首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Present study explored how message framing (gain vs loss) and social media virality metrics (e.g. the number of ‘likes’ and ‘shares’; SMVM) affect pro-environmental message’s influence perception and behavioral intention. In a 2 (framing: gain vs loss) × 2 (SMVM: high vs low) between-subjects experiment (N = 404), participants were exposed to Facebook posts about mitigating climate change. Major findings indicate: (1) gain framing, compared to loss, resulted in increased social desirability perception of pro-environmental messages when they are accompanied by high numbers of likes and shares; (2) social desirability perception mediated the effect of message framing on third person perception (TPP) but not on second person perception (SPP); (3) numbers of likes and shares affected participants’ message influence perceptions (TPP and SPP), and this was mediated by social desirability perception; and (4) message influence perceptions were found to be significant predictors of participants’ intentions for climate change mitigation actions. Study results implicate that SMVM can signal media content popularity and this can further affect social desirability and influence perceptions of the content. Message framing appeared to have an effect on how one thinks media content influence other people, especially in the presence of high levels of endorsement by others. The potential role of SPP, the perception of shared media influence, in augmenting public awareness and engagement is discussed in detail.  相似文献   

2.
3.
RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure against chosen message attacks in the random oracle model. The best known security reduction from the RSA assumption is non-tight, i.e., it loses a factor of \(q_s\), where \(q_s\) is the number of signature queries made by the adversary. It was furthermore proven by Coron (Advances in cryptology—EUROCRYPT 2002, Lecture notes in computer science, vol 2332. Springer, Berlin, pp 272–287, 2002) that a security loss of \(q_s\) is optimal and cannot possibly be improved. In this work, we uncover a subtle flaw in Coron’s impossibility result. Concretely, we show that it only holds if the underlying trapdoor permutation is certified. Since it is well known that the RSA trapdoor permutation is (for all practical parameters) not certified, this renders Coron’s impossibility result moot for RSA-FDH. Motivated by this, we revisit the question whether there is a tight security proof for RSA-FDH. Concretely, we give a new tight security reduction from a stronger assumption, the Phi-Hiding assumption introduced by Cachin et al. (Advances in Cryptology—EUROCRYPT’99. Lecture notes in computer science, vol 1592. Springer, Berlin, pp 402–414, 1999). This justifies the choice of smaller parameters in RSA-FDH, as it is commonly used in practice. All of our results (positive and negative) extend to the probabilistic signature scheme PSS (with message recovery).  相似文献   

4.
Two claims are at stake for a science of communication. This essay brings into focus the philosophical distinctions between the human science of communication and the social science of communication. Social science is argued to be the dominant paradigm in mainstream communication inquiry in the United States. Its underlying basis is information theory. Communicology is a human science that differs from social science in that it focuses not on the message but rather the cultural-semiotic constraints on embodied phenomenological experience. This is a unique human science approach. The grounds for comparison are located in the history of these contrasting views and in their problematic concerns. American pragmatism and social psychology are depicted as analogous to European philosophy and the Geisteswissenschaften. As this essay argues, the human science of embodied discourse is historically rooted in semiotics and phenomenology and lead to a synthesis in contemporary communicology. Communicology is distinguished from cultural studies, and a vision for the future discipline is advanced.  相似文献   

5.
Ayub  Qaisar  Rashid  Sulma 《Wireless Networks》2019,25(8):4695-4704
Wireless Networks - The delay tolerant network Spray and Wait routing protocol minimizes resource consumption by defining the ‘n’ number of message transmission quota. However, with...  相似文献   

6.
The current study examines how an empowered public engages in information seeking and electronic word-of-mouth (eWOM) behavior due to emotions elicited from their message appraisals of an inspiring branding campaign. Using cognitive appraisal theory as a framework, the current research assumes that the women with higher problem recognition and involvement will be more likely to engage in information seeking and eWOM behavior through positive affect. Using a representative sample (N = 530) randomly drawn from Qualtrics’ panel data, it uses a structural equation modeling approach to test the proposed appraisal-based behavior model. The results indicate that participants’ information seeking and eWOM behavior are adaptive responses to the emotions elicited by message appraisals. The results also show that situational variables influence the message appraisals of intrinsic pleasantness and goal-conduciveness dimensions.  相似文献   

7.
《III》1997,10(7):22-25
Throughout the past year III–Vs Review has been reporting on the starting developments within the field of blue emitting optoelectronics. Previous years saw a re-awakening of the science and commercial pursuit of what had been dismissed as a cul de sac in compound semiconductors. 1997 saw confirmation of the blue-green laser diode as an operational device from researchers worldwide, both in the academic laboratories and in industry. As the year closes and we look forward to the ‘wash-up’ celebration at the ‘MRS Fall Meeting Nitride Workshop’, Roy Szweda reports on the very latest developments in this exciting field.  相似文献   

8.
Text messages are characterised by a casual language style, ‘textese’ (e.g., c u on thurs). This study investigated adolescents’ perceptions of the use of different levels of textese in digital messages which varied in their intended recipient (friend, teacher). Grade 8 students in Australia (N = 90, aged 13–14 years) each read six text messages purportedly written by a fellow student, and rated the extent to which they agreed (on a 7-point Likert scale) that the message writer was intelligent, paid attention to detail, used an appropriate writing style, and was friendly. Overall, participants rated message senders most favourably on all measures when they used no textese, and least favourably when they used high levels of textese. This pattern was even stronger when messages were addressed to teachers rather than same-aged friends. The findings suggest that adolescents are sensitive to both writing style and recipient when considering digital messages.  相似文献   

9.
This essay examines multitudinous definitions of ‘communication’ in the light of the meaning of ‘concept’ as reflected in the literature of the philosophy of science. The examination produced 15 main themes from the definitions. Among the 15 conceptual components there are three upon which the definitions rather critically divide. These three points of conceptual split are examined for their impact on theory construction in communication. Some suggestions are made for conceptual clarification.  相似文献   

10.
‘麦香’桃叶片变色期色素含量及超微结构的变化   总被引:1,自引:0,他引:1  
本文以桃的栽培品种‘麦香’(Prunus persica‘mai xiang’)为试材,在8月中旬其叶片由绿变紫红时,对其不同叶位的叶片色素含量进行了测定;以叶色维持绿色不变的品种‘照手姬’桃(Prunus persica‘terutehime’)为对照,并观察了这2个品种的叶片细胞超微结构。结果表明:当花色苷与总叶绿素、类胡萝卜含量的比值约为1∶3.86∶0.43时叶片开始转为淡紫色;当三者含量的比值达到1∶1.70∶0.18时,‘麦香’的整个叶片转变为紫色;当三者的比值大于1∶1.35∶0.16时,叶片的紫色加深变为紫红色。超微结构研究发现,‘麦香’的顶端嫩叶与‘照手姬’的存在显著差异,‘照手姬’桃叶绿体基粒片层清晰,而此时‘麦香’叶绿体基粒片层已表现出明显的松散,线粒体膜有降解现象,而且在上表皮细胞和栅栏组织的液泡中已存在不明物质,这种幼龄期表现的衰老迹象,可能是‘麦香’桃的早熟性决定的。在基部叶片的超微结构中,两品种都出现了相似的衰老现象,即叶绿体片层结构严重扭曲并出现解体现象、嗜锇颗粒增多变大、线粒体外膜解体,内嵴混乱。此外’麦香’叶片中还显示出特有的结构:栅栏组织细胞的液泡和上表皮细胞出现大量絮状或粒状的黑色物质。本实验结果表明,‘麦香’桃叶片的成色取决于花色苷和总叶绿素的比例,‘麦香’桃在变色期合成花色苷,然后可能运输到栅栏组织的液泡和上表皮细胞,使叶片呈现紫红色。  相似文献   

11.
Multijunction (MJ),1 gallium arsenide (GaAs) and silicon (Si) solar cells have respective test efficiencies of approximately 24%, 18.5% and 14.8%. Multijunction and gallium arsenide solar cells weigh more than silicon solar cells and cost approximately five times as much per unit power at the cell level.2 A trade is performed for the Tropical Rainfall Measuring Mission (TRMM) spacecraft to determine which of these cell types would have offered an overall performance and price advantage to the spacecraft. A trade is also performed for the multijunction cells under the assumption that they will cost over ten times that of silicon cells at the cell level. The trade shows that the TRMM project, less the cost of the instrument, ground systems and mission operations, would spend approximately $552 000 per kilogram to launch and support
  • 1 The term ‘support’ means to provide the scientific equipment (‘science’) with environmental protection from the space environ ment, to keep it at acceptable temperatures and to send the data it produces to Earth in readable form, i.e. the services provided by the spacecraft.
  • science in the case of the spacecraft equipped with silicon solar cells. If these cells are exch anged for gallium arsenide solar cells, an additional 31 kg of science can be launched and serviced at a price of approximately $90 000 per kilogram. The 31 kg array weight reduction is shown to derive from the smaller area of the array and hence reductio ns in the weight of the array substrate and supporting structure. If the silicon solar cells are changed out for multijunction solar cells, an additional 45 kg of science above the silicon baseline can be launched and supported at a price of approximately $58 000 per kilogram. The trade shows that even if the multijunction cells are priced over ten times that of silicon cells, a price that is much higher than projected, the additional 45 kg of science are launched and serviced at $180 000 per kilogram. This is still much less than the original $552 000 per kilogram to launch and service the science. Data and qualitative factors are presented to show that these figures are subject to a great deal of uncertainty. Nonetheless, the benefit of the higher efficiency solar cells for TRMM is far greater than the uncertainties in the analysis. © This article is a US Government work and, as such, is in the public domain in the United States of America  相似文献   

    12.
    Xiao  Nan  Xinyi  Rang  Xiong  Zenggang  Xu  Fang  Zhang  Xuemin  Xu  Qiong  Zhao  Xiaochao  Ye  Conghuan 《Journal of Signal Processing Systems》2021,93(7):811-825

    Because mobile devices only have the limited resource in socially aware networking, some network nodes are unwilling to sacrifice their resource to forward messages to others for free, thus forming selfish nodes. However selfish nodes will cause dropping in the message delivery rate and affect the network performance, so this paper has proposed a diversity-based selfish node detection algorithm (DSNDA). Firstly, it mainly applies the node forwarding willingness mechanism to detect whether the node is selfish. If the node has the inadequate resource, that is, it cannot forward any messages for others; then it will be selfish. If the node’s resource is enough and the node has forwarded messages to other nodes, it indicates that the node is not selfish. Otherwise, DSNDA algorithm will use reputation mechanism to check the node further. If the node has broken faith, it indicates that the node is selfish. On the contrary the message confirmation mechanism will be employed to make the final check on the node. If a message does not be received or discarded after the node’s receiving it, which proves that it has selfish behaviour. If not, the node is normal. It can be proved by the simulation experiment and results that the DSNDA algorithm has significantly improved the delivery rate of messages, comparing with other algorithms. At the same time, reducing the network delay, thus verifying the feasibility of DSNDA.

      相似文献   

    13.
    A PV rural electrification experience, based on the solar home system (SHS), is being carried out at a coastal region in the state of São Paulo (Brazil). Particular attention has been paid to aspects, relating to the integration of PV technology into the pre‐existing social system. Regarding technical aspects, some special features have been designed: a ‘battery shelter’ made by the users; combined use of ‘high power’ fluorescent light with ‘low power’ incandescent light, etc. Regarding organizational aspects the technical training should be outlined. We initially decided to train one user in each community more intensively. This user was chosen from among those who appeared to be more skillful in relation to our requirements. This apparently common‐sense oriented procedure was shown to be less than appropriate, because it interfered with social relationships that we knew very little about. We observed that later on the community decided who would be responsible for the maintenance; this time widely accepted by all the users. The technical and organizational aspects together conform to a particular rural electrification scheme that can be useful for general SHS projects. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   

    14.
    随着并行计算的发展.MPI作为一种重要的消息传递方式标准,被广泛地应用到科学计算中。本文将其与电磁场时域有限差分法结合.进行了初步探讨,得到了理想的结果.加速比可达1.8左右。  相似文献   

    15.
    A privacy-preserving secure communication in ad hoc (without infrastructure) mission critical wireless networking system suitable for unmanned aerial vehicle communication systems is introduced and analyzed. It is expected that in a critical condition, few ad hoc (without infrastructure) mission critical wireless networking systems will work together. To make the simple and low cost privacy-preserving secure communication among the same network, each transmitting mobile node generates packets in such a way that its wanted receiving mobile nodes can read the message packets easily. On the other hand, the unwanted receiving mobile nodes from other networks cannot read those message packets. In addition, the unwanted receiving mobile nodes receive ‘jamming packets’ if they try to read them. This mechanism prevents the malicious receivers (readers from other networks) from reading the packets and obtaining information from this network. Results show that the throughput is very high and does not detect any jamming packets, if the receiving nodes of a network try to read packets transmitted by the nodes from the same networks.  相似文献   

    16.
    Nodes in a computer network often require a copy of a message to be delivered to every node in the network. The network layer can provide such a service, referred to as network‐wide broadcast routing or simply ‘broadcasting’. Broadcasting has many applications, including its role as a service to many routing protocols. In a mobile ad hoc network (MANET), simplistic broadcast schemes (such as flooding) inundate the network with redundancy, contention, collision, and unnecessary use of energy resources. This can prevent broadcasts from achieving their primary objective of maximizing delivery ratio, while also considering secondary objectives, such as balancing energy resources or reducing the network's burden on congested or busy nodes. As a solution, we propose multiple‐criteria broadcasting (MCB). In MCB, the source of each broadcast specifies the importance assigned to broadcast objectives. Network nodes use these priorities, along with local and neighbor knowledge of distributed factors, to broadcast in accordance with the objective priorities attributed to the message. Using ns2, the performance of MCB is evaluated and compared to that of other broadcast protocols. To present knowledge, MCB constitutes the first reconfigurable, multi‐objective approach to broadcasting. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

    17.
    李为  陈彬  魏急波  熊春林  张晓瀛 《信号处理》2012,28(9):1314-1320
    提出了一种实现无线通信物理层安全的新方法,并从信息论的角度进行了性能分析。此方法通过合法接收者发送人工噪声来干扰窃听者信道,同时通过抵消技术使得自身不受人工噪声的影响。此方法无需信道信息的反馈,能够对抗多天线的窃听者,具有强的鲁棒性。此外基于地理位置信息提出了一种“保密区域”的新概念,可以作为物理层安全的评价标准和设计准则。分析和仿真结果表明所提算法对安全性能的提升较为明显,所提“保密区域”概念能够较好的从地理位置的角度评估物理层安全性能。   相似文献   

    18.
    This study aimed to estimate consumer welfare created by informative messages via mobile instant messenger (MIM). In order to reach this goal, this paper attempted to estimate the willingness to pay (WTP) for a MIM’s service as a substitute for the existing texting-message service. Info-Talk, an informative message service provided by KakaoTalk, a major MIM in Korea, was employed as a research case, and conjoint analysis was used for a methodology for finding the WTP of informative messages via MIM. According to the result, an informative message via MIM provides 4.87 Korean Won’s (KRW) worth of service to users. When receiving an informative message via MIM using an LTE network, the maximum data charge generated by an informative message via MIM is KRW 2.864. This implies that the amount of the net welfare of informative messaging via MIM exceeds cost incurred by using it with the LTE network.  相似文献   

    19.
    Wen GU  Ji-hong HAN  Lin YUAN 《通信学报》2017,38(10):175-188
    A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.  相似文献   

    20.
    In opportunistic networks due to the inconsistency of the nodes link, routing is carried out dynamically and we cannot use proactive routes. In these networks, nodes use opportunities gained based on store-carry-forward patterns to forward messages. Every node that receives a message when it encounters another node makes decision regarding the forwarding or not forwarding the node encountered. In some previous methods, the recognition of whether encounter with current node is considered as an appropriate opportunity or not has been carried out based on the comparison of the probability of carrier node and the node encountered. In these methods, if the message is delivered to the encountered node, a better opportunity would be lost. To fight with this challenge we have posed CPTR method by using conditional probability tree method through which in addition to the probability of the delivery of carrier and encountered nodes’ message delivery, the opportunities for after encounter will be involved in messages’ forwarding. Results of simulation showed that the proposed method can improve the ratio of delivery and delay of message delivery compared to other similar methods in networks with limited buffer.  相似文献   

    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号