-
141
Measurement and Analysis of P2P IPTV Program Resource
Published 2014-01-01“…In order to represent popularity of programs and to predict user behavior and popularity of hot programs over a period, we also put forward an analytical model of hot programs.…”
Get full text
Article -
142
Multi-scale analysis of social network based on diffusion wavelets
Published 2014-01-01“…A new multi-scale framework based on diffusion wavelets was proposed to analyze the homogeneous relationships,which can be used to conduct multi-scale analysis on structures,contents and user behaviors.The diffusion operator of diffusion wavelet only considers the local similarity in this framework.The experiments on both synthetic and real-world networks show that the proposed algorithm outperforms the typical algorithms in multi-scale analysis without parameters.…”
Get full text
Article -
143
Reddit comment analysis: sentiment prediction and topic modeling using VADER and BERTopic
Published 2024-12-01“… This work aims at exploring data analysis techniques applied to the social media platform Reddit, highlighting the execution of an Exploratory Data Analysis (EDA) to identify trends and patterns of interaction among users. …”
Get full text
Article -
144
Exploring the Use of Activity Trackers to Support Physical Activity and Reduce Sedentary Behavior in Adults Diagnosed With Type 2 Diabetes: Qualitative Interview Study Using the RE...
Published 2024-12-01“…Low levels of physical activity and sedentary behavior are major risk factors for developing the disease. …”
Get full text
Article -
145
Music Recommendation Algorithm Based on Multidimensional Time-Series Model Analysis
Published 2021-01-01“…This paper proposes a personalized music recommendation method based on multidimensional time-series analysis, which can improve the effect of music recommendation by using user’s midterm behavior reasonably. …”
Get full text
Article -
146
The effect of gamification on brand co-creation in app-based businesses: investigating the mediating role of consumer engagement and the moderating role of hedonic and innovativene...
Published 2025-03-01“…To collect data, standard and researcher-made questionnaires were used. Data analysis with SmartPLS software shows the positive and significant effect of gamification on customer brand co-creation behavior, partial mediating role of consumer engagement variable, positive moderating effect of hedonic and innovativeness, and finally confirming the moderated mediation. …”
Get full text
Article -
147
Predictive Value of Machine Learning Models for Cerebral Edema Risk in Stroke Patients: A Meta‐Analysis
Published 2025-01-01Get full text
Article -
148
Persistent Homology Combined with Machine Learning for Social Network Activity Analysis
Published 2024-12-01Get full text
Article -
149
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01“…Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. …”
Get full text
Article -
150
Analysis and Control of Rumor Propagation Model Considering Multiple Waiting Phases
Published 2025-01-01Get full text
Article -
151
Priority Analysis of Influence Factors for Electric Vehicle Demand Response Strategies
Published 2023-01-01“…Firstly, a multisource charging load characteristic model is constructed by analyzing the characteristics of EV charging behavior under multiple scenarios. Secondly, the DEMATEL-AISM method is used to analyze the degree of influence of personal and social factors on users’ charging behavior under complex social environments, and the dominant factors in each scenario are identified. …”
Get full text
Article -
152
Analysis of the Multilevel Impact of Social Network Quality on Personality Dimensions in Purchasing
Published 2024-06-01“…Conclusion Multilevel analysis strengthens the understanding of the relationship between social network quality at the community level and impulsive buying behavior, particularly within social networks. …”
Get full text
Article -
153
Jonathan Gruber’s “Public Finance and Public Policy”: A Critical Analysis
Published 2017-07-01Get full text
Article -
154
-
155
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01“…By using technologies such as blockchain, digital currency, as a new type of monetary asset, has been promoting the development of digital economy.Digital currency trading platform plays an important role in the use of private digital currency by digital currency users.Existing digital currency trading platforms may expose users’ privacy and provide illegal elements with the conditions to participate in various abnormal trading behaviors such as“air dropping” events, extortion, fraud, etc.The strong anonymity protection of users by digital currency trading platforms also make it more difficult for regulatory authorities to supervise digital currency transactions.Therefore, the strength of the anonymity protection of users by digital currency trading platforms need to consider not only the privacy protection of users, but also meet the regulatory requirements.For this reason, based on the analysis of the relationship between the digital currency trading platforms and the supervisory departments, an evolutionary game model was established, the digital currency trading platform and the supervisory game model were defined and constructed, and the replication dynamic equation was solved and the balanced solution was obtained according to the income matrix between the digital currency trading platform and the supervisory department.By building a Jacobian matrix, the stability of the evolutionary system under different parameters was analyzed.Besides, the evolutionary stable selection and strategy of the digital currency trading platform and the regulatory authority under different conditions were also analyzed.With Matlab, different strategies of anonymity protection of the digital currency trading platform and different strategies of supervision strategy of the regulatory department were simulated to verify the accuracy of the game model.Based on the results of the simulations, some suggestions on the supervision of digital currency trading platforms are put forward, which provides a theoretical basis for the future supervision of digital currency trading platforms in China.…”
Get full text
Article -
156
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
157
Study of the slant fracture in solid and hollow cylinders: Experimental analysis and numerical prediction
Published 2022-12-01Get full text
Article -
158
-
159
-
160
Clustering Analysis for Active and Reactive Energy Consumption Data Based on AMI Measurements
Published 2025-01-01“…Electrical data analysis based on smart grids has become a fundamental tool used by electrical grid stakeholders to understand the energy consumption patterns of users, although many proposals in this area do not consider reactive energy as another source of useful information regarding distribution costs and threats to the grid. …”
Get full text
Article