-
241
Navigating the political minefield: strategies for online participation in a polarized society
Published 2025-02-01“…In contrast to previous research that predominantly relied only on self-report or observed activities, we used direct activity logs, combined with in-depth interviews, thereby obtaining a more detailed insight into user behavior. The results revealed that Facebook usage frequently reflects a hidden “political self,” characterized by non-committal interactions (e.g., frequent likes). …”
Get full text
Article -
242
Steering Assist Control for Bicycles with Variable Trail Effect
Published 2024-12-01“…To solve the issue, previous studies have contributed to improve the maneuverability by applying the assist torque proportional to the user’s steering one by a power steering mechanism. …”
Get full text
Article -
243
Bytecode-based approach for Ethereum smart contract classification
Published 2022-10-01“…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
Get full text
Article -
244
Post-Pandemic Usage of Collaboration Tools: Influencing Factors
Published 2025-01-01“…The results of this study also support the integration of TAM and ECM to examine user intentions and behavior regarding the continuance use of a technology.…”
Get full text
Article -
245
The Predictors of Dietary Supplement Use Among Women With Musculoskeletal Disease: A Population-Based Complex Sample Designed Study
Published 2025-01-01“…A cross-sectional study and secondary data analysis were designed using a representative, multilevel stratified cluster sample from the 8th wave (2019) of the National Health and Nutrition Examination Survey, a national statistical survey encompassing health status, health behaviors, and food and nutrient consumption. …”
Get full text
Article -
246
MultiSenseX: A Sustainable Solution for Multi-Human Activity Recognition and Localization in Smart Environments
Published 2025-01-01“…This approach transcends traditional sequential methods, enabling accurate and real-time analysis in dynamic, multi-user contexts. Our empirical evaluation demonstrates <i>MultiSenseX</i>’s superior performance in both localization and activity recognition tasks, achieving remarkable accuracy and scalability. …”
Get full text
Article -
247
Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm
Published 2025-01-01“…The significance of the research lies in its ability to discover themes within each post, which is crucial for analyzing user behavior and addressing security concerns. The use of relevant Facebook data enhances the real-world relevance of the results, facilitating targeted analysis based on the language patterns used by users in these posts and thus contributing to the success of security objectives. …”
Get full text
Article -
248
Shear Capacity of Open Sandwich Steel Plate-Concrete Composite Slab: Experimental and Analytical Studies
Published 2019-01-01“…Considering that the fixed crack model by default of the general finite element software was unable to simulate the shear softening behavior of concrete in the actual situation, a rotational crack model based on the modified compression field theory developed by UMAT (user material) of ABAQUS software was proposed and applied to the nonlinear analysis, and a numerical simulated model for the steel-concrete composite slab was built for shear analysis. …”
Get full text
Article -
249
Portrayal of Men in Damilare Kuku Nearly all Men in Lagos.
Published 2025“…After thorough sorting, the data was entered into a computer for analysis using Microsoft Word and Excel. The novel critiques dominant masculine norms prevalent in Nigerian society, particularly those that dictate behavior, success, and emotional expression among men. …”
Get full text
Thesis -
250
Parametric Evaluation of Simultaneous Effects of Damaged Zone Parameters and Rock Strength Properties on GRC
Published 2021-01-01“…The convergence-confinement method via the ground reaction curve (GRC) is used as the common practice of tunnel design which demands accurate determination of the stress state and material strength behavior in different zones around the tunnel section. …”
Get full text
Article -
251
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
252
Examining the Long-Run and Short-Run Effects of Technical and Financial Factors on Bitcoin Blockchain Network Transaction Fees
Published 2024-12-01“…This study examined the long-term and short-term effects of technical and financial factors on user behavior in determining Bitcoin transaction fees. …”
Get full text
Article -
253
Flow Shift from Urban Roads to Beltway Expressway under a Tradable Credit Scheme to Alleviate Urban Traffic Congestion
Published 2024-01-01“…The lower-level model describes user travel behavior under given TCS and capacity constraints of beltway expressway links, represented as the generalized capacitated traffic assignment problem. …”
Get full text
Article -
254
An Evaluation of Human Conversational Preferences in Social Human-Robot Interaction
Published 2021-01-01“…To generate context-aware behaviors in robots, robots are required to have a careful evaluation of its encounters with humans. …”
Get full text
Article -
255
HEVERL – Viewport Estimation Using Reinforcement Learning for 360-degree Video Streaming
Published 2025-01-01“…Furthermore, our approach is augmented by a thorough analysis of human head and facial movement behaviors. …”
Get full text
Article -
256
Using a Mobile Health App (ColonClean) to Enhance the Effectiveness of Bowel Preparation: Development and Usability Study
Published 2025-01-01“…We used the Technology Acceptance Model to investigate whether the use of the ColonClean mHealth app can improve users’ attitudes and behaviors toward BP. …”
Get full text
Article -
257
About simulation environment for modeling the Internet of Things components and applications using visual flow-based programming tools and cloud services
Published 2022-06-01“…In the implementation of the simulation environment, the following goals were pursued: building a mathematical model; implementation of software, capable of running experiments on that model; providing the user with the ability to analyze results and adjust the model.Methods. …”
Get full text
Article -
258
Designing Health Recommender Systems to Promote Health Equity: A Socioecological Perspective
Published 2025-01-01“…HRS, an emerging and developing field, can play a unique role in the digital health field as they can offer relevant recommendations, not only based on what users themselves prefer and may be receptive to, but also using data about wider spheres of influence over human behavior, including peers, families, communities, and societies. …”
Get full text
Article -
259
-
260
Exploring the Feasibility of a 5-Week mHealth Intervention to Enhance Physical Activity and an Active, Healthy Lifestyle in Community-Dwelling Older Adults: Mixed Methods Study
Published 2025-01-01“…Participants then integrated the app into their daily activities for 5 weeks. Behavioral patterns such as user session duration, feature use frequency, and navigation paths were analyzed, focusing on engagement metrics and user interactions. …”
Get full text
Article