Your conditions: 广东外语外贸大学
  • 基于手游产业分析王者荣耀手游玩家行为与动机

    Subjects: Digital Publishing >> New Media submitted time 2023-10-08 Cooperative journals: 《中国传媒科技》

    Abstract:随着我国手游用户不断增长,我国已成为全球最大的游戏市场。目前,网游主要以在线战争类游戏为主流,此类游戏注重公平性,即使玩家为游戏角色购买皮肤也不会影响最终结果,既然如此,为什么还有如此多玩家愿意消费?本研究发现,玩家的消费动机源于与游戏角色的情感关联。作为多人在线竞技游戏,"王者荣耀"手游已经形成了完善的游戏、商业以及社交模式,其未来商业发展也有一定研究意义。因此本文以"王者荣耀"手游为研究对象,以用户为调查对象,基于使用与满足理论,从用户同化的视角出发,对王者用户的心理满足进行研究,进一步探究王者游戏和网络玩家心理满足之间的关系,深入剖析手游对玩家现实生活的影响,在此基础上进行审视与反思。

  • Clinical Term Normalization Based on Multiple Strategies

    Subjects: Computer Science >> Natural Language Understanding and Machine Translation submitted time 2023-07-11

    Abstract: The clinical term normalization has important research significance for dealing with the problem of non-standardization of clinical terminology in electronic medical records. The current mainstream solution is to adopt a "recall-sort" strategy. Based on the dataset provided in Evaluation 3 of the China Conference of Health Information Processing, we propose a multi-strategy-based normalization method for clinical terms. In the recall phase, the full-matching strategy, standard words recommendation of similar original words, and similarity calculation based on the TF-IDF and the improved Jaccard coefficient are used to recall the candidate standard word set. At the same time, we construct a standard quantity prediction model based on the BERT model, and use adversarial training, focal loss and label smoothing strategies to effectively improve the prediction performance and generalization performance of the models. In the ranking stage, In the ranking stage, we use the BERT implicit score ranking model based on adversarial training and fusion of diagnostic information to rank the candidate word set, and then generate the final predicted standard words based on the output of the quantity prediction model. In the final evaluation test set, the method accuracy rate of our method reached 0.6356, ranking second place among the participating teams.
     

  • The double-edged sword effect of consumers’ photo-taking behavior on consumption experience

    Subjects: Psychology >> Social Psychology submitted time 2022-10-07

    Abstract: Consumers record visual recollections of their experiences via photo-taking. The practice of phototaking is an essential part of consumers’ everyday lives and a crucial marketing tool for businesses. However, few extant studies systematically reviewed the relevant literature on the impact of photo-taking on consumption 15 experiences. Consumption experiences are impacted in a contradictory way by photo-taking. On the one hand, photo-taking provides a “bonus effect” on visual experience, but on the other, it has a “deficiency effect” due to the absence of other true sensory (olfactory\gustatory\auditory\haptic) experiences. Individual and environmental variables may influence the relationship between photo-taking and consumption experiences. Future studies might begin by comparing different effects of objects in photo-taking, focusing on the moderating influence of environmental factors, and extending the two-sided impact of photo-taking on marketing performance

  • 云环境中基于相对索引散列树的数据审核方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-02 Cooperative journals: 《计算机应用研究》

    Abstract: To ensure the cloud environment outsourcing data from tampering, and improve the efficiency of data integrity audit, this paper proposed a data audit method based on relative index-merkle hash tree (RIMHT) . Firstly, it modified each node of the classic MHT to store two information, that was data block hash value and the relative index value of node. To reduce the computation cost of data block search, it Integrated the relative index of MHT with the node. Then, by adding the last modification time of the data, it ensured the freshness of the data. The experimental results verify the effectiveness of the proposed method. Compared with other similar methods, the proposed method has some advantages in terms of computational cost, communication cost and storage cost. And it is possible to detect the improper operation of the server with higher probability.