Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Integrating Neighborhood Geographic Distribution and Social Structure Influence for Social Media User Geolocation

    Meng Zhang1,2, Xiangyang Luo1,2,*, Ningbo Huang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2513-2532, 2024, DOI:10.32604/cmes.2024.050517 - 08 July 2024

    Abstract Geolocating social media users aims to discover the real geographical locations of users from their publicly available data, which can support online location-based applications such as disaster alerts and local content recommendations. Social relationship-based methods represent a classical approach for geolocating social media. However, geographically proximate relationships are sparse and challenging to discern within social networks, thereby affecting the accuracy of user geolocation. To address this challenge, we propose user geolocation methods that integrate neighborhood geographical distribution and social structure influence (NGSI) to improve geolocation accuracy. Firstly, we propose a method for evaluating the homophily… More >

  • Open Access

    ARTICLE

    Associations between Social Media Use and Sleep Quality in China: Exploring the Mediating Role of Social Media Addiction

    Yijie Ye1, Han Wang2, Liujiang Ye1, Hao Gao1,*

    International Journal of Mental Health Promotion, Vol.26, No.5, pp. 361-376, 2024, DOI:10.32604/ijmhp.2024.049606 - 30 May 2024

    Abstract Sleep quality is closely linked to people’s health, and during the COVID-19 pandemic, the sleep patterns of residents in China were notably poor. The lockdown in China led to an increase in social media use, prompting questions about its impact on sleep. Therefore, this study investigates the association between social media use and sleep quality among Chinese residents during the COVID-19 outbreak, highlighting the potential mediating role of social media addiction. Data were collected via questionnaires through a cross-sectional survey with 779 valid responses. Variance analysis was used to test for differences in social media… More >

  • Open Access

    ARTICLE

    A Study on the Influence of Social Media Use on Psychological Anxiety among Young Women

    Tao Liu1, Huiyin Shi1, Chen Chen1,*, Rong Fu2,*

    International Journal of Mental Health Promotion, Vol.26, No.3, pp. 199-209, 2024, DOI:10.32604/ijmhp.2024.046303 - 08 April 2024

    Abstract To explore the relationship between social influence, social comparison, clarity of self-concept, and psychological anxiety among young women during their usage of social networking sites, our study selected 338 young women aged 14–34 from the social site platforms of Little Red Book and Weibo for questionnaire surveys. The Passive Social Network Utilization Scale, Social Comparison Scale (SCS), Social Influence Questionnaire, Self-Concept Clarity Scale (SCCS), and Generalized Anxiety Disorder Scale (GAD-7) were employed to measure the subjects. Our results show that the frequency of passive social media use is positively related to the level of psychological… More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614 - 09 February 2022

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux More >

Displaying 1-10 on page 1 of 4. Per Page