期刊文献+
共找到688,328篇文章
< 1 2 250 >
每页显示 20 50 100
西藏交通警察道路执法工作的风险与防范
1
作者 尼桑拉 《时代汽车》 2024年第12期184-186,共3页
西藏自治区自然、地理与气候环境复杂且特殊,道路交通环境相对恶劣,这导致当地交通警察道路执法工作面临诸多风险,包括警员人身安全和执法效能等风险。对此,文章对西藏交通警察道路执法工作风险进行了调查分析,从地区环境、警员安全意... 西藏自治区自然、地理与气候环境复杂且特殊,道路交通环境相对恶劣,这导致当地交通警察道路执法工作面临诸多风险,包括警员人身安全和执法效能等风险。对此,文章对西藏交通警察道路执法工作风险进行了调查分析,从地区环境、警员安全意识与技能、执法装备、社会宣传和教育等角度探讨了相关风险的成因,针对性相关风险成因,提出从优化警力配置与道路信息推送、加强警员培训、完善警务装备、加强法治化宣传教育等工作来消除相关风险,以期保障警员安全并改善西藏交通环境。 展开更多
关键词 西 harsh which leads to the local trac POLICE road LAW ENFORCEMENT work to face a lot of RISKS including the personal SAFETY of the POLICE ocers and LAW ENFORCEMENT eectiveness and other risks. In this regard this paper investigates and analyzes the RISKS of road LAW ENFORCEMENT work of the Xi Zang trac POLICE discusses the causes of the RISKS from the perspectives of regional environment POLICE SAFETY awareness and skills LAW ENFORCEMENT equipment social publicity and education and proposes to eliminate the RISKS by optimizing the allocation of POLICE force and road information delivery strengthening POLICE training improving POLICE equipment and strengthening the rule of LAW publicity and education etc. so as to guarantee the SAFETY of POLICE ocers and improve the eectiveness of LAW ENFORCEMENT so as to ensure the SAFETY of POLICE ocers and improve the trac environment in Xi Zang.
下载PDF
Habits on Social Networks at Workplace: A Survey of Motivations and Behaviour
2
作者 Thomas Kakou Kouassi Douatia Koné +3 位作者 Aliou Bamba Aladji Kamagaté Olivier Asseu Yvon Kermarrec 《Open Journal of Applied Sciences》 2024年第8期2154-2168,共15页
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo... This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace. 展开更多
关键词 social network social Media Applications Poissons Law STATISTICS Digital Supports Workers Productivity
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
3
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Predicting Users’ Latent Suicidal Risk in Social Media: An Ensemble Model Based on Social Network Relationships
4
作者 Xiuyang Meng Chunling Wang +3 位作者 Jingran Yang Mairui Li Yue Zhang Luo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4259-4281,共23页
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ... Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences. 展开更多
关键词 Suicide risk prediction social media social network relationships Weibo Tree Hole deep learning
下载PDF
Discrete Choice Analysis of Temporal Factors on Social Network Growth
5
作者 Kwok-Wai Cheung Yuk Tai Siu 《Intelligent Information Management》 2024年第1期21-34,共14页
Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital w... Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved. 展开更多
关键词 Discrete Choice Models Temporal Factors social network Link Prediction network Growth
下载PDF
Identifying influential spreaders in social networks: A two-stage quantum-behaved particle swarm optimization with Lévy flight
6
作者 卢鹏丽 揽继茂 +3 位作者 唐建新 张莉 宋仕辉 朱虹羽 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期743-754,共12页
The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy ... The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms. 展开更多
关键词 social networks influence maximization metaheuristic optimization quantum-behaved particle swarm optimization Lévy flight
下载PDF
A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating
7
作者 Rongrong Ren Luyang Su +2 位作者 Xinyu Meng Jianfang Wang Meng Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期429-458,共30页
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid... With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted. 展开更多
关键词 Large-scale group decision making social network updating trust relationship group consensus feedback mechanism
下载PDF
Profile Matching in Electronic Social Networks Using a Matching Measure for Fuzzy Numerical Attributes and Fields of Interests
8
作者 Andreas de Vries 《Applied Mathematics》 2014年第16期2619-2629,共11页
The problem of profile matching in electronic social networks asks to find those offering profiles of actors in the network fitting best to a given search profile. In this article this problem is mathematically formul... The problem of profile matching in electronic social networks asks to find those offering profiles of actors in the network fitting best to a given search profile. In this article this problem is mathematically formulated as an optimization problem. For this purpose the underlying search space and the objective function are defined precisely. In particular, data structures of search and offering profiles are proposed, as well as a function measuring the matching of the attributes of a search profile with the corresponding attributes of an offering profile. This objective function, given in Equation (29), is composed of the partial matching degrees for numerical attributes, discrete non-numerical attributes, and fields of interests, respectively. For the matching degree of numerical profile attributes a fuzzy value approach is presented, see Equation (22), whereas for the matching degree of fields of interest a new measure function is introduced in Equation (26). The resulting algorithm is illustrated by a concrete example. It not only is applicable to electronic social networks but also could be adapted for resource discovery in grid computation or in matchmaking energy demand and supply in electrical power systems and smart grids, especially to efficiently integrate renewable energy resources. 展开更多
关键词 Profile MATCHING ALGORITHM MATCHMAKING ALGORITHM MATCHING Degree ELECTRONIC social network MATCHING FIELDS of Interest Grid Computing Renewable ENERGY ENERGY Transition
下载PDF
Multi-Cultural Dynamics on Social Networks under External Random Perturbations
9
作者 J. Chandra G. S. Ladde 《International Journal of Communications, Network and System Sciences》 2014年第6期181-195,共15页
This work deals with the development of multi-cultural network-centric dynamic models under the influence of personal intra- and inter-members, as well as community. Each individual member of a society is influenced b... This work deals with the development of multi-cultural network-centric dynamic models under the influence of personal intra- and inter-members, as well as community. Each individual member of a society is influenced by her/his interactions with fellow members of the family, neighborhood, region and the universe. The behavior of such complex and highly interacting social networks is characterized by stochastic interconnected dynamical systems. The primary goal is on laying down an investigation of both qualitative and quantitative properties of this network dynamical system. In particular, we would like to determine the regions of conflicts and coexietence as well as to establish the cohesion and stability of emerging states. This is achieved by employing the method of system of differential inequalities and comparison theorems in the context of the energy function. The developed energy function method provides estimates for regions of conflict and cooperation. Moreover, the method also provides sufficient conditions for the community cohesion and stability in a systematic way. 展开更多
关键词 AFFINITY Matrix CULTURAL State Gaussian PROCESS Mono-Cultural network Multi-Cultural network MOVING Isotropic CENTER Energy Function Method Stochastic PROCESS MOVING CENTER
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
10
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
CRB:A new rumor blocking algorithm in online social networks based on competitive spreading model and influence maximization
11
作者 董晨 徐桂琼 孟蕾 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期588-604,共17页
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea... The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time. 展开更多
关键词 online social networks rumor blocking competitive linear threshold model influence maximization
下载PDF
Geo-Social Profile Matching Algorithm for Dynamic Interests in Ad-Hoc Social Network 被引量:1
12
作者 Nagender Aneja Sapna Gambhir 《Social Networking》 2014年第5期240-247,共8页
Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementat... Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementation, user experience, and different profile matching algorithms to provide better user experience in ad-hoc social network. We emphasize that strength of an ad-hoc social network depends on a good profile-matching algorithm that provides meaningful friend suggestions in proximity. Keeping browsing history is a good way to determine user’s interest, however, interests change with location. This paper presents a novel profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users. Building user profile based on GPS location of a user provides benefits to ASN users as this profile represents user’s dynamic interests that keep changing with location e.g. office, home, or some other location. Proposed profile-matching algorithm maintains multiple local profiles based on location of mobile device. 展开更多
关键词 AD-HOC social networks User PROFILE DYNAMIC INTERESTS Friends PROFILE Matching Search and BROWSING History
下载PDF
Impact of different interaction behavior on epidemic spreading in time-dependent social networks
13
作者 黄帅 陈杰 +2 位作者 李梦玉 徐元昊 胡茂彬 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期190-195,共6页
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi... We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy. 展开更多
关键词 epidemic transmission complex network time-dependent networks social interaction
下载PDF
Sentiment Analysis on the Social Networks Using Stream Algorithms
14
作者 Nathan Aston Timothy Munson +3 位作者 Jacob Liddle Garrett Hartshaw Dane Livingston Wei Hu 《Journal of Data Analysis and Information Processing》 2014年第2期60-66,共7页
The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for id... The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for identifying sentiment in OSNs such as communication pattern mining and classification based on emoticon and parts of speech, the majority of them utilize a suboptimal batch mode learning approach when analyzing a large amount of real time data. As an alternative we present a stream algorithm using Modified Balanced Winnow for sentiment analysis on OSNs. Tested on three real-world network datasets, the performance of our sentiment predictions is close to that of batch learning with the ability to detect important features dynamically for sentiment analysis in data streams. These top features reveal key words important to the analysis of sentiment. 展开更多
关键词 Modified BALANCED WINNOW SENTIMENT Analysis TWITTER Online social networks Feature Selection Data STREAMS
下载PDF
A Parallel Approach for Sentiment Analysis on Social Networks Using Spark 被引量:1
15
作者 M.Mohamed Iqbal K.Latha 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1831-1842,共12页
The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for... The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for obtaining public opinion.Single node computational methods are inefficient for sentiment analysis on such large datasets.Supercomputers or parallel or distributed proces-sing are two options for dealing with such large amounts of data.Most parallel programming frameworks,such as MPI(Message Processing Interface),are dif-ficult to use and scale in environments where supercomputers are expensive.Using the Apache Spark Parallel Model,this proposed work presents a scalable system for sentiment analysis on Twitter.A Spark-based Naive Bayes training technique is suggested for this purpose;unlike prior research,this algorithm does not need any disk access.Millions of tweets have been classified using the trained model.Experiments with various-sized clusters reveal that the suggested strategy is extremely scalable and cost-effective for larger data sets.It is nearly 12 times quicker than the Map Reduce-based model and nearly 21 times faster than the Naive Bayes Classifier in Apache Mahout.To evaluate the framework’s scalabil-ity,we gathered a large training corpus from Twitter.The accuracy of the classi-fier trained with this new dataset was more than 80%. 展开更多
关键词 social networks sentiment analysis big data SPARK tweets classication
下载PDF
Empirical Study on Growth of Evil Forces in Land Requisition and Relocation in City G of Hubei Province Based on Social Network Analysis
16
作者 Hongxia ZHANG Xia ZHOU Yanan LI 《Asian Agricultural Research》 2015年第11期62-67,71,共7页
Using social network analysis method,this paper made an empirical study on growth of evil forces in land requisition and relocation in City G of Hubei Province. It obtained following results:(i) lawless developers and... Using social network analysis method,this paper made an empirical study on growth of evil forces in land requisition and relocation in City G of Hubei Province. It obtained following results:(i) lawless developers and inefficient public security organs form interested parties of evil forces. Besides,the inward closeness centrality of evil forces is high,manifesting that evil forces independently possess decentralized power of network and have unscrupulous behavior in land requisition and relocation to a certain extent.(ii) Activities of evil forces have complicated spatial correlation and their geographical distribution is uneven,taking on irregular characteristics. In the field of land requisition and relocation,some evil forces are expandi Xng and spreading,while other forces are relatively weak. In conclusion,growth of evil forces comes from premeditation and collaboration of lawless developers,lack of functions and weak attack of public security organs; growth of evil forces has periodic changes,when in power,they will take opportunity to expand,while losing power,they will hide or even disappear. 展开更多
关键词 LAND CONSOLIDATION LAND REQUISITION and RELOCATION EVIL forces Empirical study social network analysis
下载PDF
Social Networks, Politics and Public Views: An Analysis of the Term “Macedonia” in Twitter
17
作者 Dimitrios Kydros Vasiliki Vrana Evangelos Kehris 《Social Networking》 2019年第1期1-15,共15页
In this paper we deal with Twitter and the presence of the keyword “Macedonia” in tweets over a period of time. We searched for the same term in three different languages, i.e. “Μακεδονíα”, “Macedoni... In this paper we deal with Twitter and the presence of the keyword “Macedonia” in tweets over a period of time. We searched for the same term in three different languages, i.e. “Μακεδονíα”, “Macedonia” and “Македонска - Македониjа”, since we are primarily interested in views from Greece and FYROM without excluding views from other regions. We use methods from Social Network Analysis (SNA) in order to create networks of users, calculate some main network metrics, measure user importance and investigate the presence of possible fragmentations—communities among them. We furthermore proceed to a form of content analysis, using pairs of words within tweets, in order to obtain main ideas, trends and public views that circulated over the network. 展开更多
关键词 social network ANALYSIS TWITTER MACEDONIA Μακεδονíα Македонска - Македониjа Content ANALYSIS Public VIEWS
下载PDF
Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping
18
作者 Muhammad Riaz Masooma Raza Hashmi +3 位作者 Faruk Karaaslan Aslıhan Sezgin Mohammed M.Ali Al Shamiri Mohammed M.Khalaf 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1759-1783,共25页
This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse ... This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse NCS-mapping between two NCS-classes.We develop a robust mathematical modeling with the help of NCS-mapping to analyze the emerging trends in social networking systems(SNSs)for our various generations.We investigate the advantages,disadvantages,and natural aspects of SNSs for five generations.With the changing of the generations,it is analyzed that emerging trends and the benefits of SNSs are increasing day by day.The suggested modeling with NCS-mapping is applicable in solving various decision-making problems. 展开更多
关键词 Neutrosophic crisp soft set operations of NCSSs NCS-mapping inverse NCS-mapping social networking systems DECISION-MAKING
下载PDF
The Role of Social Networks as a Public Sphere During the Rise of Chinese Cybernationalism
19
作者 Deng Lian Valle de Frutos Sonia 《Journalism and Mass Communication》 2019年第4期190-202,共13页
The nationalism is gradually expanding among the Chinese internauts,but few investigations about the Chinese nationalism’s dissemination over social networks have been done.This study focuses on the structure of soci... The nationalism is gradually expanding among the Chinese internauts,but few investigations about the Chinese nationalism’s dissemination over social networks have been done.This study focuses on the structure of social networks used by the Chinese cybernationalists,and their contribution as a public sphere to the Chinese nationalism will be examined,which leads to the understanding of the informational attribute of the Chinese cybernationalism.Also,the communication model showed by the social networks will be defined,so the role of the opinion leaders during the rise of Chinese nationalism can be evaluated. 展开更多
关键词 social networks PUBLIC sphere China NATIONALISM cybernationalism international communication CYBERCULTURE digital PUBLIC OPINION
下载PDF
Venture Capital Syndication under Social Network Theory:Literature Review and Prospect
20
作者 Junru Zhao Shasha Yang Zhengbin Wang 《Proceedings of Business and Economic Studies》 2024年第4期10-15,共6页
As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance... As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance investment returns,venture capital syndication holds significant research value in the field of venture capital.This paper reviews the literature,summarizing the motivations behind the formation of joint investment networks,the conceptual characteristics of the three core theories of social network theory,and the empirical research on venture capital syndication within the framework of social network theory.It also highlights the existing research results,identifies gaps,and anticipates future research directions. 展开更多
关键词 social network theory Venture capital syndication investment
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部