期刊文献+
共找到224,621篇文章
< 1 2 250 >
每页显示 20 50 100
Channel Correlation Based User Grouping Algorithm for Nonlinear Precoding Satellite Communication System 被引量:1
1
作者 Ke Wang Baorui Feng +5 位作者 Jingui Zhao Wenliang Lin Zhongliang Deng Dongdong Wang Yi Cen Genan Wu 《China Communications》 SCIE CSCD 2024年第1期200-214,共15页
Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear ... Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear precoding such as Tomlinson-Harashima precoding(THP)algorithm has been proved to be a promising technology to solve this problem,which has smaller noise amplification effect compared with linear precoding.However,the similarity of different user channels(defined as channel correlation)will degrade the performance of THP algorithm.In this paper,we qualitatively analyze the inter-beam interference in the whole process of LEO satellite over a specific coverage area,and the impact of channel correlation on Signal-to-Noise Ratio(SNR)of receivers when THP is applied.One user grouping algorithm is proposed based on the analysis of channel correlation,which could decrease the number of users with high channel correlation in each precoding group,thus improve the performance of THP.Furthermore,our algorithm is designed under the premise of co-frequency deployment and orthogonal frequency division multiplexing(OFDM),which leads to more users under severe inter-beam interference compared to the existing research on geostationary orbit satellites broadcasting systems.Simulation results show that the proposed user grouping algorithm possesses higher channel capacity and better bit error rate(BER)performance in high SNR conditions relative to existing works. 展开更多
关键词 channel correlation inter-beam interference multibeam satellite Tomlinson-Harashima precoding user grouping
下载PDF
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
2
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 user intent CLUsTER user profile online search information sharing user behavior search reasons
下载PDF
Hepatitis B Surface Antigen and Hepatitis C Virus Antibodies among Drug Users in Burkina Faso
3
作者 Sylvie Zida Kadari Cissé +13 位作者 Odette Ky-Zerbo Dinanibè Kambiré Serge Théophile Soubeiga Simon Tiendrebéogo Fatou Sissoko Issa Sory Célestine Ki-Toé Solange Dioma Djeneba Zorom Adama Ouédraogo Cedric Dimitri Axon Hien Mahamoudou Sanou Seni Kouanda Henri Gautier Ouédraogo 《Advances in Microbiology》 CAS 2024年第1期92-104,共13页
Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and ... Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso. 展开更多
关键词 Drug users Hepatitis C Hepatitis B PREVALENCE Burkina Faso
下载PDF
User Preference Aware Hierarchical Edge-User Cooperative Caching Strategy
4
作者 Wu Dapeng Yang Lin +2 位作者 Cui Yaping He Peng Wang Ruyan 《China Communications》 SCIE CSCD 2024年第6期69-86,共18页
The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been conside... The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been considered as a feasible scheme.However,how to efficiently utilize the limited caching resources to cache diverse contents has been confirmed as a tough problem in the past decade.In this paper,considering the time-varying user requests and the heterogeneous content sizes,a user preference aware hierarchical cooperative caching strategy in edge-user caching architecture is proposed.We divide the caching strategy into three phases,that is,the content placement,the content delivery and the content update.In the content placement phase,a cooperative content placement algorithm for local content popularity is designed to cache contents proactively.In the content delivery phase,a cooperative delivery algorithm is proposed to deliver the cached contents.In the content update phase,a content update algorithm is proposed according to the popularity of the contents.Finally,the proposed caching strategy is validated using the MovieLens dataset,and the results reveal that the proposed strategy improves the delay performance by at least 35.3%compared with the other three benchmark strategies. 展开更多
关键词 cooperative caching network delay timevarying popularity user preference
下载PDF
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
5
作者 Yuting Tan Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期463-473,共11页
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ... As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis. 展开更多
关键词 social Media user Behavior Analysis sentiment Analysis Data Mining Machine Learning user Profiling CYBERsECURITY Behavioral Insights Personality Prediction
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
6
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
How to implement a knowledge graph completeness assessment with the guidance of user requirements
7
作者 ZHANG Ying XIAO Gang 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期679-688,共10页
In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge grap... In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge graphs, quality assessment is particularly important. As an important thing of quality assessment, completeness assessment generally refers to the ratio of the current data volume to the total data volume.When evaluating the completeness of a knowledge graph, it is often necessary to refine the completeness dimension by setting different completeness metrics to produce more complete and understandable evaluation results for the knowledge graph.However, lack of awareness of requirements is the most problematic quality issue. In the actual evaluation process, the existing completeness metrics need to consider the actual application. Therefore, to accurately recommend suitable knowledge graphs to many users, it is particularly important to develop relevant measurement metrics and formulate measurement schemes for completeness. In this paper, we will first clarify the concept of completeness, establish each metric of completeness, and finally design a measurement proposal for the completeness of knowledge graphs. 展开更多
关键词 knowledge graph completeness assessment relative completeness user requirement quality management
下载PDF
Joint Optimization of Resource Allocation and Trajectory Based on User Trajectory for UAV-Assisted Backscatter Communication System
8
作者 Peizhong Xie Junjie Jiang +1 位作者 Ting Li Yin Lu 《China Communications》 SCIE CSCD 2024年第2期197-209,共13页
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca... The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme. 展开更多
关键词 energy efficiency joint optimization UAV-assisted backscatter communication user trajectory
下载PDF
Resource Allocation in Multi-User Cellular Networks:A Transformer-Based Deep Reinforcement Learning Approach
9
作者 Zhao Di Zheng Zhong +2 位作者 Qin Pengfei Qin Hao Song Bin 《China Communications》 SCIE CSCD 2024年第5期77-96,共20页
To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlin... To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance. 展开更多
关键词 dynamic resource allocation multi-user cellular network spectrum efficiency user fairness
下载PDF
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps
10
作者 Wael M.S.Yafooz Abdullah Alsaeedi 《Computers, Materials & Continua》 SCIE EI 2024年第4期735-759,共25页
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo... In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user comments.However, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models. 展开更多
关键词 Mobile apps issues play store user comments deep learning LsTM bidirectional LsTM
下载PDF
Reform of the Irrigation Sector and Creation of Functional and Sustainable Irrigation Water Users Associations (AUEI) in Niger: Capitalization of the Experience of the Konni AHA
11
作者 Saidou Abdoulkarimou Illou Mahamadou 《Agricultural Sciences》 2024年第2期209-229,共21页
During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to coo... During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI. 展开更多
关键词 Konni (Niger) Hydro-Agricultural Developments Association of Irrigation Water users GOVERNANCE
下载PDF
Resource Allocation for IRS Assistedmm Wave Wireless Powered Sensor Networks with User Cooperation
12
作者 Yonghui Lin Zhengyu Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期663-677,共15页
In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET... In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET)phase first and then cooperatively transmit information to a hybrid access point(AP)in the wireless information transmission(WIT)phase,following which the IRS is deployed to enhance the system performance of theWET andWIT.We maximized the weighted sum-rate problem by jointly optimizing the transmit time slots,power allocations,and the phase shifts of the IRS.Due to the non-convexity of the original problem,a semidefinite programming relaxation-based approach is proposed to convert the formulated problem to a convex optimization framework,which can obtain the optimal global solution.Simulation results demonstrate that the weighted sum throughput of the proposed UC scheme outperforms the non-UC scheme whether equipped with IRS or not. 展开更多
关键词 Intelligent reflecting surface millimeter wave wireless powered sensor networks user cooperation resource allocation
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
13
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Framework to Model User Request Access Patterns in the World Wide Web
14
作者 Richard Hurley Robert Sturgeon 《Journal of Software Engineering and Applications》 2024年第2期69-88,共20页
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa... In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns. 展开更多
关键词 Performance Modelling World Wide Web sIMULATION user Request Access Patterns FRAMEWORK
下载PDF
Interface Design and Functional Optimization of Chinese Learning Apps Based on User Experience
15
作者 Qihui Hong Jialing Hu Nianxiu Fang 《教育技术与创新》 2024年第2期59-78,共20页
This research paper investigates the interface design and functional optimization of Chinese learning apps through the lens of user experience.With the increasing popularity of Chinese language learning apps in the er... This research paper investigates the interface design and functional optimization of Chinese learning apps through the lens of user experience.With the increasing popularity of Chinese language learning apps in the era of rapid mobile internet development,users'demands for enhanced interface design and interaction experience have grown significantly.The study aims to explore the influence of user feedback on the design and functionality of Chinese learning apps,proposing optimization strategies to improve user experience and learning outcomes.By conducting a comprehensive literature review,utilizing methods such as surveys and user interviews for data collection,and analyzing user feedback,this research identifies existing issues in the interface design and interaction experience of Chinese learning apps.The results present user opinions,feedback analysis,identified problems,improvement directions,and specific optimization strategies.The study discusses the potential impact of these optimization strategies on enhancing user experience and learning outcomes,compares findings with previous research,addresses limitations,and suggests future research directions.In conclusion,this research contributes to enriching the design theory of Chinese learning apps,offering practical optimization recommendations for developers,and supporting the continuous advancement of Chinese language learning apps. 展开更多
关键词 Chinese Learning Apps user Experience Interface Design Functional Optimization
下载PDF
Building Custom Spreadsheet Functions with Python: End-User Software Engineering Approach
16
作者 Tamer Bahgat Elserwy Atef Tayh Nour El-Din Raslan +1 位作者 Tarek Ali Mervat H. Gheith 《Journal of Software Engineering and Applications》 2024年第5期246-258,共13页
End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data a... End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data analysis. However, Excel functionalities have limits compared to dedicated programming languages. This paper addresses this gap by proposing a prototype for integrating Python’s capabilities into Excel through on-premises desktop to build custom spreadsheet functions with Python. This approach overcomes potential latency issues associated with cloud-based solutions. This prototype utilizes Excel-DNA and IronPython. Excel-DNA allows creating custom Python functions that seamlessly integrate with Excel’s calculation engine. IronPython enables the execution of these Python (CSFs) directly within Excel. C# and VSTO add-ins form the core components, facilitating communication between Python and Excel. This approach empowers users with a potentially open-ended set of Python (CSFs) for tasks like mathematical calculations, statistical analysis, and even predictive modeling, all within the familiar Excel interface. This prototype demonstrates smooth integration, allowing users to call Python (CSFs) just like standard Excel functions. This research contributes to enhancing spreadsheet capabilities for end-user programmers by leveraging Python’s power within Excel. Future research could explore expanding data analysis capabilities by expanding the (CSFs) functions for complex calculations, statistical analysis, data manipulation, and even external library integration. The possibility of integrating machine learning models through the (CSFs) functions within the familiar Excel environment. 展开更多
关键词 End-user software Engineering Custom spreadsheet Functions (CsFs)
下载PDF
The Use of Smart Textiles in the Healthcare Space: Towards an Improvement of the User-Patient Experience
17
作者 Balkis Ellouze Marwa Damak 《Journal of Textile Science and Technology》 2024年第2期41-50,共10页
This article explores the role of smart textiles in transforming healthcare environments into spaces that prioritize patient well-being. We will examine the advantages of smart textiles in healthcare settings, such as... This article explores the role of smart textiles in transforming healthcare environments into spaces that prioritize patient well-being. We will examine the advantages of smart textiles in healthcare settings, such as the real-time monitoring of vital signs through connected clothing. Additionally, we will introduce metadesign as a design approach that considers the interactions between users, healthcare environments, and technologies to create fulfilling experiences. By combining the advanced features of smart textiles with a patient-centered metadesign approach, it becomes possible to create care spaces that cater to patient needs. The objective of this article is to present the integration of metadesign in the design of smart textiles as a process aimed at enhancing the quality of the patient user experience. In this process, we will emphasize the collaborative approach and embrace technological innovation to harness the potential for ongoing improvement and provide users with high-quality experiences. Lastly, we will underscore the significance of adopting a multidimensional approach to evaluate the impact of smart textiles on the patient user experience. 展开更多
关键词 smart Textiles Healthcare space user-Patient Experience Metadesign
下载PDF
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
18
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-user Approach EXCEL Excel Add-In CYBERsECURITY URL Check API Virustotal API Encryption Decryption Vigenère Cipher Python-Excel Integration
下载PDF
S31603复合板压力容器点蚀行为试验研究 被引量:1
19
作者 宋晓俊 杨忠武 +4 位作者 豆磊 张烜玮 魏西尧 谭中炜 郭睿朋 《压力容器》 北大核心 2024年第3期8-16,共9页
针对S31603复合板压力容器不锈钢层不同点蚀深度的发展进程及穿透至碳钢层后的电偶腐蚀风险,通过预制不同点蚀深度的S31603复合板试片组,分别在实验室和现场S31603复合板压力容器内进行腐蚀试验,并对试片进行宏观分析、低倍观察、高倍... 针对S31603复合板压力容器不锈钢层不同点蚀深度的发展进程及穿透至碳钢层后的电偶腐蚀风险,通过预制不同点蚀深度的S31603复合板试片组,分别在实验室和现场S31603复合板压力容器内进行腐蚀试验,并对试片进行宏观分析、低倍观察、高倍观察及腐蚀产物表征分析。结果表明,S31603复合板预制的点蚀坑深度穿透至碳钢层时发生了明显的电偶腐蚀,实验室腐蚀试验和现场试验最高点蚀速率分别达到4.954,1.023 mm/a;用S31603复合板试片预制的点蚀坑深度穿透至碳钢层后碳钢优先发生电偶腐蚀;S31603复合板试片预制的点蚀坑深度处于不锈钢层时腐蚀轻微,也未萌生新的点蚀,相邻点蚀坑之间也未见明显的腐蚀影响。在含Cl-的酸性腐蚀性介质环境下,当S31603复合板压力容器点蚀深度处于不锈钢层时腐蚀轻微,当点蚀深度穿透至碳钢层后,会发生明显的电偶腐蚀,需要缩短S31603复合板压力容器开罐检修周期以保证安全使用。 展开更多
关键词 复合板压力容器 点蚀 s31603 腐蚀试验
下载PDF
深水采油树Spring-Seal密封圈接触模型构建与实验测试
20
作者 张红 龙圣均 +1 位作者 冯定 黄熠 《中国安全生产科学技术》 CAS CSCD 北大核心 2024年第8期112-119,共8页
为提高深水采油树在高压、高温、低温等工况下长时间工作的稳定性,对采油树密封圈进行重新设计,提出Spring-Seal密封圈(以下简称S密封圈);基于赫兹接触理论、填料密封接触理论,重新构建S密封圈接触力学模型;建立有限元仿真分析模型,分... 为提高深水采油树在高压、高温、低温等工况下长时间工作的稳定性,对采油树密封圈进行重新设计,提出Spring-Seal密封圈(以下简称S密封圈);基于赫兹接触理论、填料密封接触理论,重新构建S密封圈接触力学模型;建立有限元仿真分析模型,分析不同条件下S密封圈的密封性能,同时验证新建接触模型的合理性;利用实验测试S密封圈的实际密封效果。研究结果表明:S密封圈在高压、高温、低温等工况下能够长时间稳定工作且密封性能良好。研究结果可为S密封圈的接触研究及工程运用提供理论参考。 展开更多
关键词 s密封圈 接触模型 密封性能 实验
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部