The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The working principle of intelligent English translating search engine is discussed in this paper. Then the method of Meta search that is fused with acquired results of each search is analyzed in detail. In the research of fusion results we adopt the optimized scheme which integrates weight and quality method to extract the retrieval results of component search engine, and to perform purification...
In this paper, a thinking and research method of inflation expectations measurements based on web search data is proposed. First, a conceptual framework between search data and inflation expectations is built in order to clarify their mechanism of association. Then, a index of web inflation expectations is built by using principal component analysis and its effectiveness is verified. The results show...
The B to C E-commerce Enterprise (B2CEE) has produced extensive and profound influence on the economic structure. To study the structural factors of stock price of B2CEE which will influence the market pricing of them, we have introduced fractal method and made an empirical analysis on the typical case of listed B2CEE. Furthermore, to reveal the true value of B2CEE, it must separate the trend factor...
Currently, we are faced with a major problem concerning the use of malicious codes in hacking attacks, which is becoming increasingly intelligent. We became curious about the major factors behind the cyber incident, which prompted us to conduct research about the weighted value of resources that are used to commit malicious acts. The major approach of this paper consists in calculating the weighted...
Entertainment industry growing very fast, as an essential pillar, actors become more and more influential. An effective influence model will help investors a lot. In this paper, we propose SPIA influence model, considering actors' both social influence and professional influence. In this way we can choose the most influential actors with no obvious shortcomings. We take Sina Weibo, the largest micro-blogging...
Identifying review manipulation has become one of hot research issues in e-commerce because more and more customers make their purchase decisions based on some personal comments from virtual communities and e-business websites. Customers consider these personal reviews are more reliable than the existing internet advertisements. Consequently, some enterprises attempt to create fake personal comments...
We propose a dual hash tables algorithm which can realize the durable top-k search. Two hash tables are constructed to keep the core information, such as score and time in the inverted lists. We use the key-value relationships between the two hash tables to calculate the scores which measure the correlations between a keyword and documents, and search the versioned objects that are consistent in the...
With the rapid development of information technology, search engine optimization (SEO) technology has attracted more and more attentions. In order to improve their website visit quantity, SEO techniques can make a better ranking in the search result using the keyword selection and deployment, high quality back links, rational website constitution, and rich content, etc. This paper discusses in detail...
Coal listed companies play an important role in the structure of stock market and investor relations management is the key operation factor in the competition of investment capital. By the method of descriptive statistics and least squares regression about the cross-sectional data of 2008, we found that in addition to the company's own characteristics, the quality of investor relations management...
This work presents a classifier capable of classifying websites accessed by a community of users based on characteristics of web traffic they generate. The classifier introduced here can be used for engineering web traffic. This classifier is capable of identifying a few different classes of websites based on intensity of bursts of web requests made to each website in both the long and the short run...
Since Jeff Howe introduced the term "crowdsourcing" in 2006 for the first time, crowd sourcing has be come a growing market in the current Internet. Thousands of workers categorize images, write articles or perform other small tasks on platforms like Amazon Mechanical Turk (MTurk), Micro workers or Short Task. In this work, we want to give an inside view of the usage data from Micro workers...
Online social networking community is an important type of internet service. Large scale social network can be built upon the large quantities of user data kept by social networking community. We model the large scale social network on the live online community and evaluate the user relationship index from the model. We further use the user relationship index in analyzing the user relation data and...
One of the important characteristics of Web2.0 is the collaboration between Web2.0 service providers. They allow users (i.e., providers, developers, consumers) to combine their services. The prerequisite for this collaboration is openness of the Web2.0 service system. Although the Web2.0 technology allows the linking of different heterogeneous Web2.0 services freely, it is only assumed that the Web2...
In network economy, it's very important for Chinese tourism web sites to raise their core competence. This paper adopts multiple correspondence to evaluate Chinese tourism websites by utilizing real-time detecting tool. In this research, tourism websites should improve their service levels through constructing their web sites and strengthening their service functions.
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and recovers reputation scores from a novel angle: combination of temporal analysis and user correlation analysis. Benefiting from the rich information in the time-domain, TAUCA identifies the products under attack, the time...
From the view of customers' perception, this paper analyzes the factors effecting online shopping, and combines with empirical analysis method for research. Gathering information by the questionnaire survey, we use statistical analysis, such as reliability analysis, validity analysis, regression analysis. These results show that questionnaire design is reasonable ,the reliability and validity are...
Hadoop distributed file system (HDFS) becomes a representative cloud storage platform, benefiting from its reliable, scalable and low-cost storage capability. HDFS has been utilized in BlueSky, one of the most prevalent e-Learning resource sharing systems in China, to store and share courseware majorly in the form of PowerPoint (PPT) files and video clips. Unfortunately, HDFS does not perform well...
Performance management and dependability are two of the fundamental issues in business-critical applications. The ability to detect the occurrence of performance failures and anomalies has raised the attention of researchers in the last years. It is in fact a difficult problem, since a visible change in the performance can result from some natural cause (e.g., workload variations, upgrades) or by...
This paper presents an assessment of broadband penetration among OECD member countries and the Middle East including Iran, to ascertain if broadband usage can be used as a predictor of ICT exports. Using inferential statistics, the linear relationship between the following pairs of variables were evaluated: monthly charge and volume of DSL subscription; volume of DSL subscription and speed of connection;...
State Transition Matrix (STM) is a flexible table-like modeling language that has been frequently used for specifying behavior of distributed systems. In this paper, we first present a formalization of the static and dynamic aspects of a STM design (i.e., design written in STM). Consequentially, based on this formalization, we investigate how a STM design can be formally analyzed using SAL, precisely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.