期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
唐《户令》“析”“分”条考证
1
作者 祖伟 《兰台世界》 2021年第5期156-160,共5页
《唐令拾遗》及《唐令拾遗补》采用拆分式分条复原唐户令共48条,补充修订资料追加57条,复原新条文4条。其中,第15、16等条是关于“析口为户”“分田宅财物”的规定。据《通典》《文献通考》等史料,其复原户令“析”“分”规定的准确性... 《唐令拾遗》及《唐令拾遗补》采用拆分式分条复原唐户令共48条,补充修订资料追加57条,复原新条文4条。其中,第15、16等条是关于“析口为户”“分田宅财物”的规定。据《通典》《文献通考》等史料,其复原户令“析”“分”规定的准确性存在问题。《唐令拾遗》“户令”第八乙条冠以“开元二十五年”令,没有可靠的“引据”资料支撑。《户令》“析”是唐律文“禁止别立户籍”原则的例外;“子孙继绝”是“析出为户”的条件,成年男子十八才可析出为户主,若是命继年十七以下男子以继母为户主亦可析出,“析”与“分”因标的不同而不同。 展开更多
关键词 唐律 析口为户 同居分财
下载PDF
张家山汉简中的“偏妻”身份考辨 被引量:3
2
作者 孙玉荣 《社会科学》 CSSCI 北大核心 2018年第11期146-152,共7页
张家山汉简《二年律令》中的"偏妻"是指"不同居之妻"。汉初"偏妻"亲属与夫家产生亲属关系。偏妻在户籍登记时有"为户"和"别居不同数"两种情况,偏妻"为户"是"女户&qu... 张家山汉简《二年律令》中的"偏妻"是指"不同居之妻"。汉初"偏妻"亲属与夫家产生亲属关系。偏妻在户籍登记时有"为户"和"别居不同数"两种情况,偏妻"为户"是"女户"的一种。"偏妻"与"下妻"的区别在于居住、著籍方式以及"社会身份"的不同,而非单纯"家庭身份与地位"的高低。"偏妻子"与"孽子"在傅籍时的排序依据其母的良贱身份,"偏妻子"与"下妻子"在置后时的次序反映了针对不同子孙时父权的差异。"为户"之"偏妻"的婚姻是女子父家在无子男承嗣情况下的一种延续后嗣的过渡性婚姻形态,其意义与"赘婚"类似,虽然偏妻之夫的身份明显高于赘婿,对偏妻子有家长权,并且还另有正妻。 展开更多
关键词 偏妻 为户 下妻 孽子 偏妻子
下载PDF
Factors Influencing Large-scale Operation of Large Grain Farmers in Northeast China
3
作者 刘文新 何秀丽 《Agricultural Science & Technology》 CAS 2017年第12期2622-2627,2632,共7页
With the grain yield accounting for 20% of the whole country, the north- east China is a strategic region for ensuring national grain security and also a most centralized region of large grain farmers. Through a sampl... With the grain yield accounting for 20% of the whole country, the north- east China is a strategic region for ensuring national grain security and also a most centralized region of large grain farmers. Through a sampling survey of large grain farmers in 15 counties and cities of northeast China, with the aid of SPSS and AMOS software, using multiple regression analysis and structural equation modeling, this paper made a quantitative analysis on the influence of the subjective and ob- jective factors of large grain farmers on their large-scale management. The results showed that the age structure, educational level, family operating capital, yield ex- pectation and protective farming awareness of large grain farmers are the positive factors influencing their large scale operation due to agricultural subsidy policy. By comparison, the number of agricultural machinery and equipment owned by family, regional labor force, expectation for future income, and expectation for contractual scale become negative factors influencing large-scale operation of large grain farm- ers because of agricultural policies. When the future expectation, self conditions, family endowment, and operation conditions of large grain farmers increase one unit, their large scale operation motivation will increase by 0.692, 0.689, 0.487 and 0.363 units respectively. Thus, increasing the future expectation and self conditions of large grain farmers is a key factor for promoting large scale operation of farmland. 展开更多
关键词 Large grain farmers Large-scale operation Motivation Northeast China
下载PDF
A User Participation Behavior Prediction Model of Social Hotspots Based on Influence and Markov Random Field 被引量:2
4
作者 Yunpeng Xiao Jiawei Lai Yanbing Liu 《China Communications》 SCIE CSCD 2017年第5期145-159,共15页
Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user ... Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user behavior and relationship data, to predict user participation behavior and topic development trends. Firstly, for the complex factors of user behavior, three dynamic influence factor functions are defined, including individual, peer and community influence. These functions take timeliness into account using a time discretization method. Secondly, to determine laws of individual behavior and group behavior within a social topic, a hotspot user participation behavior prediction model is proposed and associated with the basic concepts of randora field and Markov property in information diffusion. The experimental results show that the model can not only dynamically predict the individual behavior, but also grasp the development trends of topics. 展开更多
关键词 social network hotspot topic behavior prediction Markov random field influence factor
下载PDF
Bidirectional Clone Node Model of Optimizing Performance of Structured P2P Overlay Network 被引量:1
5
作者 Zhang Yu Hao Ying +1 位作者 Ye Xinxin Li Yongzhen 《China Communications》 SCIE CSCD 2012年第4期123-129,共7页
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B... In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system. 展开更多
关键词 structured P2P user behavior clone node protocol maintenance cost
下载PDF
Free Riding Inhibition Mechanism Based on User Behavior in P2P File-Sharing System 被引量:2
6
作者 Zhang Yu Bai Yanping Hao Ying 《China Communications》 SCIE CSCD 2012年第12期36-45,共10页
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b... In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems. 展开更多
关键词 free riding user behavior FILE-SHARING white-washing
下载PDF
User Behaviors Analysis in Website Identification Registration 被引量:1
7
作者 甘曈 林福宏 +2 位作者 陈常嘉 郭宇春 郑毅 《China Communications》 SCIE CSCD 2013年第3期76-81,共6页
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S... Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. 展开更多
关键词 user behaviors website identifi- cation COMPLEXITY CORRELATION PREFERENCE
下载PDF
Time-Ordered Collaborative Filtering for News Recommendation 被引量:6
8
作者 XIAO Yingyuan AI Pengqiang +2 位作者 Ching-Hsien Hsu WANG Hongya JIAO Xu 《China Communications》 SCIE CSCD 2015年第12期53-62,共10页
Faced with hundreds of thousands of news articles in the news websites,it is difficult for users to find the news articles they are interested in.Therefore,various news recommender systems were built.In the news recom... Faced with hundreds of thousands of news articles in the news websites,it is difficult for users to find the news articles they are interested in.Therefore,various news recommender systems were built.In the news recommendation,these news articles read by a user is typically in the form of a time sequence.However,traditional news recommendation algorithms rarely consider the time sequence characteristic of user browsing behaviors.Therefore,the performance of traditional news recommendation algorithms is not good enough in predicting the next news article which a user will read.To solve this problem,this paper proposes a time-ordered collaborative filtering recommendation algorithm(TOCF),which takes the time sequence characteristic of user behaviors into account.Besides,a new method to compute the similarity among different users,named time-dependent similarity,is proposed.To demonstrate the efficiency of our solution,extensive experiments are conducted along with detailed performance analysis. 展开更多
关键词 similarity collaborative compute recommendation filtering users hundreds Collaborative Recommendation interested
下载PDF
An Overview of Social Analysis from Mobile Telephone Calls of Different Operators
9
作者 Changyuan Wang Yang Liu +2 位作者 Zongfei Lu Shanqing Guo Lizhen Cui 《China Communications》 SCIE CSCD 2016年第9期173-182,共10页
We construct a call network digraph G with attribution using mobile phone call records within 21 days collected by three operators and analyze the social call behavior features through analyzing the degree distributio... We construct a call network digraph G with attribution using mobile phone call records within 21 days collected by three operators and analyze the social call behavior features through analyzing the degree distribution of nodes of the network digraph under the help of Graphx based on the Spark Platform.We get the following social conclusions from the communication relationship between phone users:on average,users make about5~7 mobile telephone calls and connect about2~3 persons one day;on weekends,people make less calls but spend longer time on each call,revealing that working calls account for a large part of calls on weekdays;among these telephone calls on weekdays,most are less than one minute,and on average,mobile users that call more people also tend to be called by more individuals. 展开更多
关键词 mobile communication network degree distribution strength of degrees SPARK Graphx
下载PDF
Techno-psychological Aspects of Social Media Behaviors
10
作者 Ali Simsek 《Journalism and Mass Communication》 2015年第6期270-278,共9页
Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those i... Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media. 展开更多
关键词 social media technology behaviors virtual communication network society new media communication technologies
下载PDF
Structural Insights on Internet Traffic:Community Overlapping and Correlations
11
作者 吴晓非 禹可 +1 位作者 狄佳玺 苏驷希 《China Communications》 SCIE CSCD 2013年第10期101-114,共14页
There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important f... There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important for efficient network management. In this paper, we construct flow graphs from detailed Internet traffic data collected from the public networks of Internet Service Providers. We analyse the community structures of the flow graph that is naturally formed by different applications. The community size, degree distribution of the community, and community overlap of 10 Internet applications are investigated. We further study the correlations between the communities from different applications. Our results provide deep insights into the behaviour Internet applications and traffic, which is helpful for both network management and user behaviour analysis. 展开更多
关键词 application identification overlapping community complex network Internet traffic flow correlation coefficient
下载PDF
Microblog User Recommendation Based on Particle Swarm Optimization
12
作者 Ling Xing Qiang Ma Ling Jiang 《China Communications》 SCIE CSCD 2017年第5期134-144,共11页
Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)f... Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)for Microblog network. Specifically,a PSO-based algorithm is developed to learn the user influence,where not only the number of followers is incorporated,but also the interactions among users(e.g.,forwarding and commenting on other users' tweets). Three social factors,the influence and the activity of the target user,together with the coherence between users,are fused to improve the performance of proposed recommendation strategy. Experimental results show that,compared to the well-known Page Rank-based algorithm,the proposed strategy performs much better in terms of precision and recall and it can effectively avoid a biased result caused by celebrity effect and zombie fans effect. 展开更多
关键词 particle swarm optimization Microblog social network user recommendation user influence
下载PDF
Integrated Control of Meloidogyne Incognita Infesting Tomato Plants Using Callus Powders Derived from Certain Plants Either Alone or in Combination with Oxamyl under Out-Door Conditions
13
作者 Ahmed H. Nour El-Deen A. G. EI-Sherif Fatma A. M. Mostafa A. R. Refaei 《Journal of Agricultural Science and Technology(A)》 2011年第2X期225-230,共6页
The effect of four dried callus powders derived from certain plants, i.e. tomato, Lycopersicon esculentum; periwinkle, Catharanthus roseus; thorne apple, Datura stramonium and oleander, Nerium oleander applied separat... The effect of four dried callus powders derived from certain plants, i.e. tomato, Lycopersicon esculentum; periwinkle, Catharanthus roseus; thorne apple, Datura stramonium and oleander, Nerium oleander applied separately or concomitantly with oxamyl at a half of the recommended dose each on tomato seedlings grown in soil naturally heavy infested with M. incognita under field conditions, indicated that dried callus powder derived from N. oleander either alone or mixed with oxamyl significantly surpassed the other tested treatments in improving percentages of increase in whole plant fresh and shoot dry weights as well as increasing numbers and weights of fruits. Concerning other treatments including oxamyl at a half of recommended dose with each tested callus powder, similar results were evident regarding tomato plant growth parameters. C. roseus plus oxamyl achieved the highest percentage of increase in whole plant fresh weight (141.4%) and shoot dry weight (189.7%) and ranked second to N. oleander + oxamyl in this respect over the untreated plants, respectively. One the other hand, among all tested materials single application of either L. esculentum or oxamyl gave the least values of such criteria which averaged 34.4% and 61.7% or 39.5% and 11.2%, respectively. All tested treatments significantly reduced the total number of galls, egg-masses and eggs in egg-masses especially, dried callus powder of N. oleander which applied singly or combined with oxamyl. The least values of reduction percentages of galls and eggs in egg-masses among all treatments were recorded from tomato plant received dried callus powders of L. esculentum applied alone or concomitant with oxamyl. 展开更多
关键词 Tomato Meloidogyne incognita MS medium callus powders.
下载PDF
Impact of Workspace Design in Indian Context on Occupant's Behavior, to Enhance Efficiency and Comfort
14
作者 Pooja Mukund Pathak Alpana Rajendra Dongre 《Journal of Civil Engineering and Architecture》 2013年第3期310-322,共13页
The environmental psychology ofa workspace is a rich and diverse field of study that is growing fast and gaining popularity. The indoor environmental factors in workspaces should follow functional as well as behaviora... The environmental psychology ofa workspace is a rich and diverse field of study that is growing fast and gaining popularity. The indoor environmental factors in workspaces should follow functional as well as behavioral requirements as the spaces are designed as per the user's requirements, needs and aspirations. These play a major role in achieving behavioral impact on the user, as sense of well-being in the environment and physical comfort in the space enhances the productivity and efficiency of the user of the space. The slow and gradual importance of this issue in workspace design with Indian context, post occupancy evaluation can be adjudged as a permanent tool for improving indoor environment in buildings. Occupants should be used as a benchmark of evaluation, showing correlation of physical measurements and subjective parameters. It also suggests recommendations to improve quality of indoor environment in office buildings with analytical study, an important step in post occupancy evaluation. The objective of the paper is to inquire how people experience environmental psychology of the workspace as the determinants are efficiency, productivity and comfort. The success of any design depends upon the degree to which it creates an interface between the user and the environment. 展开更多
关键词 WORKSPACE physical measurements behavioral parameters EFFICIENCY COMFORT quantity quality
下载PDF
The Impact of Occupant Behavior on Daylight Performance of an Office Room in a Tropical Climate
15
作者 Juliana Portela Vilar de Carvalho Viviane Diniz Hazboun +1 位作者 Allyson Santos Carvalho Aldomar Pedrini 《Journal of Civil Engineering and Architecture》 2018年第3期205-212,共8页
This work explores three patterns of occupants’ control of window blinds and the potential influence on daylight performance of an office room in a tropical climate. In this climate, windows are frequently obstructe... This work explores three patterns of occupants’ control of window blinds and the potential influence on daylight performance of an office room in a tropical climate. In this climate, windows are frequently obstructed by curtains to avoid glare, despite the daylighting and the exterior view. The consequences are obstructed outside view, poor daylight quality and dependency on artificial lighting. This paper assesses the impact on available daylight using parametric analysis based on daylighting dynamic computer simulations using Grasshopper and Daysim software, combining WWR (window-to-wall ratio) (40% and 80%), SVF (sky view factor) (small and large) and occupant behavior (active, intermediate and passive users). The user patterns are based in an office buildings survey that identifies preferences concerning daylight use and control of shading devices. The daylight performance criteria combine UDI (useful daylight illuminance) (500-5,000 lux) and illuminance uniformity distribution. Results confirm the impact of occupant behavior on daylighting performance. The optimum combination of external shading devices, high SVF and high window size results in a useful daylighting for 1/3 of the time for passive users and 2/3 for active users. 展开更多
关键词 DAYLIGHTING occupant behavior fenestration systems.
下载PDF
里耶“户隶”简与秦及汉初附籍问题 被引量:8
16
作者 吴方基 《中国史研究》 CSSCI 北大核心 2019年第3期54-69,共16页
秦及汉初附籍问题是户籍制度中的一个重要问题,过去由于材料阙如,未有探讨。据近年刊布里耶“户隶”简、岳麓秦简等相关材料,“户隶”之“隶”是民,非以往认为的罪隶、奴隶、眷属子弟等。“户隶”指民不“为户”者,将户籍依附于他户主名... 秦及汉初附籍问题是户籍制度中的一个重要问题,过去由于材料阙如,未有探讨。据近年刊布里耶“户隶”简、岳麓秦简等相关材料,“户隶”之“隶”是民,非以往认为的罪隶、奴隶、眷属子弟等。“户隶”指民不“为户”者,将户籍依附于他户主名下,是为附籍。秦及汉初附籍现象的成因主要有三点:一、因年龄问题不立户而为附籍;二、无户籍无归属的女子重新编入户籍成为附籍;三、因“名田宅”制度的执行问题,一些民无法占有田宅便可不“为户”,附籍他户主名下。 展开更多
关键词 秦及汉初 隶” “隶”身份 为户 附籍
原文传递
Optimal Transmission Behaviour Policies of Secondary Users in Proactive-Optimization Cognitive Radio Networks 被引量:2
17
作者 司鹏搏 于非 +1 位作者 王慧琪 张延华 《China Communications》 SCIE CSCD 2013年第8期1-17,共17页
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell... In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users. 展开更多
关键词 CR proactive-optimization user behaviour POMDP
下载PDF
Optimisation of Climate Robust Buildings under Summer Conditions with "Primero-Comfort" Simulation Software Including Detailed User Behaviour and Comfort Expectance
18
作者 Udo Dietrich 《Journal of Civil Engineering and Architecture》 2011年第9期765-771,共7页
In this paper the possibilities for avoiding active air conditioning by all means of the room itself (window size, glazing, shading system, natural ventilation, and furniture), artificial light and control strategy ... In this paper the possibilities for avoiding active air conditioning by all means of the room itself (window size, glazing, shading system, natural ventilation, and furniture), artificial light and control strategy of these systems are investigated. A very important component of the system is the user with his ability to adapt to changing conditions in his surrounding and with his possibilities to manipulate the window, the shading system, the light switch etc. All these aspects interact together. It is necessary to optimize them simultaneously. But real planning often separates them into single sections. Simulation tools also handle normally only one or a few aspects, we know for example the thermal simulation or the daylight simulation. Primero-Comfort (2009) is a simulation tool based on energy+, what is able to consider thermal simulation as well as daylight simulation as well as user behaviour in regard to the probability of window openings. The resulting thermal comfort is rated by an adaptive comfort model, the Dutch ISSO 74 (2004). This allows designing office rooms more realistic. And it shows that an optimized solution has to include the interactions of aU mentioned aspects. Investigations with Primero-Comfort for a moderate European climate (Hamburg) show that a very good comfort can be reached only by passive means of building design also for hot summer weather just like the summer in the year 2003. The keys for such hot-summer-robust-buildings are night ventilation with height difference, heat protection glazing and good shading system, reduced internal heat gains for artificial light by accepting a threshold of 300 lx of daylight as comfortable and a reduced window size oriented on daylighting and the view out of the window. 展开更多
关键词 Thermal comfort adaptive comfort models building simulation hot summer weather design occupant behaviour
下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
19
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
下载PDF
A probe into social media users- Based on the "Actual Man" theory of Marxism
20
作者 Zhai Yue 《International English Education Research》 2015年第4期30-32,共3页
Social media users attracted the attention of scholars at home and abroad.This paper conducted a detailed literature review and prposed an analytical framework to define and conceptualize social media users on the "A... Social media users attracted the attention of scholars at home and abroad.This paper conducted a detailed literature review and prposed an analytical framework to define and conceptualize social media users on the "Actual Man" theory of Marxism.Furthermore, the paper generalizes three research levels, including the individual level,the gruop level and the materialism level.This study can improve understanding of the users' behavior in the social media virtue world as well as provide references for advanced researehe~ 展开更多
关键词 Social media Individual factors Collective wisdom
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部