期刊文献+
共找到386篇文章
< 1 2 20 >
每页显示 20 50 100
Classifying Misinformation of User Credibility in Social Media Using Supervised Learning
1
作者 Muhammad Asfand-e-Yar Qadeer Hashir +1 位作者 Syed Hassan Tanvir Wajeeha Khalil 《Computers, Materials & Continua》 SCIE EI 2023年第5期2921-2938,共18页
The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social network... The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks. 展开更多
关键词 MIsINFORMATION user credibility fake news machine learning
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
2
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 user’s needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
3
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE user’s GUIDE
下载PDF
Improved Collaborative Filtering Recommendation Based on Classification and User Trust 被引量:3
4
作者 Xiao-Lin Xu Guang-Lin Xu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期25-31,共7页
When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes ... When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation. 展开更多
关键词 Collaborative filtering credibility of ratings evaluation on user trust item classification similarity metric
下载PDF
Frequent Itemset Mining of User’s Multi-Attribute under Local Differential Privacy 被引量:2
5
作者 Haijiang Liu Lianwei Cui +1 位作者 Xuebin Ma Celimuge Wu 《Computers, Materials & Continua》 SCIE EI 2020年第10期369-385,共17页
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ... Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets. 展开更多
关键词 Local differential privacy frequent itemset mining user’s multi-attribute
下载PDF
User’s Relevance of PIR System Based on Cloud Models 被引量:1
6
作者 康海燕 樊孝忠 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期181-185,共5页
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f... A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better. 展开更多
关键词 personalized information retrieval (PIR) cloud model users relevance fuzzy evaluation
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
7
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization users behaviour traffic module sDN
下载PDF
Method of Consistency Judgment for App Software’s User Comments
8
作者 Meng Ran Ying Jiang +1 位作者 Qixin Xiang Jiaman Ding 《国际计算机前沿大会会议论文集》 2016年第1期121-123,共3页
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ... With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective. 展开更多
关键词 social computing APP software The CONsIsTENCY of user COMMENT user’s COMMENT information user’s mark Featuresentiment-word-pairs Network sentiment WORD
下载PDF
Changes in the Structure of China's Net Users
9
《China's Foreign Trade》 2000年第5期44-44,共1页
关键词 Changes in the structure of China’s Net users
下载PDF
B/S模式下OA系统的权限控制设计与实现 被引量:25
10
作者 宋维平 曾一 +2 位作者 涂争光 高旻 李颖 《计算机工程与应用》 CSCD 北大核心 2004年第35期199-201,210,共4页
通过分析现有权限控制模型,结合B/S模式的特征,论文提出了改进的权限控制模型,与在OA系统中的具体实现方法。
关键词 用户管理 权限控制模型 B/s模式 OA系统
下载PDF
一种基于树型结构的B/S系统权限控制方法 被引量:17
11
作者 李南妮 张璟 李军怀 《计算机应用研究》 CSCD 北大核心 2005年第10期128-130,共3页
在应用RBAC技术的基础上研究了基于树型结构下的B/S系统中权限控制方法,通过系统资源树的生成,提出了用户权限数据报的概念及其设计思想,并在实践中加以应用。实现了系统全局资源的安全访问控制,增加了系统的灵活性。
关键词 基于角色的访问控制 B/s 系统资源树 用户权限
下载PDF
基于Pignistic概率函数和相关系数的证据组合方法 被引量:15
12
作者 杨晓萍 廉伟健 +1 位作者 李孟杰 钱志鸿 《通信学报》 EI CSCD 北大核心 2019年第3期73-79,共7页
D-S证据理论不能很好地解决证据之间高冲突的情况,得到的结果与事实相悖,并且在实际的应用中无法解决"一票否决"的问题。针对上述不足,提出了一种基于Pignistic概率函数和相关系数的新证据冲突衡量标准(Pcor)和基于该标准的... D-S证据理论不能很好地解决证据之间高冲突的情况,得到的结果与事实相悖,并且在实际的应用中无法解决"一票否决"的问题。针对上述不足,提出了一种基于Pignistic概率函数和相关系数的新证据冲突衡量标准(Pcor)和基于该标准的加权证据组合方法。该方法用Pcor来衡量证据间的冲突,通过建立支持矩阵来确定各证据的支持度,用加权平均法修正证据,使用Dempster组合规则,最终得出与事实相符的结果。数值算例表明,所提方法有效地解决了高冲突证据组合问题,与相关算法相比,具有更好的收敛性。 展开更多
关键词 D-s证据理论 冲突衡量 相关系数 证据组合 信任度
下载PDF
基于B/S架构的多用户在线程序评判系统设计与实现 被引量:8
13
作者 乔少杰 杨燕 +2 位作者 葛永明 张翠芳 戴齐 《计算机工程与科学》 CSCD 北大核心 2011年第S1期58-61,共4页
针对现有在线程序评判系统存在的判题效率和安全性问题,本文在分析多用户在线评判系统的功能需求基础上,提出了一种基于B/S架构采用Struts+Spring+Hibernate(SSH)组合框架的多用户在线程序评判系统,介绍了系统的程序评判原理及采用的安... 针对现有在线程序评判系统存在的判题效率和安全性问题,本文在分析多用户在线评判系统的功能需求基础上,提出了一种基于B/S架构采用Struts+Spring+Hibernate(SSH)组合框架的多用户在线程序评判系统,介绍了系统的程序评判原理及采用的安全机制。该系统不但可以用于ACM程序设计等比赛,而且可以为程序设计课程教学提供很好的辅助实验平台支持。 展开更多
关键词 在线程序评判 B/s架构 多用户 安全机制
下载PDF
一种处理冲突证据的D-S证据权重计算方法 被引量:21
14
作者 费翔 周健 《计算机工程》 CAS CSCD 北大核心 2016年第2期142-145,共4页
D-S证据理论是一种有效处理不确定信息的方法,在数据融合等领域得到了广泛应用。经典D-S证据理论在融合冲突较大的信息时通常会得到有悖于常理的结论。为此,引入证据矛盾系数的概念,提出一种能有效利用冲突信息的证据权重计算方法,采用... D-S证据理论是一种有效处理不确定信息的方法,在数据融合等领域得到了广泛应用。经典D-S证据理论在融合冲突较大的信息时通常会得到有悖于常理的结论。为此,引入证据矛盾系数的概念,提出一种能有效利用冲突信息的证据权重计算方法,采用D-S证据理论组合规则进行数据融合。算例分析结果表明,相比同类方法,提出方法收敛速度更快,融合结果更准确,能克服经典D-S证据理论的不足,提高融合结果的可信度。 展开更多
关键词 D-s证据理论 冲突证据 矛盾系数 数据融合 证据可信度
下载PDF
B/S模式的电厂耗差分析系统权限管理的实现 被引量:11
15
作者 杨官平 陈鸿伟 李永华 《计算机工程与设计》 CSCD 北大核心 2006年第3期497-499,503,共4页
采用ASP.NET技术,应用用户/岗位角色/权限的模型,实现了B/S模式的电厂耗差分析系统权限管理。阐述了权限管理的设计原则和设计方法、权限管理的数据库设计、用户授权的实现和用户权限控制的实现。在开发过程中,使用C#语言,开发了权限管... 采用ASP.NET技术,应用用户/岗位角色/权限的模型,实现了B/S模式的电厂耗差分析系统权限管理。阐述了权限管理的设计原则和设计方法、权限管理的数据库设计、用户授权的实现和用户权限控制的实现。在开发过程中,使用C#语言,开发了权限管理组件,提高了开发效率,简化了权限管理,用户使用灵活方便。 展开更多
关键词 权限管理 耗差分析 AsRNET技术 B/s模式 角色 用户
下载PDF
基于技术扩散S曲线的3G技术市场推广策略研究 被引量:7
16
作者 黄梦璇 宋艳 +1 位作者 刘峰 蒋冲雨 《研究与发展管理》 CSSCI 北大核心 2011年第2期26-32,共7页
3G技术市场快速推广是电信运营商目前需着力解决的现实问题.从技术扩散S曲线出发,通过问卷调查结果,分析论证我国3G技术扩散还处在初期阶段,需要精确定位初期阶段的目标用户并按照其特征来制定推广策略,指出运营商的现有推广策略针对性... 3G技术市场快速推广是电信运营商目前需着力解决的现实问题.从技术扩散S曲线出发,通过问卷调查结果,分析论证我国3G技术扩散还处在初期阶段,需要精确定位初期阶段的目标用户并按照其特征来制定推广策略,指出运营商的现有推广策略针对性不强,并在此基础上对这些方案提出改进建议,为3G技术市场的发展提供参考借鉴. 展开更多
关键词 技术扩散s曲线 3G技术 初期目标用户 推广策略
下载PDF
一种基于证据距离的D-S改进算法 被引量:2
17
作者 赵欣 王仕成 +2 位作者 司小胜 刘志国 罗大成 《电讯技术》 2008年第11期28-32,共5页
针对高冲突下Dempster证据组合规则失效的问题,定义了描述证据可靠程度的可信度的概念,提出了一种改进的D-S组合算法。该方法首先通过证据距离,建立相似性矩阵,确定证据可信度,对证据进行预处理,再采用Dempster规则进行组合。通过仿真... 针对高冲突下Dempster证据组合规则失效的问题,定义了描述证据可靠程度的可信度的概念,提出了一种改进的D-S组合算法。该方法首先通过证据距离,建立相似性矩阵,确定证据可信度,对证据进行预处理,再采用Dempster规则进行组合。通过仿真算例并与其它改进方法进行对比,验证了新算法在高冲突证据的情况下,可以有效地减小冲突对组合结果的影响,同时提高了证据组合的收敛速度,降低了决策风险。 展开更多
关键词 信息融合 D—s理论 证据距离 Dempster规则 可信度
下载PDF
基于D-S理论的可信云服务评价方法研究 被引量:6
18
作者 刘钻石 耿秀丽 《计算机工程与应用》 CSCD 北大核心 2017年第17期70-76,共7页
云制造环境下,用户选择云服务资源时往往陷入信息量巨大以及信任缺失的困境。针对如何选取可信云服务的问题,提出了一种基于D-S理论的云服务评价方法。选取六个云服务指标作为可信特征集;通过获取定性定量指标评价信息,求解指标的评价... 云制造环境下,用户选择云服务资源时往往陷入信息量巨大以及信任缺失的困境。针对如何选取可信云服务的问题,提出了一种基于D-S理论的云服务评价方法。选取六个云服务指标作为可信特征集;通过获取定性定量指标评价信息,求解指标的评价等级隶属度;进而获得评价指标效用偏好度作为基本概率分配值;引入各云服务评价指标的权重修正基本概率分配以减少证据合成过程中的冲突;应用D-S理论合成规则对可信云服务的证据进行合成;计算各云服务的信任区间并将其进行偏序关系的对比,实现了云服务的选择。以某汽车零部件制造商选择云服务为例,验证所提方法的可行性和有效性。 展开更多
关键词 云服务 D-s理论 可信评价 服务选择
下载PDF
基于SimFMECA的仿真风险和VV&A等级研究 被引量:3
19
作者 郑利平 刘晓平 《系统仿真学报》 CAS CSCD 北大核心 2008年第15期3934-3939,共6页
VV&A是风险驱动的,FMECA是常用的风险分析方法。将两者进行结合,提出一种面向建模与仿真的FMECA方法——SimFMECA。首先对FMECA分析表格和过程进行扩展,然后分析一般仿真系统的FMI(Failure Mode Identification)框架,并给出风险和... VV&A是风险驱动的,FMECA是常用的风险分析方法。将两者进行结合,提出一种面向建模与仿真的FMECA方法——SimFMECA。首先对FMECA分析表格和过程进行扩展,然后分析一般仿真系统的FMI(Failure Mode Identification)框架,并给出风险和危害度评定方法,由此确定所需的VV&A投入,包括VV&A等级以及必需的VV&A活动,最后给出该方法的应用实例。SimFMECA是一种定性的方法,具有花费成本低和易于实施的特点。 展开更多
关键词 建模和仿真 风险 VV&A FMECA 可信性 等级
下载PDF
一种改进的CSGC频谱分配算法 被引量:3
20
作者 滕志军 李可 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2014年第11期119-122,共4页
基于图论着色的频谱分配算法未充分考虑用户实际带宽需求,针对这一问题,本文在原算法基础上提出了一种改进的CSGC频谱分配算法.该算法引入了空闲频谱和用户请求两个时间因子,通过设置用户优先级函数,在进行二次频谱分配时最大限度地满... 基于图论着色的频谱分配算法未充分考虑用户实际带宽需求,针对这一问题,本文在原算法基础上提出了一种改进的CSGC频谱分配算法.该算法引入了空闲频谱和用户请求两个时间因子,通过设置用户优先级函数,在进行二次频谱分配时最大限度地满足用户需求.仿真结果表明,该算法不仅保留了原CSGC算法的性能,而且大幅度提高了频谱利用率. 展开更多
关键词 图论 频谱 分配 用户优先级
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部