In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interact...In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.展开更多
In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its as...In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
Due to the increase in the number of smart meter devices,a power grid generates a large amount of data.Analyzing the data can help in understanding the users’electricity consumption behavior and demands;thus,enabling...Due to the increase in the number of smart meter devices,a power grid generates a large amount of data.Analyzing the data can help in understanding the users’electricity consumption behavior and demands;thus,enabling better service to be provided to them.Performing power load profile clustering is the basis for mining the users’electricity consumption behavior.By examining the complexity,randomness,and uncertainty of the users’electricity consumption behavior,this paper proposes an ensemble clustering method to analyze this behavior.First,principle component analysis(PCA)is used to reduce the dimensions of the data.Subsequently,the single clustering method is used,and the majority is selected for integrated clustering.As a result,the users’electricity consumption behavior is classified into different modes,and their characteristics are analyzed in detail.This paper examines the electricity power data of 19 real users in China for simulation purposes.This manuscript provides a thorough analysis along with suggestions for the users’weekly electricity consumption behavior.The results verify the effectiveness of the proposed method.展开更多
The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-S...The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-ST IA is also got. Futherly, IA scheme of secondary network and IA scheme of primary network are given respectively without assuming a priori knowledge of interference covariance matrices. Moreover, the paper analyses the computational complexity of FDPM-ST IA. Simulation results and theoretical calculations show that the proposed algorithm can achieve higher sum rate with lower computational complexity.展开更多
Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it rema...Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society.展开更多
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell...In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.展开更多
Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information ado...Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users’ attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users’ information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users’ intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.展开更多
Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/meth...Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.展开更多
Purpose: In order to further the understanding of Chinese Web users' image-seeking behavior, this study explores the kinds of images that Chinese Web users seek online and how they express their requests.Design/meth...Purpose: In order to further the understanding of Chinese Web users' image-seeking behavior, this study explores the kinds of images that Chinese Web users seek online and how they express their requests.Design/methodology/approach: We used five pairs of simulated keywords to collect 893 image-seeking questions from Baidu Zhidao. Then, we revised the subject category of questions to analyze popular image needs. In addition, we conducted content analysis and descriptive statistical analysis to identify image-seeking motivations and image features used in the requests in terms of the two theories of image feature classification and image use. Findings: Among the 893 questions, the image searches for entertainment accounted for 47.59%, more than the searches for professional knowledge (37.40%) and personal daily activities (15.01%). With regard to motivation, over 60% of the questions were identified as used for learning, which is well over the proportion of questions used for illustrating. Thus, these questions requested images as sources of data rather than sources of objects. Non-visual features (47.58%) were used most frequently in question descriptions, slightly higher than semantic features (45.96%). Users who lacked domain knowledge tended to use general words rather than specific words to describe their requests. However, not many users used syntactic featm'es when seeking images. Nevertheless, most of the users had a fairly clear idea about what the target image should look like. Research limitations: We studied only one question and answer (Q&A) community using five pairs of simulated keywords. Practical implications: The findings should be helpful in strengthening the functionality of Q&A systems, promoting the theories of image feature classification, and shedding light on information literacy training.Originality/value: This study is one of the first research efforts that discusses Chinese Web users' daily image searches and querying behavior in natural language in a Q&A community, which should help to further the understanding of the principles of image-seeking behavior among Chinese Web users.展开更多
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a...Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.展开更多
Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear ...Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear precoding such as Tomlinson-Harashima precoding(THP)algorithm has been proved to be a promising technology to solve this problem,which has smaller noise amplification effect compared with linear precoding.However,the similarity of different user channels(defined as channel correlation)will degrade the performance of THP algorithm.In this paper,we qualitatively analyze the inter-beam interference in the whole process of LEO satellite over a specific coverage area,and the impact of channel correlation on Signal-to-Noise Ratio(SNR)of receivers when THP is applied.One user grouping algorithm is proposed based on the analysis of channel correlation,which could decrease the number of users with high channel correlation in each precoding group,thus improve the performance of THP.Furthermore,our algorithm is designed under the premise of co-frequency deployment and orthogonal frequency division multiplexing(OFDM),which leads to more users under severe inter-beam interference compared to the existing research on geostationary orbit satellites broadcasting systems.Simulation results show that the proposed user grouping algorithm possesses higher channel capacity and better bit error rate(BER)performance in high SNR conditions relative to existing works.展开更多
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component...In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.展开更多
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu...Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy.展开更多
Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more ...Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more and more business applications need to be accessed from mobile devices such as smartphones by enterprise end users.This paper attempts to solve both two challenges above.A lightweight event-driven process model is proposed aiming at satisfying the spontaneous business needs in enterprise.And we design an innovative wizard,which works like a tutorial,guiding end users in creating this lightweight process model.Moreover,end users are allowed to interact with the process created by themselves on smartphones.Finally,the usability of our approach was evaluated on a small set of users in a real business scenario.The results show that end users can effectively build their personalized business processes using our approach and interact with them in mobile environment.展开更多
Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which inf...Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.展开更多
文摘In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.
基金supported by Beijing Natural Science Fund–Haidian Original Innovation Joint Fund(L232040 and L232045).
文摘In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
基金supported by the State Grid Science and Technology Project (No.5442AI90009)Natural Science Foundation of China (No. 6170337)
文摘Due to the increase in the number of smart meter devices,a power grid generates a large amount of data.Analyzing the data can help in understanding the users’electricity consumption behavior and demands;thus,enabling better service to be provided to them.Performing power load profile clustering is the basis for mining the users’electricity consumption behavior.By examining the complexity,randomness,and uncertainty of the users’electricity consumption behavior,this paper proposes an ensemble clustering method to analyze this behavior.First,principle component analysis(PCA)is used to reduce the dimensions of the data.Subsequently,the single clustering method is used,and the majority is selected for integrated clustering.As a result,the users’electricity consumption behavior is classified into different modes,and their characteristics are analyzed in detail.This paper examines the electricity power data of 19 real users in China for simulation purposes.This manuscript provides a thorough analysis along with suggestions for the users’weekly electricity consumption behavior.The results verify the effectiveness of the proposed method.
基金the National Nature Science Foundation of China under Grant No.61271259 and 61301123,the Chongqing Nature Science Foundation under Grant No.CTSC2011jjA40006,and the Research Project of Chongqing Education Commission under Grant No.KJ120501 and KJ120502
文摘The interference alignment (IA) algorithm based on FDPM subspace tracking (FDPM-ST IA) is proposed for MIMO cognitive network (CRN) with multiple primary users in this paper. The feasibility conditions of FDPM-ST IA is also got. Futherly, IA scheme of secondary network and IA scheme of primary network are given respectively without assuming a priori knowledge of interference covariance matrices. Moreover, the paper analyses the computational complexity of FDPM-ST IA. Simulation results and theoretical calculations show that the proposed algorithm can achieve higher sum rate with lower computational complexity.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61471080)the Equipment Development Department Research Foundation of China (Grant No. 61400010303)+2 种基金the Natural Science Research Project of Liaoning Education Department of China (Grant Nos. JDL2019019 and JDL2020002)the Surface Project for Natural Science Foundation in Guangdong Province of China (Grant No. 2019A1515011164)the Science and Technology Plan Project in Zhanjiang, China (Grant No. 2018A06001)。
文摘Current public-opinion propagation research usually focused on closed network topologies without considering the fluctuation of the number of network users or the impact of social factors on propagation. Thus, it remains difficult to accurately describe the public-opinion propagation rules of social networks. In order to study the rules of public opinion spread on dynamic social networks, by analyzing the activity of social-network users and the regulatory role of relevant departments in the spread of public opinion, concepts of additional user and offline rates are introduced, and the direct immune-susceptible, contacted, infected, and refractory (DI-SCIR) public-opinion propagation model based on real-time online users is established. The interventional force of relevant departments, credibility of real information, and time of intervention are considered, and a public-opinion propagation control strategy based on direct immunity is proposed. The equilibrium point and the basic reproduction number of the model are theoretically analyzed to obtain boundary conditions for public-opinion propagation. Simulation results show that the new model can accurately reflect the propagation rules of public opinion. When the basic reproduction number is less than 1, public opinion will eventually disappear in the network. Social factors can significantly influence the time and scope of public opinion spread on social networks. By controlling social factors, relevant departments can analyze the rules of public opinion spread on social networks to suppress the propagate of negative public opinion and provide a powerful tool to ensure security and stability of society.
基金supported in part by the National Natural Science Foundation of China under Grants No. 61101113,No. 61072088,No.61201198the Beijing Natural Science Foundation under Grants No. 4132007,No. 4132015,No. 4132019the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20111103120017
文摘In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.
基金jointly supported by National Social Science Foundation of China(Grant No.14BTQ044)Wuhan University Academic Development Plan for Scholars after 1970s
文摘Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users’ attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users’ information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users’ intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.
文摘Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.
基金supported by Humanities and Social Science Fund from the Chinese Ministry of Education (Grant No.: 11YJC870010)
文摘Purpose: In order to further the understanding of Chinese Web users' image-seeking behavior, this study explores the kinds of images that Chinese Web users seek online and how they express their requests.Design/methodology/approach: We used five pairs of simulated keywords to collect 893 image-seeking questions from Baidu Zhidao. Then, we revised the subject category of questions to analyze popular image needs. In addition, we conducted content analysis and descriptive statistical analysis to identify image-seeking motivations and image features used in the requests in terms of the two theories of image feature classification and image use. Findings: Among the 893 questions, the image searches for entertainment accounted for 47.59%, more than the searches for professional knowledge (37.40%) and personal daily activities (15.01%). With regard to motivation, over 60% of the questions were identified as used for learning, which is well over the proportion of questions used for illustrating. Thus, these questions requested images as sources of data rather than sources of objects. Non-visual features (47.58%) were used most frequently in question descriptions, slightly higher than semantic features (45.96%). Users who lacked domain knowledge tended to use general words rather than specific words to describe their requests. However, not many users used syntactic featm'es when seeking images. Nevertheless, most of the users had a fairly clear idea about what the target image should look like. Research limitations: We studied only one question and answer (Q&A) community using five pairs of simulated keywords. Practical implications: The findings should be helpful in strengthening the functionality of Q&A systems, promoting the theories of image feature classification, and shedding light on information literacy training.Originality/value: This study is one of the first research efforts that discusses Chinese Web users' daily image searches and querying behavior in natural language in a Q&A community, which should help to further the understanding of the principles of image-seeking behavior among Chinese Web users.
基金supported by the National Natural Science Foundation of China(Grant No.:71203163)the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.:12YJC870011)
文摘Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.
基金supported by the Key R&D Project of the Ministry of Science and Technology of China(2020YFB1808005)。
文摘Low Earth Orbit(LEO)multibeam satellites will be widely used in the next generation of satellite communication systems,whose inter-beam interference will inevitably limit the performance of the whole system.Nonlinear precoding such as Tomlinson-Harashima precoding(THP)algorithm has been proved to be a promising technology to solve this problem,which has smaller noise amplification effect compared with linear precoding.However,the similarity of different user channels(defined as channel correlation)will degrade the performance of THP algorithm.In this paper,we qualitatively analyze the inter-beam interference in the whole process of LEO satellite over a specific coverage area,and the impact of channel correlation on Signal-to-Noise Ratio(SNR)of receivers when THP is applied.One user grouping algorithm is proposed based on the analysis of channel correlation,which could decrease the number of users with high channel correlation in each precoding group,thus improve the performance of THP.Furthermore,our algorithm is designed under the premise of co-frequency deployment and orthogonal frequency division multiplexing(OFDM),which leads to more users under severe inter-beam interference compared to the existing research on geostationary orbit satellites broadcasting systems.Simulation results show that the proposed user grouping algorithm possesses higher channel capacity and better bit error rate(BER)performance in high SNR conditions relative to existing works.
基金supported by the National Natural Science Foundation of China(Grant No.61322104,61571240)the State Key Development Program of Basic Research of China(2013CB329005)+3 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe University Natural Science Research Foundation of Anhui Province(No.KJ2015A105,No.KJ2015A092)The open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(NYKL201509)The open research fund of the State Key Laboratory of Integrated Services Networks,Xidian University(ISN17-04)
文摘In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.
基金supported in part by the Fundamental Research Funds for Central Universities under Grant No.2022RC006in part by the National Nat⁃ural Science Foundation of China under Grant Nos.62201029 and 62202051+2 种基金in part by the BIT Research and Innovation Promoting Project under Grant No.2022YCXZ031in part by the Shandong Provincial Key Research and Development Program under Grant No.2021CXGC010106in part by the China Postdoctoral Science Foundation under Grant Nos.2021M700435,2021TQ0042,2021TQ0041,BX20220029 and 2022M710007.
文摘Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy.
基金supported by the National 973 Programs(Grant No.2013CB329102)the National Natural Science Foundation of China (Grant No.61003067)Key Project of National Natural Science Foundation of China (Grant No.61132001)
文摘Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more and more business applications need to be accessed from mobile devices such as smartphones by enterprise end users.This paper attempts to solve both two challenges above.A lightweight event-driven process model is proposed aiming at satisfying the spontaneous business needs in enterprise.And we design an innovative wizard,which works like a tutorial,guiding end users in creating this lightweight process model.Moreover,end users are allowed to interact with the process created by themselves on smartphones.Finally,the usability of our approach was evaluated on a small set of users in a real business scenario.The results show that end users can effectively build their personalized business processes using our approach and interact with them in mobile environment.
基金supported by the National Social Science Foundation of China(Grant Nos.:10CTQ010 and 11CTQ038)Wuhan University Development Program for Researchers Born after the 1970s
文摘Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.