期刊文献+
共找到807篇文章
< 1 2 41 >
每页显示 20 50 100
AI-Augmented Smart Irrigation System Using IoT and Solar Power for Sustainable Water and Energy Management
1
作者 Siwakorn Banluesapy Mahasak Ketcham Montean Rattanasiriwongwut 《Energy Engineering》 2025年第10期4261-4296,共36页
Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-... Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies. 展开更多
关键词 Smart irrigation precision agriculture water conservation energy efficiency sustainable farming agricultural automation sensor networks
在线阅读 下载PDF
Geothermal prospecting through integrated CSAMT and soil radon methods in Baozigou village,Yuncheng Basin,Fenwei Rift,China
2
作者 GuoPeng Wu HuiYou He +3 位作者 GuoXiong Chen XiaoRong Ren JiFeng Zhang Yang Gao 《Earth and Planetary Physics》 2026年第1期57-74,共18页
The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for ge... The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets. 展开更多
关键词 controlled source audio-frequency magnetotellurics soil radon geothermal exploration Fenwei Rift conceptual model
在线阅读 下载PDF
Geographic information technology usage in developing countries – A case study in Mozambique 被引量:2
3
作者 Nelson Amade Marco Painho Tiago Oliveira 《Geo-Spatial Information Science》 SCIE CSCD 2018年第4期331-345,共15页
Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this... Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access. 展开更多
关键词 Geographic information technologies organizations remote sensing GPS geographic information systems Mozambique
原文传递
Toward Cloud-Based Parking Facility Management System: A Preliminary Study 被引量:1
4
作者 Chung-Yang Chen Wen-Lung Tsai Tzu-Yin Chen 《Journal of Electronic Science and Technology》 CAS 2013年第2期181-186,共6页
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa... An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time. 展开更多
关键词 Cloud-based construction e-tag parking facility management system radio-frequencyidentification.
在线阅读 下载PDF
Seeking Health Information Online:The Moderating Effects of Problematic Situations on User Intention 被引量:4
5
作者 Lidan Xia Shengli Deng Yirong Liu 《Journal of Data and Information Science》 CSCD 2017年第2期76-95,共20页
Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Ac... Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity. 展开更多
关键词 Health information seeking Situation Moderating effect Urgency Severity
在线阅读 下载PDF
Short Video Recommendation Algorithm Incorporating Temporal Contextual Information and User Context 被引量:1
6
作者 Weihua Liu Haoyang Wan Boyuan Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期239-258,共20页
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He... With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method. 展开更多
关键词 Recommendation algorithm user contexts short video temporal contextual information
在线阅读 下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
7
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
在线阅读 下载PDF
Information Collection System of Crop Growth Environment Based on the Internet of Things 被引量:1
8
作者 Hua YU Guangyu ZHANG Ningbo LU 《Asian Agricultural Research》 2013年第5期148-150,共3页
Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information c... Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent. 展开更多
关键词 The INTERNET of THINGS NODE MECHANISM ROUTING mech
在线阅读 下载PDF
An empowerment evaluation framework for national scientific and technical information governance 被引量:1
9
作者 hao Keran Chen Meihua Zeng Wen 《High Technology Letters》 EI CAS 2019年第4期461-469,共9页
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir... ‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation. 展开更多
关键词 scientific and technical(S&T) information governance empowerment evaluation technology assessment EE-capability system
在线阅读 下载PDF
PetroChina Implements QHSE Information System 被引量:2
10
作者 Mao Yaming Gao Yunsheng 《China Oil & Gas》 CAS 2005年第3期46-48,共3页
Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoin... Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project. 展开更多
关键词 中国石油天然气股份有限公司 信息化系统 企业管理 经营理念 QHSE 质量管理
在线阅读 下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
11
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
在线阅读 下载PDF
An SAO-based approach to technology evolution analysis using patent information: Case study—graphene sensors 被引量:12
12
作者 Zhengyin HU Shu FANG +3 位作者 Ling WEI Yi WEN Xian ZHANG Min WANG 《Chinese Journal of Library and Information Science》 2015年第3期62-75,共14页
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro... Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively. 展开更多
关键词 Technology evolution Patent analysis SAO Feature d
原文传递
A comparative study of information diffusion in weblogs and microblogs based on social network analysis 被引量:2
13
作者 Yang ZHANG Wanyang LING 《Chinese Journal of Library and Information Science》 2012年第4期51-66,共16页
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods... Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment. 展开更多
关键词 WEBLOG Microblog Information diffusion Social network analysis(SNA) Library and information science(LIS
原文传递
The Quantitative Law of Network Information Growth 被引量:1
14
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier Internet economy central information base
在线阅读 下载PDF
A comparative analysis of information literacy curriculum standards in the educational programs of high schools in China and in the United States 被引量:1
15
作者 Jianhua WU Jing GUO Jing SUN 《Chinese Journal of Library and Information Science》 2011年第2期41-59,共19页
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ... Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism. 展开更多
关键词 Information literacy education Curriculum standards Information literacy evaluation criteria Information literacy education policy Information technology literacy Secondary education School librarian training Teacher training
原文传递
Factors influencing online information acquisition: The case of Chinese college students 被引量:1
16
作者 Yihan ZHANG Qinjian YUAN Jabeen MISBAH 《Chinese Journal of Library and Information Science》 2015年第1期66-82,共17页
Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by usi... Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by using the technology acceptance model (TAM) and information system success model as the theoretical foundation. The proposed model was empirically tested with the structural equation modeling technique based on data collected from a survey of 357 college students. Findings: The results show that 1) perceived ease of use, perceived usefulness and perceived playfulness all have a positive impact on the intention to use the Internet for acquiring information, 2) use context and system quality significantly influence perceived usefulness and perceived ease of use, and 3) service quality has a positive impact on perceived ease of use but not on perceived usefulness. Likewise information quality has no positive effect on perceived usefulness. Research limitations: The survey respondents were mainly from college students in Nanjing. We need to recruit college students in the western or other developing areas in China to further validate our findings. Practical implications: This study puts forward some feasible suggestions for university libraries to improve information organization and the use of digital library resources to better meet the needs of library users. Originality/value: This study provides insights into the understanding of the factors affecting college students' online information acquisition from multiple perspectives. 展开更多
关键词 Intemet information Technology acceptance model (TAM) Perceivedplayfulness Contextual factor Information system success model
原文传递
Obsolescence determination of network information based on “double-proportion” method 被引量:2
17
作者 Juncheng WANG Kai YANG +1 位作者 Xiang LI Mengxian ZHU 《Chinese Journal of Library and Information Science》 2013年第4期28-39,共12页
Purpose:It is necessary to determine whether the value of network information exists or not from users’perspective.This study is to develop a new approach,called'double-proportion'method(DPM),to determine the... Purpose:It is necessary to determine whether the value of network information exists or not from users’perspective.This study is to develop a new approach,called'double-proportion'method(DPM),to determine the point of information obsolescence.Design/methodology/approach:Firstly,DPM is produced and introduced with statistics in great detail.Secondly,two data sets from Qiangguo Forum and NetEase News are used to validate DPM.Finally,the distributions of lifetime of the two sets are compared and reasons for the differences are revealed.Findings:In Qiangguo Forum,posts with no comments within 17 h can be identified as obsolescence,which indicates that approximately 83%of posts information has died within24 h,92%died within 36 h and almost all died within 54 h;While in NetEase News,news without comments within 28 h can be identified as obsolescence.Research limitations:This study adopted comments as the only behavior indicator,for further study other indicators like page views,republished times need to be used,to exploit better solutions for information obsolescence.Practical implications:According to obsolescence determination,network managers can optimize webpages more rationally,delete aged information in time,preserve valuable information,help search engines ignore aged webpages,optimize reptiles’mechanisms,and help advertisers choose webpages rationally to advertise online.Originality/value:Firstly,DPM is designed from users’perspective to describe the lifetime of information;Secondly,DPM is easy to use.DPM merges and improves former methods by taking the long-tail theory and Pareto principle into consideration. 展开更多
关键词 Information obsolescence Obsolescence determination Double-proportion method Users' behavior LIFETIME
原文传递
The college students' response to customized information services based on Library2.0 technologies at universities in Nanjing 被引量:1
18
作者 Lei LIU Yinghua FENG Yi JIANG 《Chinese Journal of Library and Information Science》 2011年第1期66-80,共15页
Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 tec... Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 technologies. In so doing, the authors carefully examined the data collected from the returned questionnaires about such key issues as the students’ perceptions about the customized information service via a Library2.0platform, self-initiated use experience of such a mechanism, their achieved information searching results vis-à-vis their expectations, etc. In addition, the authors also made a comparative study between information providers(i.e. librarians) and information consumers(i.e. students) at Chinese and American academic libraries. 展开更多
关键词 Academic library Users' need Library 2.0 Customized information service University in Nanjing
原文传递
The hot issues of studies in China on digital information resources: Based on co-word analysis 被引量:1
19
作者 MA Feicheng WANG Juncheng CHEN Jinxia 《Chinese Journal of Library and Information Science》 2008年第1期14-26,共13页
With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in thi... With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in this paper. The hot issues of studies on DIR and the relationship between those subjects are analyzed in this investigation as well. 展开更多
关键词 Digital information resources Co-word analysis Factor analysis Clustered analysis
原文传递
上一页 1 2 41 下一页 到第
使用帮助 返回顶部