Information Propagation Prediction Based on Key Users Authentication in Microblogging
نویسندگان
چکیده
منابع مشابه
Research on Information Propagation Model for Microblogging
Music is beautiful, and music communication is a dissemination of beauty, which could make more people enjoy that kind of beauty. MicroBlogging, as a new media, is more and more popular for users, especially for younger people. The timeliness of Microblogging makes it more convenient for music communication on the Internet. In this paper, we study how a musical event is propagated according to ...
متن کاملPropagation-based Sentiment Analysis for Microblogging Data
The explosive popularity of microblogging services encourages more and more online users to share their opinions, and sentiment analysis on such opinion-rich resources has been proven to be an effective way to understand public opinions. On the one hand, the brevity and informality of microblogging data plus its wide variety and rapid evolution of language in microblogging pose new challenges t...
متن کاملOn Robust Key Agreement Based on Public Key Authentication
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of “authentication” in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr’s signature. Among all the...
متن کاملStudying Users’ Emotions Attribution Style in Information Retrieval Based on Weiner’s Emotion Attribution Theory
Background and Aim: This research aimed to study emotions attribution style of users in information retrieval based on Weiner's theory. Methods: The survey method was used in this study. Population consisted of graduate students in humanities at Imam Reza (AS) International University. Sample of 72 students was selected. Data was collected by attribution style questionnaire (ASQ) and two resea...
متن کاملAuthentication Scheme based on Biometric Key for VANET Information System in M2M Application Service
Smart machines and devices are rapidly deployed in the future, a secure mobile environment will be mandatory. Smart machines and devices of future are being developed towards smart machine and device based M2M(Machine to Machine) by using IT(Information Technology) technology and new science technology. Wireless machines and devices are increasing greatly in the recent years. M2M has shown the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2018
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2018/7024842