With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, ...With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.展开更多
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr...To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.展开更多
The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional ...The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.展开更多
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni...The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.展开更多
It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials&...It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element meth...The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.展开更多
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env...In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.展开更多
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h...Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.展开更多
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo...This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.展开更多
采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行...采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.展开更多
The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid ...The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.展开更多
The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendsh...The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendship network development. Results indicate that international students significantly increase and adapt their new media use while abroad to communicate globally with their friends and family, and locally with their newly formed relationships. Furthermore, social networking site host national friends do not necessarily lead to the development of face-to-face host national friends;however, interaction with established face-to-face host national friends and friend groups via new media platforms leads to an increased understanding of host communication patterns. Finally, this study proposes that researchers who apply Kim’s [1] cross-cultural adaptation theory consider incorporating Host New Media Communication as a principal concept.展开更多
In the last decade, a large amount of data has been published in different fields and can be used as a data source for research and study. However, identifying a specific type of data requires processing, which involv...In the last decade, a large amount of data has been published in different fields and can be used as a data source for research and study. However, identifying a specific type of data requires processing, which involves machine learning classifying techniques. To facilitate this, we propose a general framework that can be applied to any social media content to develop an intelligent system. The framework consists of three main parts: an interface, classifier and ana-lyzer. The analyzer uses media recognition to identify specific features. Then, the classifier uses these features and involves them in the classification process. The interface organizes the interaction between the system compo-nents. We tested the framework and developed a system to be applied to im-age-based social media networks (Instagram). The system was implemented as a mobile application (My Interests) that works as a recommendation and filtering system for Instagram users and reduces the time they spend on irre-levant information. It analyzes the images, categorizes them, identifies the in-teresting ones, and finally, reports the results. We used the Cloud Vision API as a tool to analyze the images and extract their features. Furthermore, we adapted support vector machine (SVM), a machine learning method, to classify images and to predict the preferred ones.展开更多
In the era of We Media, online public opinion in colleges and universities has become an important front of ideological and political, with some characteristics such as concealment, diversity and sensitivity, interact...In the era of We Media, online public opinion in colleges and universities has become an important front of ideological and political, with some characteristics such as concealment, diversity and sensitivity, interaction and immediacy of communication. It is urgent to carry out some researches about network public opinion analysis and guidance mechanism. It is a new challenge that the ideological and political education in colleges and universities, must face how to guide online public opinion effectively. The team building should be strengthened and the right of public opinion should be returned. The platform construction should be enriched, and it is important to give the chance to various media. Therefore, it should strengthen the mechanism construction, and public opinion guidance must be scientific and professional. Colleges and universities should build a clear network space from such aspects as the construction of network public opinion guidance institutions, the cultivation of opinion leaders, the perfection of early warning mechanism, the improvement of university network literacy and the guidance of campus media.展开更多
基金This paper is supported by the National Social Science Foundation Project--Research on Network Association and the Stability and Development of Ethnic Minority Area in China's Borderland--Take Yunnan Area as an example (No. 09CZZ011 ), and the Key Project of Educational Department of Yunnan Province--Research on the policemen working mode guided by intelligence (No. 2010Z089).
文摘With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.
文摘To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.
基金supported by the National High Technology Research and Development (863) Program of China (Grant Nos.2006AA09A209-5)the National Natural Science Foundation of China (Grant Nos. 90510003)the Major Research Project of the Ministry of Education (Grant Nos. 306005)
文摘The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.
文摘The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.
文摘It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金the National Natural Science Foundation of China (Nos.19872002 and 10272003)Climbing Foundation of Northern Jiaotong University
文摘The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.
基金Supported by the National Natural Science Foundation of China (No. 60972038)the Jiangsu Province Universities Natural Science Research Key Grant Project (07KJA-51006)+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200911)Jiangsu Province Graduate In-novative Research Plan (CX09B_149Z)
文摘In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.
基金Project (Nos. 60502014 and 60432030) supported by the National Natural Science Foundation of China
文摘Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.
文摘This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.
文摘采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.
基金supported by the National Nature Science Foundation of China(No.51278383,No.51238009 and No.51025827)Key Scientific and Technological Innovation Team of Zhejiang Province(No.2011R50020)Key Scientific and Technological Innovation Team of Wenzhou(No.C20120006)
文摘The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.
文摘The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendship network development. Results indicate that international students significantly increase and adapt their new media use while abroad to communicate globally with their friends and family, and locally with their newly formed relationships. Furthermore, social networking site host national friends do not necessarily lead to the development of face-to-face host national friends;however, interaction with established face-to-face host national friends and friend groups via new media platforms leads to an increased understanding of host communication patterns. Finally, this study proposes that researchers who apply Kim’s [1] cross-cultural adaptation theory consider incorporating Host New Media Communication as a principal concept.
文摘In the last decade, a large amount of data has been published in different fields and can be used as a data source for research and study. However, identifying a specific type of data requires processing, which involves machine learning classifying techniques. To facilitate this, we propose a general framework that can be applied to any social media content to develop an intelligent system. The framework consists of three main parts: an interface, classifier and ana-lyzer. The analyzer uses media recognition to identify specific features. Then, the classifier uses these features and involves them in the classification process. The interface organizes the interaction between the system compo-nents. We tested the framework and developed a system to be applied to im-age-based social media networks (Instagram). The system was implemented as a mobile application (My Interests) that works as a recommendation and filtering system for Instagram users and reduces the time they spend on irre-levant information. It analyzes the images, categorizes them, identifies the in-teresting ones, and finally, reports the results. We used the Cloud Vision API as a tool to analyze the images and extract their features. Furthermore, we adapted support vector machine (SVM), a machine learning method, to classify images and to predict the preferred ones.
文摘In the era of We Media, online public opinion in colleges and universities has become an important front of ideological and political, with some characteristics such as concealment, diversity and sensitivity, interaction and immediacy of communication. It is urgent to carry out some researches about network public opinion analysis and guidance mechanism. It is a new challenge that the ideological and political education in colleges and universities, must face how to guide online public opinion effectively. The team building should be strengthened and the right of public opinion should be returned. The platform construction should be enriched, and it is important to give the chance to various media. Therefore, it should strengthen the mechanism construction, and public opinion guidance must be scientific and professional. Colleges and universities should build a clear network space from such aspects as the construction of network public opinion guidance institutions, the cultivation of opinion leaders, the perfection of early warning mechanism, the improvement of university network literacy and the guidance of campus media.