期刊文献+
共找到351篇文章
< 1 2 18 >
每页显示 20 50 100
Reputation-Based Cooperative Spectrum Sensing Algorithm for Mobile Cognitive Radio Networks 被引量:1
1
作者 Xinyu Wang Min Jia +2 位作者 Qing Guo Xuemai Gu Guangyu Zhang 《China Communications》 SCIE CSCD 2017年第1期124-134,共11页
Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into considerati... Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into consideration. If applied directly in mobile CRNs, those conventional algorithms would overly punish reliable users at extremely bad or good locations, leading to an obvious decrease in detection performance. To overcome this problem, we divide the whole area of interest into several cells to consider the location diversity of the network. Each user's reputation score is updated after each sensing slot and is used for identifying whether it is malicious or not. If so, it would be removed away. And then our algorithm assigns users in cells with better channel conditions, i.e. larger signal-to-noise ratios(SNRs), with larger weighting coefficients, without requiring the prior information of SNR. Detailed analysis about the validity of our algorithm is presented. The simulation results show that in a CRN with 60 mobile secondary users, among which, 18 are malicious, our solution has an improvement of detection probability by 0.97-d B and 3.57-d B when false alarm probability is 0.1, compared with a conventional trust-value-based algorithm and a trusted collaborative spectrum sensing for mobile CRNs, respectively. 展开更多
关键词 cognitive radio cooperative spectrum sensing mobility malicious users reputation score
下载PDF
Reputation-based joint optimization of user satisfaction and resource utilization in a computing force network
2
作者 Yuexia FU Jing WANG +2 位作者 Lu LU Qinqin TANG Sheng ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第5期685-700,共16页
Under the development of computing and network convergence,considering the computing and network resources of multiple providers as a whole in a computing force network(CFN)has gradually become a new trend.However,sin... Under the development of computing and network convergence,considering the computing and network resources of multiple providers as a whole in a computing force network(CFN)has gradually become a new trend.However,since each computing and network resource provider(CNRP)considers only its own interest and competes with other CNRPs,introducing multiple CNRPs will result in a lack of trust and difficulty in unified scheduling.In addition,concurrent users have different requirements,so there is an urgent need to study how to optimally match users and CNRPs on a many-to-many basis,to improve user satisfaction and ensure the utilization of limited resources.In this paper,we adopt a reputation model based on the beta distribution function to measure the credibility of CNRPs and propose a performance-based reputation update model.Then,we formalize the problem into a constrained multi-objective optimization problem and find feasible solutions using a modified fast and elitist non-dominated sorting genetic algorithm(NSGA-II).We conduct extensive simulations to evaluate the proposed algorithm.Simulation results demonstrate that the proposed model and the problem formulation are valid,and the NSGA-II is effective and can find the Pareto set of CFN,which increases user satisfaction and resource utilization.Moreover,a set of solutions provided by the Pareto set give us more choices of the many-to-many matching of users and CNRPs according to the actual situation. 展开更多
关键词 Computing force network Resource scheduling Performance-based reputation user satisfaction
原文传递
基于S-O-R理论的新型公共阅读空间用户流失行为分析——来自大众点评网用户评论 被引量:6
3
作者 戴艳清 高亮 孙英姿 《图书馆理论与实践》 2023年第4期55-62,71,共9页
文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为... 文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为模型。在此基础上,提出提高新型公共阅读空间服务效能的相关建议,为提高新型阅读空间的服务质量,降低用户流失率提供参考。 展开更多
关键词 新型公共阅读空间 用户流失行为 公共文化服务 s-O-R理论
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
4
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 user’s needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
5
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE user’s GUIDE
下载PDF
Frequent Itemset Mining of User’s Multi-Attribute under Local Differential Privacy 被引量:2
6
作者 Haijiang Liu Lianwei Cui +1 位作者 Xuebin Ma Celimuge Wu 《Computers, Materials & Continua》 SCIE EI 2020年第10期369-385,共17页
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ... Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets. 展开更多
关键词 Local differential privacy frequent itemset mining user’s multi-attribute
下载PDF
User’s Relevance of PIR System Based on Cloud Models 被引量:1
7
作者 康海燕 樊孝忠 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期181-185,共5页
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f... A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better. 展开更多
关键词 personalized information retrieval (PIR) cloud model users relevance fuzzy evaluation
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
8
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization users behaviour traffic module sDN
下载PDF
Method of Consistency Judgment for App Software’s User Comments
9
作者 Meng Ran Ying Jiang +1 位作者 Qixin Xiang Jiaman Ding 《国际计算机前沿大会会议论文集》 2016年第1期121-123,共3页
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ... With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective. 展开更多
关键词 social computing APP software The CONsIsTENCY of user COMMENT user’s COMMENT information user’s mark Featuresentiment-word-pairs Network sentiment WORD
下载PDF
Changes in the Structure of China's Net Users
10
《China's Foreign Trade》 2000年第5期44-44,共1页
关键词 Changes in the structure of China’s Net users
下载PDF
基于B/S架构的用户用能信息采集系统研究
11
作者 张涛 王乐乐 +2 位作者 徐文涛 王国彬 陈银江 《自动化技术与应用》 2023年第5期146-149,共4页
为了提高用户用能信息采集能力,提出基于B/S架构的用户用能信息采集系统设计方法。通过物联网和RFID标签识别技术,构建用户用能信息采集系统的射频标签信息采集模块,采用B/S架构和总线传输协议实现用户用能信息采集的信息化传输和调度,... 为了提高用户用能信息采集能力,提出基于B/S架构的用户用能信息采集系统设计方法。通过物联网和RFID标签识别技术,构建用户用能信息采集系统的射频标签信息采集模块,采用B/S架构和总线传输协议实现用户用能信息采集的信息化传输和调度,实现用户用能信息采集。测试结果表明方法进行用户用能信息采集的智能性和准确性较好。 展开更多
关键词 B/s架构 用户用能信息 采集系统 总线传输控制协议 RFID标签识别
下载PDF
知识分享社区中的社交互动对用户隐私信息披露的影响
12
作者 王君 刘红德 +1 位作者 王亚妮 吴昊 《系统管理学报》 CSCD 北大核心 2024年第5期1284-1302,共19页
研究围绕用户隐私披露意愿和披露水平,探索了知识分享社区中的社交互动行为对用户隐私信息披露的影响机制。基于刺激-有机体-反应(Stimulus-Organism-Response,S-O-R)理论研究用户社交互动中的外界刺激如何影响隐私信息披露者的内在状态... 研究围绕用户隐私披露意愿和披露水平,探索了知识分享社区中的社交互动行为对用户隐私信息披露的影响机制。基于刺激-有机体-反应(Stimulus-Organism-Response,S-O-R)理论研究用户社交互动中的外界刺激如何影响隐私信息披露者的内在状态,进而影响其隐私信息披露意愿。采用问卷调查收集数据,验证提出模型及假设,并借助知识分享社区中的用户行为数据探究用户间的社交互动对其信息披露水平的影响。结果表明,社交互动对用户的自我效能、用户间信任和社会认同均产生显著促进作用,进而影响用户的隐私信息披露意愿。社交互动在一定程度上影响用户的信息披露水平,且账户信息认证起到一定的正向调节作用。研究结论能够为促进知识分享社区中用户信息的合理披露行为提供建议。 展开更多
关键词 社交互动 用户隐私信息披露 知识分享社区 账户信息认证 s-O-R模型
下载PDF
拟人化线索和直播氛围双视角下数字人直播用户参与行为影响机制研究
13
作者 郭海玲 卫金金 +1 位作者 崔坤 包若琪 《财经论丛》 北大核心 2024年第8期89-99,共11页
数字人技术可为直播行业注入新活力,如何提升数字人直播质量,增强用户参与度是亟待解决的管理问题。本研究基于S-O-R理论构建数字人直播用户参与行为影响机制模型,通过结构方程模型(SEM)和模糊集定性比较分析(fsQCA)识别用户参与行为关... 数字人技术可为直播行业注入新活力,如何提升数字人直播质量,增强用户参与度是亟待解决的管理问题。本研究基于S-O-R理论构建数字人直播用户参与行为影响机制模型,通过结构方程模型(SEM)和模糊集定性比较分析(fsQCA)识别用户参与行为关键影响因素及组态路径。研究发现:(1)交互型线索和解说氛围正向影响信任;印象型线索、移情性线索、娱乐氛围和解说氛围正向影响社会临场感;社会临场感正向影响信任,信任和社会临场感正向影响用户参与行为;所有影响因素均不能构成用户参与行为的必要条件,需多种因素协同发挥作用。(2)高娱乐氛围、高信任和高社会临场感均存在于围观式、表达式及购买式参与行为的所有组态中,对用户参与行为具有促进作用。在此基础上,围观式参与行为产生路径为情感内容驱动路径及形象内容驱动路径;表达式参与行为产生路径为情感驱动路径;购买式参与行为产生路径为情感形象驱动路径和情感社交驱动路径。 展开更多
关键词 数字人直播 s-O-R理论 用户参与行为 拟人化线索 直播氛围
下载PDF
B/S模式下OA系统的权限控制设计与实现 被引量:25
14
作者 宋维平 曾一 +2 位作者 涂争光 高旻 李颖 《计算机工程与应用》 CSCD 北大核心 2004年第35期199-201,210,共4页
通过分析现有权限控制模型,结合B/S模式的特征,论文提出了改进的权限控制模型,与在OA系统中的具体实现方法。
关键词 用户管理 权限控制模型 B/s模式 OA系统
下载PDF
一种基于树型结构的B/S系统权限控制方法 被引量:17
15
作者 李南妮 张璟 李军怀 《计算机应用研究》 CSCD 北大核心 2005年第10期128-130,共3页
在应用RBAC技术的基础上研究了基于树型结构下的B/S系统中权限控制方法,通过系统资源树的生成,提出了用户权限数据报的概念及其设计思想,并在实践中加以应用。实现了系统全局资源的安全访问控制,增加了系统的灵活性。
关键词 基于角色的访问控制 B/s 系统资源树 用户权限
下载PDF
基于B/S架构的多用户在线程序评判系统设计与实现 被引量:8
16
作者 乔少杰 杨燕 +2 位作者 葛永明 张翠芳 戴齐 《计算机工程与科学》 CSCD 北大核心 2011年第S1期58-61,共4页
针对现有在线程序评判系统存在的判题效率和安全性问题,本文在分析多用户在线评判系统的功能需求基础上,提出了一种基于B/S架构采用Struts+Spring+Hibernate(SSH)组合框架的多用户在线程序评判系统,介绍了系统的程序评判原理及采用的安... 针对现有在线程序评判系统存在的判题效率和安全性问题,本文在分析多用户在线评判系统的功能需求基础上,提出了一种基于B/S架构采用Struts+Spring+Hibernate(SSH)组合框架的多用户在线程序评判系统,介绍了系统的程序评判原理及采用的安全机制。该系统不但可以用于ACM程序设计等比赛,而且可以为程序设计课程教学提供很好的辅助实验平台支持。 展开更多
关键词 在线程序评判 B/s架构 多用户 安全机制
下载PDF
B/S模式的电厂耗差分析系统权限管理的实现 被引量:11
17
作者 杨官平 陈鸿伟 李永华 《计算机工程与设计》 CSCD 北大核心 2006年第3期497-499,503,共4页
采用ASP.NET技术,应用用户/岗位角色/权限的模型,实现了B/S模式的电厂耗差分析系统权限管理。阐述了权限管理的设计原则和设计方法、权限管理的数据库设计、用户授权的实现和用户权限控制的实现。在开发过程中,使用C#语言,开发了权限管... 采用ASP.NET技术,应用用户/岗位角色/权限的模型,实现了B/S模式的电厂耗差分析系统权限管理。阐述了权限管理的设计原则和设计方法、权限管理的数据库设计、用户授权的实现和用户权限控制的实现。在开发过程中,使用C#语言,开发了权限管理组件,提高了开发效率,简化了权限管理,用户使用灵活方便。 展开更多
关键词 权限管理 耗差分析 AsRNET技术 B/s模式 角色 用户
下载PDF
基于技术扩散S曲线的3G技术市场推广策略研究 被引量:7
18
作者 黄梦璇 宋艳 +1 位作者 刘峰 蒋冲雨 《研究与发展管理》 CSSCI 北大核心 2011年第2期26-32,共7页
3G技术市场快速推广是电信运营商目前需着力解决的现实问题.从技术扩散S曲线出发,通过问卷调查结果,分析论证我国3G技术扩散还处在初期阶段,需要精确定位初期阶段的目标用户并按照其特征来制定推广策略,指出运营商的现有推广策略针对性... 3G技术市场快速推广是电信运营商目前需着力解决的现实问题.从技术扩散S曲线出发,通过问卷调查结果,分析论证我国3G技术扩散还处在初期阶段,需要精确定位初期阶段的目标用户并按照其特征来制定推广策略,指出运营商的现有推广策略针对性不强,并在此基础上对这些方案提出改进建议,为3G技术市场的发展提供参考借鉴. 展开更多
关键词 技术扩散s曲线 3G技术 初期目标用户 推广策略
下载PDF
基于B/S模式的学术期刊稿件管理系统 被引量:2
19
作者 赵洋 张玉新 幺炜 《河北农业大学学报》 CAS CSCD 北大核心 2012年第2期115-118,共4页
随着互联网技术的推广与普及,从提高期刊管理水平和论文编审效率的角度出发,编辑部建立期刊网络处理系统已成为必然趋势。本文设计了基于B/S架构的学术期刊稿件管理系统,对该系统的功能模块进行了详细分析,并在系统实现技术上作了说明;... 随着互联网技术的推广与普及,从提高期刊管理水平和论文编审效率的角度出发,编辑部建立期刊网络处理系统已成为必然趋势。本文设计了基于B/S架构的学术期刊稿件管理系统,对该系统的功能模块进行了详细分析,并在系统实现技术上作了说明;提出了专家信誉度模型,保证审稿人资源的合理配置。 展开更多
关键词 学术期刊 投稿系统 B/s模式 信誉度模型
下载PDF
基于更新质量检测和恶意客户端识别的联邦学习模型
20
作者 雷诚 张琳 《计算机科学》 CSCD 北大核心 2024年第11期368-378,共11页
作为分布式机器学习,联邦学习缓解了数据孤岛问题,其在不共享本地数据的情况下,仅在服务器和客户端之间传输模型参数,提高了训练数据的隐私性,但也因此使得联邦学习容易遭受恶意客户端的攻击。现有工作主要集中在拦截恶意客户端上传的... 作为分布式机器学习,联邦学习缓解了数据孤岛问题,其在不共享本地数据的情况下,仅在服务器和客户端之间传输模型参数,提高了训练数据的隐私性,但也因此使得联邦学习容易遭受恶意客户端的攻击。现有工作主要集中在拦截恶意客户端上传的更新。对此,研究了一种基于更新质量检测和恶意客户端识别的联邦学习模型umFL,以提升全局模型的训练表现和联邦学习的鲁棒性。具体而言,通过获取每一轮客户端训练的损失值来计算客户端更新质量,进行更新质量检测,选择每一轮参与训练的客户端子集,计算更新的本地模型与上一轮全局模型的相似度,从而判定客户端是否做出积极更新,并过滤掉负面更新。同时,引入beta分布函数更新客户端信誉值,将信誉值过低的客户端标记为恶意客户端,拒绝其参与随后的训练。利用卷积神经网络,分别测试了所提算法在MNIST和CIFAR10数据集上的有效性。实验结果表明,在20%~40%恶意客户端的攻击下,所提模型依旧是安全的,尤其是在40%恶意客户端环境下,其相比传统联邦学习在MNIST和CIFAR10上分别提升了40%和20%的模型测试精度,同时分别提升了25.6%和22.8%的模型收敛速度。 展开更多
关键词 联邦学习 客户端更新质量 客户端信誉值 恶意客户端识别 客户端选择
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部