Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into considerati...Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into consideration. If applied directly in mobile CRNs, those conventional algorithms would overly punish reliable users at extremely bad or good locations, leading to an obvious decrease in detection performance. To overcome this problem, we divide the whole area of interest into several cells to consider the location diversity of the network. Each user's reputation score is updated after each sensing slot and is used for identifying whether it is malicious or not. If so, it would be removed away. And then our algorithm assigns users in cells with better channel conditions, i.e. larger signal-to-noise ratios(SNRs), with larger weighting coefficients, without requiring the prior information of SNR. Detailed analysis about the validity of our algorithm is presented. The simulation results show that in a CRN with 60 mobile secondary users, among which, 18 are malicious, our solution has an improvement of detection probability by 0.97-d B and 3.57-d B when false alarm probability is 0.1, compared with a conventional trust-value-based algorithm and a trusted collaborative spectrum sensing for mobile CRNs, respectively.展开更多
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform...The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.展开更多
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo...Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.展开更多
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ...Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.展开更多
Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information ado...Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users' attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users' information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users' intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.展开更多
Considering characteristics of Chinese urban mixed traffic,the author develops a combinatorial model involving the mixed deterministic traffic volume distribution and user’s equilibrium (UE) assignment on the basis o...Considering characteristics of Chinese urban mixed traffic,the author develops a combinatorial model involving the mixed deterministic traffic volume distribution and user’s equilibrium (UE) assignment on the basis of symmetrical link travel time function (or deterrence).Its uniqueness and equivalance to the Wardropian principle of UE are also proved.Finally,we give the algorithm of model.展开更多
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ...With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.展开更多
Purpose:The paper aims to build an index model for measuring microblog users’influence by taking microbloggers of Sina Weibo as a research sample.Design/methodology/approach:Our user influence index model emphasizes ...Purpose:The paper aims to build an index model for measuring microblog users’influence by taking microbloggers of Sina Weibo as a research sample.Design/methodology/approach:Our user influence index model emphasizes link analysis and user activities in the microblogging network.We conduct experiments to investigate the performance of our model by using data crawled from Sina Weibo.Findings:User influence is correlated to the attention that a user has received from his/her audience,the user’s activities and his/her tweets’influence.Experimental results show that our model can reflect microbloggers’influence in a more reasonable way.Research limitations:More factors need to be considered to identify different influential users at different time periods.Practical implications:The results of the study provide us with insights both into the way to measure microblog users’influence and to rank users based on their influence.Originality/value:By combining link analysis and user activities,this index model can reduce the impact of dummy follower accounts on user influence,reflecting a user’s real influence in the microblog system.展开更多
基金supported by National Natural Science Foundation of China under Grant No. 61671183the Open Research Fund of State Key Laboratory of Space-Ground Integrated Information Technology under Grant No. 2015_SGIIT_KFJJ_TX_02major consulting projects of Chinese Academy of Engineering under Grant No. 2016-ZD-05-07
文摘Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into consideration. If applied directly in mobile CRNs, those conventional algorithms would overly punish reliable users at extremely bad or good locations, leading to an obvious decrease in detection performance. To overcome this problem, we divide the whole area of interest into several cells to consider the location diversity of the network. Each user's reputation score is updated after each sensing slot and is used for identifying whether it is malicious or not. If so, it would be removed away. And then our algorithm assigns users in cells with better channel conditions, i.e. larger signal-to-noise ratios(SNRs), with larger weighting coefficients, without requiring the prior information of SNR. Detailed analysis about the validity of our algorithm is presented. The simulation results show that in a CRN with 60 mobile secondary users, among which, 18 are malicious, our solution has an improvement of detection probability by 0.97-d B and 3.57-d B when false alarm probability is 0.1, compared with a conventional trust-value-based algorithm and a trusted collaborative spectrum sensing for mobile CRNs, respectively.
文摘The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.
文摘Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.
基金This paper is supported by the Inner Mongolia Natural Science Foundation(Grant Number:2018MS06026,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/)the Science and Technology Program of Inner Mongolia Autonomous Region(Grant Number:2019GG116,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/).
文摘Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.
基金jointly supported by National Social Science Foundation of China(Grant No.14BTQ044)Wuhan University Academic Development Plan for Scholars after 1970s
文摘Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users' attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users' information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users' intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.
文摘Considering characteristics of Chinese urban mixed traffic,the author develops a combinatorial model involving the mixed deterministic traffic volume distribution and user’s equilibrium (UE) assignment on the basis of symmetrical link travel time function (or deterrence).Its uniqueness and equivalance to the Wardropian principle of UE are also proved.Finally,we give the algorithm of model.
基金This research is sponsored by the National Science Foundation of China No. 60703116, 61063006 and 61462049, and the Application Basic Research Plan in Yunnan Province of China No. 2013FZ020.
文摘With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.
基金supported by the Natural Science Foundation of Hebei Province of China(Grant No.:F2011203219)
文摘Purpose:The paper aims to build an index model for measuring microblog users’influence by taking microbloggers of Sina Weibo as a research sample.Design/methodology/approach:Our user influence index model emphasizes link analysis and user activities in the microblogging network.We conduct experiments to investigate the performance of our model by using data crawled from Sina Weibo.Findings:User influence is correlated to the attention that a user has received from his/her audience,the user’s activities and his/her tweets’influence.Experimental results show that our model can reflect microbloggers’influence in a more reasonable way.Research limitations:More factors need to be considered to identify different influential users at different time periods.Practical implications:The results of the study provide us with insights both into the way to measure microblog users’influence and to rank users based on their influence.Originality/value:By combining link analysis and user activities,this index model can reduce the impact of dummy follower accounts on user influence,reflecting a user’s real influence in the microblog system.