期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Tik-Tok Usage During Third Wave of COVID-19 and Its Impacts on Personal,Academic,and Social Life of Teenagers and Youngsters in Turkey
1
作者 Ali Raza Ain Bemisal Alavi +2 位作者 Ahsan ul Haque Shaikh Yusra Memon Maham Memon 《Management Studies》 2023年第1期31-43,共13页
Tik-Tok is a famous entertainment and art creation app that is used all around the world,which enables everyone to make short video clip ranging from 30 seconds to 1 minute and which is published and shared with famil... Tik-Tok is a famous entertainment and art creation app that is used all around the world,which enables everyone to make short video clip ranging from 30 seconds to 1 minute and which is published and shared with family,friends,and public.This app is downloaded about 1.5 billion times with 800 million users all around the world,Tik-Tok users from China,India,USA,Russia,and Turkey are at the top.This paper explores the usage of Tik-Tok under the pandemic COVID-19 and how does it impact on personal,academic,and social life of youngsters and teenagers in Turkey.We collected primary data by using questionnaires from four big provinces:Istanbul,Ankara,Izmir,and Antalya(mainly top tourist provinces),500 samples were collected by using convenience sampling method,data collected in between 1 April 2021 to 2 May 2021,data analyzed by Multiple ANOVA,three times simple regression was used to explore the impact of Tik-Tok on personal,academic,and social life separately,furthermore correlation test was also applied to show strength among variables.Results indicate statistical significance(p<0.01)which supports the hypotheses. 展开更多
关键词 COVID-19 Tik-Tok personal life academic life social life
下载PDF
An Orthogonal Approach to Reusable Component Discovery in Cloud Migration 被引量:1
2
作者 ZHAO Junfeng ZHOU Jiantao +1 位作者 YANG Hongji LIU Guoping 《China Communications》 SCIE CSCD 2015年第5期134-151,共18页
As an innovative software application mode,Software as a service(SaaS) shows many attractive advantages.Migrating legacy system to SaaS can make outdated systems revived.In the process of migration,the existing valuab... As an innovative software application mode,Software as a service(SaaS) shows many attractive advantages.Migrating legacy system to SaaS can make outdated systems revived.In the process of migration,the existing valuable components need to be discovered and reused in order that the target system could be developed/integrated more efficiently.An innovative approach is proposed in this paper to extract the reusable components from legacy systems.Firstly,implementation models of legacy system are recovered through reverse engineering.Secondly,function models are derived by vertical clustering,and then logical components are discovered by horizontal clustering based on the function models.Finally,the reusable components with specific feature descriptions are extracted.Through experimental verification,the approach is considered to be efficient in reusable component discovery and to be helpful to migrating legacy system to SaaS. 展开更多
关键词 可重用组件 迁移过程 正交方法 遗留系统 软件应用 函数模型 重复使用 目标系统
下载PDF
人民币实际有效汇率变动与上海产业结构升级效应
3
作者 丁红艳 冯江华 LU LIU 《当代经济》 2016年第34期22-27,共6页
本文采用1981—2013年数据,通过协整检验、误差修正模型和脉冲响应分析考察了人民币实际有效汇率变动对上海产业结构影响。实证结果表明:上海市出口开放度、进口渗透度、外商直接投资强度增加对上海市产业结构产生负向影响;人民币实际... 本文采用1981—2013年数据,通过协整检验、误差修正模型和脉冲响应分析考察了人民币实际有效汇率变动对上海产业结构影响。实证结果表明:上海市出口开放度、进口渗透度、外商直接投资强度增加对上海市产业结构产生负向影响;人民币实际有效汇率通过对外贸易和外商直接投资两个渠道对上海产业结构优化升级将产生一定的影响:人民币实际有效汇率升值,上海产业结构优化指数下降,两者之间存在一定的负相关。 展开更多
关键词 人民币实际有效汇率 产业结构升级 供给侧结构改革
下载PDF
Promoting Creative Computing: origin, scope, research and applications 被引量:1
4
作者 Hongji Yang Lu Zhang 《Digital Communications and Networks》 SCIE 2016年第2期84-91,共8页
下载PDF
Conceivable Security Risks and Authentication Techniques for Smart Devices: A Comparative Evaluation of Security Practices 被引量:2
5
作者 Syeda Mariam Muzammal Munam Ali Shah +1 位作者 Si-Jing Zhang Hong-Ji Yang 《International Journal of Automation and computing》 EI CSCD 2016年第4期350-363,共14页
With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue... With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques. 展开更多
关键词 Smart devices security risks AUTHENTICATION BIOMETRIC privacy.
原文传递
A Reliability Aware Protocol for Cooperative Communication in Cognitive Radio Networks 被引量:1
6
作者 Munam Ali Shah Si-Jing Zhang Hong-Ji Yang 《International Journal of Automation and computing》 EI CSCD 2019年第1期84-92,共9页
One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network whic... One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols. 展开更多
关键词 COGNITIVE RADIO COMMON CONTROL channel co-operative communication MEDIUM access control(MAC)protocols DTMC
原文传递
A Creative Approach to Reducing Ambiguity in Scenario-based Software Architecture Analysis
7
作者 Xi-Wen Wu Chen Li +1 位作者 Xuan Wang Hong-Ji Yang 《International Journal of Automation and computing》 EI CSCD 2019年第2期248-260,共13页
In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is ... In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenario-based approaches to analyse software architecture, there are still limitations in this research field, and a key limitation is that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenario-based software requirements analysis. Our work expands this idea in three directions. Firstly, we extend an architecture description language(ADL)-based language – Breeze/ADL to model the software architecture. Secondly, we use a creative rule – combinational rule(CR) to combine the vector clock algorithm for reducing the ambiguities in modelling scenarios. Then, another creative rule – transformational rule(TR) is employed to help to transform our Breeze/ADL model to a popular model – unified modelling language(UML) model. We implement our approach as a plugin of Breeze, and illustrate a running example of modelling a poetry to music system in our case study.Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice. 展开更多
关键词 Creative computing vector clock algorithm scenario-based analysis of SOFTWARE ARCHITECTURE sequence diagram Breeze/ ARCHITECTURE description language (ADL)
原文传递
An Ontology-based Approach to Security Pattern Selection
8
作者 Hui Guan Hongji Yang Jun Wang 《International Journal of Automation and computing》 EI CSCD 2016年第2期168-182,共15页
Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security experti... Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security expertise solution to the recurring security problems have been widely accepted by the community of security engineering. The fllndamental challenge for using security patterns to satisfy security requirements is the lack of defined syntax, which makes it impossible to ask meaningful questions and get semantically meaningful answers. Therefore, this paper presents an ontological approach to facilitating security knowledge mapping from security requirements to their corresponding solutions security patterns. Ontologies have been developed using Web Ontology Language (OWL) and then incorporated into a security pattern search engine which enables sophisticated search and retrieval of security patterns using the proposed algorithm. Applying the introduced approach allows security novices to reuse security expertise to develop secure software system. 展开更多
关键词 Security pattern ONTOLOGY security requirement risk analysis security engineering
原文传递
xBreeze/ADL:A Language for Software Architecture Specification and Analysis
9
作者 Chert Li Hong-Ji Yang +1 位作者 Mei-Yu Shi Wei Zhu 《International Journal of Automation and computing》 EI CSCD 2016年第6期552-564,共13页
Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynamic chan... Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynamic changes directly or too formal to be understood and manipulated. This paper presents xBreeze/ADL, a novel extensible markup language (XML)-based verification and evolution supported architecture description language, which is specifically designed for modelling the software architecture of large, complex systems. Five principle design goals are 1) to separate template from instance to define a loose coupling structure, 2) to present virtual and concrete link to identify service execution flow, 3) to clearly represent component behaviour to specify architecture semantics, 4) to introduce multi-dimension restrictions to define the architecture constraints, and 5) to use the graph transformation theory to implement the architecture configuration management (i.e., reconfiguration and verification). Various advanced features of xBreeze/ADL are illustrated by using an example on online movie ticket booking system. 展开更多
关键词 Software architecture architecture description language (ADL) xBreeze/ADL breeze graph grammar Breeze/ADL.
原文传递
Lom: Discovering Logic Flaws Within MongoDB-based Web Applications
10
作者 Shuo Wen Yuan Xue +4 位作者 Jing Xu Li-Ying Yuan Wen-Li Song Hong-Ji Yang Guan-Nan Si 《International Journal of Automation and computing》 EI CSCD 2017年第1期106-118,共13页
Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query ... Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness. 展开更多
关键词 Logic flaw web application security not only structured query language (NoSQL) database BLACK-BOX MougoDB.
原文传递
An Approach to Locating Delayed Activities in Software Processes
11
作者 Yun-Zhi Jin Hua Zhou +2 位作者 Hong-Ji Yang Si-Jing Zhang Ji-Dong Ge 《International Journal of Automation and computing》 EI CSCD 2018年第1期115-124,共10页
Activity is now playing a vital role in software processes. To ensure the high-level efficiency of software processes, a key point is to locate those activities that own bigger resource occupation probabilities with r... Activity is now playing a vital role in software processes. To ensure the high-level efficiency of software processes, a key point is to locate those activities that own bigger resource occupation probabilities with respect to average execution time, called delayed activities, and then improve them. To this end, we firstly propose an approach to locating delayed activities in software processes. Furthermore, we present a case study, which exhibits the high-level efficiency of the approach, to concretely illustrate this new solution. Some beneficial analysis and reasonable modification are developed in the end. 展开更多
关键词 Locating of the delayed activities software process stochastic Petri-nets Markov random fields metrics.
原文传递
An Approach to Modelling and Analysing Reliability of Breeze/ADL-based Software Architecture
12
作者 Chen Li Hong-Ji Yang Hua-Xiao Liu 《International Journal of Automation and computing》 EI CSCD 2017年第3期275-284,共10页
Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL pr... Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment.Abstract: Breeze/architecture description language (ADL), is an eXtensible markup language (XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net (GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool-EXGSPN (Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2 (PIPE2) to carry out a reliability assessment. 展开更多
关键词 Software architecture reliability Breeze/architecture description language(ADL) generalized stochastic Petri net(GSPN) Breeze graph grammar
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部