Information Propagation Prediction Based on Key Users Authentication in Microblogging

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on Information Propagation Model for Microblogging

Music is beautiful, and music communication is a dissemination of beauty, which could make more people enjoy that kind of beauty. MicroBlogging, as a new media, is more and more popular for users, especially for younger people. The timeliness of Microblogging makes it more convenient for music communication on the Internet. In this paper, we study how a musical event is propagated according to ...

متن کامل

Propagation-based Sentiment Analysis for Microblogging Data

The explosive popularity of microblogging services encourages more and more online users to share their opinions, and sentiment analysis on such opinion-rich resources has been proven to be an effective way to understand public opinions. On the one hand, the brevity and informality of microblogging data plus its wide variety and rapid evolution of language in microblogging pose new challenges t...

متن کامل

On Robust Key Agreement Based on Public Key Authentication

We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of “authentication” in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr’s signature. Among all the...

متن کامل

Studying Users’ Emotions Attribution Style in Information Retrieval Based on Weiner’s Emotion Attribution Theory

Background and Aim: This research aimed to study emotions attribution style of users in information retrieval based on Weiner's theory. Methods: The survey method was used in this study. Population consisted of graduate students in humanities at Imam Reza (AS) International University. Sample of 72 students was selected.  Data was collected by attribution style questionnaire (ASQ) and two resea...

متن کامل

Authentication Scheme based on Biometric Key for VANET Information System in M2M Application Service

Smart machines and devices are rapidly deployed in the future, a secure mobile environment will be mandatory. Smart machines and devices of future are being developed towards smart machine and device based M2M(Machine to Machine) by using IT(Information Technology) technology and new science technology. Wireless machines and devices are increasing greatly in the recent years. M2M has shown the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2018

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2018/7024842