In last decade,due to that the popularity of the internet, data-central traffic kept growing,some emerging networking requirements have been posed on the todays telecommunication networks,especially in the area of net...In last decade,due to that the popularity of the internet, data-central traffic kept growing,some emerging networking requirements have been posed on the todays telecommunication networks,especially in the area of network survivability.Obviously,as a key networking problem,network reliability will be more and more important.The integration of different technologies such as ATM,SDH,and WDM in multilayer transport networks raises many questions regarding the coordination of the individual network layers.This problem is referred as multilayer network survivability.The integrated multilayer network survivability is investingated as well as the representation of an interworking strategy between different single layer survivability schemes in IP via generalized multi-protocol label switching over optical network.展开更多
The presented iterative multiuser detection technique was based on joint deregularized and box-constrained solution to quadratic optimization with iterations similar to that used in the nonstationary Tikhonov iterated...The presented iterative multiuser detection technique was based on joint deregularized and box-constrained solution to quadratic optimization with iterations similar to that used in the nonstationary Tikhonov iterated algorithm.The deregularization maximized the energy of the solution,which was opposite to the Tikhonov regularization where the energy was minimized.However,combined with box-constraints,the deregularization forced the solution to be close to the binary set.It further exploited the box-constrained dichotomous coordinate descent algorithm and adapted it to the nonstationary iterative Tikhonov regularization to present an efficient detector.As a result,the worst-case and average complexity are reduced down as K2.8 and K2.5 floating point operation per second,respectively.The development improves the "efficient frontier" in multiuser detection,which is illustrated by simulation results.In addition,most operations in the detector are additions and bit-shifts.This makes the proposed technique attractive for fixed-point hardware implementation.展开更多
The nominal group is an important aspect of English and other languages and requires specific attention because of its complex structure and sequence. This study examines how sequencing affects users' understanding a...The nominal group is an important aspect of English and other languages and requires specific attention because of its complex structure and sequence. This study examines how sequencing affects users' understanding and interpretation of the English nominal group and attempts to prescribe guidelines to the different challenges which the complex ordering of the nominal group poses to users of English as a second language. The findings of the study indicate that the complex ordering of the nominal group has a significant impact on their semantic effects in any discourse, and many of the difficulties users of English as a second language are faced with have to do with lack of adequate understanding of the structure and usage of the nominal group. Some of these problems can be addressed through a comprehensive study and examination of linguists' explanation of the nominal group and practical application of their guidelines. A functional approach to the study of the group will help second language learners of English to have a better understanding of its structure展开更多
Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)f...Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)for Microblog network. Specifically,a PSO-based algorithm is developed to learn the user influence,where not only the number of followers is incorporated,but also the interactions among users(e.g.,forwarding and commenting on other users' tweets). Three social factors,the influence and the activity of the target user,together with the coherence between users,are fused to improve the performance of proposed recommendation strategy. Experimental results show that,compared to the well-known Page Rank-based algorithm,the proposed strategy performs much better in terms of precision and recall and it can effectively avoid a biased result caused by celebrity effect and zombie fans effect.展开更多
The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detect...The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detection performance of spectrum sensing by mobile SUs was analyzed. Three performance metrics,i.e.,detection probability,miss detection probability and false alarm probability,were thoroughly investigated. In our analysis,a critical variable was the real-time received primary user signal power by a mobile SU. Its probability distribution and mathematical expectation were analytically derived. Moreover,the three performance metrics in single-node spectrum sensing and multi-node collaborative spectrum sensing systems were also derived. Extensive simulations were performed. The results are consistent with the theoretical analysis. And it is concluded that SU mobility has a significant impact on the detection probability and the miss detection probability,but not on the false alarm probability.展开更多
The relatively high percentage of people with disabilities in Europe combined with the facts of ageing population, strong relation of impairment to age, and as State of the Art shows, dissatisfaction or even unawarene...The relatively high percentage of people with disabilities in Europe combined with the facts of ageing population, strong relation of impairment to age, and as State of the Art shows, dissatisfaction or even unawareness of people with disabilities of available assistive technology are revealing the necessity to incorporate a user-centric approach that beyond 2nd generation practices will achieve to provide embedded and built-in accessibility solutions, as well as toolkits for developers, for "engraving" accessibility in existing and emerging mass-market ICT-based products, aiming to make accessibility open, plug and play, personalised and configurable, realistic and applicable in various contexts, keeping always the user in the loop. The AEGIS (Accessibility Everywhere: Groundwork, Infrastructure, Standards) IP (Integrated Project) of the 7th European Framework Programme seeks to determine whether 3rd generation access techniques will provide a more accessible, more exploitable and deeply embeddable approach in mainstream ICT (information and communication technologies). This paper presents the holistic UCD (user-centered design) implementation plan, upon which AEGIS has been based in order to achieve its targets, starting from modelling its target users, in the most efficient way possible.展开更多
The Language Policy for Higher Education (2002) and University of Cape Town's Language Plan (2001) suggest that language is central to our social and academic engagement at every level: to our communication with...The Language Policy for Higher Education (2002) and University of Cape Town's Language Plan (2001) suggest that language is central to our social and academic engagement at every level: to our communication with those around us, to our learning, and to our identities. The purpose of this paper is to show how the medical school, after making progress towards implementing the University of Cape Town's Language Plan of 2001, is compelled to encourage isiXhosa language developers to develop the necessary and relevant vocabulary responding to the needs of the target users. In some cases, there is a need to adopt terms that are already available and being used by the speech community to align them in the curriculum. Research conducted by analyzing field notes, having plenary discussions with students, observations during clinical practice, reflecting on the curriculum and study materials material. Results indicated the significance of teaching isiXhosa drawing from the medical jargon understood amongst patients, doctors, and nurses. This paper discusses the status enjoyed by isiXhosa to date, language teaching and teaching matters pertaining to isiXhosa, and reflection on whether there is benefit in learning isiXhosa.展开更多
With the advent of the era of symbolic consumption, products' value of his "symbol" is getting more and more important. By discussing the meaning of the symbolic design of product, it puts forward the design method...With the advent of the era of symbolic consumption, products' value of his "symbol" is getting more and more important. By discussing the meaning of the symbolic design of product, it puts forward the design method of realizing symbolic design from the inspects of products' shape, material, color, and using ways, and constructs the symbolic value of commodity, and manifests the target users' emotion, identity, way of life, differences in value orientation, etc, to meet the high-level needs of people.展开更多
Standard e-government information system(SEIS) including mobile-government applications are playing more and more important roles in the establishing of national e-government framework. It can be beneficial not only f...Standard e-government information system(SEIS) including mobile-government applications are playing more and more important roles in the establishing of national e-government framework. It can be beneficial not only for avoiding redundant e-government IS development but also for improving collaboration among government agencies. Two research questions were explored: what are the factors influencing the performance of SEIS? Will mandatory SEIS create a better performance than non-mandatory SEIS? Specifically, the use of five categories of IS aspects--information system quality, online service quality, offline service quality, diffusion modes and standard network size—is proposed to understand the performance of SEIS through applying both survey study and simulation study. The results show that information system quality and online service quality of SEIS have strong effects on users' expectation and users' satisfaction, which thereafter promotes the performance of SEIS. Government agencies' offline service quality shows a significant effect on users' satisfaction while not on users' expectation. Furthermore, the diffusion speed of SEIS in non-mandatory and mandatory modes and the standard network size also have great influence on the utility of SEIS.展开更多
The sign algorithm has been extensively investigated for digital echo cancellation application and other adaptive filtering applications. In this paper, we use the blind averaging Sign-regressor (SR) algorithm for ada...The sign algorithm has been extensively investigated for digital echo cancellation application and other adaptive filtering applications. In this paper, we use the blind averaging Sign-regressor (SR) algorithm for adaptive multiuser detection. It is another least mean square (LMS) algorithm and eliminates the need for multiplication in the adaptive algorithm. The new algorithm not only reduces the calculation complexity but also has good convergence character. Simulations indicate that this algorithm can adapt to the changes of the environment quickly and improve the stability of the SIR.展开更多
Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from l...Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from low to high. So how people can evaluate OSS and ensta-e that it is reliable for use becomes necessary. This paper proposes a set of reliability evaluation metrics considering the states of OSS selected in the early stage. Understandability, Fault tolerance & Recoverability and Community Matmrity as sub-attributes of reliability are defined, and then several evaluation criteria for each of them are identified. A process of reliability evaluation in our study is proposed. For application, we select four OSS projects and evaluate them with our metrics. As a result of compadrison with other evaluation model for OSS, our research presents an easy, effective and trustworthy way for selecting a reliable OSS.展开更多
Social tagging systems are widely applied in Web 2.0.Many users use these systems to create,organize,manage,and share Internet resources freely.However,many ambiguous and uncontrolled tags produced by social tagging s...Social tagging systems are widely applied in Web 2.0.Many users use these systems to create,organize,manage,and share Internet resources freely.However,many ambiguous and uncontrolled tags produced by social tagging systems not only worsen users' experience,but also restrict resources' retrieval efficiency.Tag clustering can aggregate tags with similar semantics together,and help mitigate the above problems.In this paper,we first present a common co-occurrence group similarity based approach,which employs the ternary relation among users,resources,and tags to measure the semantic relevance between tags.Then we propose a spectral clustering method to address the high dimensionality and sparsity of the annotating data.Finally,experimental results show that the proposed method is useful and efficient.展开更多
Generally, predicting whether an item will be liked or disliked by active users, and how much an item will be liked, is a main task of collaborative filtering systems or recommender systems. Recently, predicting most ...Generally, predicting whether an item will be liked or disliked by active users, and how much an item will be liked, is a main task of collaborative filtering systems or recommender systems. Recently, predicting most likely bought items for a target user, which is a subproblem of the rank problem of collaborative filtering, became an important task in collaborative filtering. Traditionally, the prediction uses the user item co-occurrence data based on users' buying behaviors. However, it is challenging to achieve good prediction performance using traditional methods based on single domain information due to the extreme sparsity of the buying matrix. In this paper, we propose a novel method called the preference transfer model for effective cross-domain collaborative filtering. Based on the preference transfer model, a common basis item-factor matrix and different user-factor matrices are factorized.Each user-factor matrix can be viewed as user preference in terms of browsing behavior or buying behavior. Then,two factor-user matrices can be used to construct a so-called ‘preference dictionary' that can discover in advance the consistent preference of users, from their browsing behaviors to their buying behaviors. Experimental results demonstrate that the proposed preference transfer model outperforms the other methods on the Alibaba Tmall data set provided by the Alibaba Group.展开更多
文摘In last decade,due to that the popularity of the internet, data-central traffic kept growing,some emerging networking requirements have been posed on the todays telecommunication networks,especially in the area of network survivability.Obviously,as a key networking problem,network reliability will be more and more important.The integration of different technologies such as ATM,SDH,and WDM in multilayer transport networks raises many questions regarding the coordination of the individual network layers.This problem is referred as multilayer network survivability.The integrated multilayer network survivability is investingated as well as the representation of an interworking strategy between different single layer survivability schemes in IP via generalized multi-protocol label switching over optical network.
文摘The presented iterative multiuser detection technique was based on joint deregularized and box-constrained solution to quadratic optimization with iterations similar to that used in the nonstationary Tikhonov iterated algorithm.The deregularization maximized the energy of the solution,which was opposite to the Tikhonov regularization where the energy was minimized.However,combined with box-constraints,the deregularization forced the solution to be close to the binary set.It further exploited the box-constrained dichotomous coordinate descent algorithm and adapted it to the nonstationary iterative Tikhonov regularization to present an efficient detector.As a result,the worst-case and average complexity are reduced down as K2.8 and K2.5 floating point operation per second,respectively.The development improves the "efficient frontier" in multiuser detection,which is illustrated by simulation results.In addition,most operations in the detector are additions and bit-shifts.This makes the proposed technique attractive for fixed-point hardware implementation.
文摘The nominal group is an important aspect of English and other languages and requires specific attention because of its complex structure and sequence. This study examines how sequencing affects users' understanding and interpretation of the English nominal group and attempts to prescribe guidelines to the different challenges which the complex ordering of the nominal group poses to users of English as a second language. The findings of the study indicate that the complex ordering of the nominal group has a significant impact on their semantic effects in any discourse, and many of the difficulties users of English as a second language are faced with have to do with lack of adequate understanding of the structure and usage of the nominal group. Some of these problems can be addressed through a comprehensive study and examination of linguists' explanation of the nominal group and practical application of their guidelines. A functional approach to the study of the group will help second language learners of English to have a better understanding of its structure
基金supported by National Natural Science Foundation of China(No.61171109)Applied Basic Research Programs of Sichuan Science and Technology Department(No.2014JY0215)Basic Research Plan in SWUST(No.13zx9101)
文摘Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommendation strategy based on particle swarm optimization(PSO)for Microblog network. Specifically,a PSO-based algorithm is developed to learn the user influence,where not only the number of followers is incorporated,but also the interactions among users(e.g.,forwarding and commenting on other users' tweets). Three social factors,the influence and the activity of the target user,together with the coherence between users,are fused to improve the performance of proposed recommendation strategy. Experimental results show that,compared to the well-known Page Rank-based algorithm,the proposed strategy performs much better in terms of precision and recall and it can effectively avoid a biased result caused by celebrity effect and zombie fans effect.
基金supported by National Natural Science Foundation of China under Grand No.61671183
文摘The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detection performance of spectrum sensing by mobile SUs was analyzed. Three performance metrics,i.e.,detection probability,miss detection probability and false alarm probability,were thoroughly investigated. In our analysis,a critical variable was the real-time received primary user signal power by a mobile SU. Its probability distribution and mathematical expectation were analytically derived. Moreover,the three performance metrics in single-node spectrum sensing and multi-node collaborative spectrum sensing systems were also derived. Extensive simulations were performed. The results are consistent with the theoretical analysis. And it is concluded that SU mobility has a significant impact on the detection probability and the miss detection probability,but not on the false alarm probability.
文摘The relatively high percentage of people with disabilities in Europe combined with the facts of ageing population, strong relation of impairment to age, and as State of the Art shows, dissatisfaction or even unawareness of people with disabilities of available assistive technology are revealing the necessity to incorporate a user-centric approach that beyond 2nd generation practices will achieve to provide embedded and built-in accessibility solutions, as well as toolkits for developers, for "engraving" accessibility in existing and emerging mass-market ICT-based products, aiming to make accessibility open, plug and play, personalised and configurable, realistic and applicable in various contexts, keeping always the user in the loop. The AEGIS (Accessibility Everywhere: Groundwork, Infrastructure, Standards) IP (Integrated Project) of the 7th European Framework Programme seeks to determine whether 3rd generation access techniques will provide a more accessible, more exploitable and deeply embeddable approach in mainstream ICT (information and communication technologies). This paper presents the holistic UCD (user-centered design) implementation plan, upon which AEGIS has been based in order to achieve its targets, starting from modelling its target users, in the most efficient way possible.
文摘The Language Policy for Higher Education (2002) and University of Cape Town's Language Plan (2001) suggest that language is central to our social and academic engagement at every level: to our communication with those around us, to our learning, and to our identities. The purpose of this paper is to show how the medical school, after making progress towards implementing the University of Cape Town's Language Plan of 2001, is compelled to encourage isiXhosa language developers to develop the necessary and relevant vocabulary responding to the needs of the target users. In some cases, there is a need to adopt terms that are already available and being used by the speech community to align them in the curriculum. Research conducted by analyzing field notes, having plenary discussions with students, observations during clinical practice, reflecting on the curriculum and study materials material. Results indicated the significance of teaching isiXhosa drawing from the medical jargon understood amongst patients, doctors, and nurses. This paper discusses the status enjoyed by isiXhosa to date, language teaching and teaching matters pertaining to isiXhosa, and reflection on whether there is benefit in learning isiXhosa.
文摘With the advent of the era of symbolic consumption, products' value of his "symbol" is getting more and more important. By discussing the meaning of the symbolic design of product, it puts forward the design method of realizing symbolic design from the inspects of products' shape, material, color, and using ways, and constructs the symbolic value of commodity, and manifests the target users' emotion, identity, way of life, differences in value orientation, etc, to meet the high-level needs of people.
基金supported by the Natural Science Foundation of China (71103021, 71573022, 71372193, 71301106)Beijing Philosophy and Social Science Planning Foundation (13JGC085)+1 种基金Beijing Higher Education Yong Elite Teacher Foundation (YETP0852)Humanities and Social Sciences Foundation of the Ministry of Education(13YJC630034, 13YJA790023)
文摘Standard e-government information system(SEIS) including mobile-government applications are playing more and more important roles in the establishing of national e-government framework. It can be beneficial not only for avoiding redundant e-government IS development but also for improving collaboration among government agencies. Two research questions were explored: what are the factors influencing the performance of SEIS? Will mandatory SEIS create a better performance than non-mandatory SEIS? Specifically, the use of five categories of IS aspects--information system quality, online service quality, offline service quality, diffusion modes and standard network size—is proposed to understand the performance of SEIS through applying both survey study and simulation study. The results show that information system quality and online service quality of SEIS have strong effects on users' expectation and users' satisfaction, which thereafter promotes the performance of SEIS. Government agencies' offline service quality shows a significant effect on users' satisfaction while not on users' expectation. Furthermore, the diffusion speed of SEIS in non-mandatory and mandatory modes and the standard network size also have great influence on the utility of SEIS.
文摘The sign algorithm has been extensively investigated for digital echo cancellation application and other adaptive filtering applications. In this paper, we use the blind averaging Sign-regressor (SR) algorithm for adaptive multiuser detection. It is another least mean square (LMS) algorithm and eliminates the need for multiplication in the adaptive algorithm. The new algorithm not only reduces the calculation complexity but also has good convergence character. Simulations indicate that this algorithm can adapt to the changes of the environment quickly and improve the stability of the SIR.
文摘Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from low to high. So how people can evaluate OSS and ensta-e that it is reliable for use becomes necessary. This paper proposes a set of reliability evaluation metrics considering the states of OSS selected in the early stage. Understandability, Fault tolerance & Recoverability and Community Matmrity as sub-attributes of reliability are defined, and then several evaluation criteria for each of them are identified. A process of reliability evaluation in our study is proposed. For application, we select four OSS projects and evaluate them with our metrics. As a result of compadrison with other evaluation model for OSS, our research presents an easy, effective and trustworthy way for selecting a reliable OSS.
基金supported by the National Natural Science Foundation of China(Nos.61273292,61303131,51474007,and 51374114)the MOE Humanities and Social Science Research on Youth Foundation of China(No.13YJCZH077)
文摘Social tagging systems are widely applied in Web 2.0.Many users use these systems to create,organize,manage,and share Internet resources freely.However,many ambiguous and uncontrolled tags produced by social tagging systems not only worsen users' experience,but also restrict resources' retrieval efficiency.Tag clustering can aggregate tags with similar semantics together,and help mitigate the above problems.In this paper,we first present a common co-occurrence group similarity based approach,which employs the ternary relation among users,resources,and tags to measure the semantic relevance between tags.Then we propose a spectral clustering method to address the high dimensionality and sparsity of the annotating data.Finally,experimental results show that the proposed method is useful and efficient.
基金supported by the National Basic Research Program(973)of China(No.2012CB316400)the National Natural Science Foundation of China(No.61571393)
文摘Generally, predicting whether an item will be liked or disliked by active users, and how much an item will be liked, is a main task of collaborative filtering systems or recommender systems. Recently, predicting most likely bought items for a target user, which is a subproblem of the rank problem of collaborative filtering, became an important task in collaborative filtering. Traditionally, the prediction uses the user item co-occurrence data based on users' buying behaviors. However, it is challenging to achieve good prediction performance using traditional methods based on single domain information due to the extreme sparsity of the buying matrix. In this paper, we propose a novel method called the preference transfer model for effective cross-domain collaborative filtering. Based on the preference transfer model, a common basis item-factor matrix and different user-factor matrices are factorized.Each user-factor matrix can be viewed as user preference in terms of browsing behavior or buying behavior. Then,two factor-user matrices can be used to construct a so-called ‘preference dictionary' that can discover in advance the consistent preference of users, from their browsing behaviors to their buying behaviors. Experimental results demonstrate that the proposed preference transfer model outperforms the other methods on the Alibaba Tmall data set provided by the Alibaba Group.