期刊文献+
共找到835篇文章
< 1 2 42 >
每页显示 20 50 100
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
1
作者 Wen Deng Guangjun Liang +3 位作者 Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1561-1576,共16页
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value. 展开更多
关键词 CRAWLER user portrait feature engineering deep learning small program development
下载PDF
A Fast Detection Method of Network Crime Based on User Portrait
2
作者 Yabin Xu Meishu Zhang Xiaowei Xu 《Journal of Information Hiding and Privacy Protection》 2021年第1期17-28,共12页
In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct ... In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method. 展开更多
关键词 user portrait abnormal behavior audit network crime abnormal behavior rule base
下载PDF
基于AISAS的“云”听类有声书平台用户画像研究
3
作者 祖苏皖 《现代信息科技》 2024年第19期168-174,共7页
为给有声书平台的用户分类提供参考,文章首先基于AISAS模型进行用户标签的构建与提取,并根据所提取的用户标签设计、发放调查问卷,收集数据;其次利用RapidMiner数据挖掘软件进行K-means聚类分析,以实现对有声书平台不同用户群体的分类,... 为给有声书平台的用户分类提供参考,文章首先基于AISAS模型进行用户标签的构建与提取,并根据所提取的用户标签设计、发放调查问卷,收集数据;其次利用RapidMiner数据挖掘软件进行K-means聚类分析,以实现对有声书平台不同用户群体的分类,并进行描述分析。最后总结出五类用户群体,分别是A类活跃型用户、B类社交型用户、C类沉默型用户、D类创作型用户、E类实用型用户。 展开更多
关键词 AIsAs 有声书 用户画像
下载PDF
基于S-O-R理论的新型公共阅读空间用户流失行为分析——来自大众点评网用户评论 被引量:6
4
作者 戴艳清 高亮 孙英姿 《图书馆理论与实践》 CSSCI 2023年第4期55-62,71,共9页
文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为... 文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为模型。在此基础上,提出提高新型公共阅读空间服务效能的相关建议,为提高新型阅读空间的服务质量,降低用户流失率提供参考。 展开更多
关键词 新型公共阅读空间 用户流失行为 公共文化服务 s-O-R理论
下载PDF
基于CiteSpace的用户画像知识图谱分析
5
作者 崔兴文 肖厅 《九江学院学报(自然科学版)》 CAS 2023年第3期52-57,69,共7页
为了明确用户画像研究热点和趋势,文章运用CiteSpace软件定量化分析知网1496篇用户画像文献。研究结果表明,国内对用户画像研究呈现增长态势,总体经历了研究萌芽、快速发展和质量提升三个阶段,虽然研究机构和作者群体稳定,但尚未形成核... 为了明确用户画像研究热点和趋势,文章运用CiteSpace软件定量化分析知网1496篇用户画像文献。研究结果表明,国内对用户画像研究呈现增长态势,总体经历了研究萌芽、快速发展和质量提升三个阶段,虽然研究机构和作者群体稳定,但尚未形成核心作者群和跨专业领域的合作。研究趋势方面,大数据、数据挖掘、图书馆、机器学习、人工智能、精准营销、知识服务、协同过滤等是主要研究热点;前沿研究聚焦于信息服务、融媒体、数据采集、媒体融合和聚类。 展开更多
关键词 Cite sPACE 用户画像 知识图谱 聚类
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
6
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 user’s needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
7
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE user’s GUIDE
下载PDF
Frequent Itemset Mining of User’s Multi-Attribute under Local Differential Privacy 被引量:2
8
作者 Haijiang Liu Lianwei Cui +1 位作者 Xuebin Ma Celimuge Wu 《Computers, Materials & Continua》 SCIE EI 2020年第10期369-385,共17页
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ... Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets. 展开更多
关键词 Local differential privacy frequent itemset mining user’s multi-attribute
下载PDF
User’s Relevance of PIR System Based on Cloud Models 被引量:1
9
作者 康海燕 樊孝忠 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期181-185,共5页
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f... A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better. 展开更多
关键词 personalized information retrieval (PIR) cloud model users relevance fuzzy evaluation
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
10
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization users behaviour traffic module sDN
下载PDF
Method of Consistency Judgment for App Software’s User Comments
11
作者 Meng Ran Ying Jiang +1 位作者 Qixin Xiang Jiaman Ding 《国际计算机前沿大会会议论文集》 2016年第1期121-123,共3页
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ... With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective. 展开更多
关键词 social computing APP software The CONsIsTENCY of user COMMENT user’s COMMENT information user’s mark Featuresentiment-word-pairs Network sentiment WORD
下载PDF
Changes in the Structure of China's Net Users
12
《China's Foreign Trade》 2000年第5期44-44,共1页
关键词 Changes in the structure of China’s Net users
下载PDF
POTALA PALACE:Qing Emperor’s Memorial Tablet and Portrait Enshrined
13
作者 ZHAXICERING 《China's Tibet》 1997年第4期43-44,共2页
关键词 EMPEROR POTALA PALACE:Qing Emperor’s Memorial Tablet and portrait Enshrined
下载PDF
多平台视角下用户知识交流主题挖掘与画像分析——以ChatGPT话题为例 被引量:1
14
作者 严炜炜 曹灿瑜 《现代情报》 CSSCI 北大核心 2024年第7期47-59,共13页
[目的/意义]基于多平台视角挖掘用户知识交流主题特征,构建用户画像标签体系,有助于全面理解用户利用差异化平台开展知识交流行为的规律偏好,为平台提供精确优化策略,为平台间生态建设提供参考依据。[方法/过程]采集大众社交平台、兴趣... [目的/意义]基于多平台视角挖掘用户知识交流主题特征,构建用户画像标签体系,有助于全面理解用户利用差异化平台开展知识交流行为的规律偏好,为平台提供精确优化策略,为平台间生态建设提供参考依据。[方法/过程]采集大众社交平台、兴趣交流平台、垂直知识平台3类典型平台中ChatGPT话题相关的原创博文及用户数据,采用BERTopic模型凝练知识交流主题,结合多平台数据特点,从自然属性、社会属性、知识交流行为属性和知识交流主题属性4个维度抽出画像标签,通过K-means聚类实现用户画像,呈现群组特征并进行平台差异对比。[结果/结论]研究识别出了应用场景、行业进展、未来探讨、相关产业、咨询求助、热门话题、使用感受、风险监督8大知识交流方向及46个主题;根据属性特征将用户划分为专业贡献型、综合共享型、社交求知型和话题潜力型4类,平台间知识交流主题和用户画像存在显著差异,各平台应采取差异化的激励方式,增强平台用户黏性。 展开更多
关键词 知识交流 多元平台 主题模型 BERTopic 用户画像
下载PDF
人工智能视域下的医护科研人员知识服务 被引量:1
15
作者 杨晓雯 《图书馆论坛》 CSSCI 北大核心 2024年第7期101-109,共9页
随着ChatGPT的兴起,如何将人工智能更好地运用于医护科研人员知识服务体系中,成为推进“健康中国”建设的重要举措。文章以医护科研人员为研究对象,以Wilson信息行为模型和信息搜寻行为的情境为理论基础,采用问卷调查法和因子分析法设... 随着ChatGPT的兴起,如何将人工智能更好地运用于医护科研人员知识服务体系中,成为推进“健康中国”建设的重要举措。文章以医护科研人员为研究对象,以Wilson信息行为模型和信息搜寻行为的情境为理论基础,采用问卷调查法和因子分析法设计用户画像标签体系,构建医护科研人员用户画像。研究发现:医护科研人员可细分为科研成熟型、科研进阶型、科研起步型和科研潜在型四类群体;图书馆员可通过积极采纳AI服务理念进行用户特征的个性化与动态化识别,使用自然语言处理与机器学习实现医学资源自动化管理,以AI教学平台提升医护科研人员对新工具的掌握效率等途径,实现人工智能视域下医护科研人员知识服务效能的提升。 展开更多
关键词 人工智能 医护科研人员 知识服务体系 用户画像
下载PDF
高校纸本图书使用者的本科生用户画像构建
16
作者 孙达辰 张秀萍 孙常丽 《科技创新与应用》 2024年第13期14-17,21,共5页
以高校纸本图书使用者的本科生用户为研究对象,构建高校纸本图书的用户画像,可以更加深入地识别用户、更加有效地提升纸本图书的资源建设和服务质量,进而提升用户体验,促进学生系统、深刻阅读。选取层级标签方法来构建用户画像,在现有RF... 以高校纸本图书使用者的本科生用户为研究对象,构建高校纸本图书的用户画像,可以更加深入地识别用户、更加有效地提升纸本图书的资源建设和服务质量,进而提升用户体验,促进学生系统、深刻阅读。选取层级标签方法来构建用户画像,在现有RFM模型的基础上,构建LRFM模型,识别出具有共同特征的用户群体,最终完成用户画像的构建。基于真实数据,对该文构建的用户画像模型进行实证,验证模型是有效的。 展开更多
关键词 用户画像 高校纸本图书 RFM模型 LRFM模型 系统阅读
下载PDF
我国大城市居民参与互联网在线问诊的行为画像分析
17
作者 吕英杰 马子婷 胡雅欣 《医学信息学杂志》 CAS 2024年第6期1-6,共6页
目的/意义研究大城市居民选择互联网医疗服务时的典型特征,建立患者行为画像,为改进互联网医疗服务提供决策依据。方法/过程以北京市患者为研究对象,从个体属性特征、在线问诊行为以及择医需求偏好3个维度构建患者群体画像,通过聚类方... 目的/意义研究大城市居民选择互联网医疗服务时的典型特征,建立患者行为画像,为改进互联网医疗服务提供决策依据。方法/过程以北京市患者为研究对象,从个体属性特征、在线问诊行为以及择医需求偏好3个维度构建患者群体画像,通过聚类方法对在线患者群体分类。结果/结论在线患者可划分为价值潜力型、平台忠诚型、潜在转化型、需求强烈型和服务转移型5类不同特征群体。总体上来自大城市的在线患者病例级别偏低且活跃度不高,通常使用价格较低的图文问诊方式,倾向于选择来自三甲医院、职称较高且在线服务质量较高的医生。5类患者群体各具典型特征,需要分别采取针对性措施满足其个性化医疗需求。 展开更多
关键词 互联网医疗 大城市居民 用户画像
下载PDF
基于B/S架构的用户用能信息采集系统研究
18
作者 张涛 王乐乐 +2 位作者 徐文涛 王国彬 陈银江 《自动化技术与应用》 2023年第5期146-149,共4页
为了提高用户用能信息采集能力,提出基于B/S架构的用户用能信息采集系统设计方法。通过物联网和RFID标签识别技术,构建用户用能信息采集系统的射频标签信息采集模块,采用B/S架构和总线传输协议实现用户用能信息采集的信息化传输和调度,... 为了提高用户用能信息采集能力,提出基于B/S架构的用户用能信息采集系统设计方法。通过物联网和RFID标签识别技术,构建用户用能信息采集系统的射频标签信息采集模块,采用B/S架构和总线传输协议实现用户用能信息采集的信息化传输和调度,实现用户用能信息采集。测试结果表明方法进行用户用能信息采集的智能性和准确性较好。 展开更多
关键词 B/s架构 用户用能信息 采集系统 总线传输控制协议 RFID标签识别
下载PDF
多源数据融合下医护科研人员科研能力提升策略研究
19
作者 杨晓雯 季汉珍 《医学信息学杂志》 CAS 2024年第7期26-32,共7页
目的/意义探讨医护科研人员用户画像构建方法和科研能力提升策略。方法/过程根据用户画像理论提出医护科研人员用户画像的构建模型;使用Python语言、ETL和Echarts工具对构建用户画像所需的多源异构数据进行采集、预处理、存储和挖掘,提... 目的/意义探讨医护科研人员用户画像构建方法和科研能力提升策略。方法/过程根据用户画像理论提出医护科研人员用户画像的构建模型;使用Python语言、ETL和Echarts工具对构建用户画像所需的多源异构数据进行采集、预处理、存储和挖掘,提取标签进行用户画像可视化并进行实证研究。结果/结论医护科研人员可分为具备科研潜质的护理人员、科研新手、科研提升型群体和科研领域资深专家,根据不同类型特征提出医护科研人员科研能力提升策略。 展开更多
关键词 多源数据 医护科研人员 用户画像 科研能力提升
下载PDF
基于用户画像分析的应对读者投诉实证研究——以M大学图书馆为例
20
作者 陈涛 《大学图书情报学刊》 2024年第6期132-136,共5页
从用户画像视角对M大学图书馆投诉群体进行研究,分析用户画像技术为图书馆处理读者投诉问题带来的影响与作用,阐述用户画像技术在读者投诉领域应用的方式方法,定义M大学图书馆读者投诉群体的画像特征,归纳用户画像技术在读者投诉领域应... 从用户画像视角对M大学图书馆投诉群体进行研究,分析用户画像技术为图书馆处理读者投诉问题带来的影响与作用,阐述用户画像技术在读者投诉领域应用的方式方法,定义M大学图书馆读者投诉群体的画像特征,归纳用户画像技术在读者投诉领域应用中存在的瓶颈,并提出应对之策。 展开更多
关键词 用户画像 读者投诉 高校图书馆 读者服务
下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部