期刊文献+
共找到667,279篇文章
< 1 2 250 >
每页显示 20 50 100
Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping
1
作者 Muhammad Riaz Masooma Raza Hashmi +3 位作者 Faruk Karaaslan Aslıhan Sezgin Mohammed M.Ali Al Shamiri Mohammed M.Khalaf 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1759-1783,共25页
This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse ... This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse NCS-mapping between two NCS-classes.We develop a robust mathematical modeling with the help of NCS-mapping to analyze the emerging trends in social networking systems(SNSs)for our various generations.We investigate the advantages,disadvantages,and natural aspects of SNSs for five generations.With the changing of the generations,it is analyzed that emerging trends and the benefits of SNSs are increasing day by day.The suggested modeling with NCS-mapping is applicable in solving various decision-making problems. 展开更多
关键词 Neutrosophic crisp soft set operations of NCSSs NCS-mapping inverse NCS-mapping social networking systems DECISION-MAKING
下载PDF
Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China
2
作者 Xiaolin Lu Xiaolei Miao 《International Journal of Mental Health Promotion》 2023年第9期1041-1052,共12页
Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on u... Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on users’emotional status has become stronger than ever.This study examines the association between online social networking and Internet users’emotional status and how offline reality affects this relationship.Methods:The study utilizes cross-sectional online survey data(n=3004)and Baidu Migration big data from the first 3 months of the pandemic.Two dimensions of online networking are measured:social support and information sources.Results:First,individuals’online social support(β=0.16,p<0.05)and information sources(β=0.08,p<0.01)are both positively associated to their emotional status during the epidemic.Second,these positive associations are moderated by social status and provincial pandemic control interventions.With regards to the moderation effect of social status,the constructive impact of information sources on emotional well-being is more pronounced among individuals from vulnerable groups compared to those who are not.With regard to the moderation effect of provincial interventions,online social support has the potential to alleviate the adverse repercussions of high rates of confirmed COVID-19 cases and strict lockdown measures while simultaneously augmenting the favorable effects of recovery.Conclusion:The various dimensions of social networking exert distinct effects on emotional status through diverse mechanisms,all of which must be taken into account when designing and adapting pandemic-control interventions. 展开更多
关键词 COVID-19 emotional status online social networking social support information sources
下载PDF
Malicious Activities Prediction Over Online Social Networking Using Ensemble Model
3
作者 S.Sadhasivam P.Valarmathie K.Dinakaran 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期461-479,共19页
With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the us... With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user.However,the attackers also target this height of OSN utilization,explicitly creating the clones of the user’s account.Various clone detection mechanisms are designed based on social-network activities.For instance,monitoring the occur-rence of clone edges is done to restrict the generation of clone activities.However,this assumption is unsuitable for a real-time environment and works optimally during the simulation process.This research concentrates on modeling and effi-cient clone prediction and avoidance methods to help the social network activists and the victims enhance the clone prediction accuracy.This model does not rely on assumptions.Here,an ensemble Adaptive Random Subspace is used for clas-sifying the clone victims with k-Nearest Neighbour(k-NN)as a base classifier.The weighted clone nodes are analysed using the weighted graph theory concept based on the classified results.When the weighted node’s threshold value is high-er,the trust establishment is terminated,and the clones are ranked and sorted in the higher place for termination.Thus,the victims are alert to the clone propaga-tion over the online social networking end,and the validation is done using the MATLAB 2020a simulation environment.The model shows a better trade-off than existing approaches like Random Forest(RF),Naïve Bayes(NB),and the standard graph model.Various performance metrics like True Positive Rate(TPR),False Alarm Rate(FAR),Recall,Precision,F-measure,and ROC and run time analysis are evaluated to show the significance of the model. 展开更多
关键词 Online social network decision tree weighted measure clone attack predictive measures
下载PDF
Using IQA to Extract Mental Models Concerning Quality Evaluation Factors for Social Networking Services on Smartphones 被引量:1
4
作者 Yu-Lou Lee Li-Chieh Chen 《Social Networking》 2016年第1期16-26,共11页
Although today’s users of mobile phones are afforded increasing control as the popularity and richness of information provided by smartphones increases, how these users make choices and evaluations cannot be explicit... Although today’s users of mobile phones are afforded increasing control as the popularity and richness of information provided by smartphones increases, how these users make choices and evaluations cannot be explicitly expressed. This study uses an acute observation of designers of technology and aesthetics to conduct a mental-model analysis of smartphones with the purpose of explicitly identifying the differences in the schemas of users. This study also modifies the mental model to evaluate the practicability of the mental model. Hence, this study investigates groups of subjects, comparing freshmen and graduating students froma college of design, and adopts a schematized data collection and analysis approach, Interactive Qualitative Analysis (IQA), to ascertain the relationships between factors and establish a complete user mental model. The study results present 11 primary affinity factors: “Pricing,” “Advertisement,” “User Interface,” “Innovation Functions,” “System Maintenance,” “Privacy,” “Utility Functions,” “Personalization,” “Network Performance,” “Customer Service,” and “Multimedia Contents.” The primary driver in evaluating smartphones is found to be “Pricing” for graduating students and “Privacy” for freshmen. The two groups share the same final effect factor, “Multimedia Contents.” This study has successfully identified differences between the different mental models of the two groups, supporting the method that using IQA to perform a quality evaluation of social networking for smartphones is effective. Consequently, platform developers can understand user demand through a mental model and can design good platform functions to effectively improve users’ experience of smartphones. 展开更多
关键词 Interactive Qualitative Approach Smartphones social networking Service (SNS) Mental Model
下载PDF
Writing skills practice:A social networking site
5
作者 《疯狂英语(初中天地)》 2019年第12期52-53,共2页
关键词 Writing skills practice:A social networking site
下载PDF
The Supernetwork Model of Social Networking Services 被引量:4
6
作者 尚艳超 王恒山 王艳灵 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期37-39,共3页
The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the inte... The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the interrelation and interaction of the two dimensions-topic and user, a supernetwork model was established based on the supernetwork research method. Through the actual data, a supernetwork topology diagram and the changing rule of user participation were attained. And it was concluded that the key factor of dealing with emergent online public sentiment should start with affecting the opinions of key figures, whose opinions would further affect the public opinions. 展开更多
关键词 virtual community network SUPERNETWORK HYPERGRAPH emergent online public sentiment
下载PDF
Social Networking Approach for Building Trust in E-commerce 被引量:1
7
作者 Mohammad H. Saraee Azar Shahgholian Parisa Mazrooei 《通讯和计算机(中英文版)》 2010年第6期49-53,共5页
关键词 社会网络 电子商务 信任度 网络方法 网上交易 业务功能 交易方式 集群化
下载PDF
A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP
8
作者 Manoj Rameshchandra Thakur Sugata Sanyal 《Social Networking》 2013年第1期42-45,共4页
The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the intera... The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform [1]. Almost 33% of the crimes on the internet are initiated through a social networking website [1]. Moreover activities like spam messages create unnecessary traffic and might affect the user base of a social networking platform. As a result preventing interactions with malicious intent and spam activities becomes crucial. This work attempts to detect the same in a social networking platform by considering a social network as a weighted graph wherein each node, which represents an individual in the social network, stores activities of other nodes with respect to itself in an optimized format which is referred to as localized data set. The weights associated with the edges in the graph represent the trust relationship between profiles. The weights of the edges along with the localized data set are used to infer whether nodes in the social network are compromised and are performing spam or malicious activities. 展开更多
关键词 SPAM social GRAPH Collaborative Filtering Weighted GRAPH LOCALIZED Data-Set Trust Level
下载PDF
Factors influencing knowledge contribution:An empirical investigation of social networking website users
9
作者 Shengli DENG Ting ZHOU Min ZHANG 《Chinese Journal of Library and Information Science》 2012年第4期37-50,共14页
Purpose:In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence.This research aims to investigate the factors which influ... Purpose:In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence.This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS)users.Design/methodology/approach:The data were obtained from an online survey of 251 social networking sites users.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that the individuals’motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations:Respondents of our online survey are mainly undergraduate and graduate students.A limited sample group cannot represent all of the population.A larger survey involving more SNS users may be useful.Practical implications:The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value:Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users.This study can make a theoretical contribution by examining how the social influence processes and habits affect one’s knowledge contribution behavior using online communities. 展开更多
关键词 social networking sites(SNS) Network user Knowledg
原文传递
Privacy disclosure in Chinese social networking sites:An investigation of Renren users
10
作者 Chenju ZHU Qi HUANG Qinghua ZHU 《Chinese Journal of Library and Information Science》 2014年第2期31-42,共12页
Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college student... Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college students on Renren.com,a popular college-oriented social networking site in China.Users' privacy disclosure behaviors were studied and gender difference was analyzed particularly.Correlation analysis was conducted to examine the relationships among evaluation indicators involving user name,image,page visibility,message board visibility,completeness of education information and provision of personal information.Findings:A large amount of personal information was disclosed via social networking sites in China.Greater percentage of male users than female users disclosed their personal information.Furthermore,significantly positive relationships were found among page visibility,message board visibility,completeness of education information and provision of personal information.Research limitations:Subjects were collected from only one social networking website.Meanwhile,our survey involves subjective judgments of user name reliability,category of profile images and completeness of information.Practical implications:This study will be of benefit for college administrators,teachers and librarians to design courses for college students on how to use social networking sites safely.Originality /value:This empirical study is one of the first studies to reveal the current situation of privacy disclosure in the Chinese social networking sites and will help the research community gain a deeper understanding of privacy disclosure in the Chinese social networking sites. 展开更多
关键词 social networking site(SNS) PERSONAL information P
原文传递
Uses of Social Networking Sites and Satisfactions Achieved by Emirati Youth: A Field Study on a Sample of Sharjah University Students
11
作者 Fawzia Abd Allah Al-Ali 《Journalism and Mass Communication》 2017年第3期113-132,共20页
关键词 阿联酋 大学生 社交 网站 样本 信息技术 研究人员 娱乐休闲
下载PDF
Internet Addiction: Just Facebook Me! The Role of Social Networking Sites in Internet Addiction
12
作者 Carrie L. Carmody 《Computer Technology and Application》 2012年第3期262-267,共6页
关键词 网络成瘾 互联网 社交 脸谱 网站 网络工具 吸引力 用户
下载PDF
WiFace:A Secure GeoSocial Networking System Using Wi-Fi Based Multihop MANET
13
作者 Lan Zhang Xuan Ding +2 位作者 Zhiguo Wan Ming Gu Xiangyang Li 《ZTE Communications》 2011年第1期27-32,共6页
A number of mobile Online Social Networking (OSN) services have appeared in the market in recent times. While most mobile systems benefit greatly from cloud services, centralized servers and communications infrastruct... A number of mobile Online Social Networking (OSN) services have appeared in the market in recent times. While most mobile systems benefit greatly from cloud services, centralized servers and communications infrastructure is not always available. Nor are location-based services offered to mobile devices without GPS. To take advantage of cloud and to address these problems, a Wi-Fi based multihop networking system called MoNet is proposed. On top of MoNET we propose a privacy-aware geosocial networking service called WiFace. Where there is no infrastructure, a distributed content sharing protocol significantly shortens the relay path, reduces conflicts, and improves data availability. Furthermore, a security mechanism is developed to protect privacy. Comprehensive experiments performed on MoNet show that the system is more than sufficient to support social networking and even audio and video applications. 展开更多
关键词 联网系统 多跳 自组网 通信基础设施 社会网络 服务器 移动网络 移动系统
下载PDF
Therapeutic Potential of Social Networking Sites for Caregivers
14
作者 Trey Asbury Nancy L. Myers 《Psychology Research》 2014年第9期749-753,共5页
关键词 网站 社交 治疗 网络平台 社会关系 SNS 市场营销 研究人员
下载PDF
The Rise and Fall of Social Networking Sites: A Comparative Study of Cyworld and Facebook
15
作者 Yongwoon Shim Daeho Kim 《Journalism and Mass Communication》 2014年第3期147-162,共16页
关键词 社交 网站 应用程序编程接口 秋季 网络能力 SNS 全球范围 开放平台
下载PDF
Identifying influential spreaders in social networks: A two-stage quantum-behaved particle swarm optimization with Lévy flight
16
作者 卢鹏丽 揽继茂 +3 位作者 唐建新 张莉 宋仕辉 朱虹羽 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期743-754,共12页
The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy ... The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms. 展开更多
关键词 social networks influence maximization metaheuristic optimization quantum-behaved particle swarm optimization Lévy flight
原文传递
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
17
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating
18
作者 Rongrong Ren Luyang Su +2 位作者 Xinyu Meng Jianfang Wang Meng Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期429-458,共30页
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid... With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted. 展开更多
关键词 Large-scale group decision making social network updating trust relationship group consensus feedback mechanism
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
19
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Discrete Choice Analysis of Temporal Factors on Social Network Growth
20
作者 Kwok-Wai Cheung Yuk Tai Siu 《Intelligent Information Management》 2024年第1期21-34,共14页
Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital w... Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved. 展开更多
关键词 Discrete Choice Models Temporal Factors social Network Link Prediction Network Growth
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部