首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
【目的/意义】近年来移动社交网络的高速发展推动了学术界对网络舆情的关注,网络谣言作为其中的重要 组成部分越来越受到监管部门的关注。本文通过建模仿真对谣言传播群体动态演化特征进行分析,以期为有关部 门有效应对和控制移动社交网络谣言提供借鉴。【方法/过程】本文以经典SIR模型为基础,加入移动社交网络用户 数量等影响因子进行优化,并结合传播动力学理论构建了移动社交网络谣言传播的参与群体动态演化模型,最后 使用MATLAB等软件实现模型和数值仿真。【结果/结论】实验结果显示:谣言在前期发展阶段的传播速度最快,杀 伤力也最大;移动社交网络环境对谣言传播有促进作用;网络容量越大,谣言传播的范围越大;本文模型通过仿真 验算,证明可以用于对移动社交网络环境下的谣言传播进行仿真。  相似文献   

2.
随着移动商务时代的到来,商家逐渐意识到移动社交网络对产品创新扩散的重要性,因此评价网络用户重要性成为创新扩散的重要内容.基于创新扩散理论,结合社会网络中心性和信息检索相关算法构建移动社交网络用户价值评价指标UR,基于移动社交网络数据对该算法进行测度,并基于传染病模型研究网络中用户的创新扩散能力.通过评价指标与扩散效果的相关性研究发现,移动社交网络中重要性高的用户具有较强的产品创新扩散能力,UR算法优于传统中心性指标  相似文献   

3.
随着移动商务时代的到来,商家逐渐意识到移动社交网络对产品创新扩散的重要性,因此评价网络用户重要性成为创新扩散的重要内容。基于创新扩散理论,结合社会网络中心性和信息检索相关算法构建移动社交网络用户价值评价指标UR,基于移动社交网络数据对该算法进行测度,并基于传染病模型研究网络中用户的创新扩散能力。通过评价指标与扩散效果的相关性研究发现,移动社交网络中重要性高的用户具有较强的产品创新扩散能力,UR算法优于传统中心性指标  相似文献   

4.
张利  王欢 《现代情报》2012,32(11):68
随着3G技术的成熟,智能手机的普及,移动社交网络服务在互联网市场崭露头角。如今,其发展如火如荼,期间也经历了从冬天到春天数十年的发展历程。移动SNS越来越受用户的欢迎,其市场价值也逐渐显现。目前,移动SNS虽然有真实的人际关系为基础,获得了较为广泛的使用范围,但其发展过程中也产生了用户社交疲劳、从众心理的问题。人人网是国内领先的社交网站,其发展模式值得借鉴。移动社交网络的发展要与中国人的心理特征和交往方式相契合,培养用户的移动社交网络习惯,以有利于突破社交网络的发展瓶颈,实现移动社交网络的长远发展。  相似文献   

5.
【目的/意义】移动社交网络时代,随时随地传递信息与发布动态已然成为人们的一种生活习惯。与此同 时,移动社交网络的即时性、超时空性等特点也使得网络舆情进一步升级—移动社交网络舆情由此产生。【方法/过 程】通过构建移动社交网络舆情多主体应对的系统动力学模型,并采用 Vensim PLE软件对实例进行模拟仿真。【结 果/结论】结果表明移动社交网络舆情受舆情事件、媒体、网民、政府四个主体的共同影响,降低事件敏感度、移动社 交平台传播次数、网民情绪强度及提升政府的信息透明度能够有效地应对移动社交网络舆情。  相似文献   

6.
本文对智能巡检技术在电力公司可实现的应用做了详尽地分析和研究以及实践,提出了智能巡检系统的概念,该系统使用移动设备,结合当今流行的手持GIS技术,开发出应用于移动设备和PC两部分的专门针对电力部门的移动巡检系统,并配合全面的缺陷数据库。该系统满足巡检工人携带智能终端等移动设备在户外开展巡检工作。移动设备自带的网络可以同步数据库中含有电力设备和地理背景设备的电子地形图,通过手机自带的定位功能获取卫星信号来定位设备坐标,既满足了在恶劣的自然环境下或是恶劣的天气情况下快速定位电力设备的需求,同时也可以通过定位系统对巡检人员工作的完成情况进行监督考核。  相似文献   

7.
张继东  李鹏程 《情报科学》2017,35(11):13-16
【目的/意义】通过模型构建模拟移动社交网络中的信息传递,为移动社交网络中信息的高效传递和政府管 控提供支持。【方法/过程】基于地理社交数据来量化移动社交网络中用户对信息的传递意愿程度,同时通过将地理 社交数据中的用户地理属性添加到用户的多维特征集合中,根据用户多维特征选择传递不同内容的信息,以提高 信息的传递效率。【结论/结果】由地理社交数据构建的用户特征模型与实际情形贴切,因而通过其进行移动社交网 络中的信息传递机制研究有较高的可行性。  相似文献   

8.
当前我国 互联网信息安全形势严峻, 在社会舆情预警、隐私泄露保护等方面具有重 大需求。 在线社交网络由于其承载着海量的信息,是信息安全研究的重要对象。 本文从作为 理论基础的社交网络结构属性和模型展开综述, 其中包含作者所在研究团队的成果及观点。 社交网络的结构特性的研究重点在于揭示社交网络的基本属性、探索作为社交网络基本要素 的人与人之间的关系的本质特征;社交网络模型研究重点在于通过模拟真实社交关系网中人 与人之间的交往行为来构造具备相应属性特征的演化模型, 并以此为基础, 研究特定社交行 为对网络结构的影响, 或者通过所建立的模型逆向分析社交网络的本质特征、推断哪些社交 行为决定着相应的网络特性。 近年来, 不同的策略和技术分别在网络的结构特征、网络中的 信息传播和检索、网络中用户的行为分析、社团结构挖掘等领域取得了重大研究进展。 文章 对网络结构研究中取得的成果进行了回顾,分别介绍了近期研究中所发现的社交网络在不同 层面表现出的结构特征,并给出了社交网络模型研究中几类常见的结构模型和建模方法。  相似文献   

9.
当前我国互联网信息安全形势严峻,在社会舆情预警、隐私泄露保护等方面具有重大需求。在线社交网络由于其承载着海量的信息,是信息安全研究的重要对象。本文从作为理论基础的社交网络结构属性和模型展开综述,其中包含作者所在研究团队的成果及观点。社交网络的结构特性的研究重点在于揭示社交网络的基本属性、探索作为社交网络基本要素的人与人之间的关系的本质特征;社交网络模型研究重点在于通过模拟真实社交关系网中人与人之间的交往行为来构造具备相应属性特征的演化模型,并以此为基础,研究特定社交行为对网络结构的影响,或者通过所建立的模型逆向分析社交网络的本质特征、推断哪些社交行为决定着相应的网络特性。近年来,不同的策略和技术分别在网络的结构特征、网络中的信息传播和检索、网络中用户的行为分析、社团结构挖掘等领域取得了重大研究进展。文章对网络结构研究中取得的成果进行了回顾,分别介绍了近期研究中所发现的社交网络在不同层面表现出的结构特征,并给出了社交网络模型研究中几类常见的结构模型和建模方法。  相似文献   

10.
分析了影响移动社交网络中用户信息安全的相关因素,从而提出了关于移动社交网络用户信息安全保护的相关策略,以达到保护用户信息安全的终极目标,并不断推进移动社交行业的良性发展。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号