首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
Advanced speech recognition technology facilitated the development of voice-based smart devices. Voice user interface (VUI) is now a common feature on smartphones, computers, smart home devices, and car systems. The fragmented and context focused literature on VUI motivates this examination of the relationship between perceived quality and customer satisfaction in VUI portable devices. This study is the first to introduce extrinsic motivational factors as an extension to Wixom and Todd’s model. These additional antecedent factors add an enriched explanation of VUI user behavior. This study is also the first to consider the role of gender in a VUI behavior model. Our findings suggest that the proposed driving factors, including trust, perceived risks, perceived enjoyment, and mobile self-efficacy, significantly affect VUI user attitudes, which influence their continuance intention. Our results also address the role of gender on the association of attitude toward VUI use and its antecedents. The findings show that perceived risk (privacy concerns) and perceived ease of use are more influential on VUI use behavior of males than females. However, the effect of trust and mobile self-efficacy play a more crucial role for females than males.  相似文献   

2.
针对在线社会网络潜在社区难以检测的问题,根据在线社会网络的独有特性,提出一种基于用户紧密度的在线社会网络社区发现算法。创建初步用户图,依据节点属性相似性算法计算用户个体紧密度,基于共有邻居相似性算法计算用户社区紧密度,从而构造出完整用户图,利用层次聚类算法对完整用户图进行处理,发现潜在社区。实验结果表明,与NAS、CNS算法相比,该算法的社区凝聚度与正确率更高,分别达到0.67和97.1%。  相似文献   

3.
本文通过抽样采集国内最大的在线旅游社区平台马蜂窝中的用户成员帖子数据,进行预处理并借助数据挖掘技术进行挖掘,从而获得在线旅游社区的用户潜在的行为规律,并对这些行为规律进行相关描述.基于关联规则数据挖掘的在线旅游社区用户行为规律研究结果具有一定的意义,可为在线旅游社区的运营者开展针对性的运营提供有益的参考.  相似文献   

4.
This article examines the responses of users to home Internet of Things (IoT) services in South Korea, which is taking progressive steps in the field of IoT. It is important to investigate the user’s response because home IoT users are the core users of the IoT business. To this end, the research model includes two trust constructs — “trust in the service provider” and “institutional trust”; two risk constructs — “perceived security risk” and “perceived privacy risk”; and “perceived benefit” construct. This study has two main objectives: (1) to establish the functional relationship among the five constructs listed above; (2) to examine the moderating role of home IoT usage experience in these relationships. The study first reviews the literature on home IoT services and describes the Korean situation. Data were collected from residents living in a smart apartment complex. They were made aware of not only the benefits of home IoT but also the security and privacy risks before they moved into their new homes. The research model was empirically analyzed with structural equation modeling (SEM) using Amos 22.0. The results show that (1) “trust in the service provider” negatively influences “perceived security risk” and “perceived privacy risk” while “institutional trust” does not have a significant influence on them, (2) “perceived security risk” and “perceived privacy risk” negatively influence “perceived benefit,” and (3) “trust in service provider” does not directly influence “perceived benefit” while “institutional trust” has a positive and direct influence on it. In addition, there is a significant moderating effect of home IoT usage experience on some paths. Finally, the study’s findings and limitations are discussed, and potential avenues for future research are suggested.  相似文献   

5.
周而重  黄佳进  徐欣欣 《计算机科学》2015,42(10):232-234, 261
基于位置的地点推荐服务日益强调用户的个性化需求。对此,可通过社交网站上用户与其好友之间、用户与签到地点以及地点与地点之间的关联,来从用户的网络签到行为中总结出用户的出行特点,从而提出一种基于用户网络签到行为的个性化地点推荐方法。该方法通过融合用户对地点的个人偏好程度、地点自身属性对用户的影响程度以及用户好友对地点的推荐程度,来筛选出候选地点中满足用户个性化需求的地点。实验结果验证了该方法在一定场景下的可行性和有效性。  相似文献   

6.
王博  曾温特 《微型电脑应用》2011,27(12):51-52,60,71
在Internet移动机器人遥操作系统中,网络本身的不确定性是影响系统性能和用户操作效果的一个重要因素。提出了一种新的基于轨迹分布模式的方法,能对用户意图进行建模和识别,利用网络机器人的本身的自主性削弱网络不确定性给系统带来的不良影响。通过实验验证,发现这种方法能够较好地识别出用户的控制意图,并根据识别结果自主执行用户期望完成的任务,从而改善了用户的操作体验和机器人接受用户操作的表现,提高了遥操作系统的效率。  相似文献   

7.
In this paper, we propose a new method of representing on-line signatures by interval valued symbolic features. Global features of on-line signatures are used to form an interval valued feature vectors. Methods for signature verification and recognition based on the symbolic representation are also proposed. We exploit the notions of writer dependent threshold and introduce the concept of feature dependent threshold to achieve a significant reduction in equal error rate. Several experiments are conducted to demonstrate the ability of the proposed scheme in discriminating the genuine signatures from the forgeries. We investigate the feasibility of the proposed representation scheme for signature verification and also signature recognition using all 16500 signatures from 330 individuals of the MCYT bimodal biometric database. Further, extensive experimentations are conducted to evaluate the performance of the proposed methods by projecting features onto Eigenspace and Fisherspace. Unlike other existing signature verification methods, the proposed method is simple and efficient. The results of the experimentations reveal that the proposed scheme outperforms several other existing verification methods including the state-of-the-art method for signature verification.  相似文献   

8.
This paper investigates the decision-making process of community members who decide on using telecenters for entrepreneurial endeavors. A qualitative approach through interviews with telecenter staff and users is used to assess the barriers and enablers to economic activity through use of telecenters. An ethnographic decision tree model is developed to illustrate the process through which a community member makes a decision to use the telecenter to support economic livelihood. A predictive model for entrepreneurial behavior is proposed based on the factors which influence the usage of telecenters for entrepreneurship – social ties, opportunity recognition and support from the telecenters.  相似文献   

9.
We conducted two experiments to explore how moderation, response rate, and message interactivity affected people’s intent to participate in a web‐based online community. In our first experiment, 62 participants observed either a moderated or an unmoderated online community and answered questions about their intent to participate in the community. The participants who viewed the moderated community reported significantly higher intent to participate than participants who viewed the unmoderated community. In our second experiment, 59 participants observed a different online community in which we manipulated both the rate (in time) of posted comments and the interactivity of each comment. We derived our manipulation of interactivity from Rafaeli’s (1988) definition of interactivity as message contingency. Participants reported significantly greater intent to participate in an online community featuring interactive messages, but only when response rate was slow. These results indicate that both structural features of interfaces and content features of interactions affect people’s intent to participate in online communities.  相似文献   

10.
Abstract

With the increasing use of Web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy, and clients with sensitive data and queries may want protection from malicious attacks. This article presents a technique to hide tree-structured data from potentially malicious data stores, while allowing clients to traverse the data to locate an object of interest without leaking information to the data store. The two motivating applications for this approach are hiding (1) tree-like XML data as well as XML queries that are in the form of tree-paths, and (2) tree-structured indexes and queries executed on such data structures. We show that this task is achievable through a one-server protocol that introduces only a limited and adjustable communication overhead. This is especially essential in low-bandwidth (such as wireless) distributed environments. The proposed protocol has desirable communication and concurrency performance, as demonstrated by the experiments we have conducted.  相似文献   

11.
Community detection plays an important role in creation and transfer of information. Active learning has been employed recently to improve the performance of community detection techniques. Active learning provides a semi-automatic approach in a selective sampling of data. Based on this, a community trolling approach for topic based community detection in big data is proposed. Community trolling selectively samples the data relevant to the current context from polluted big data using active learning. Fine-tuned data is then used to study community and its sub-communities. Community trolling as a precursor to community detection leads to a reduction of the huge unreliable dataset into a reliable dataset and results in the better prediction of community elements such as important topics and important entities. Finally, the effectiveness of approach was evaluated by implementing it on a real world Tumbler dataset. The results illustrate that community trolling provides a richer dataset resulting in more appropriate communities.  相似文献   

12.
Electronic communities are social aggregations of critical masses of people on the Internet who engage in public discussions, interactions, and information exchanges with sufficient human feeling on matters of common interest to form webs of personal relationships. Many such e-communities are rapidly evolving on the Internet, some initiated, organized, and controlled by community members themselves, some organized and controlled by marketers, and some by third parties acting as intermediaries between members and other interest groups such as marketers and advertisers. In this paper, we explore the role of e-communities as intermediaries in exchange relationships among community members and between community members and other interest groups such as marketers and advertisers from an economic perspective. In particular, we focus on the types of interactions that take place among community members and between community members and other interest groups and examine the economic and social issues involved in maintaining a healthy community. Deriving parallels from extant research in financial intermediation and social exchange theory, we explore conditions and incentive mechanisms under which such communities could develop and add value on the Internet. We also draw upon limited empirical examples from the World Wide Web to provide support to our propositions.  相似文献   

13.
基于保密和安全考虑的数据库综合应用方案   总被引:1,自引:0,他引:1  
在传统的C/S架构基础上综合系统设计、数据库和应用程序部署、用户权限管理,提出一种兼顾数据共享、交互、输入输出和数据保密性、安全性的综合解决方案,并分析了该方案的优缺点和适用范围。  相似文献   

14.
随着Web服务技术的发展,越来越多的社区引入了Web服务。为了更好地满足用户的要求,本文提出了一种为社区用户推荐服务的方法CWSR。CWSR首先对服务质量即QoS给出了定量的测算,然后通过解析服务的WSDL文档提取出服务关键字,计算社区与服务关键字的相似性从而获得服务对社区的相关度,最后结合两者与历史评分数据训练得出某特殊社区的推荐模型,根据该模型预测其它服务对于该社区的推荐指数。实验表明,本文提出的方法具有比以往方法更优的推荐质量。  相似文献   

15.
With the advancement of Internet technology, online shopping has emerged as a popular way of making purchases. However, because online shopping does not allow immediate enjoyment of purchases as bricks-and-mortar shops do, cultivating customers' trust in online businesses is especially important in attracting return customers. Previous studies have put forward the factors that build multidimensional trust but not systematically examined them. This article reexamines factors of building customer trust and makes a systematic study of the relationship between customers' perceived waiting and repurchase intention. This study examines online stores' professional ability, integrity, and benevolence were selected as the three constructing factors of trust. A total of 351 valid customer questionnaires were collected and analyzed using structural equation modeling. It was found that the most influential factor in customer trust was the security of the online business' information system, followed by the privacy protection, whereas the third-party guarantees and recommendation exhibited the third strongest correlation. Furthermore, the perceived waiting was a significant factor affecting customers' decision to return, notwithstanding their trust in an online business.  相似文献   

16.
17.
用户流失预测在很多领域得到关注,目前主流的用户流失预测方法是使用分类法。网络游戏领域发展迅猛,但用户特征选取、特征处理和流失预测的相关研究较少。本文以一款网页网络游戏的用户记录为数据,对用户游戏行为进行分析对比,发现流失用户在游戏投入、博彩热情、玩家互动方面与正常用户存在显著差异;同时发现网络游戏数据存在样本分布不平衡、候选特征库庞大和干扰差异多等难点。在此分析基础上,本文探讨了网游用户的关键特征提取的关注方向,以及归一化和对齐化在特征处理中的关键作用。实验表明,本文提取的特征具有很好的区分度。  相似文献   

18.
时空数据挖掘是数据挖掘中的重要研究内容,其中时空预测的应用领域最为广泛.针对目前时空预测方法中的不足,提出了一种基于数据融合和方法融合的时空综合预测算法.该方法首先采用统计学原理对目标对象本身的时序进行预测;然后通过神经网络解算相邻对象的空间影响,继而对混合数据序列使用时空自回归预测模型;最后使用线性回归将单个的时间预测、空间预测和时空预测有效地融合在一起,得到综合预测结果.应用该方法预测铁路客流,突破了传统铁路客流预测方法的局限,实验结果表明了算法的有效性.  相似文献   

19.
Although there have been previous studies in social psychology on the association between self-awareness and aggression, none has investigated the relationship in computer-mediated communication (CMC). The present study aims to replicate the findings in the context of CMC, by replacing the traditional mirror manipulation of private self-awareness with a real-time video image of oneself, and by measuring the intention of verbal aggression in abusive user comments on online news articles. As predicted, two experiments (N = 163) found that participants were less likely to agree with abusive comments and intend to write such comments when private self-awareness is induced. The effects of device size, self-monitoring, and social norm were also examined. In addition to extending theories of self-awareness to the context of CMC, the study offers a novel approach to addressing incivility on the Internet.  相似文献   

20.
随着进销存管理系统的规模不断扩大,系统的权限管理也变得日益复杂起来。基于角色和用户组的权限管理模型,把用户所拥有的权限分为不同部门用户的访问权限和同部门内用户的操作权限两部分,即用户的权限等于基于用户组地访问资源权限加上基于角色地功能权限。从而解决了进销存系统中权限管理的复杂性和安全性问题,满足了企业对进销存管理系统的权限要求。使系统具有了更高的灵活性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号