期刊文献+
共找到832篇文章
< 1 2 42 >
每页显示 20 50 100
AI-Augmented Smart Irrigation System Using IoT and Solar Power for Sustainable Water and Energy Management
1
作者 Siwakorn Banluesapy Mahasak Ketcham Montean Rattanasiriwongwut 《Energy Engineering》 2025年第10期4261-4296,共36页
Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-... Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies. 展开更多
关键词 Smart irrigation precision agriculture water conservation energy efficiency sustainable farming agricultural automation sensor networks
在线阅读 下载PDF
Keyword Spotting Based on Dual-Branch Broadcast Residual and Time-Frequency Coordinate Attention
2
作者 Zeyu Wang Jian-Hong Wang Kuo-Chun Hsu 《Computers, Materials & Continua》 2026年第4期333-352,共20页
In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and rec... In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge.To address this,we propose a novel time-frequency dual-branch parallel residual network,which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module.The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features,effectively avoiding the potential information loss caused by serial stacking,while enhancing information flow and multi-scale feature fusion.In terms of training strategy,a curriculum learning approach is introduced to progressively improve model robustness fromeasy to difficult tasks.Experimental results demonstrate that the proposed method consistently outperforms existing lightweight models under various signal-to-noise ratio(SNR)conditions,achieving superior far-field recognition performance on the Google Speech Commands V2 dataset.Notably,the model maintains stable performance even in low-SNR environments such as–10 dB,and generalizes well to unseen SNR conditions during training,validating its robustness to novel noise scenarios.Furthermore,the proposed model exhibits significantly fewer parameters,making it highly suitable for deployment on resource-limited devices.Overall,the model achieves a favorable balance between performance and parameter efficiency,demonstrating strong potential for practical applications. 展开更多
关键词 Keyword spotting convolutional neural network residual learning ATTENTION small footprint noisy far-field
在线阅读 下载PDF
Modeling Hepatitis B and Alcohol Effects on Liver Cirrhosis Progression
3
作者 Zia Ur Rahman Nigar Ali +4 位作者 Dragan Pamucar Imtiaz Ahmad Haci Mehmet Baskonus Naseer Ul Haq Zeeshan Ali 《Computer Modeling in Engineering & Sciences》 2026年第1期954-988,共35页
Hepatitis B Virus(HBV)infection and heavy alcohol consumption are the two primary pathogenic causes of liver cirrhosis.In this paper,we proposed a deterministic mathematical model and a logistic equation to investigat... Hepatitis B Virus(HBV)infection and heavy alcohol consumption are the two primary pathogenic causes of liver cirrhosis.In this paper,we proposed a deterministic mathematical model and a logistic equation to investigate the dynamics of liver cirrhosis progression as well as to explain the implications of variations in alcohol consumption on chronic hepatitis B patients,respectively.The intricate interactions between liver cirrhosis,recovery,and treatment dynamics are captured by the model.This study aims to show that alcohol consumption by Hepatitis B-infected individuals accelerates liver cirrhosis progression while treatment of acutely infected individuals reduces it.We proved that a unique solution of the proposed model exists,which is positive and bounded.Using the next-generation matrix approach,two basic reproductive numbers R_(A_(0))and R_(A_(max))are calculated to identify future recurrence.The equilibrium points are calculated,and both equilibria are proved locally and globally asymptotically stable when R_(0)is below and above one,respectively.It is shown that bifurcation exists at R_(0)=1 and a detailed proof for forward bifurcation is given.Furthermore,we performed the sensitivity analysis of the model parameters on R_(0).For the confirmation of analytical work,we performed numerical simulations,and the results indicate that the treatment and the inhibitory effects reduce the risk of developing liver cirrhosis in individuals,while heavy alcohol consumption accelerates markedly the liver cirrhosis progression in patients with chronic hepatitis B. 展开更多
关键词 Liver cirrhosis deterministic model saturated incidence rate STABILITY forward bifurcation
在线阅读 下载PDF
Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing
4
作者 Ahmad Zia Nazia Azim +5 位作者 Bekarystankyzy Akbayan Khalid J.Alzahrani Ateeq Ur Rehman Faheem Ullah Khan Nouf Al-Kahtani Hend Khalid Alkahtani 《Computers, Materials & Continua》 2026年第3期1559-1588,共30页
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c... The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods. 展开更多
关键词 Computation offloading task scheduling cheetah optimizer fog computing optimization resource allocation internet of things
在线阅读 下载PDF
Multimodal Trajectory Generation for Robotic Motion Planning Using Transformer-Based Fusion and Adversarial Learning
5
作者 Shtwai Alsubai Ahmad Almadhor +3 位作者 Abdullah Al Hejaili Najib Ben Aoun Tahani Alsubait Vincent Karovic 《Computer Modeling in Engineering & Sciences》 2026年第2期848-869,共22页
In Human–Robot Interaction(HRI),generating robot trajectories that accurately reflect user intentions while ensuring physical realism remains challenging,especially in unstructured environments.In this study,we devel... In Human–Robot Interaction(HRI),generating robot trajectories that accurately reflect user intentions while ensuring physical realism remains challenging,especially in unstructured environments.In this study,we develop a multimodal framework that integrates symbolic task reasoning with continuous trajectory generation.The approach employs transformer models and adversarial training to map high-level intent to robotic motion.Information from multiple data sources,such as voice traits,hand and body keypoints,visual observations,and recorded paths,is integrated simultaneously.These signals are mapped into a shared representation that supports interpretable reasoning while enabling smooth and realistic motion generation.Based on this design,two different learning strategies are investigated.In the first step,grammar-constrained Linear Temporal Logic(LTL)expressions are created from multimodal human inputs.These expressions are subsequently decoded into robot trajectories.The second method generates trajectories directly from symbolic intent and linguistic data,bypassing an intermediate logical representation.Transformer encoders combine multiple types of information,and autoregressive transformer decoders generate motion sequences.Adding smoothness and speed limits during training increases the likelihood of physical feasibility.To improve the realism and stability of the generated trajectories during training,an adversarial discriminator is also included to guide them toward the distribution of actual robot motion.Tests on the NATSGLD dataset indicate that the complete system exhibits stable training behaviour and performance.In normalised coordinates,the logic-based pipeline has an Average Displacement Error(ADE)of 0.040 and a Final Displacement Error(FDE)of 0.036.The adversarial generator makes substantially more progress,reducing ADE to 0.021 and FDE to 0.018.Visual examination confirms that the generated trajectories closely align with observed motion patterns while preserving smooth temporal dynamics. 展开更多
关键词 Multimodal trajectory generation robotic motion planning transformer networks sensor fusion reinforcement learning generative adversarial networks
在线阅读 下载PDF
Geothermal prospecting through integrated CSAMT and soil radon methods in Baozigou village,Yuncheng Basin,Fenwei Rift,China
6
作者 GuoPeng Wu HuiYou He +3 位作者 GuoXiong Chen XiaoRong Ren JiFeng Zhang Yang Gao 《Earth and Planetary Physics》 2026年第1期57-74,共18页
The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for ge... The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets. 展开更多
关键词 controlled source audio-frequency magnetotellurics soil radon geothermal exploration Fenwei Rift conceptual model
在线阅读 下载PDF
Geographic information technology usage in developing countries – A case study in Mozambique 被引量:2
7
作者 Nelson Amade Marco Painho Tiago Oliveira 《Geo-Spatial Information Science》 SCIE CSCD 2018年第4期331-345,共15页
Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this... Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access. 展开更多
关键词 Geographic information technologies organizations remote sensing GPS geographic information systems Mozambique
原文传递
Toward Cloud-Based Parking Facility Management System: A Preliminary Study 被引量:1
8
作者 Chung-Yang Chen Wen-Lung Tsai Tzu-Yin Chen 《Journal of Electronic Science and Technology》 CAS 2013年第2期181-186,共6页
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa... An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time. 展开更多
关键词 Cloud-based construction e-tag parking facility management system radio-frequencyidentification.
在线阅读 下载PDF
The Rural Information-based Construction under the Perspective of Expanding Agricultural Industrial Chain 被引量:3
9
作者 ZHU Li ZHU Jing 《Asian Agricultural Research》 2012年第1期49-53,57,共6页
On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informati... On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informatization in expanding agricultural industrial chain:it can enhance market competitiveness of industry chain,improve the operational efficiency of industry chain,and promote the income and quality of farmers in industry chain.Under the perspective of expanding agricultural industrial chain,this article puts forwards thinking about the construction of rural informatization as follows:first,give full play to the leading role of the government;second,strengthen the construction of information-based network facility;third,integrate information resources in rural areas,and improve the quality of information;fourth,build comprehensive information service platform in rural areas;fifth,improve organizational level of production and management of individual farmers;sixth,strengthen the construction of information-based personnel in rural areas;seventh,strengthen publicity and training,promote overall cultural quality and information awareness of farmers. 展开更多
关键词 Expansion of agricultural industrial chain Rural areas Information-based construction
在线阅读 下载PDF
Seeking Health Information Online:The Moderating Effects of Problematic Situations on User Intention 被引量:4
10
作者 Lidan Xia Shengli Deng Yirong Liu 《Journal of Data and Information Science》 CSCD 2017年第2期76-95,共20页
Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Ac... Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity. 展开更多
关键词 Health information seeking Situation Moderating effect Urgency Severity
在线阅读 下载PDF
Short Video Recommendation Algorithm Incorporating Temporal Contextual Information and User Context 被引量:1
11
作者 Weihua Liu Haoyang Wan Boyuan Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期239-258,共20页
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He... With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method. 展开更多
关键词 Recommendation algorithm user contexts short video temporal contextual information
在线阅读 下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
12
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
在线阅读 下载PDF
Information Collection System of Crop Growth Environment Based on the Internet of Things 被引量:1
13
作者 Hua YU Guangyu ZHANG Ningbo LU 《Asian Agricultural Research》 2013年第5期148-150,共3页
Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information c... Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent. 展开更多
关键词 The INTERNET of THINGS NODE MECHANISM ROUTING mech
在线阅读 下载PDF
An empowerment evaluation framework for national scientific and technical information governance 被引量:1
14
作者 hao Keran Chen Meihua Zeng Wen 《High Technology Letters》 EI CAS 2019年第4期461-469,共9页
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir... ‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation. 展开更多
关键词 scientific and technical(S&T) information governance empowerment evaluation technology assessment EE-capability system
在线阅读 下载PDF
PetroChina Implements QHSE Information System 被引量:2
15
作者 Mao Yaming Gao Yunsheng 《China Oil & Gas》 CAS 2005年第3期46-48,共3页
Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoin... Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project. 展开更多
关键词 中国石油天然气股份有限公司 信息化系统 企业管理 经营理念 QHSE 质量管理
在线阅读 下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
16
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
在线阅读 下载PDF
An SAO-based approach to technology evolution analysis using patent information: Case study—graphene sensors 被引量:12
17
作者 Zhengyin HU Shu FANG +3 位作者 Ling WEI Yi WEN Xian ZHANG Min WANG 《Chinese Journal of Library and Information Science》 2015年第3期62-75,共14页
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro... Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively. 展开更多
关键词 Technology evolution Patent analysis SAO Feature d
原文传递
A comparative study of information diffusion in weblogs and microblogs based on social network analysis 被引量:2
18
作者 Yang ZHANG Wanyang LING 《Chinese Journal of Library and Information Science》 2012年第4期51-66,共16页
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods... Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment. 展开更多
关键词 WEBLOG Microblog Information diffusion Social network analysis(SNA) Library and information science(LIS
原文传递
The Quantitative Law of Network Information Growth 被引量:1
19
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier Internet economy central information base
在线阅读 下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部