دانلود و نمایش مقالات مرتبط با WeChat::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - WeChat

تعداد مقالات یافته شده: 12
ردیف عنوان نوع
1 The effect of WeChat-based training on improving the knowledge of tuberculosis management of rural doctors
تأثیر آموزش مبتنی بر وی چت بر ارتقای دانش مدیریت سل در پزشکان روستایی-2021
Computer vision has been utilized to extract safety-related information from images with the advancement of video monitoring systems and deep learning algorithms. However, construction safety management is a knowledge-intensive task; for instance, safety managers rely on safety regulations and their prior knowledge during a jobsite safety inspection. This paper presents a conceptual framework that combines computer vision and ontology techniques to facilitate the management of safety by semantically reasoning hazards and corresponding mitigations. Specifically, computer vision is used to detect visual information from on-site photos while the safety regulatory knowledge is formally represented by ontology and semantic web rule language (SWRL) rules. Hazards and corresponding mitigations can be inferred by comparing extracted visual information from construction images with pre-defined SWRL rules. Finally, the example of falls from height is selected to validate the theoretical and technical feasibility of the developed conceptual framework. Results show that the proposed framework operates similar to the thinking model of safety managers and can facilitate on-site hazard identification and prevention by semantically reasoning hazards from images and listing corresponding mitigations.
keywords: سل | مدیریت | آموزش مبتنی بر وی چت | پزشکان روستایی | چین | Tuberculosis | Management | WeChat-based training | Rural doctors | China
مقاله انگلیسی
2 Evaluating Chinese government WeChat official accounts in public service delivery: A user-centered approach
ارزیابی حساب های رسمی دولت چین WeChat در ارائه خدمات عمومی: یک رویکرد کاربر محور-2021
WeChat official accounts have been increasingly adopted by Chinese government agencies to deliver public services, in response to the “Internet + Public Service” reformation. While previous studies depended heavily on the expert-oriented approach to evaluate the accounts, this paper presents a user-centered study based on a mixed methods research design in which an unobtrusive clickstream data analysis was complemented by a card sorting study, stakeholder interviews, and a focus group. A 2-month server log file containing 42,188,760 clickstream records was obtained from an active government WeChat official account and analyzed at the movement level, which found that the account was mainly used as a lookup tool with most services underutilized and its home portals failed to support effective wayfinding to needed services. Deficiencies in information ar- chitecture, operation strategy, and interaction design of the account were identified in the complementary studies. This study not only enriches the knowledge about social media use in the Chinese government for public service delivery, but also introduces innovative methods to generate new research insights. The findings can inform government WeChat official accounts of how to improve service quality and user experience.
keywords: حساب های رسمی دولت WeChat | تحویل خدمات عمومی | تجزیه و تحلیل داده های Clickstream | روش های مختلف طراحی | رویکرد کاربر محور | Government WeChat official accounts | Public service delivery | Clickstream data analysis | Mixed methods design | User-centered approach
مقاله انگلیسی
3 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
4 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly.
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
5 Analyzing a mixed supply chain with a WeChat channel
تحلیل یک زنجیره تامین ترکیبی با یک کانال وی چت-2018
By combining traditional marketing methods with WeChat, this study introduces the WeChat channel into multi-channel supply chain systems. We analyze and compare the profit levels of different supply chain channels. Our results show that retailers tend to open the WeChat channel for increased profits. Whether manufacturers can benefit from the WeChat channel is determined by other factors though. In the multi-channel supply chain setting, when most consumers accept the Internet channel and the WeChat channel, or consumers are insensitive to service and adopt the new WeChat channel, then manufacturers will be able to obtain considerable profits. The results complement traditional supply chain research and offer significant guidance for supply chain channel design.
keywords: Analytical modeling |Demand functions |Economics and e-commerce |Firm strategy |Multi-channel supply chain |Numerical simulation |Policy analytics |Stackelberg game |WeChat channel
مقاله انگلیسی
6 An experimental study of Chinese tourists using a company-hosted WeChat official account
یک مطالعه تجربی روی گردشگران چینی با استفاده از یک حساب رسمی شرکتی وی چت-2018
Company-hosted WeChat official accounts (WOA) have emerged as a commonly-used marketing channel recently. The relationship between user motivations and behaviors in WOA need to be explored. This study distinguishes between consumers hedonic and utilitarian motivations for using travel agency-hosted WOA, and empirically investigates the influence of WeChat user motives and trust on usage behaviors and word-of-mouth (WOM) intentions. Structural equation modeling was employed to analyze the relationships among motivation, behavior, trust and WOM. The results show that utilitarian motivation has a significant effect on consumer participation behavior which obviously impacts the users WOM intention. Furthermore, the outcomes also indicate that trust affects user participation behavior and WOM intention significantly. The findings provide theoretical insights into consumer behavior in social media and contribute to managerial implications for practitioners.
keywords: Behavioral research |Empirical study |Motivation |Social media |Trust |WeChat |Word-of-mouth
مقاله انگلیسی
7 Mobile Social Big Data: WeChat Moments Dataset, Network Applications, and Opportunities
داده های بزرگ اجتماعی موبایل : مجموعه داده های لحظه ای WeChat، برنامه های شبکه، و فرصت ها-2018
In parallel with the increase of various mobile technologies, the MSN service has brought us into an era of mobile social big data, where people are creating new social data every second and everywhere. It is of vital importance for businesses, governments, and institutions to understand how peoples behaviors in the online cyberspace can affect the underlying computer network, or their offline behaviors at large. To study this problem, we collect a dataset from WeChat Moments, called WeChatNet, which involves 25,133,330 WeChat users with 246,369,415 records of link reposting on their pages. We revisit three network applications based on the data analytics over WeChatNet, i.e., the information dissemination in mobile cellular networks, the network traffic prediction in backbone networks, and the mobile population distribution projection. We also discuss the potential research opportunities for developing new applications using the released dataset.
Keywords: Twitter, Facebook, Business, IP networks, Data analysis, Sociology
مقاله انگلیسی
8 How WeChat can retain users: Roles of network externalities, social interaction ties, and perceived values in building continuance intention
چگونه WeChat می تواند کاربران را حفظ کند: نقش بیگانگی شبکه، روابط متقابل اجتماعی و ارزش های درک شده در ایجاد قصد تداوم-2017
An increasing number of users join and immerse in Social Network Services (SNS) virtual spaces, but many users quit using these services as well. SNS managers must enhance users continuance intention. Based on a survey of WeChat users, this research examined the effects of direct and indirect network externalities on users perceived values (including social value, information value, emotional value, and hedonic value) and continuance intention. We conducted data analysis with structural equation modeling (SEM). Results confirmed that social interaction ties mediate the effect of network externalities on the four types of perceived values. Meanwhile, among the four types of perceived values, only social value and hedonic value influence continuance intention.
Keywords: WeChat | Network externalities | Continuance intention | Social interaction ties | Social network
مقاله انگلیسی
9 Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol
فرستنده پروتکل ارتباطی گروهی پویا، غیر قابل انکار و حفظ حریم شخصی و امن قوی -2017
Establishing a secure communication channel among a group of individuals is a critical issue in group oriented applications. In implementation, besides the basic confidentiality requirement, we also expect the group communications to be sender dynamic, forward se cure, non-repudiable and privacy preserving. Traditional approaches, i.e., group key agree ment and broadcast encryption cannot achieve the above requirements simultaneously and efficiently. In this paper, we propose our solution to secure group communications using a new security tool called identity based asymmetric group key agreement protocol with sender non-reputation and privacy. The new notion allows a group of users to negotiate a common group encryption key and their respective group decryption keys. After that, users inside/outside the group who have the knowledge of the group encryption key are able to send non-repudiable and privacy-preserving messages to the group confidentially. Further, even all the users’ private keys are later corrupted, the messages broadcasted previously remain secure. Following this definition, we propose a concrete protocol which is proven to be secure against chosen-ciphertext attacks (CCA) directly. We also show the poten tial applications of our new protocol in instant messaging applications, such as Whatsapp, Wechat, Messenger.
Keywords: Group communications | Security | Non-repudiation | Privacy preserving | Asymmetric group key agreement
مقاله انگلیسی
10 A study of the relationship between narcissism, extraversion, drive for entertainment, and narcissistic behavior on social networking sites
بررسی رابطه بین خودشیفتگی ، برون گرا، درایو برای سرگرمی و رفتار غیراخلاقی در سایت های شبکه های اجتماعی-2017
As social networking sites are gaining popularity, the rise in narcissistic culture on theses sites are also documented. Literature suggests users personality traits may be important factors leading people to engage in narcissistic behaviors. Using a national sample of Chinese adults, this study investigated the relationship between narcissism, extraversion, drive for entertainment and narcissistic behaviors on a Chinese social networking site, Wechat Moment. We also examined whether demographic variables and online time played a role in that dynamic. Results revealed that narcissism predicted exhibitionistic behaviors on Wechat Moment, ratings of ones profile picture and using an image of oneself as profile picture over and above extraversion and drive for entertainment controlling for online time and de mographic variables. Contrary to our hypothesis, narcissism did not predict higher frequency of Wechat Moment posting over and above drive for entertainment and extraversion. Different sub-factors of narcissism also contributed differently to the variance of narcissistic behavior on SNS.
Keywords: Social networking site | Wechat moment | Narcissism | Extraversion | Drive for entertainment | Narcissistic behavior
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4927 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 4927 :::::::: افراد آنلاین: 69