期刊文献+
共找到18,658篇文章
< 1 2 250 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Research on Information Architecture Design of Short-Form Video Social Platforms Based on Cognitive Psychology
2
作者 Zhengyang Liu Albert Young Choi 《Psychology Research》 2024年第1期1-13,共13页
This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using ... This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using a questionnaire,it explores TikTok users’habits and preferences,highlighting how social media fatigue(SMF)impacts their interaction with the platform.The paper offers strategies to optimize TikTok’s design.It suggests refining the organizational system using principles like chunking,schema theory,and working memory capacity.Additionally,it proposes incorporating shopping features within TikTok’s interface to personalize product suggestions and enable monetization for influencers and content creators.Furthermore,the study underlines the need to consider gender differences and user preferences in improving TikTok’s sharing features,recommending streamlined and customizable sharing options,collaborative sharing,and a system to acknowledge sharing milestones.Aiming to strengthen social connections and increase sharing likelihood,this research provides insights into enhancing information architecture for short-form video platforms,contributing to their growth and success. 展开更多
关键词 information architecture design short-form video social cognitive psychology user experience
下载PDF
Enlightenment and Suggestions on the Construction of Information Platform and Processing Mechanism of Drug Shortages in Developed Countries to China
3
作者 Cui Li Xing Hua 《Asian Journal of Social Pharmacy》 2023年第2期177-186,共10页
Objective To study how to improve and perfect the information platform and processing mechanism of drug shortages in China.Methods By searching the relevant policies from official websites of FDA,European Medicines Ag... Objective To study how to improve and perfect the information platform and processing mechanism of drug shortages in China.Methods By searching the relevant policies from official websites of FDA,European Medicines Agency(EMA),Health Canada(HC)and National Health Commission,the good experience of the United States,the European Union and Canada in the construction of information platform and processing mechanism of drug shortages was summarized for reference in China.Results and Conclusion China has initially established the processing mechanism of drug shortages,but the platform construction should be improved,and the information disclosure of drug shortages varies from province to province.We should improve the information platform of drug shortages,strengthen the disclosure and communication of information,enrich the processing tools and measures after the drug shortages occurs,and strengthen the cooperation with relevant associations and other non-governmental departments. 展开更多
关键词 drug shortage CONSTRUCTION information platform processing mechanism
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
4
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 information Technology (IT) Identity and Access Management (IAM) Saviynt User Identities Access Privileges Authentication Processes Risk Management
下载PDF
High Resolution Radar Real-Time Signal and Information Processing 被引量:7
5
作者 Teng Long Tao Zeng +8 位作者 Cheng Hu Xichao Dong Liang Chen Quanhua Liu Yizhuang Xie Zegang Ding Yang Li Yanhua Wang Yan Wang 《China Communications》 SCIE CSCD 2019年第2期105-133,共29页
Radar is an electronic device that uses radio waves to determine the range, angle, or velocity of objects. Real-time signal and information processor is an important module for real-time positioning, imaging, detectio... Radar is an electronic device that uses radio waves to determine the range, angle, or velocity of objects. Real-time signal and information processor is an important module for real-time positioning, imaging, detection and recognition of targets. With the development of ultra-wideband technology, synthetic aperture technology, signal and information processing technology, the radar coverage, detection accuracy and resolution have been greatly improved, especially in terms of one-dimensional(1D) high-resolution radar detection, tracking, recognition, and two-dimensional(2D) synthetic aperture radar imaging technology. Meanwhile, for the application of radar detection and remote sensing with high resolution and wide swath, the amount of data has been greatly increased. Therefore, the radar is required to have low-latency and real-time processing capability under the constraints of size, weight and power consumption. This paper systematically introduces the new technology of high resolution radar and real-time signal and information processing. The key problems and solutions are discussed, including the detection and tracking of 1D high-resolution radar, the accurate signal modeling and wide-swath imaging for geosynchronous orbit synthetic aperture radar, and real-time signal and information processing architecture and efficient algorithms. Finally, the latest research progress and representative results are presented, and the development trends are prospected. 展开更多
关键词 1D high resolutionradar geosynchronous synthetic aperture radar real-time signal and information processing
下载PDF
Research on the Model of Consumer Health Information Seeking Behavior via Social Media 被引量:3
6
作者 Juan Chen Xiaorong Hou Wenlong Zhao 《International Journal of Communications, Network and System Sciences》 2016年第8期326-337,共13页
Purpose: We aim to create a model of consumer health information seeking behavior via social media, then to have a better understand of it. After that further efforts should be made to provide targeted recommendations... Purpose: We aim to create a model of consumer health information seeking behavior via social media, then to have a better understand of it. After that further efforts should be made to provide targeted recommendations for media managers to promote health communication via social media. Methods: Our custom model was derived from literature review, empirical research was tested by the use of questionnaire investigation, and then the collected data were analyzed by structural equation model tool SmartPLS. Finally, the custom model was modified according to the experimental results of SmartPLS. Results: A total of 239 (66.39%) of the respondents were female and 121 (33.61%) were male. The maximum of two stages of age were 18 - 29 (70.56%), 30 - 39 (13.89%). Wechat (60.28%), QQ Zone (55.22%), Micro-blog (48.89%) were the most commonly used social media to obtain health information. About 44.72% of respondents used social media to obtain health information multiple times a day. The whole numerical values of AVE, cronbach’s alpha, CR and square roots of AVE were above the benchmarks of themselves and showed great reliability and validity. All the 11 hypotheses had obvious statistical significance, the P-value of eight path coefficients exhibited <0.001, one path coefficient exhibited <0.01 and two path coefficients exhibited <0.05. Conclusions: A suitable model of consumer health information seeking behavior via social media was created and some inner relationships were found. Namely, gratification of health information and its platform had a positive effect on attitudes toward health information seeking behavior. Health information literacy and health status were proved to have a significant influence on attitudes toward health information seeking behavior, subject norms and perceived behavioral control respectively. In addition, attitudes toward the health information seeking behavior, subject norms and perceived behavioral control were proved to positively associate with health information seeking behavior intention. 展开更多
关键词 Health information Seeking Behavior Research Model Structural Equation Model social Media
下载PDF
Influence of Information Technology on Social Spatial Behaviors of Urban Residents——Case of Nanjing City in China 被引量:18
7
作者 ZHEN Feng WEI Zongcai 《Chinese Geographical Science》 SCIE CSCD 2008年第4期316-322,共7页
Taking Nanjing as a case, the paper explains the spatial behavior differences existing in the information technology use among different groups of residents and households, by virtue of analyzing the survey data of ur... Taking Nanjing as a case, the paper explains the spatial behavior differences existing in the information technology use among different groups of residents and households, by virtue of analyzing the survey data of urban households in the 11 districts of Nanjing, from the social, spatial, life and other non-technical angles. Also it makes various analyses and evaluation quantitatively and qualitatively on the social and spatial effect of information technology. The results show that the new technology is changing the social spatial behaviors of urban residents. New behavioral spaces of urban family such as telecommuting, email and QQ have begun to emerge. With the help of Internet, the communication scope of families has expanded greatly, and more new forms of publicizing community information have begun to emerge. Telecommunication contact forms have been developing swiftly, and their frequencies of contact have been increasing dramatically. 展开更多
关键词 中国 南京 城市居民 信息技术 社会空间
下载PDF
Information mining and similarity computation for semi-/un-structured sentences from the social data 被引量:1
8
作者 Peiying Zhang Xingzhe Huang Lei Zhang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期518-525,共8页
In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely f... In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely fully analyzed,which is a major obstacle to the intelligent development of the social IoT.In this paper,we propose a sentence similarity analysis model to analyze the similarity in people’s opinions on hot topics in social media and news pages.Most of these data are unstructured or semi-structured sentences,so the accuracy of sentence similarity analysis largely determines the model’s performance.For the purpose of improving accuracy,we propose a novel method of sentence similarity computation to extract the syntactic and semantic information of the semi-structured and unstructured sentences.We mainly consider the subjects,predicates and objects of sentence pairs and use Stanford Parser to classify the dependency relation triples to calculate the syntactic and semantic similarity between two sentences.Finally,we verify the performance of the model with the Microsoft Research Paraphrase Corpus(MRPC),which consists of 4076 pairs of training sentences and 1725 pairs of test sentences,and most of the data came from the news of social data.Extensive simulations demonstrate that our method outperforms other state-of-the-art methods regarding the correlation coefficient and the mean deviation. 展开更多
关键词 Sentence similarity computation information mining and computation social data Internet of things Type of sentence pairs
下载PDF
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles 被引量:1
9
作者 Joe Mutebi Margaret Kareyo +1 位作者 Umezuruike Chinecherem Akampurira Paul 《Journal of Computer and Communications》 2022年第8期41-63,共23页
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ... The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage. 展开更多
关键词 social Media Usage information Security Factors Cyber Security Socio-Technical Usable-Security
下载PDF
Social Network Information Propagation Model Based on Individual Behavior 被引量:9
10
作者 Lejun Zhang Hongjie Li +1 位作者 Chunhui Zhao Xiaoying Lei 《China Communications》 SCIE CSCD 2017年第7期78-92,共15页
In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behav... In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behavior of individuals, and we define and quantify these factors. We consider these factors as characteristic attributes and use a Bayesian classifier to classify individuals. Considering the forwarding delay characteristics of information dissemination, we present a random time generation method that simulates the delay of information dissemination. Given time and other constraints, a user might not look at all the information that his/her friends published. Therefore, this paper proposes an algorithm to predict information visibility, i.e., it estimates the probability that an individual will see the information. Based on the classification of individual behavior and combined with our random time generation and information visibility prediction method, we propose an information dissemination model based on individual behavior. The model can be used to predict the scale and speed of information propagation. We use data sets from Sina Weibo to validate and analyze the prediction methods of the individual behavior and information dissemination model based on individual behavior. A previously proposedinformation dissemination model provides the foundation for a subsequent study on the evolution of the network and social network analysis. Predicting the scale and speed of information dissemination can also be used for public opinion monitoring. 展开更多
关键词 个体行为 网络信息 传播模型 社会 贝叶斯分类器 信息传播 预测信息 随机时间
下载PDF
Social networks, social capital,and the use of information technology in the urban village:A study of community groups in Manchester, England 被引量:2
11
作者 Kate WILLIAMS 《Chinese Journal of Library and Information Science》 2011年第Z1期35-48,共14页
Underresourced or socially excluded communities in Manchester,England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups,at h... Underresourced or socially excluded communities in Manchester,England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups,at how they use IT and who helps them,reveals possible mechanisms towards a more inclusive network society.Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity,class,gender,and generations for skilled help,yet stay close to their strong-tie,bonding-social-capital networks,relying largely on people in their own communities.Based on 25 measures of IT use,the groups fall into three progressively more extensive categories:Downloaders(using computers and the Internet,particularly e-mails),uploaders(maintaining a group web presence),and cyberorganizers(helping others to become uploaders or downloaders).These categories align with each individual group’s purpose. 展开更多
关键词 social network information technology social capit
原文传递
Low-cost cloud computing solution for geo-information processing 被引量:3
12
作者 高培超 刘钊 +1 位作者 谢美慧 田琨 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3217-3224,共8页
Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/rem... Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications. 展开更多
关键词 地理信息系统 计算模式 信息处理 低成本 资源利用率 资源节约型 GIS 研究人员
下载PDF
A comparative study of information diffusion in weblogs and microblogs based on social network analysis 被引量:2
13
作者 Yang ZHANG Wanyang LING 《Chinese Journal of Library and Information Science》 2012年第4期51-66,共16页
Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,... Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach:Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS)as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings:Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect.Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks.Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism.Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations:The sample size needs to be increased so that samples are more representative.Errors may exist during the data collection.Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications:This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media.In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value:We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods.This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment. 展开更多
关键词 WEBLOG Microblog information DIFFUSION social netw
原文传递
Grey systems for intelligent sensors and information processing 被引量:7
14
作者 Chen Chunlin Dong Daoyi +1 位作者 Chen Zonghai Wang Haibo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期659-665,共7页
In a measurement system,new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system.A grey mea... In a measurement system,new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system.A grey measurement system is discussed from the point of view of intelligent sensors and incomplete information processing compared with a numerical and symbolized measurement system.The methods of grey representation and information processing are proposed for data collection and reasoning.As a case study,multi-ultrasonic sensor systems are demonstrated to verify the effectiveness of the proposed methods. 展开更多
关键词 智能传感器 信息处理 测量系统 数字测量
下载PDF
Investigation of system structure and information processing mechanism for cognitive skywave over-the-horizon radar 被引量:8
15
作者 Xia Wu Jianwen Chen Kun Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期797-806,共10页
Based on the cognitive radar concept and the basic connotation of cognitive skywave over-the-horizon radar(SWOTHR), the system structure and information processingmechanism about cognitive SWOTHR are researched. Among... Based on the cognitive radar concept and the basic connotation of cognitive skywave over-the-horizon radar(SWOTHR), the system structure and information processingmechanism about cognitive SWOTHR are researched. Amongthem, the hybrid network system architecture which is thedistributed configuration combining with the centralized cognition and its soft/hardware framework with the sense-detectionintegration are proposed, and the information processing framebased on the lens principle and its information processing flowwith receive-transmit joint adaption are designed, which buildand parse the work law for cognition and its self feedback adjustment with the lens focus model and five stages informationprocessing sequence. After that, the system simulation andthe performance analysis and comparison are provided, whichinitially proves the rationality and advantages of the proposedideas. Finally, four important development ideas of futureSWOTHR toward "high frequency intelligence information processing system" are discussed, which are scene information fusion, dynamic reconfigurable system, hierarchical and modulardesign, and sustainable development. Then the conclusion thatthe cognitive SWOTHR can cause the performance improvement is gotten. 展开更多
关键词 智能信息处理系统 天波超视距雷达 信息处理机制 网络体系结构 地波超视距雷达 模块化设计 性能分析 可重构系统
下载PDF
Governments′ Path Selection of Promoting Rural Information Development——From the Perspective of Social Capital Theory 被引量:3
16
作者 LUO Zhang, WANG Tao Department of trade and admission, Chongqing University, Chongqing 400044, China 《Asian Agricultural Research》 2010年第9期37-39,44,共4页
In introduction of the connoted meaning of rural information and its important role in the development of modern agriculture in our country and the development of urban and rural areas, the paper analyzes the difficul... In introduction of the connoted meaning of rural information and its important role in the development of modern agriculture in our country and the development of urban and rural areas, the paper analyzes the difficulties in information construction: the first is the inadequate attendance of farmers, the low efficiency of information platform use; the second is the backward construction of information sources, which cannot meet the practical needs of information by farmers; the third is the bad situation of information exchanging. From perspective of social capital, it discusses the roles social capital factors playing in the rural information construction, among which, the information relations between farmers and information are the basis; net attendance is the necessary condition of sustainable development of rural information construction; customs afford management resources in rural information construction. Based on the above materials, the paper puts forward that it is the government who must accelerate the construction of rural information: the first is planting technic net in rural credit systems, accelerating the admission and supporting of farmers to information construction; the second is to strengthen the exchanging abilities among information platforms, upgrading the attendance degrees of farmers in rural information construction; the third is to introduce and make use of the management power of rural customs to complete an information management norm. 展开更多
关键词 RURAL information PLATFORMS RURAL information Gove
下载PDF
A Genetic-Algorithm-Based Information Evolution Model for Social Networks
17
作者 Yanan Wang Xiuzhen Chen +1 位作者 Jianhua Li Wanyu Huang 《China Communications》 SCIE CSCD 2016年第12期234-249,共16页
the existing information diffusion models focus on analyzing the spatial distribution of certain pieces of messages in social networks. However, these conventional models ignored another important characteristic of di... the existing information diffusion models focus on analyzing the spatial distribution of certain pieces of messages in social networks. However, these conventional models ignored another important characteristic of diffusion: gradually changing of message contents due to the ‘new' and ‘comment' mechanisms. A novel genetic-algorithm-based information evolution model is proposed to reproduce both the diffusion and development process of information in social networks. This model firstly proposes a five-tuple to represent three types of topics: independent, competitive and mutually exclusive. Furthermore, it adopts mutation operator and forms new crossover and mutation rules to simulate four typical interactions between individuals, which bring the advantage of reproducing the information evolution process in both popularity and content.A series of experiments tested on public datasets demonstrate that: 1) independent and competitive topics of information rarely affect each other while mutually exclusive topics significantly suppress the diffusion processes of each other; 2) lower mutation probability leads to decreasing of final information amount. The experimental results show that our evolution model is more reasonable and feasible in demonstrating the evolution of information in social networks. 展开更多
关键词 social network information evolution genetic algorithm MUTATION five-tuple PROLOG
下载PDF
Relationships of Corporate Social Responsibility (CSR) With Accounting Information Systems A Study 被引量:1
18
作者 Semra Aksoylu 《Journal of Modern Accounting and Auditing》 2013年第12期1678-1686,共9页
关键词 企业社会责任 会计信息系统 CSR 社会政策 环境政策 环保政策 经营方针 土耳其
下载PDF
Guest Editorial Special Section on Quantum Information Processing
19
作者 Hai-Zhi Song 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期193-194,共2页
Quantum information processing is an active cross-disciplinary field drawing upon theoretical and experimental physics, computer science, engineering, mathematics, and material science. Its scope ranges from fundament... Quantum information processing is an active cross-disciplinary field drawing upon theoretical and experimental physics, computer science, engineering, mathematics, and material science. Its scope ranges from fundamental issues in quantum physics to prospective commercial exploitation by the computing and communications industries. 展开更多
关键词 GUEST EDITORIAL SPECIAL SECTION QUANTUM information processing
下载PDF
Set pair three-way overlapping community discovery algorithm for weighted social internet of things 被引量:1
20
作者 Chunying Zhang Jing Ren +3 位作者 Lu Liu Shouyue Liu Xiaoqi Li Liya Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期3-13,共11页
There are many problems in Social Internet of Things(IoTs),such as complex topology information,different degree of association between nodes and overlapping communities.The idea of set pair information grain computin... There are many problems in Social Internet of Things(IoTs),such as complex topology information,different degree of association between nodes and overlapping communities.The idea of set pair information grain computing and clustering is introduced to solve the above problems so as to accurately describe the similarity between nodes and fully explore the multi-community structure.A Set Pair Three-Way Overlapping Community Discovery Algorithm for Weighted Social Internet of Things(WSIoT-SPTOCD)is proposed.In the local network structure,which fully considers the topological information between nodes,the set pair connection degree is used to analyze the identity,difference and reverse of neighbor nodes.The similarity degree of different neighbor nodes is defined from network edge weight and node degree,and the similarity measurement method of set pair between nodes based on the local information structure is proposed.According to the number of nodes'neighbors and the connection degree of adjacent edges,the clustering intensity of nodes is defined,and an improved algorithm for initial value selection of k-means is proposed.The nodes are allocated according to the set pair similarity between nodes and different communities.Three-way community structures composed of a positive domain,boundary domain and negative domain are generated iteratively.Next,the overlapping node set is generated according to the calculation results of community node membership.Finally,experiments are carried out on artificial networks and real networks.The results show that WSIoT-SPTOCD performs well in terms of standardized mutual information,overlapping community modularity and F1. 展开更多
关键词 social internet of things Set pair analysis K-MEANS Local information structure Overlapping community
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部