期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
解读宫崎骏动漫中的“现实世界”和“异世界” 被引量:3
1
作者 李芳 《电影文学》 北大核心 2012年第8期43-44,共2页
本文通过分析宫崎骏的四大代表作的构造,解读其作品中体现的"现实世界"和"异世界",最终得到下述结论:(1)宫崎骏每部作品基本都由"现实世界"和"异世界"构成。但每部作品的两个世界又各有不同。(2)"现实世界"和"异世界"... 本文通过分析宫崎骏的四大代表作的构造,解读其作品中体现的"现实世界"和"异世界",最终得到下述结论:(1)宫崎骏每部作品基本都由"现实世界"和"异世界"构成。但每部作品的两个世界又各有不同。(2)"现实世界"和"异世界"基本以依托魔法、异类、空中飞行物等的形式来界定。(3)"异世界"和"现实世界"之间的关系有对立、有融合、有表里统一,纷繁复杂。当二者关系为对立关系时,经常有居间人出场。 展开更多
关键词 “现实世界” “异世界” 对立 融合
下载PDF
An overview of PCI in the very elderly 被引量:22
2
作者 Vimalraj Bogana Shanmugam Richard Harper Ian Meredith Yuvaraj Malaiapan Peter J Psaltis 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2015年第2期174-184,共11页
Cardiovascular disease, and in particular ischemic heart disease (IHD), is a major cause of morbidity and mortality in the very elderly (〉 80 years) worldwide. These patients represent a rapidly growing cohort pr... Cardiovascular disease, and in particular ischemic heart disease (IHD), is a major cause of morbidity and mortality in the very elderly (〉 80 years) worldwide. These patients represent a rapidly growing cohort presenting for percntaneous coronary intervention (PCI), now constituting more than one in five patients treated with PCI in real-world practice. Furthermore, they often have greater ischemic burden than their younger counterparts, suggesting that they have greater scope of benefit from coronary revascularization therapy. Despite this, the very elderly are frequently under-represented in clinical revascularization trials and historically there has been a degree of physician reluctance in referring them for PCI procedures, with perceptions of disappointing outcomes, low success and high complication rates. Several issues have contributed to this, including the tendency for older patients with IHD to present late, with atypical symptoms or non-diagnostic ECGs, and reservations regarding their procedural risk-to-benefit ratio, due to shorter life expectancy, presence of comorbidities and increased bleeding risk from antiplatelet and anticoagulation medications. However, advances in PCI technology and techniques over the past decade have led to better outcomes and lower risk of complications and the existing body of evidence now indicates that the very elderly actually derive more relative benefit from PCI than younger populations. Importantly, this applies to all PCI settings: elective, urgent and emergency. This review discusses the role of PCI in the very elderly presenting with chronic stable IHD, non ST-elevation acute coronary syndrome, and ST-elevation myocardial infarction. It also addresses the clinical challenges met when considering PCI in this cohort and the ongoing need for research and development to further improve outcomes in these challenging patients. 展开更多
关键词 Acute coronary syndrome ANGINA Antithrombotic therapy Myocardial infarction OCTOGENARIANS Percutaneous coronary intervention The elderly
下载PDF
Real-world comparison of non-vitamin K antagonist oral anticoagulants and warfarin in Asian octogenarian patients with atrial fibrillation 被引量:4
3
作者 Chang Hee Kwon Minsu Kim +2 位作者 Gi-Byoung Nam Kee-Joon Choi You-Ho Kim 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2016年第7期566-572,共7页
Background The efficacy and safety of non-vitamin K antagonist oral anticoagulants (NOACs) and warfarin in Asian octogenarian atrial fibrillation (AF) patients have not been established in a real-world setting. We... Background The efficacy and safety of non-vitamin K antagonist oral anticoagulants (NOACs) and warfarin in Asian octogenarian atrial fibrillation (AF) patients have not been established in a real-world setting. We aimed to evaluate the efficacy and safety of NOACs and warfarin in Korean octogenarian patients. Methods A total of 293 consecutive patients aged 〉 80 years with non-valvular AF who had taken either NOACs 048 cases, 50.5%) or warfarin (145 cases, 49.5%) were retrospectively reviewed. The efficacy outcome was the com- posite of stroke or systemic embolism. The safety outcome was major bleeding. Results The follow-up duration was 375 patient-years ( 172 patient-years with NOACs and 203 patient-years with warfarin). Patients on NOACs were slightly older (P = 0.006) and had slightly higher HAS-BLED scores (P = 0.034). The efficacy of both anticoagulants was high (1.16% for NOACs vs. 2.98% for warfarin per 100 pa- tient-years, P = 0.46). The safety outcome was relatively high in both NOACs and warfarin groups (8.96% vs. 12.46%, P = 0.29). The effi- cacy and safety outcomes tended to decrease non-significantly in low dose NOACs than in common dose NOACs or warfarin (0.85% vs. 1.84% vs. 2.98% in efficacy outcome, P = 0.69; and 6.97% vs. 13.29% vs. 12.46% in safety outcome, P = 0.34). Conclusions NOACs were highly effective for prevention of stroke or systemic embolism in Asian octogenarian AF patients. However, major bleeding occurred excessively high in both anticoagulant groups. Further study is required on the optimal anticoagulant regimen in octogenarian population. 展开更多
关键词 ANTICOAGULANTS Atrial fibrillation EFFICACY OCTOGENARIAN Safety
下载PDF
Recommending Friends Instantly in Location-based Mobile Social Networks 被引量:4
4
作者 QIAO Xiuquan SU Jianchong +4 位作者 ZHANG Jinsong XU Wangli WU Budan XUE Sida CHEN Junliang 《China Communications》 SCIE CSCD 2014年第2期109-127,共19页
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s... Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach. 展开更多
关键词 mobile social network service friend recommendation location-basedservice location proximity user behaviorsimilarity singular value decomposition
下载PDF
Mitigation Strategy against Cascading Failures on Social Networks 被引量:4
5
作者 YI Chengqi BAO Yuanyuan +1 位作者 JIANG Jingchi XUE Yibo 《China Communications》 SCIE CSCD 2014年第8期37-46,共10页
Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network ar... Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network are unavailable for some reasons,they are more likely to influence a large portion of social network.Therefore,an effective mitigation strategy is very critical for avoiding or reducing the impact of cascading failures.In this paper,we firstly quantify the user loads and construct the processes of cascading dynamics,then elaborate the more reasonable mechanism of sharing the extra user loads with considering the features of social networks,and further propose a novel mitigation strategy on social networks against cascading failures.Based on the realworld social network datasets,we evaluate the effectiveness and efficiency of the novel mitigation strategy.The experimental results show that this mitigation strategy can reduce the impact of cascading failures effectively and maintain the network connectivity better with lower cost.These findings are very useful for rationally advertising and may be helpful for avoiding various disasters of cascading failures on many real-world networks. 展开更多
关键词 social networks mitigationstrategy cascading failures betweennesscentrality cascading dynamics
下载PDF
Comparisons of three data storage models in parametric temporal databases 被引量:5
6
作者 Seo-Young NOH Shashi K. GADIA Haengjin JANG 《Journal of Central South University》 SCIE EI CAS 2013年第7期1919-1927,共9页
The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases b... The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases because of its unfixed attribute sizes. XML is a matured technology and can be an elegant solution for such challenge. Representing data in XML trigger a question about storage efficiency. The goal of this work is to provide a straightforward answer to such a question. To this end, we compare three different storage models for the parametric temporal data model and show that XML is not worse than any other approaches. Furthermore, XML outperforms the other storages under certain conditions. Therefore, our simulation results provide a positive indication that the myth about XML is not true in the parametric temporal data model. 展开更多
关键词 data representation parametric data model XML-based representation
下载PDF
Android Malware Detection with Contrasting Permission Patterns 被引量:2
7
作者 XIONG Ping WANG Xiaofeng +2 位作者 NIU Wenjia ZHU Tianqing LI Gang 《China Communications》 SCIE CSCD 2014年第8期1-14,共14页
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are ... As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection. 展开更多
关键词 malware detection permissionpattern classification contrast set ANDROID
下载PDF
Measuring Propeller Blade Width Using Binocular Stereo Vision 被引量:3
8
作者 张建德 陆金桂 《Journal of Marine Science and Application》 2011年第2期246-251,共6页
Propeller blade width measurement has been extensively studied in the past using direct and indirect methods, and it plays a great role in determining the quality of the finished products. It has surveyed that previou... Propeller blade width measurement has been extensively studied in the past using direct and indirect methods, and it plays a great role in determining the quality of the finished products. It has surveyed that previous techniques are usually time-consuming and erroneous due to a large number of points to be processed in blade width measurement. This paper proposes a new method of measuring blade width using two images acquired from different viewpoints of the same blade. And a new feature points matching approach for propeller blade image is proposed in stereo vision measurement. Based on these, pixel coordinates of contour points of the blade in two images are extracted and converted to real world coordinates by image algorithm and binocular stereo machine vision theory. Then, from the real world coordinates, the blade width at any position can be determined by simple geometrical method. 展开更多
关键词 blade width binocular stereo vision propeller: vision measurement
下载PDF
A dynamic model for railway freight overbooking 被引量:2
9
作者 冯芬玲 张佳琪 郭晓峰 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第8期3257-3264,共8页
In order to apply overbooking idea in Chinese railway freight industry to improve revenue, a Markov decision process(dynamic programming) model for railway freight reservation was formulated and the overbooking limit ... In order to apply overbooking idea in Chinese railway freight industry to improve revenue, a Markov decision process(dynamic programming) model for railway freight reservation was formulated and the overbooking limit level was proposed as a control policy. However, computing the dynamic programming treatment needs six nested loops and this will be burdensome for real-world problems. To break through the calculation limit, the properties of value function were analyzed and the overbooking protection level was proposed to reduce the calculating quantity. The simulation experiments show that the overbooking protection level for the lower-fare class is higher than that for the higher-fare class, so the overbooking strategy is nested by fare class. Besides, by analyzing the influence on the overbooking strategy of freight arrival probability and cancellation probability, the proposed approach is efficient and also has a good application prospect in reality. Also, compared with the existing reservation(FCFS), the overbooking strategy performs better in the fields of vacancy reduction and revenue improvement. 展开更多
关键词 revenue management railway freight OVERBOOKING dynamic model
下载PDF
Science of empirical design in mining ground control 被引量:9
10
作者 Mark Christopher 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2016年第3期461-470,共10页
Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world expe... Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world experience is generally available and can be turned into valuable experimental data.Every pillar that is developed, or stope that is mined, represents a full-scale test of a rock mechanics design. By harvesting these data, and then using the appropriate statistical techniques to interpret them,mining engineers have developed powerful design techniques that are widely used around the world.Successful empirical methods are readily accepted because they are simple, transparent, practical, and firmly tethered to reality. The author has been intimately associated with empirical design for his entire career, but his previous publications have described the application of individual techniques to specific problems. The focus of this paper is the process used to develop a successful empirical method. A sixstage process is described: identification of the problem, and of the end users of the final product; development of a conceptual rock mechanics model, and identification of the key parameters in that model;identification of measures for each of the key parameters, and the development of new measures(such as rating scales) where necessary; data sources and data collection; statistical analysis; and packaging of the final product. Each of these stages has its own potential rewards and pitfalls, which will be illustrated by incidents from the author's own experience. The ultimate goal of this paper is to provide a new and deeper appreciation for empirical techniques, as well as some guidelines and opportunities for future developers. 展开更多
关键词 Design Pillar Stope Empirical Statistics Modeling
下载PDF
Dyna-QUF:Dyna-Q based univector field navigation for autonomous mobile robots in unknown environments 被引量:1
11
作者 VIET Hoang-huu CHOI Seung-yoon CHUNG Tae-choong 《Journal of Central South University》 SCIE EI CAS 2013年第5期1178-1188,共11页
A novel approach was presented to solve the navigation problem of autonomous mobile robots in unknown environments with dense obstacles based on a univector field method. In an obstacle-free environment, a robot is en... A novel approach was presented to solve the navigation problem of autonomous mobile robots in unknown environments with dense obstacles based on a univector field method. In an obstacle-free environment, a robot is ensured to reach the goal position with the desired posture by following the univector field. Contrariwise, the univector field cannot guarantee that the robot will avoid obstacles in environments. In order to create an intelligent mobile robot being able to perform the obstacle avoidance task while following the univector field, Dyna-Q algorithm is developed to train the robot in learning moving directions to attain a collision-free path for its navigation. Simulations on the computer as well as experiments on the real world prove that the proposed algorithm is efficient for training the robot in reaching the goal position with the desired final orientation. 展开更多
关键词 Dyna-Q mobile robot reinforcement learning univector field
下载PDF
A Novel Audio Event Detection Method for Internet of Things 被引量:1
12
作者 李祺 田斌 《China Communications》 SCIE CSCD 2011年第1期110-118,共9页
Recently, the Internet of Things (loT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor net- works is one of the... Recently, the Internet of Things (loT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor net- works is one of the most important applications for the Internet of Things. In practice, it is hard to get enough real-world samples to generate the classifi- ers for some special audio events (e.g., car-crash- ing in the smart traffic system). In this paper, we introduce a TrAdaBoost-based method to solve the above problem. By using the proposed approach, we can train a strong classifier by using only a tiny amount of real-world data and a large number of more easily collected samples (e.g., collected from TV programs), even when the real-world data is not sufficient to train a model alone. We deploy this ap- proach in a smart traffic system to evaluate its per- formance, and the experiment evaluations demonstrate that our method can achieve satisfying results. 展开更多
关键词 Internet of Things smart traffic audio event detection
下载PDF
Precise perception of virtual object position in real world 被引量:1
13
作者 林理平 《High Technology Letters》 EI CAS 2009年第3期255-260,共6页
There is a deviation between actual and theoretical perceived positions of virtual object in stereoscop-ic display.Therefore,methods for precise position perception in real world are proposed in this paper.The causes ... There is a deviation between actual and theoretical perceived positions of virtual object in stereoscop-ic display.Therefore,methods for precise position perception in real world are proposed in this paper.The causes for the deviation are analyzed on the basis of geometrical optics .Then deviation correctionsare performed by error compensation with mathematic method and by remodeling virtual viewpoint dynami-cally with the movement of physical viewpoint.Experimental results show that these methods can reducethe position deviation to less than 10 millimeter,meeting the requirements for direct manipulation in mul-ti-sensory virtual environment. 展开更多
关键词 virtual reality position perception stereoscopic display head tracking
下载PDF
The Discovery of Burst Topic and Its Intermittent Evolution in Our Real World
14
作者 汤斯亮 张寅 +3 位作者 王翰琪 陈铭 吴飞 庄越挺 《China Communications》 SCIE CSCD 2013年第3期1-12,共12页
Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and i... Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and its evolution, is a significant challenge. In this paper, a novel topic model, called intermittent Evolution LDA (iELDA) is proposed. In iELDA, the time-evolving documents are divided into many small epochs. iELDA utilizes the detected global topics as priors to guide the detection of an emerging topic and keep track of its evolution over different epochs. As a natural extension of the traditional Latent Dirichlet Allocation (LDA) and Dynamic Topic Model (DTM), iELDA has an advantage: it can discover the intermittent recurring pattern of a burst topic. We apply iELDA to real-world data from NYT; the results demonstrate that the proposed iELDA can appropriately capture a burst topic and track its intermittent evolution as well as produce a better predictive ability than other related topic models. 展开更多
关键词 LDA time series iterative clustering model
下载PDF
Uses of probe-based confocal laser endomicroscopy:Responses to a question to practitioners
15
作者 Navin Paul Kevin A Ghassemi 《World Journal of Gastroenterology》 SCIE CAS CSCD 2011年第42期4739-4740,共2页
Confocal laser endomicroscopy is a novel imaging technology,which allows realtime visualization and inter-pretation of microscopic details in live tissues. Although several potential uses have been identified for this... Confocal laser endomicroscopy is a novel imaging technology,which allows realtime visualization and inter-pretation of microscopic details in live tissues. Although several potential uses have been identified for this technology,no data are available regarding its real-worlduses. We report the results of an email-based survey of experts in North America regarding their use of the technology. 展开更多
关键词 Confocal laser endomicroscopy Expert opinlon
下载PDF
CONSTRUCTION OF THE ENCRYPTION MATRIX BASED ON CHEBYSHEV CHAOTIC NEURAL NETWORKS
16
作者 Zou Ajin Wu Wei +1 位作者 Li Renfa Li Yongjiang 《Journal of Electronics(China)》 2012年第3期248-253,共6页
The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which availab... The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected. Then, a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices. The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and auto-correlation with the natural frequency of the plaintext being hidden and homogenized. 展开更多
关键词 Neural network Encryption matrix CHAOS Tensor production
下载PDF
The Second Source of the Force
17
作者 Dongkai Li 《Journal of Philosophy Study》 2015年第9期469-470,共2页
From the physical science, we know the force comes from the reaction between at least two objects. But, in the reality world, we can see some kind force of an existence does not come from outside. For instance, when a... From the physical science, we know the force comes from the reaction between at least two objects. But, in the reality world, we can see some kind force of an existence does not come from outside. For instance, when a person takes the action such as speaking, movement of arms, we cannot see any force loaded from outside of this person. Then, here is the question: Where does this kind of force come from? This paper is to demonstrate to prove that there is the second source of force, which comes from internal of a kind of object. 展开更多
关键词 FORCE EXISTENCE CONTRADICTION action noumenon PERSON
下载PDF
Are There Tea Parties on Mars? Business and Politics in Science Fiction Films
18
作者 O'Brien Stanley Nicki L. Michalski Ruth J. H. Stanley 《Journal of Literature and Art Studies》 2012年第3期382-396,共15页
This paper will apply a politically oriented description-critique paradigm developed from the works of Whitehall and Grewell that offers a way to examine works of popular culture, particularly Mars-based science ficti... This paper will apply a politically oriented description-critique paradigm developed from the works of Whitehall and Grewell that offers a way to examine works of popular culture, particularly Mars-based science fiction films. Because of the unique nature of these films, primarily which they are set in a future and distant world, they allow us to explore the socio-political landscape in which they were created from a remove that does not exist in "real-world" based works. Specifically we will be examining the governing power (in any particular Mars-based science fiction film) that might be either wielded by business interests or governmental interests. Although it is possible to have both a strong government and a strong business in a society, in many Mars-based science fiction films, government and business seem to represent two sides of a continuum. The stronger the business power structure in the film, the weaker the governmental power structure, and vice-versa. 展开更多
关键词 science fiction MARS political structure governmental power Geoffrey Whitehall Gary Grewell COLONIZATION film
下载PDF
Philosophy and Theology in the Islamic Culture: Al-Farabis De scientiis
19
作者 Jakob Hans Josef Schneider 《Journal of Philosophy Study》 2011年第1期41-51,共11页
In this paper, the author refers to the Latin translation of the Kitab Ihsa 'al' Ulum of Al-Frabi made by Dominicus Gundissalinus in the Xllth Century in Toledo, Spain. This text under the Latin title De scientiis w... In this paper, the author refers to the Latin translation of the Kitab Ihsa 'al' Ulum of Al-Frabi made by Dominicus Gundissalinus in the Xllth Century in Toledo, Spain. This text under the Latin title De scientiis was one of the most influential texts of the Arab and Persian world in the western Latin Europe. It is an introductory text into all until known sciences written for students and laymen (illiterate) who want to study one of these sciences. The text of Al-Farabi discusses the seven liberal arts, all of the works on physics of Aristotle and includes some reflexions on metaphysics, political philosophy and theology. There are two important points: (1) All sciences have a theoretical and practical aspect. All sciences are sciences of principles and causes and their application to the practical world. (2) The so called prima philosophia is the political philosophy and not metaphysics. In this respect, Al-Farabi subordinates theology as a science of the religious laws to politics as a science of civil laws. In the same respect, he combines, under the famous sentence of Plato that philosophers are the governors and the very well companions of mankind, politics with theology 展开更多
关键词 Muslim philosophy political philosophy seven liberal arts medieval philosophy THEOLOGY PLATO ARISTOTLE
下载PDF
Techno-psychological Aspects of Social Media Behaviors
20
作者 Ali Simsek 《Journalism and Mass Communication》 2015年第6期270-278,共9页
Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those i... Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media. 展开更多
关键词 social media technology behaviors virtual communication network society new media communication technologies
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部