期刊文献+
共找到1,051篇文章
< 1 2 53 >
每页显示 20 50 100
Lost,Exile and Return-An Analysis of Sheona’s Identity Reconstruction in“Sisters”from the Perspective of Spatial Theory
1
作者 ZHU Ling 《Journal of Literature and Art Studies》 2024年第8期679-683,共5页
“Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United Stat... “Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United States.Colum McCann is skilled in writing about the spiritual dilemmas and identity search of ethnic minorities living in a foreign land.Employing the space theory and Sheona’s perspective,this paper examines her identity loss in Ireland’s patriarchal system,her migration to the US for identity pursuit,and her subsequent transnational journey between the two nations to reconstruct her identity amidst physical and mental trauma. 展开更多
关键词 Colum McCann SISTERS identity reconstruction spatial theory
下载PDF
Improvement method for the combining rule of Dempster-Shaferevidence theory based on reliability 被引量:8
2
作者 WangPing YangGenqing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期471-474,F003,共5页
An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence acc... An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result. 展开更多
关键词 data fusion RELIABILITY dempster-shafer evidence theory.
下载PDF
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
3
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
下载PDF
A new oil spill detection algorithm based on Dempster-Shafer evidence theory 被引量:1
4
作者 Tianlong ZHANG Jie GUO +3 位作者 Chenqi XU Xi ZHANG Chuanyuan WANG Baoquan LI 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2022年第2期456-469,共14页
Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these ... Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%. 展开更多
关键词 synthetic aperture radar(SAR)data oil spill detection subjective Bayesian Faster-region convolutional neural networks(RCNN) dempster-shafer evidence theory
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
5
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence theory SPKI/SDSI SECURITY
下载PDF
Full Diversity Reception Based on Dempster-Shafer Theory for Network Coding with Multiple-Antennas Relay 被引量:1
6
作者 SUN Yanhua YANG Yi +1 位作者 LI Yonghua ZHANG Yanhua 《China Communications》 SCIE CSCD 2015年第10期76-90,共15页
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S... In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime. 展开更多
关键词 network coding MIMO-DS NC/PNC dempster-shafer evidence theory twoway multiple antennas relay system
下载PDF
An Improved CREAM Model Based on DS Evidence Theory and DEMATEL
7
作者 Zhihui Xu Shuwen Shang +3 位作者 Yuntong Pu Xiaoyan Su Hong Qian Xiaolei Pan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2597-2617,共21页
Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability ... Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable. 展开更多
关键词 Human reliability analysis CREAM uncertainty modeling DEPENDENCE dempster-shafer evidence theory DEMATEL
下载PDF
SAR images classification method based on Dempster-Shafer theory and kernel estimate
8
作者 He Chu Xia Guisong Sun Hong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期210-216,共7页
To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxame... To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxametric Probability Density Function (PDF) estimate method is introduced, to describe the scene of SAR images. And then under the Maxkov context, both the determinate PDF and the kernel estimate method axe adopted respectively, to form a primary classification. Next, the primary classification results are fused using the evidence theory in an unsupervised way to get the scene classification. Finally, a regularization step is used, in which an iterated maximum selecting approach is introduced to control the fragments and modify the errors of the classification. Use of the kernel estimate and evidence theory can describe the complicated scenes with little prior knowledge and eliminate the ambiguities of the primary classification results. Experimental results on real SAR images illustrate a rather impressive performance. 展开更多
关键词 Image classification Synthetic aperture Radar (SAR) dempster-shafer theory Kernel estimate.
下载PDF
THE COMBINATION PREDICTION OF TRANSMEMBRANE REGIONS BASED ON DEMPSTER-SHAFER THEORY OF EVIDENCE
9
作者 DengXinyang XuPeida DengYong 《Journal of Electronics(China)》 2012年第1期142-147,共6页
Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significan... Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool. 展开更多
关键词 Transmembrane regions PREDICTION dempster-shafer theory of evidence PROTEINS
下载PDF
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
10
作者 Chak Fong Cheang Yiqin Wang +1 位作者 Zhiping Cai Gen Xu 《Computers, Materials & Continua》 SCIE EI 2018年第11期297-306,共10页
Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using group... Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm. 展开更多
关键词 Intrusion detection cloud computing dempster-shafer theory evidence fusion
下载PDF
Triggered Asynchronous Cooperative Spectrum Sensing Scheme Based on Dempster-Shafer Theory
11
作者 肖淑艳 李世银 +2 位作者 李宗艳 崔洁 张晓光 《Journal of Donghua University(English Edition)》 EI CAS 2013年第6期477-481,共5页
Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) t... Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) theory was proposed.Sensing asynchronously,each cognitive user calculated the confidence measure functions with double threshold spectrum sensing method.When the useful report was received by the fusion center,a fusion process would be triggered.Then the sensing results were fused together based on D-S theory.The analysis and simulation results show that the proposed scheme can improve the spectrum sensing efficiency and reduce the calculation amount of the fusion center compared with the existing schemes. 展开更多
关键词 asynchronous cooperative spectrum sensing ACSS altered-triggered double threshold dempster-shafer (D-S) theory
下载PDF
A Study of Identity Crisis From the Perspective of Identity Negotiation Theory——Taking Blanche in A Streetcar Named Desire as Example
12
作者 WANG Ruo-Yan JIA Xiao-Yun 《Sino-US English Teaching》 2020年第3期88-92,共5页
A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to... A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to an asylum.This paper attempts to analyze Blanche’s identity crisis from identity negotiation theory in cross-cultural communication,including identity security,identity inclusion,and identity predictability.Thereby it figures out that one who suffers hostile gazes from others in a strange environment,is unable to carry out an intimate and effective communication,which will eventually lead to a sense of loss and despair.This paper puts forward the methods to obtain identity recognition:be honest with others,be sure of oneself,and try one’s best to fit in the new environment,aiming to help people avoid identity crisis in interpersonal communication and establish a positive identity. 展开更多
关键词 A Streetcar Named Desire identity negotiation theory identity crisis identity recognition BLANCHE
下载PDF
Application of the Dempster-Shafer Theory to the Classification of Pixels from Aster Satellite Images and Spectral Indices
13
作者 Jean-Claude Okaingni Sié Ouattara +3 位作者 Adles Francis Kouassi Adama Koné Wognin Joseph Vangah Alain Clement 《Journal of Applied Mathematics and Physics》 2017年第7期1462-1477,共16页
In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of ... In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of geological formations (rocks, breastplates, regolith, etc.). The proposed approach consists in aggregating information by using the DST. From pretreated Aster satellite images (geo-referencing, geometric correction and resampling at 15 m), new channels were produced by determining the spectral indices NDVI, MNDWI and NDBaI. Then, the DST formalism was modeled and generated under the MATLAB software, an image segmented into six classes including three absolute classes (E,V,M) and three classes of confusion ({E,V}, {M,V}, {E,M}). The control on the land, based on geographic coordinates of pixels of different classes on said image, has made it possible to make a concordant interpretation thereof. Our contribution lies in taking into account imperfections (inaccuracies and uncertainties) related to source information by using mass functions based on a simple support model (two focal elements: the discernment framework and the potential set of belonging of the pixel to be classified) with a normal law for the good management of these. 展开更多
关键词 dempster-shafer theory BELIEF FUNCTIONS Source Modeling ASTER Satellite Images Spectral Indices CLASSIFICATION
下载PDF
Application of Dempster-Shafer theory in mineral resource potential mapping
14
作者 CHEN Yong-liang WU Wei LI Xue-bin 《Journal of Geoscientific Research in Northeast Asia》 2005年第1期104-115,共12页
The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are app... The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are applied to measuring map pattem and map pattem combination, respectively; and the environment composed of the only two singleton sets (deposit set and non-deposit set), is used for expressing the entire map area. For a subarea in which the certain map pattern combination exists, the combined basic probability assignment corresponding to the map pattern combination existing in this subarea, expresses the belief of inferring the subarea belonging to the deposit set from the evidence that the corresponding map pattern combination existing in the subarea. Thus, it may be served as a statistical index measuring the relative mineral resource potentials of the subarea. And it may be determined like 1) dividing the map area into a series of small equal-sized grid cells and then select the training sample set composed of the well-known grid cells or the entire grid cells; 2) estimating the basic probability assignments corresponding to each map pattern fromthe training sample set; 3) determining the map pattern combination existing in each cell, and then appling the Dempster's Rule of Combination to integrating the all basic probability assignments corresponding to the map patterns existing in the cell into the combined basic probability assignment. Mineral resource potential mapping with the Dempster-Shafer theory is demonstrated on a case study to select mineral resource targets. The experimental results manifest that the model can be compared with the weights of evidence model in the effectiveness of mineral resource target selection. 展开更多
关键词 ENVIRONMENT dempster-shafer theory basic probability assignment combined basic probability assignment mineral resource mineral target selection
下载PDF
贝斯方法与Dempster-Shafer证据理论的讨论 被引量:21
15
作者 涂嘉文 徐守时 《红外与激光工程》 EI CSCD 北大核心 2001年第2期139-142,共4页
目前 ,实时C3 I系统中主要应用的判决级属性估计方法有贝斯方法和Dempster Shafer证据理论。在获得目标参数数据之后 ,通过对多个参数数据的融合获得所要识别的属性。文中介绍了贝斯方法和Dempster Shafer证据理论的基本原理和融合过程 ... 目前 ,实时C3 I系统中主要应用的判决级属性估计方法有贝斯方法和Dempster Shafer证据理论。在获得目标参数数据之后 ,通过对多个参数数据的融合获得所要识别的属性。文中介绍了贝斯方法和Dempster Shafer证据理论的基本原理和融合过程 ,将两者进行比较并给出一个实例。最后展望了属性估计方法的发展。 展开更多
关键词 属性估计 贝斯方法 D-S证据理论 C^3I系统
下载PDF
Structural damage assessment using improved Dempster-Shafer data fusion algorithm 被引量:3
16
作者 Ding Yijie Yao Xiaofei +1 位作者 Wang Sheliang Zhao Xindong 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2019年第2期395-408,共14页
As an efficient tool in handling uncertain issues, Dempster-Shafer evidence theory has been increasingly used in structural health monitoring and damage detection. In applications, however, Dempster-Shafer evidence th... As an efficient tool in handling uncertain issues, Dempster-Shafer evidence theory has been increasingly used in structural health monitoring and damage detection. In applications, however, Dempster-Shafer evidence theory sometimes leads to counter-intuitive results. In this study, a new fusion algorithm of evidence theory is put forward to address various counter-intuitive problems and manage the reliability difference of the evidence. The proposed algorithm comprises the following aspects:(1) Dempster's combination rule is generalized by introducing the concept of evidence ullage. The new rule allows classical Dempster's rule and can resolve counter-intuitive problems cause by evidence conflict and evidence compatibility;(2) a reliability assessing method based on a priori and posterior knowledge is proposed. Compared with conventional reliability assessment, the proposed method can reflect the actual evidence reliabilities and can efficiently reduce decision risk. Numerical examples confirm the validity and utility of the proposed algorithm. In addition, an experimental investigation on a spatial truss structure is carried out to illustrate the identified ability of the proposed approach. The results indicate that the fusion algorithm has no strict request on the accuracy and consistency of evidence sources and can efficiently enhance diagnostic accuracy. 展开更多
关键词 dempster-shafer EVIDENCE theory DAMAGE detection EVIDENCE confl ICT EVIDENCE reliability SPATIAL TRUSS structure
下载PDF
Factors in International Student Identity Formation: Processes and Challenges
17
作者 Deborah Osborne 《Sino-US English Teaching》 2012年第4期1035-1044,共10页
International students choosing to study abroad face a change in self-identity, which in many cases takes them by surprise and which is affected by a multiplicity of factors. Within the framework of Tajfel's Social I... International students choosing to study abroad face a change in self-identity, which in many cases takes them by surprise and which is affected by a multiplicity of factors. Within the framework of Tajfel's Social Identity Theory, we examine the nature of identity and the many contexts in which it is shaped, mainly in reference to the ESL (English as a Second Language) classroom, but with broader implications for the students' experiences in Western classroom as a whole. We discuss the challenges facing not only students, but also faculty who wish to assist students in the formation of their new identities 展开更多
关键词 student identity Social identity theory role of language in identity educational background andidentity sociopolitical context of ESL (English as a Second Language)
下载PDF
National History Contributes to the Definition of National Identity
18
作者 Tibor Polya 《Psychology Research》 2017年第8期458-462,共5页
关键词 历史事件 民族 界定 定义 参与者
下载PDF
“三融入,一反哺”:植物生理学课程思政探索与实践 被引量:2
19
作者 李忠光 樊冬梅 +3 位作者 龚明 杨双龙 王莎莎 郝大海 《高教学刊》 2024年第2期37-40,共4页
课程思政是立德树人的根本任务,针对植物生理学教学中课程思政元素融入不够,育智重于育人的不足。以文化自信为切入点,采取“三融入,一反哺”策略,即将处于世界领先地位的中国古代传统农业思想、近现代中国植物生理学家的成就、西南联... 课程思政是立德树人的根本任务,针对植物生理学教学中课程思政元素融入不够,育智重于育人的不足。以文化自信为切入点,采取“三融入,一反哺”策略,即将处于世界领先地位的中国古代传统农业思想、近现代中国植物生理学家的成就、西南联合大学(简称“西南联大”)的卓越贡献和科研反哺教学融入植物生理学教学。激发学生的学习热情,提高创新能力;增强文化自信,提升专业认同感。 展开更多
关键词 植物生理学课程 文化自信 创新能力 课程思政 专业认同感
下载PDF
二重情境:数字视听文化中的身份构建与认同疏离 被引量:1
20
作者 张梓轩 李政 《编辑之友》 北大核心 2024年第2期21-28,共8页
数字视听媒介及其文化的发展创造了新的情境,推动用户产生新的媒介实践,但也带来了新的问题和现象,即情境生成逻辑向流媒体用户让渡的转变、情境功能作为交往工具的偏移,以及情境秩序在去公共性过程中权力再结构化的取向。其中隐含着情... 数字视听媒介及其文化的发展创造了新的情境,推动用户产生新的媒介实践,但也带来了新的问题和现象,即情境生成逻辑向流媒体用户让渡的转变、情境功能作为交往工具的偏移,以及情境秩序在去公共性过程中权力再结构化的取向。其中隐含着情境之于用户身份构建的二重性:一方面,流媒体用户依据情境构建身份,身份的构建过程进一步激发了情境的创造;另一方面,这些被构建的身份呈现出去情境化的流动趋向,造成了身份与认同的疏离。对此,文章在厘清数字视听文化新情境特征的基础上,阐释流媒体用户基于身份的情境互动过程,以及身份认同疏离的成因及危机。更进一步,文章尝试将新媒介—新情境—新行为的线性模式延展为更具解释力的用户主导循环模式,并提出通过共识的凝聚、公共性的重拾和共同体的重建,推动数字视听文化的良序发展。 展开更多
关键词 数字视听文化 流媒体 媒介情境论 身份构建 认同疏离
下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部