The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni...The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.展开更多
It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials&...It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.展开更多
The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional ...The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.展开更多
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr...To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.展开更多
With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, ...With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.展开更多
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env...In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.展开更多
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h...Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element meth...The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.展开更多
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo...This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.展开更多
采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行...采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.展开更多
The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid ...The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.展开更多
The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and rele...The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and relevant scientific/applicable references (published papers—PPi,n) to fill up/bridge the gap of the information science between cited Standards and infiltration discipline conceptual vocabulary providing accordingly a dedicated/internal Knowledge Base (KB). This attempt constitutes an innovative approach, since it is based on externalizing domain knowledge in the form of Ontology-Based Knowledge Networks, incorporating standardized methodology in soil engineering. The ontology soil/water concepts (semantics) of the developed network correspond to soil/water physicochemical & biological properties, classified in seven different generations that are distinguished/located in infiltration/percolation process of contaminated water through soil porous media. The interconnections with arcs between corresponding concepts/properties among the consecutive generations are defined by the relationship of dependent and independent variables. All these interconnections are documented according to the below three ways: 1) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting existent explicit functions and equations;2) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting produced implicit functions, according to Rayleigh’s method of indices;3) dependent and independent variables interconnected by using the logical operator “<em>related to</em>” based on a logical dependence among the examined nodes-concepts-variables. The aforementioned approach provides significant advantages to semantic web developers and web users by means of prompt knowledge navigation, tracking, retrieval and usage.展开更多
The increasing interest for wireless communication services and scarcity of radio spectrum resources have created the need for a more flexible and efficient usage of the radio frequency bands. Cognitive Radio (CR) eme...The increasing interest for wireless communication services and scarcity of radio spectrum resources have created the need for a more flexible and efficient usage of the radio frequency bands. Cognitive Radio (CR) emerges as an important trend for a solution to this problem. Spectrum sensing is a crucial function in a CR system. Cooperative spectrum sensing can overcome fading and shadowing effects, and hence increase the reliability of primary user detection. In this paper we consider a system model of a dedicated detect-andforward wireless sensor network (DetF WSN) for cooperative spectrum sensing with k-out-of-n decision fusion in the presence of reporting channels errors. Using this model we consider the design of a spatial reuse media access control (MAC) protocol based on TDMA/OFDMA to resolve conflicts and conserve resources for intra-WSN communication. The influence of the MAC protocol on spectrum sensing performance of the WSN is a key consideration. Two design approaches, using greedy and adaptive simulated annealing (ASA) algorithms, are considered in detail. Performance results assuming a grid network in a Rician fading environment are presented for the two design approaches.展开更多
The AIDS epidemic has affected every aspect of Zambian society and is recognized as the greatest public health challenge of the past 30 years. Nevertheless, education can generate hope in the face of the epidemic usin...The AIDS epidemic has affected every aspect of Zambian society and is recognized as the greatest public health challenge of the past 30 years. Nevertheless, education can generate hope in the face of the epidemic using different methods, including social networks. This article investigates the positive and negative impacts of social networks on the spread of HIV at the University of Zambia (UNZA). The research study included survey-based oral interviews with 280 UNZA students. During the course of the study, we realized that efforts have been and are being put in place at UNZA to use online social networks to spread news about HIV and AIDS and how to stop its transmission. Findings showed that most participants felt that social networks hastened the spread of the virus among social media users. Despite social networks having a few positive effects, the results of our study indicate that the negative effects far outweigh the positive effects.展开更多
文摘The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.
文摘It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.
基金supported by the National High Technology Research and Development (863) Program of China (Grant Nos.2006AA09A209-5)the National Natural Science Foundation of China (Grant Nos. 90510003)the Major Research Project of the Ministry of Education (Grant Nos. 306005)
文摘The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.
文摘To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.
基金This paper is supported by the National Social Science Foundation Project--Research on Network Association and the Stability and Development of Ethnic Minority Area in China's Borderland--Take Yunnan Area as an example (No. 09CZZ011 ), and the Key Project of Educational Department of Yunnan Province--Research on the policemen working mode guided by intelligence (No. 2010Z089).
文摘With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.
基金Supported by the National Natural Science Foundation of China (No. 60972038)the Jiangsu Province Universities Natural Science Research Key Grant Project (07KJA-51006)+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200911)Jiangsu Province Graduate In-novative Research Plan (CX09B_149Z)
文摘In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.
基金Project (Nos. 60502014 and 60432030) supported by the National Natural Science Foundation of China
文摘Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金the National Natural Science Foundation of China (Nos.19872002 and 10272003)Climbing Foundation of Northern Jiaotong University
文摘The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.
文摘This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.
文摘采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.
基金supported by the National Nature Science Foundation of China(No.51278383,No.51238009 and No.51025827)Key Scientific and Technological Innovation Team of Zhejiang Province(No.2011R50020)Key Scientific and Technological Innovation Team of Wenzhou(No.C20120006)
文摘The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.
文摘The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and relevant scientific/applicable references (published papers—PPi,n) to fill up/bridge the gap of the information science between cited Standards and infiltration discipline conceptual vocabulary providing accordingly a dedicated/internal Knowledge Base (KB). This attempt constitutes an innovative approach, since it is based on externalizing domain knowledge in the form of Ontology-Based Knowledge Networks, incorporating standardized methodology in soil engineering. The ontology soil/water concepts (semantics) of the developed network correspond to soil/water physicochemical & biological properties, classified in seven different generations that are distinguished/located in infiltration/percolation process of contaminated water through soil porous media. The interconnections with arcs between corresponding concepts/properties among the consecutive generations are defined by the relationship of dependent and independent variables. All these interconnections are documented according to the below three ways: 1) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting existent explicit functions and equations;2) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting produced implicit functions, according to Rayleigh’s method of indices;3) dependent and independent variables interconnected by using the logical operator “<em>related to</em>” based on a logical dependence among the examined nodes-concepts-variables. The aforementioned approach provides significant advantages to semantic web developers and web users by means of prompt knowledge navigation, tracking, retrieval and usage.
文摘The increasing interest for wireless communication services and scarcity of radio spectrum resources have created the need for a more flexible and efficient usage of the radio frequency bands. Cognitive Radio (CR) emerges as an important trend for a solution to this problem. Spectrum sensing is a crucial function in a CR system. Cooperative spectrum sensing can overcome fading and shadowing effects, and hence increase the reliability of primary user detection. In this paper we consider a system model of a dedicated detect-andforward wireless sensor network (DetF WSN) for cooperative spectrum sensing with k-out-of-n decision fusion in the presence of reporting channels errors. Using this model we consider the design of a spatial reuse media access control (MAC) protocol based on TDMA/OFDMA to resolve conflicts and conserve resources for intra-WSN communication. The influence of the MAC protocol on spectrum sensing performance of the WSN is a key consideration. Two design approaches, using greedy and adaptive simulated annealing (ASA) algorithms, are considered in detail. Performance results assuming a grid network in a Rician fading environment are presented for the two design approaches.
文摘The AIDS epidemic has affected every aspect of Zambian society and is recognized as the greatest public health challenge of the past 30 years. Nevertheless, education can generate hope in the face of the epidemic using different methods, including social networks. This article investigates the positive and negative impacts of social networks on the spread of HIV at the University of Zambia (UNZA). The research study included survey-based oral interviews with 280 UNZA students. During the course of the study, we realized that efforts have been and are being put in place at UNZA to use online social networks to spread news about HIV and AIDS and how to stop its transmission. Findings showed that most participants felt that social networks hastened the spread of the virus among social media users. Despite social networks having a few positive effects, the results of our study indicate that the negative effects far outweigh the positive effects.