期刊文献+
共找到1,320篇文章
< 1 2 66 >
每页显示 20 50 100
Research on Multi-Objective Optimization Model of Industrial Microgrid Considering Demand Response Technology and User Satisfaction
1
作者 Junhui Li Jinxin Zhong +3 位作者 Kailiang Wang Yu Luo Qian Han Jieren Tan 《Energy Engineering》 EI 2023年第4期869-884,共16页
In the process of wind power,coal power,and energy storage equipment participating in the operation of industrial microgrids,the stable operation of wind-storage industrial microgrids is guaranteed by considering dema... In the process of wind power,coal power,and energy storage equipment participating in the operation of industrial microgrids,the stable operation of wind-storage industrial microgrids is guaranteed by considering demand response technology and user satisfaction.This paper firstly sorts out the status quo of microgrid operation optimization,and determines themain requirements for user satisfaction considering three types of load characteristics,demand response technology,power consumption benefit loss,user balance power purchase price and wind power consumption evaluation indicators in the system.Secondly,the operation architecture of the windstorage industrialmicrogrid is designed,and themulti-objective optimizationmodel of the wind-storage industrial microgrid is established with the comprehensive operating cost and user satisfaction as the target variables,and the corresponding solution method is mentioned.Finally,a typical wind-storage industrial microgrid is selected for simulation analysis,and the results showthat,(1)Considering the demand response technology,the comprehensive operating cost of the wind-storage industrial microgrid per day is 5292.63 yuan,the user satisfaction index is 0.953,and the wind power consumption rate reaches 100%.(2)By setting four scenarios,it highlights that the grid-connected operation mode is superior to the off-grid operation mode.Considering the demand response technology,the load curve can be optimized,and the time-of-use electricity price can be fully used to coordinate the operation of each unit,which enhances the wind power consumption capacity.The compromise solution of the system comprehensive operating cost and user satisfaction under the confidence level of 0.95 is obtained,namely(5343.22,0.94).(3)The frontier curve shows that in the process of model solving,it is impossible to optimize any sub-objective by changing the control variables,which proves that there is a close relationship between the comprehensive operating cost of the system and the confidence level,which can provide effective guidance for the optimal operation of industrial microgrids. 展开更多
关键词 Wind storage industrial microgrid demand response user satisfaction
下载PDF
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
2
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 user intent CLUSTER user profile online search information sharing user behavior search reasons
下载PDF
User Preference Aware Hierarchical Edge-User Cooperative Caching Strategy
3
作者 Wu Dapeng Yang Lin +2 位作者 Cui Yaping He Peng Wang Ruyan 《China Communications》 SCIE CSCD 2024年第6期69-86,共18页
The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been conside... The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been considered as a feasible scheme.However,how to efficiently utilize the limited caching resources to cache diverse contents has been confirmed as a tough problem in the past decade.In this paper,considering the time-varying user requests and the heterogeneous content sizes,a user preference aware hierarchical cooperative caching strategy in edge-user caching architecture is proposed.We divide the caching strategy into three phases,that is,the content placement,the content delivery and the content update.In the content placement phase,a cooperative content placement algorithm for local content popularity is designed to cache contents proactively.In the content delivery phase,a cooperative delivery algorithm is proposed to deliver the cached contents.In the content update phase,a content update algorithm is proposed according to the popularity of the contents.Finally,the proposed caching strategy is validated using the MovieLens dataset,and the results reveal that the proposed strategy improves the delay performance by at least 35.3%compared with the other three benchmark strategies. 展开更多
关键词 cooperative caching network delay timevarying popularity user preference
下载PDF
Channel Correlation Based User Grouping Algorithm for Nonlinear Precoding Satellite Communication System
4
作者 Ke Wang Baorui Feng +5 位作者 Jingui Zhao Wenliang Lin Zhongliang Deng Dongdong Wang Yi Cen Genan Wu 《China Communications》 SCIE CSCD 2024年第1期200-214,共15页
Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear ... Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear precoding such as Tomlinson-Harashima precoding(THP)algorithm has been proved to be a promising technology to solve this problem,which has smaller noise amplification effect compared with linear precoding.However,the similarity of different user channels(defined as channel correlation)will degrade the performance of THP algorithm.In this paper,we qualitatively analyze the inter-beam interference in the whole process of LEO satellite over a specific coverage area,and the impact of channel correlation on Signal-to-Noise Ratio(SNR)of receivers when THP is applied.One user grouping algorithm is proposed based on the analysis of channel correlation,which could decrease the number of users with high channel correlation in each precoding group,thus improve the performance of THP.Furthermore,our algorithm is designed under the premise of co-frequency deployment and orthogonal frequency division multiplexing(OFDM),which leads to more users under severe inter-beam interference compared to the existing research on geostationary orbit satellites broadcasting systems.Simulation results show that the proposed user grouping algorithm possesses higher channel capacity and better bit error rate(BER)performance in high SNR conditions relative to existing works. 展开更多
关键词 channel correlation inter-beam interference multibeam satellite Tomlinson-Harashima precoding user grouping
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
5
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Joint Optimization of Resource Allocation and Trajectory Based on User Trajectory for UAV-Assisted Backscatter Communication System
6
作者 Peizhong Xie Junjie Jiang +1 位作者 Ting Li Yin Lu 《China Communications》 SCIE CSCD 2024年第2期197-209,共13页
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca... The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme. 展开更多
关键词 energy efficiency joint optimization UAV-assisted backscatter communication user trajectory
下载PDF
Resource Allocation in Multi-User Cellular Networks:A Transformer-Based Deep Reinforcement Learning Approach
7
作者 Zhao Di Zheng Zhong +2 位作者 Qin Pengfei Qin Hao Song Bin 《China Communications》 SCIE CSCD 2024年第5期77-96,共20页
To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlin... To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance. 展开更多
关键词 dynamic resource allocation multi-user cellular network spectrum efficiency user fairness
下载PDF
Resource Allocation for IRS Assistedmm Wave Wireless Powered Sensor Networks with User Cooperation
8
作者 Yonghui Lin Zhengyu Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期663-677,共15页
In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET... In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET)phase first and then cooperatively transmit information to a hybrid access point(AP)in the wireless information transmission(WIT)phase,following which the IRS is deployed to enhance the system performance of theWET andWIT.We maximized the weighted sum-rate problem by jointly optimizing the transmit time slots,power allocations,and the phase shifts of the IRS.Due to the non-convexity of the original problem,a semidefinite programming relaxation-based approach is proposed to convert the formulated problem to a convex optimization framework,which can obtain the optimal global solution.Simulation results demonstrate that the weighted sum throughput of the proposed UC scheme outperforms the non-UC scheme whether equipped with IRS or not. 展开更多
关键词 Intelligent reflecting surface millimeter wave wireless powered sensor networks user cooperation resource allocation
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
9
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Hepatitis B Surface Antigen and Hepatitis C Virus Antibodies among Drug Users in Burkina Faso
10
作者 Sylvie Zida Kadari Cissé +13 位作者 Odette Ky-Zerbo Dinanibè Kambiré Serge Théophile Soubeiga Simon Tiendrebéogo Fatou Sissoko Issa Sory Célestine Ki-Toé Solange Dioma Djeneba Zorom Adama Ouédraogo Cedric Dimitri Axon Hien Mahamoudou Sanou Seni Kouanda Henri Gautier Ouédraogo 《Advances in Microbiology》 CAS 2024年第1期92-104,共13页
Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and ... Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso. 展开更多
关键词 Drug users Hepatitis C Hepatitis B PREVALENCE Burkina Faso
下载PDF
Reform of the Irrigation Sector and Creation of Functional and Sustainable Irrigation Water Users Associations (AUEI) in Niger: Capitalization of the Experience of the Konni AHA
11
作者 Saidou Abdoulkarimou Illou Mahamadou 《Agricultural Sciences》 2024年第2期209-229,共21页
During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to coo... During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI. 展开更多
关键词 Konni (Niger) Hydro-Agricultural Developments Association of Irrigation Water users GOVERNANCE
下载PDF
Framework to Model User Request Access Patterns in the World Wide Web
12
作者 Richard Hurley Robert Sturgeon 《Journal of Software Engineering and Applications》 2024年第2期69-88,共20页
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa... In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns. 展开更多
关键词 Performance Modelling World Wide Web SIMULATION user Request Access Patterns FRAMEWORK
下载PDF
Fighting the Ignorance: Public Authorities’ and Land Users’ Responses to Land Subsidence in Indonesia 被引量:1
13
作者 Erlis Saputra Thomas Hartmann +1 位作者 Annelies Zoomers Tejo Spit 《American Journal of Climate Change》 2017年第1期1-21,共21页
Land subsidence can have a considerable impact on the socio-economic viability of areas. In urban areas, land subsidence tends to damage buildings and infrastructures gradually, while in rural peat land it slowly dest... Land subsidence can have a considerable impact on the socio-economic viability of areas. In urban areas, land subsidence tends to damage buildings and infrastructures gradually, while in rural peat land it slowly destroys vegetation. The damages will worsen since climate change has further implications for the areas affected by land subsidence. In Indonesia, the response to land subsidence varies in different areas in terms of awareness, urgency and action on the part of both public authorities and land users. This paper systematically investigates these varied responses in urban and rural peat land areas. Interviews with experts and surveys of 330 land users in selected sub-districts were conducted and further supplemented by focus group discussions. We found that both the public authorities as well as the land users’ responses were considered as of limited value to contest land subsidence. We suggest that the endorsement of land users’ response into governmental policies would make a significant difference in improving land subsidence management. 展开更多
关键词 Indonesia LAND SUBsideNCE LAND userS PUBLIC Authorities Response
下载PDF
Analysis and Simulations of Open-Source Intelligence Process System Dynamics from User’s Perspective 被引量:1
14
作者 Huan Liu Zhenyu Tang +1 位作者 Ning Zhao Wei Qian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期541-558,共18页
In today’s society with advanced Internet,the amount of information increases dramatically with each passing day,which leads to increasingly complex processes of open-source intelligence.Therefore,it is more importan... In today’s society with advanced Internet,the amount of information increases dramatically with each passing day,which leads to increasingly complex processes of open-source intelligence.Therefore,it is more important to rationalize the operation mode and improve the operation efficiency of open-source intelligence under the premise of satisfying users’needs.This paper focuses on the simulation study of the process system of opensource intelligence from the user’s perspective.First,the basic concept and development status of open-source intelligence are introduced in details.Second,six existing intelligence operation process models are summarized and their advantages and disadvantages are compared in focus.Based on users’preference,the open-source intelligence system simulation theory model is constructed from four aspects:intelligence collection,intelligence processing,intelligence analysis,and intelligence delivery.Meanwhile,the dynamics model of the open-source intelligence process system is constructed based on the open-source intelligence system simulation theoretical model,which specifically includes five parts:determination of system boundary,construction of causal loop diagram,construction of stock flow diagram,writing ofmathematical equations,and system sensitivity test.Finally,the system simulation results were analyzed.It was found that improving the system of intelligence agencies,opening up government affairs,improving the professional level of intelligence personnel,strengthening the communication and cooperation among personnel of various intelligence departments,and expressing intelligence products through diverse forms can effectively improve the operational efficiency of the open-source intelligence process system. 展开更多
关键词 Open-source intelligence system dynamics FEEDBACK user demand deviation
下载PDF
Topological and Historical Considerations for Infectious Disease Transmission among Injecting Drug Users in Bushwick, Brooklyn (USA)
15
作者 Kirk Dombrowski Richard Curtis +1 位作者 Samuel Friedman Bilal Khan 《World Journal of AIDS》 2013年第1期1-9,共9页
Recent interest by physicists in social networks and disease transmission factors has prompted debate over the topology of degree distributions in sexual networks. Social network researchers have been critical of “sc... Recent interest by physicists in social networks and disease transmission factors has prompted debate over the topology of degree distributions in sexual networks. Social network researchers have been critical of “scale-free” Barabasi-Albert approaches, and largely rejected the preferential attachment, “rich-get-richer” assumptions that underlie that model. Instead, research on sexual networks has pointed to the importance of homophily and local sexual norms in dictating degree distributions, and thus disease transmission thresholds. Injecting Drug User (IDU) network topologies may differ from the emerging models of sexual networks, however. Degree distribution analysis of a Brooklyn, NY, IDU network indicates a different topology than the spanning tree configurations discussed for sexual networks, instead featuring comparatively short cycles and high concurrency. Our findings suggest that IDU networks do in some ways conform to a “scale-free” topology, and thus may represent “reservoirs” of potential infection despite seemingly low transmission thresholds. 展开更多
关键词 SOCIAL Network Analysis INJECTING Drug userS SCALE-FREE Networks
下载PDF
Orthogonal Frequency Division Multiplexing Adaptive Technology for Multinode Users of Seawater Channel Based on Inductively Coupled Mooring Chain
16
作者 ZHENG Yu LIU Yingjie +3 位作者 REN Yuanhong FEI Chen ZHANG Shijiang LI Hongzhi 《Journal of Ocean University of China》 SCIE CAS CSCD 2023年第5期1243-1252,共10页
As an important part of buoy-type ocean monitoring systems,the inductively coupled mooring chain solves the problem of data cotransmission through the multinode sensors that it carries,which is significant for the rap... As an important part of buoy-type ocean monitoring systems,the inductively coupled mooring chain solves the problem of data cotransmission through the multinode sensors that it carries,which is significant for the rapid acquisition of fish,hydrology,and other information.This paper is based on a seawater channel transmission model with a depth of 300 m and a bandwidth of 2 MHz.An orthogonal frequency division multiplexing(OFDM)technology is used to overcome the multipath effect of signal transmission on a seawater medium.The adaptive technology is integrated into the OFDM,and an improved joint subcarrier and bit power allocation algorithm is proposed.This algorithm solves the problem of dynamic subcarrier allocation during the cotransmission of underwater multinode user data in seawater channels.The results show that the algorithm complexity can be reduced by 0.18126×10^(-2)s during one complete OFDM system data transmission by the improved greedy algorithm,and a total of 216 bits are transmitted by the OFDM.The normalized channel capacity can be improved by 0.012 bit s^(-1)Hz^(-1).At the bit error ratio(BER)of 10^(-3),the BER performance can be improved by approximately 6 d B.When the numbers of users are 4 and 8,the improved algorithm increases the channel capacity,and the higher the number of users,the more evident the channel capacity improvement effect is.The results of this paper have an important reference value for enhancing the transmission performance of inductively coupled mooring chain underwater multinode data. 展开更多
关键词 inductively coupled mooring chain seawater channel multinode users OFDM adaptive technology
下载PDF
Spectrum-Efficient User Association in Caching Enabled Dense Small Cell Network
17
作者 Junyu Liu Min Sheng +2 位作者 Xiaona Zhao Shuang Ni Jiandong Li 《China Communications》 SCIE CSCD 2023年第3期86-104,共19页
In this paper,we reveal the fundamental limitation of network densification on the performance of caching enabled small cell network(CSCN)under two typical user association rules,namely,contentand distance-based rules... In this paper,we reveal the fundamental limitation of network densification on the performance of caching enabled small cell network(CSCN)under two typical user association rules,namely,contentand distance-based rules.It indicates that immoderately caching content would significantly change the interference distribution in CSCN,which may degrade the network area spectral efficiency(ASE).Meanwhile,it is shown that content-based rule outperforms the distance-based rule in terms of network ASE only when small cell base stations(BSs)are sparsely deployed with low decoding thresholds.Moreover,it is proved that network ASE under distance-based user association serves as the upper bound of that under content-based rule in dense BS regime.To enable more spectrum-efficient user association in dense CSCN,we further optimize network ASE by designing a probabilistic content retrieving strategy based on distance-based rule.With the optimized retrieving probability,network ASE could be substantially enhanced and even increase with the growing BS density in dense BS regime. 展开更多
关键词 CACHING dense network user association
下载PDF
A Study of Ensemble Feature Selection and Adversarial Training for Malicious User Detection
18
作者 Linjie Zhang Xiaoyan Zhu Jianfeng Ma 《China Communications》 SCIE CSCD 2023年第10期212-229,共18页
The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from t... The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from the intrusion of malicious users.Some studies focus on static characteristics of malicious users,which is easy to be bypassed by camouflaged malicious users.In this paper,we present a malicious user detection method based on ensemble feature selection and adversarial training.Firstly,the feature selection alleviates the dimension disaster problem and achieves more accurate classification performance.Secondly,we embed features into the multidimensional space and aggregate it into a feature map to encode the explicit content preference and implicit interaction preference.Thirdly,we use an effective ensemble learning which could avoid over-fitting and has good noise resistance.Finally,we propose a datadriven neural network detection model with the regularization technique adversarial training to deeply analyze the characteristics.It simplifies the parameters,obtaining more robust interaction features and pattern features.We demonstrate the effectiveness of our approach with numerical simulation results for malicious user detection,where the robustness issues are notable concerns. 展开更多
关键词 malicious user detection feature selection ensemble learning adversarial training
下载PDF
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
19
作者 Wen Deng Guangjun Liang +3 位作者 Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1561-1576,共16页
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value. 展开更多
关键词 CRAWLER user portrait feature engineering deep learning small program development
下载PDF
Classifying Misinformation of User Credibility in Social Media Using Supervised Learning
20
作者 Muhammad Asfand-e-Yar Qadeer Hashir +1 位作者 Syed Hassan Tanvir Wajeeha Khalil 《Computers, Materials & Continua》 SCIE EI 2023年第5期2921-2938,共18页
The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social network... The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks. 展开更多
关键词 MISINFORMATION user credibility fake news machine learning
下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部