With the grain yield accounting for 20% of the whole country, the north- east China is a strategic region for ensuring national grain security and also a most centralized region of large grain farmers. Through a sampl...With the grain yield accounting for 20% of the whole country, the north- east China is a strategic region for ensuring national grain security and also a most centralized region of large grain farmers. Through a sampling survey of large grain farmers in 15 counties and cities of northeast China, with the aid of SPSS and AMOS software, using multiple regression analysis and structural equation modeling, this paper made a quantitative analysis on the influence of the subjective and ob- jective factors of large grain farmers on their large-scale management. The results showed that the age structure, educational level, family operating capital, yield ex- pectation and protective farming awareness of large grain farmers are the positive factors influencing their large scale operation due to agricultural subsidy policy. By comparison, the number of agricultural machinery and equipment owned by family, regional labor force, expectation for future income, and expectation for contractual scale become negative factors influencing large-scale operation of large grain farm- ers because of agricultural policies. When the future expectation, self conditions, family endowment, and operation conditions of large grain farmers increase one unit, their large scale operation motivation will increase by 0.692, 0.689, 0.487 and 0.363 units respectively. Thus, increasing the future expectation and self conditions of large grain farmers is a key factor for promoting large scale operation of farmland.展开更多
Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user ...Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user behavior and relationship data, to predict user participation behavior and topic development trends. Firstly, for the complex factors of user behavior, three dynamic influence factor functions are defined, including individual, peer and community influence. These functions take timeliness into account using a time discretization method. Secondly, to determine laws of individual behavior and group behavior within a social topic, a hotspot user participation behavior prediction model is proposed and associated with the basic concepts of randora field and Markov property in information diffusion. The experimental results show that the model can not only dynamically predict the individual behavior, but also grasp the development trends of topics.展开更多
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B...In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.展开更多
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b...In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
Faced with hundreds of thousands of news articles in the news websites,it is difficult for users to find the news articles they are interested in.Therefore,various news recommender systems were built.In the news recom...Faced with hundreds of thousands of news articles in the news websites,it is difficult for users to find the news articles they are interested in.Therefore,various news recommender systems were built.In the news recommendation,these news articles read by a user is typically in the form of a time sequence.However,traditional news recommendation algorithms rarely consider the time sequence characteristic of user browsing behaviors.Therefore,the performance of traditional news recommendation algorithms is not good enough in predicting the next news article which a user will read.To solve this problem,this paper proposes a time-ordered collaborative filtering recommendation algorithm(TOCF),which takes the time sequence characteristic of user behaviors into account.Besides,a new method to compute the similarity among different users,named time-dependent similarity,is proposed.To demonstrate the efficiency of our solution,extensive experiments are conducted along with detailed performance analysis.展开更多
We construct a call network digraph G with attribution using mobile phone call records within 21 days collected by three operators and analyze the social call behavior features through analyzing the degree distributio...We construct a call network digraph G with attribution using mobile phone call records within 21 days collected by three operators and analyze the social call behavior features through analyzing the degree distribution of nodes of the network digraph under the help of Graphx based on the Spark Platform.We get the following social conclusions from the communication relationship between phone users:on average,users make about5~7 mobile telephone calls and connect about2~3 persons one day;on weekends,people make less calls but spend longer time on each call,revealing that working calls account for a large part of calls on weekdays;among these telephone calls on weekdays,most are less than one minute,and on average,mobile users that call more people also tend to be called by more individuals.展开更多
Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those i...Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media.展开更多
There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important f...There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important for efficient network management. In this paper, we construct flow graphs from detailed Internet traffic data collected from the public networks of Internet Service Providers. We analyse the community structures of the flow graph that is naturally formed by different applications. The community size, degree distribution of the community, and community overlap of 10 Internet applications are investigated. We further study the correlations between the communities from different applications. Our results provide deep insights into the behaviour Internet applications and traffic, which is helpful for both network management and user behaviour analysis.展开更多
Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)f...Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)for Microblog network. Specifically,a PSO-based algorithm is developed to learn the user influence,where not only the number of followers is incorporated,but also the interactions among users(e.g.,forwarding and commenting on other users' tweets). Three social factors,the influence and the activity of the target user,together with the coherence between users,are fused to improve the performance of proposed recommendation strategy. Experimental results show that,compared to the well-known Page Rank-based algorithm,the proposed strategy performs much better in terms of precision and recall and it can effectively avoid a biased result caused by celebrity effect and zombie fans effect.展开更多
The effect of four dried callus powders derived from certain plants, i.e. tomato, Lycopersicon esculentum; periwinkle, Catharanthus roseus; thorne apple, Datura stramonium and oleander, Nerium oleander applied separat...The effect of four dried callus powders derived from certain plants, i.e. tomato, Lycopersicon esculentum; periwinkle, Catharanthus roseus; thorne apple, Datura stramonium and oleander, Nerium oleander applied separately or concomitantly with oxamyl at a half of the recommended dose each on tomato seedlings grown in soil naturally heavy infested with M. incognita under field conditions, indicated that dried callus powder derived from N. oleander either alone or mixed with oxamyl significantly surpassed the other tested treatments in improving percentages of increase in whole plant fresh and shoot dry weights as well as increasing numbers and weights of fruits. Concerning other treatments including oxamyl at a half of recommended dose with each tested callus powder, similar results were evident regarding tomato plant growth parameters. C. roseus plus oxamyl achieved the highest percentage of increase in whole plant fresh weight (141.4%) and shoot dry weight (189.7%) and ranked second to N. oleander + oxamyl in this respect over the untreated plants, respectively. One the other hand, among all tested materials single application of either L. esculentum or oxamyl gave the least values of such criteria which averaged 34.4% and 61.7% or 39.5% and 11.2%, respectively. All tested treatments significantly reduced the total number of galls, egg-masses and eggs in egg-masses especially, dried callus powder of N. oleander which applied singly or combined with oxamyl. The least values of reduction percentages of galls and eggs in egg-masses among all treatments were recorded from tomato plant received dried callus powders of L. esculentum applied alone or concomitant with oxamyl.展开更多
The environmental psychology ofa workspace is a rich and diverse field of study that is growing fast and gaining popularity. The indoor environmental factors in workspaces should follow functional as well as behaviora...The environmental psychology ofa workspace is a rich and diverse field of study that is growing fast and gaining popularity. The indoor environmental factors in workspaces should follow functional as well as behavioral requirements as the spaces are designed as per the user's requirements, needs and aspirations. These play a major role in achieving behavioral impact on the user, as sense of well-being in the environment and physical comfort in the space enhances the productivity and efficiency of the user of the space. The slow and gradual importance of this issue in workspace design with Indian context, post occupancy evaluation can be adjudged as a permanent tool for improving indoor environment in buildings. Occupants should be used as a benchmark of evaluation, showing correlation of physical measurements and subjective parameters. It also suggests recommendations to improve quality of indoor environment in office buildings with analytical study, an important step in post occupancy evaluation. The objective of the paper is to inquire how people experience environmental psychology of the workspace as the determinants are efficiency, productivity and comfort. The success of any design depends upon the degree to which it creates an interface between the user and the environment.展开更多
This work explores three patterns of occupants’ control of window blinds and the potential influence on daylight performance of an office room in a tropical climate. In this climate, windows are frequently obstructe...This work explores three patterns of occupants’ control of window blinds and the potential influence on daylight performance of an office room in a tropical climate. In this climate, windows are frequently obstructed by curtains to avoid glare, despite the daylighting and the exterior view. The consequences are obstructed outside view, poor daylight quality and dependency on artificial lighting. This paper assesses the impact on available daylight using parametric analysis based on daylighting dynamic computer simulations using Grasshopper and Daysim software, combining WWR (window-to-wall ratio) (40% and 80%), SVF (sky view factor) (small and large) and occupant behavior (active, intermediate and passive users). The user patterns are based in an office buildings survey that identifies preferences concerning daylight use and control of shading devices. The daylight performance criteria combine UDI (useful daylight illuminance) (500-5,000 lux) and illuminance uniformity distribution. Results confirm the impact of occupant behavior on daylighting performance. The optimum combination of external shading devices, high SVF and high window size results in a useful daylighting for 1/3 of the time for passive users and 2/3 for active users.展开更多
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell...In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.展开更多
In this paper the possibilities for avoiding active air conditioning by all means of the room itself (window size, glazing, shading system, natural ventilation, and furniture), artificial light and control strategy ...In this paper the possibilities for avoiding active air conditioning by all means of the room itself (window size, glazing, shading system, natural ventilation, and furniture), artificial light and control strategy of these systems are investigated. A very important component of the system is the user with his ability to adapt to changing conditions in his surrounding and with his possibilities to manipulate the window, the shading system, the light switch etc. All these aspects interact together. It is necessary to optimize them simultaneously. But real planning often separates them into single sections. Simulation tools also handle normally only one or a few aspects, we know for example the thermal simulation or the daylight simulation. Primero-Comfort (2009) is a simulation tool based on energy+, what is able to consider thermal simulation as well as daylight simulation as well as user behaviour in regard to the probability of window openings. The resulting thermal comfort is rated by an adaptive comfort model, the Dutch ISSO 74 (2004). This allows designing office rooms more realistic. And it shows that an optimized solution has to include the interactions of aU mentioned aspects. Investigations with Primero-Comfort for a moderate European climate (Hamburg) show that a very good comfort can be reached only by passive means of building design also for hot summer weather just like the summer in the year 2003. The keys for such hot-summer-robust-buildings are night ventilation with height difference, heat protection glazing and good shading system, reduced internal heat gains for artificial light by accepting a threshold of 300 lx of daylight as comfortable and a reduced window size oriented on daylighting and the view out of the window.展开更多
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
Social media users attracted the attention of scholars at home and abroad.This paper conducted a detailed literature review and prposed an analytical framework to define and conceptualize social media users on the "A...Social media users attracted the attention of scholars at home and abroad.This paper conducted a detailed literature review and prposed an analytical framework to define and conceptualize social media users on the "Actual Man" theory of Marxism.Furthermore, the paper generalizes three research levels, including the individual level,the gruop level and the materialism level.This study can improve understanding of the users' behavior in the social media virtue world as well as provide references for advanced researehe~展开更多
文摘With the grain yield accounting for 20% of the whole country, the north- east China is a strategic region for ensuring national grain security and also a most centralized region of large grain farmers. Through a sampling survey of large grain farmers in 15 counties and cities of northeast China, with the aid of SPSS and AMOS software, using multiple regression analysis and structural equation modeling, this paper made a quantitative analysis on the influence of the subjective and ob- jective factors of large grain farmers on their large-scale management. The results showed that the age structure, educational level, family operating capital, yield ex- pectation and protective farming awareness of large grain farmers are the positive factors influencing their large scale operation due to agricultural subsidy policy. By comparison, the number of agricultural machinery and equipment owned by family, regional labor force, expectation for future income, and expectation for contractual scale become negative factors influencing large-scale operation of large grain farm- ers because of agricultural policies. When the future expectation, self conditions, family endowment, and operation conditions of large grain farmers increase one unit, their large scale operation motivation will increase by 0.692, 0.689, 0.487 and 0.363 units respectively. Thus, increasing the future expectation and self conditions of large grain farmers is a key factor for promoting large scale operation of farmland.
基金supported by the National Key Basic Research Program(973 program)of China(No.2013CB329606)National Science Foundation of China(Grant No.61272400)+2 种基金Science and Technology Research Program of the Chongqing Municipal Education Committee(No.KJ1500425)Wen Feng Foundation of CQUPT(No.WF201403)Chongqing Graduate Research And Innovation Project(No.CYS14146)
文摘Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user behavior and relationship data, to predict user participation behavior and topic development trends. Firstly, for the complex factors of user behavior, three dynamic influence factor functions are defined, including individual, peer and community influence. These functions take timeliness into account using a time discretization method. Secondly, to determine laws of individual behavior and group behavior within a social topic, a hotspot user participation behavior prediction model is proposed and associated with the basic concepts of randora field and Markov property in information diffusion. The experimental results show that the model can not only dynamically predict the individual behavior, but also grasp the development trends of topics.
基金supported by the National Natural Science Foundation of China under Grant No.61100205Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006Doctor Start-up Foundation of BUCEA under Grant No.101002508
文摘In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.
基金This work was partly supported by 2012 Outstanding Talents Project of Beijing Organization Department under Grant No.2012D00501700005,Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006,National Natural Science Foundation of China under Grant No.61100205
文摘In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金supported by the Natural Science Foundation of China(No.61170174, 61370205)Tianjin Training plan of University Innovation Team(No.TD12-5016)
文摘Faced with hundreds of thousands of news articles in the news websites,it is difficult for users to find the news articles they are interested in.Therefore,various news recommender systems were built.In the news recommendation,these news articles read by a user is typically in the form of a time sequence.However,traditional news recommendation algorithms rarely consider the time sequence characteristic of user browsing behaviors.Therefore,the performance of traditional news recommendation algorithms is not good enough in predicting the next news article which a user will read.To solve this problem,this paper proposes a time-ordered collaborative filtering recommendation algorithm(TOCF),which takes the time sequence characteristic of user behaviors into account.Besides,a new method to compute the similarity among different users,named time-dependent similarity,is proposed.To demonstrate the efficiency of our solution,extensive experiments are conducted along with detailed performance analysis.
基金partially supported by National Natural Science Foundation of China(91546203,61173068,61572295,61573212)Program for New Century Excellent Talents in University of the Ministry of Education+2 种基金the Key Science Technology Project of Shandong Province(2014GGD01063,2015GGE27033)the Independent Innovation Foundation of Shandong Province(2014CGZH1106)the Shandong Provincial Natural Science Foundation(ZR2014FM020)
文摘We construct a call network digraph G with attribution using mobile phone call records within 21 days collected by three operators and analyze the social call behavior features through analyzing the degree distribution of nodes of the network digraph under the help of Graphx based on the Spark Platform.We get the following social conclusions from the communication relationship between phone users:on average,users make about5~7 mobile telephone calls and connect about2~3 persons one day;on weekends,people make less calls but spend longer time on each call,revealing that working calls account for a large part of calls on weekdays;among these telephone calls on weekdays,most are less than one minute,and on average,mobile users that call more people also tend to be called by more individuals.
文摘Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media.
基金supported by the National Natural Science Foundation of Chinaunder Grant No.61171098the Fundamental Research Funds for the Central Universities of Chinathe 111 Project of China under Grant No.B08004
文摘There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important for efficient network management. In this paper, we construct flow graphs from detailed Internet traffic data collected from the public networks of Internet Service Providers. We analyse the community structures of the flow graph that is naturally formed by different applications. The community size, degree distribution of the community, and community overlap of 10 Internet applications are investigated. We further study the correlations between the communities from different applications. Our results provide deep insights into the behaviour Internet applications and traffic, which is helpful for both network management and user behaviour analysis.
基金supported by National Natural Science Foundation of China(No.61171109)Applied Basic Research Programs of Sichuan Science and Technology Department(No.2014JY0215)Basic Research Plan in SWUST(No.13zx9101)
文摘Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)for Microblog network. Specifically,a PSO-based algorithm is developed to learn the user influence,where not only the number of followers is incorporated,but also the interactions among users(e.g.,forwarding and commenting on other users' tweets). Three social factors,the influence and the activity of the target user,together with the coherence between users,are fused to improve the performance of proposed recommendation strategy. Experimental results show that,compared to the well-known Page Rank-based algorithm,the proposed strategy performs much better in terms of precision and recall and it can effectively avoid a biased result caused by celebrity effect and zombie fans effect.
文摘The effect of four dried callus powders derived from certain plants, i.e. tomato, Lycopersicon esculentum; periwinkle, Catharanthus roseus; thorne apple, Datura stramonium and oleander, Nerium oleander applied separately or concomitantly with oxamyl at a half of the recommended dose each on tomato seedlings grown in soil naturally heavy infested with M. incognita under field conditions, indicated that dried callus powder derived from N. oleander either alone or mixed with oxamyl significantly surpassed the other tested treatments in improving percentages of increase in whole plant fresh and shoot dry weights as well as increasing numbers and weights of fruits. Concerning other treatments including oxamyl at a half of recommended dose with each tested callus powder, similar results were evident regarding tomato plant growth parameters. C. roseus plus oxamyl achieved the highest percentage of increase in whole plant fresh weight (141.4%) and shoot dry weight (189.7%) and ranked second to N. oleander + oxamyl in this respect over the untreated plants, respectively. One the other hand, among all tested materials single application of either L. esculentum or oxamyl gave the least values of such criteria which averaged 34.4% and 61.7% or 39.5% and 11.2%, respectively. All tested treatments significantly reduced the total number of galls, egg-masses and eggs in egg-masses especially, dried callus powder of N. oleander which applied singly or combined with oxamyl. The least values of reduction percentages of galls and eggs in egg-masses among all treatments were recorded from tomato plant received dried callus powders of L. esculentum applied alone or concomitant with oxamyl.
文摘The environmental psychology ofa workspace is a rich and diverse field of study that is growing fast and gaining popularity. The indoor environmental factors in workspaces should follow functional as well as behavioral requirements as the spaces are designed as per the user's requirements, needs and aspirations. These play a major role in achieving behavioral impact on the user, as sense of well-being in the environment and physical comfort in the space enhances the productivity and efficiency of the user of the space. The slow and gradual importance of this issue in workspace design with Indian context, post occupancy evaluation can be adjudged as a permanent tool for improving indoor environment in buildings. Occupants should be used as a benchmark of evaluation, showing correlation of physical measurements and subjective parameters. It also suggests recommendations to improve quality of indoor environment in office buildings with analytical study, an important step in post occupancy evaluation. The objective of the paper is to inquire how people experience environmental psychology of the workspace as the determinants are efficiency, productivity and comfort. The success of any design depends upon the degree to which it creates an interface between the user and the environment.
文摘This work explores three patterns of occupants’ control of window blinds and the potential influence on daylight performance of an office room in a tropical climate. In this climate, windows are frequently obstructed by curtains to avoid glare, despite the daylighting and the exterior view. The consequences are obstructed outside view, poor daylight quality and dependency on artificial lighting. This paper assesses the impact on available daylight using parametric analysis based on daylighting dynamic computer simulations using Grasshopper and Daysim software, combining WWR (window-to-wall ratio) (40% and 80%), SVF (sky view factor) (small and large) and occupant behavior (active, intermediate and passive users). The user patterns are based in an office buildings survey that identifies preferences concerning daylight use and control of shading devices. The daylight performance criteria combine UDI (useful daylight illuminance) (500-5,000 lux) and illuminance uniformity distribution. Results confirm the impact of occupant behavior on daylighting performance. The optimum combination of external shading devices, high SVF and high window size results in a useful daylighting for 1/3 of the time for passive users and 2/3 for active users.
基金supported in part by the National Natural Science Foundation of China under Grants No. 61101113,No. 61072088,No.61201198the Beijing Natural Science Foundation under Grants No. 4132007,No. 4132015,No. 4132019the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20111103120017
文摘In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.
文摘In this paper the possibilities for avoiding active air conditioning by all means of the room itself (window size, glazing, shading system, natural ventilation, and furniture), artificial light and control strategy of these systems are investigated. A very important component of the system is the user with his ability to adapt to changing conditions in his surrounding and with his possibilities to manipulate the window, the shading system, the light switch etc. All these aspects interact together. It is necessary to optimize them simultaneously. But real planning often separates them into single sections. Simulation tools also handle normally only one or a few aspects, we know for example the thermal simulation or the daylight simulation. Primero-Comfort (2009) is a simulation tool based on energy+, what is able to consider thermal simulation as well as daylight simulation as well as user behaviour in regard to the probability of window openings. The resulting thermal comfort is rated by an adaptive comfort model, the Dutch ISSO 74 (2004). This allows designing office rooms more realistic. And it shows that an optimized solution has to include the interactions of aU mentioned aspects. Investigations with Primero-Comfort for a moderate European climate (Hamburg) show that a very good comfort can be reached only by passive means of building design also for hot summer weather just like the summer in the year 2003. The keys for such hot-summer-robust-buildings are night ventilation with height difference, heat protection glazing and good shading system, reduced internal heat gains for artificial light by accepting a threshold of 300 lx of daylight as comfortable and a reduced window size oriented on daylighting and the view out of the window.
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
文摘Social media users attracted the attention of scholars at home and abroad.This paper conducted a detailed literature review and prposed an analytical framework to define and conceptualize social media users on the "Actual Man" theory of Marxism.Furthermore, the paper generalizes three research levels, including the individual level,the gruop level and the materialism level.This study can improve understanding of the users' behavior in the social media virtue world as well as provide references for advanced researehe~