期刊文献+
共找到392,725篇文章
< 1 2 250 >
每页显示 20 50 100
Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy 被引量:1
1
作者 Xiaoqin Ma Jun Wang +1 位作者 Wenchang Yu Qinli Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2063-2083,共21页
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr... The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data. 展开更多
关键词 Hybrid decision information systems fuzzy conditional information entropy attribute reduction fuzzy relationship rough set theory(RST)
下载PDF
A framework of force of information influence and application for C4KISR system
2
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Research on Information Architecture Design of Short-Form Video Social Platforms Based on Cognitive Psychology
3
作者 Zhengyang Liu Albert Young Choi 《Psychology Research》 2024年第1期1-13,共13页
This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using ... This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using a questionnaire,it explores TikTok users’habits and preferences,highlighting how social media fatigue(SMF)impacts their interaction with the platform.The paper offers strategies to optimize TikTok’s design.It suggests refining the organizational system using principles like chunking,schema theory,and working memory capacity.Additionally,it proposes incorporating shopping features within TikTok’s interface to personalize product suggestions and enable monetization for influencers and content creators.Furthermore,the study underlines the need to consider gender differences and user preferences in improving TikTok’s sharing features,recommending streamlined and customizable sharing options,collaborative sharing,and a system to acknowledge sharing milestones.Aiming to strengthen social connections and increase sharing likelihood,this research provides insights into enhancing information architecture for short-form video platforms,contributing to their growth and success. 展开更多
关键词 information architecture design short-form video social cognitive psychology user experience
下载PDF
Sedimentary architecture of submarine channel-lobe systems under different seafloor topography:Insights from the Rovuma Basin offshore East Africa
4
作者 Mei Chen Sheng-He Wu +6 位作者 Rui-Feng Wang Jia-Jia Zhang Peng-Fei Xie Min Wang Xiao-Feng Wang Ji-Tao Yu Qi-Cong Xiong 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期125-142,共18页
Seafloor topography plays an important role in the evolution of submarine lobes.However,it is still not so clear how the shape of slope affects the three-dimensional(3-D)architecture of submarine lobes.In this study,w... Seafloor topography plays an important role in the evolution of submarine lobes.However,it is still not so clear how the shape of slope affects the three-dimensional(3-D)architecture of submarine lobes.In this study,we analyze the effect of topography factors on different hierarchical lobe architectures that formed during Pliocene to Quaternary in the Rovuma Basin offshore East Africa.We characterize the shape,size and growth pattern of different hierarchical lobe architectures using 3-D seismic data.We find that the relief of the topographic slope determines the location of preferential deposition of lobe complexes and single lobes.When the topography is irregular and presents topographic lows,lobe complexes first infill these depressions.Single lobes are deposited preferentially at positions with higher longitudinal(i.e.across-slope)slope gradients.As the longitudinal slope becomes higher,the aspect ratio of the single lobes increases.Lateral(i.e.along-slope)topography does not seem to have a strong influence on the shape of single lobe,but it seems to affect the overlap of single lobes.When the lateral slope gradient is relatively high,the single lobes tend to have a larger overlap surface.Furthermore,as the average of lateral slope and longitudinal slope gets greater,the width/thickness ratio of the single lobe is smaller,i.e.sediments tend to accumulate vertically.The results demonstrate that the shape of slopes more comprehensively influences the 3-D architecture of lobes in natural deep-sea systems than previously other lobe deposits and analogue experiments,which helps us better understand the development and evolution of the distal parts of turbidite systems. 展开更多
关键词 Submarine fan Seafloor topography Sedimentary architecture Slope system SW Indian ocean
下载PDF
Battlefield target intelligence system architecture modeling and system optimization
5
作者 LI Wei WANG Yue +2 位作者 JIA Lijuan PENG Senran HE Ruixi 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1190-1210,共21页
To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from ... To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic. 展开更多
关键词 battlefield target intelligence system architecture modeling bionic design system optimization simulation verification
下载PDF
The Impact of Health Information Technology on Hospital Performance: A Systematic Integrative Literature Review
6
作者 Alisa Westerhof Cokky Hilhorst Willem Jan Bos 《Health》 2024年第4期257-279,共23页
Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu... Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. . 展开更多
关键词 Health information Technology HIT Functionalities Hospital Performance Indicators
下载PDF
Mutual Information Maximization via Joint Power Allocation in Integrated Sensing and Communications System
7
作者 Jia Zhu Junsheng Mu +1 位作者 Yuanhao Cui Xiaojun Jing 《China Communications》 SCIE CSCD 2024年第2期129-142,共14页
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ... In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance. 展开更多
关键词 COEXISTENCE COMMUNICATIONS multicarrier radar mutual information spectrum sharing
下载PDF
Dynamics of Non-Markovianity, Quantum Correlations and Information Scrambling of Three Qubits Systems Interacting via Rashba Interaction
8
作者 Nasser Metwally Fawzeya Ebrahim 《Journal of Quantum Information Science》 CAS 2024年第2期52-67,共16页
The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate be... The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate between their upper and lower bounds, where the number of oscillations increases as the Rashba interaction strength increases. The exchanging rate of these three quantities depends on the Rashba strength, and whether the entangled state is generated via direct/indirect interaction. Moreover, the coherence parameter can be used as a control parameter to maximize or minimize the three physical quantities. 展开更多
关键词 Markovianity Correlations Rashba Interaction Scrambling information
下载PDF
Review on uncertainty analysis and information fusion diagnosis of aircraft control system
9
作者 ZHOU Keyi LU Ningyun +1 位作者 JIANG Bin MENG Xianfeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1245-1263,共19页
In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and comp... In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and complex structure),the aircraft control system contains several uncertainties,such as imprecision,incompleteness,redundancy and randomness.The information fusion technology is usually used to solve the uncertainty issue,thus improving the sampled data reliability,which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system.In this work,we first analyze the uncertainties in the aircraft control system,and also compare different uncertainty quantitative methods.Since the information fusion can eliminate the effects of the uncertainties,it is widely used in the fault diagnosis.Thus,this paper summarizes the recent work in this aera.Furthermore,we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system.Finally,this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends. 展开更多
关键词 aircraft control system sensor networks information fusion fault diagnosis UNCERTAINTY
下载PDF
Witnessing quantum phase transition in a non-Hermitian trapped ion system via quantum Fisher information
10
作者 LIN Yu-Hao YAN Kai +2 位作者 TAN Jia CAO Zhao-Liang HAO Xiang 《中国光学(中英文)》 EI CAS CSCD 北大核心 2024年第6期1468-1475,共8页
Quantum Fisher information is used to witness the quantum phase transition in a non-Hermitian trapped ion system with balanced gain and loss,from the viewpoint of quantum parameter estimation.We formulate a general no... Quantum Fisher information is used to witness the quantum phase transition in a non-Hermitian trapped ion system with balanced gain and loss,from the viewpoint of quantum parameter estimation.We formulate a general non-unitary dynamic of any two-level non-Hermitian system in the form of state vector.The sudden change in the dynamics of quantum Fisher information occurs at an exceptional point characterizing quantum criticality.The dynamical behaviors of quantum Fisher information are classified into two different ways which depends on whether the system is located in symmetry unbroken or broken phase regimes.In the phase regime where parity and time reversal symmetry are unbroken,the oscillatory evolution of quantum Fisher information is presented,achieving better quantum measurement precision.In the broken phase regime,quantum Fisher information undergoes the monotonically decreasing behavior.The maximum value of quantum estimation precision is obtained at the exceptional point.It is found that the two distinct kinds of behaviors can be verified by quantum entropy and coherence.Utilizing quantum Fisher information to witness phase transition in the non-Hermitian system is emphasized.The results may have potential applications to non-Hermitian quantum information technology. 展开更多
关键词 PT symmetry non-Hermitian system quantum Fisher information quantum criticality ion trap
下载PDF
Decentralized Optimal Control and Stabilization of Interconnected Systems With Asymmetric Information
11
作者 Na Wang Xiao Liang +1 位作者 Hongdan Li Xiao Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期698-707,共10页
The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control p... The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control problem and sufficient and necessary conditions for the stabilization problem of the interconnected systems are given for the first time.The main challenge lies in three aspects:Firstly,the asymmetric information results in coupling between control and estimation and failure of the separation principle.Secondly,two extra unknown variables are generated by asymmetric information(different information filtration)when solving forward-backward stochastic difference equations.Thirdly,the existence of additive noise makes the study of mean-square boundedness an obstacle.The adopted technique is proving and assuming the linear form of controllers and establishing the equivalence between the two systems with and without additive noise.A dual-motor parallel drive system is presented to demonstrate the validity of the proposed algorithm. 展开更多
关键词 Asymmetric information decentralized control forwardbackward stochastic difference equations interconnected system stalibization
下载PDF
Cloud edge integrated security architecture of new cloud manufacturing system
12
作者 ZHAO Longbo LI Bohu YUAN Haitao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1177-1189,共13页
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre... With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations. 展开更多
关键词 new cloud manufacturing system(NCMS) integrated cloud-edge-terminal security system architecture zero trust
下载PDF
Reflections and Improvements on China’s Asset-Backed Securities Information Disclosure System
13
作者 Zhao Mingxin 《Contemporary Social Sciences》 2024年第1期122-136,共15页
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s... Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures. 展开更多
关键词 asset-backed securities asset securitization information disclosure
下载PDF
Current Trends in the Management of Distributed Transactions in Micro-Services Architectures: A Systematic Literature Review
14
作者 Samuel Lungu Mayumbo Nyirenda 《Open Journal of Applied Sciences》 2024年第9期2519-2543,共25页
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema... In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers. 展开更多
关键词 Microservice architecture Distributed Transactions Two-Phase Commit (2PC)
下载PDF
Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems
15
作者 Sang-min Lee Namgi Kim 《Computers, Materials & Continua》 SCIE EI 2024年第2期1897-1914,共18页
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ... Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets. 展开更多
关键词 Deep learning graph neural network graph convolution network graph convolution network model learning method recommender information systems
下载PDF
Evaluating and Addressing Interoperability Constraints in Health Information Systems for Enhanced Healthcare Delivery in Zimbabwe
16
作者 Prosper Tafadzwa Denhere Nelson Matanana +2 位作者 Munyaradzi Zhou Caleb Manjeese Talent Mawere 《Journal of Computer and Communications》 2024年第7期133-154,共22页
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ... Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings. 展开更多
关键词 Health information system INTEROPERABILITY Interoperability Constraints
下载PDF
Applying the Technology Acceptance Model (TAM) in Information Technology System to Evaluate the Adoption of Decision Support System
17
作者 Md Azhad Hossain Anamika Tiwari +3 位作者 Sanchita Saha Ashok Ghimire Md Ahsan Ullah Imran Rabeya Khatoon 《Journal of Computer and Communications》 2024年第8期242-256,共15页
With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-... With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-making process less complex and simpler for problem-solving. In order to make a high-quality business decision, managers need to have a great deal of appropriate information. Nonetheless, this complicates the process of making appropriate decisions. In a situation like that, the possibility of using DSS is quite logical. The aim of this paper is to find out the intended use of DSS for medium and large business organizations in USA by applying the Technology Acceptance Model (TAM). Different models were developed in order to understand and predict the use of information systems, but the information systems community mostly used TAM to ensure this issue. The purpose of the research model is to determine the elements of analysis that contribute to these results. The sample for the research consisted of the target group that was supposed to have completed an online questionnaire about the manager’s use of DSS in medium and large American companies. The information obtained from the questionnaires was analyzed through the SPSS statistical software. The research has indicated that, this is primarily used due to a significant level of Perceived usefulness and For the Perceived ease of use. 展开更多
关键词 information Technology Decision Support system Business Organization in USA Technology Acceptance Model
下载PDF
The Dynamic System Theory of Legal Protection for Personal Information Rights Infringement
18
作者 莫杨燊 NI Weis 《The Journal of Human Rights》 2024年第1期143-172,共30页
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen... The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted. 展开更多
关键词 personal information digital human rights dynamic system theory constitutive elements of torts LIABILITY
原文传递
Application and Challenge of Edge Computing Based on 5G Communication in Information and Communication Systems
19
作者 Zhengwei Li Kan Cao 《Journal of Electronic Research and Application》 2024年第6期39-45,共7页
With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communi... With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communication system field.This paper focuses on using edge computing based on 5G communication in information and communication systems.First,the study analyzes the importance of combining edge computing technology with 5G communication technology,and its advantages,such as high efficiency and low latency in processing large amounts of data.The study then explores multiple application scenarios of edge computing in information and communication systems,such as integrated use in the Internet of Things,intelligent transportation,telemedicine and Industry 4.0.The research method is mainly based on theoretical analysis and experimental verification,combined with the characteristics of the 5G network to optimize the edge computing model and test the performance of edge computing in different scenarios through experimental simulation.The results show that edge computing significantly improves the data processing capacity and response speed of ICS in a 5G environment.However,there are also a series of challenges in practical application,including data security and privacy protection,the complexity of resource management and allocation,and the guarantee of quality of service(QoS).Through the case analysis and problem analysis,the paper puts forward the corresponding solution strategies,such as strengthening the data security protocol,introducing the intelligent resource scheduling system and establishing a multi-dimensional service quality monitoring mechanism.Finally,this study points out that the deep integration of edge computing and 5G communication will continue to promote the innovative development of information and communication systems,which has a far-reaching impact and important practical significance for promoting the transformation and upgrading in the field of information technology. 展开更多
关键词 5G communication Edge computing information communication system Data security Service quality
下载PDF
Three-Way Behavioral Decision Making With Hesitant Fuzzy Information Systems:Survey and Challenges 被引量:2
20
作者 Jianming Zhan Jiajia Wang +1 位作者 Weiping Ding Yiyu Yao 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期330-350,共21页
Three-way decision(T-WD)theory is about thinking,problem solving,and computing in threes.Behavioral decision making(BDM)focuses on effective,cognitive,and social processes employed by humans for choosing the optimal o... Three-way decision(T-WD)theory is about thinking,problem solving,and computing in threes.Behavioral decision making(BDM)focuses on effective,cognitive,and social processes employed by humans for choosing the optimal object,of which prospect theory and regret theory are two widely used tools.The hesitant fuzzy set(HFS)captures a series of uncertainties when it is difficult to specify precise fuzzy membership grades.Guided by the principles of three-way decisions as thinking in threes and integrating these three topics together,this paper reviews and examines advances in three-way behavioral decision making(TW-BDM)with hesitant fuzzy information systems(HFIS)from the perspective of the past,present,and future.First,we provide a brief historical account of the three topics and present basic formulations.Second,we summarize the latest development trends and examine a number of basic issues,such as one-sidedness of reference points and subjective randomness for result values,and then report the results of a comparative analysis of existing methods.Finally,we point out key challenges and future research directions. 展开更多
关键词 Hesitant fuzzy information system(HFIS) prospect theory regret theory three-way decision(T-WD)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部