments as the only behavior indicator,for further study other indicators like page views,republished times need to be used,to exploit better solutions for information obsolescence.Practical implications:According to obsolescence determination,network managers can optimize webpages more rationally,delete aged information in time,preserve valuable information,help search engines ignore aged webpages,optimize reptiles’mechanisms,and help advertisers choose webpages rationally to advertise online.Originality/value:Firstly,DPM is designed from users’perspective to describe the lifetime of information;Secondly,DPM is easy to use.DPM merges and improves former methods by taking the long-tail theory and Pareto principle into consideration.
文摘Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 technologies. In so doing, the authors carefully examined the data collected from the returned questionnaires about such key issues as the students’ perceptions about the customized information service via a Library2.0platform, self-initiated use experience of such a mechanism, their achieved information searching results vis-à-vis their expectations, etc. In addition, the authors also made a comparative study between information providers(i.e. librarians) and information consumers(i.e. students) at Chinese and American academic libraries.
基金supported by the Fund for Philosophy and Social Sciences,Ministry of Education of China(Grant No.05JZD00024)
文摘With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in this paper. The hot issues of studies on DIR and the relationship between those subjects are analyzed in this investigation as well.