102 research outputs found

    Using social media data to understand mobile customer experience and behavior

    Get PDF
    Understanding mobile customer experience and behavior is an important task for cellular service providers to improve the satisfaction of their customers. To that end, cellular service providers regularly measure the properties of their mobile network, such as signal strength, dropped calls, call blockage, and radio interface failures (RIFs). In addition to these passive measurements collected within the network, understanding customer sentiment from direct customer feedback is also an important means of evaluating user experience. Customers have varied perceptions of mobile network quality, and also react differently to advertising, news articles, and the introduction of new equipment and services. Traditional methods used to assess customer sentiment include direct surveys and mining the transcripts of calls made to customer care centers. Along with this feedback provided directly to the service providers, the rise in social media potentially presents new opportunities to gain further insight into customers by mining public social media data as well. According to a note from one of the largest online social network (OSN) sites in the US [7], as of September 2010 there are 175 million registered users, and 95 million text messages communicated among users per day. Additionally, many OSNs provide APIs to retrieve publically available message data, which can be used to collect this data for analysis and interpretation. Our plan is to correlate different sources of measurements and user feedback to understand the social media usage patterns from mobile data users in a large nationwide cellular network. In particular, we are interested in quantifying the traffic volume, the growing trend of social media usage and how it interacts with traditional communication channels, such as voice calls, text messaging, etc. In addition, we are interested in detecting interesting network events from users' communication on OSN sites and studying the temporal aspects - how the various types of user feedback behave with respect to timing. We develop a novel approach which combines burst detection and text mining to detect emerging issues from online messages on a large OSN network. Through a case study, our method shows promising results in identifying a burst of activities using the OSN feedback, whereas customer care notes exhibit noticeable delays in detecting such an event which may lead to unnecessary operational expenses. --Mobile customer experience,social media,text data mining,customer feedback

    The impact of the digital economy on enterprise innovation behavior: Based on CiteSpace knowledge graph analysis

    Get PDF
    IntroductionAs a new trend, the digital economy will promote “digital industrialization” in the process of promoting “industrial digitalization.” It can accelerate technological innovation by adjusting managerial behavior and strategic decisions, promoting and protecting technological research and development, and providing technological infrastructure. While technological innovation, which generally occurs in enterprises, will promote a new round of upgrading, optimization, and even reshaping of the whole industry. The two are highly synergistic. Therefore, it is of great practical significance to study the impact of the digital economy era on enterprise innovation behavior.MethodsWe analyzed the impact of the digital economy era on corporate innovation behavior in the Web of Science database from 2010 to 2020 through bibliometric and scientific knowledge mapping methods.Results and discussionOur study found that: the research on enterprise innovation behavior in the digital economy era has formed eight research directions, such as expertise, human capital FSA, integration in global value chains, financial innovation, fintech, people preference shift, internet of everything, and consumer co-creation. In addition, the research hotspots on enterprise innovation behavior in the digital economy era range from enterprises’ perception of digital economy contact, to enterprises’ familiarity with digital technology and its application, to enterprises’ attempted evolution of digital transformation, reflecting the potential of both theoretical and practical characteristics. Finally, we present an outlook on the future cross-sectional development of research on enterprise innovative behavior in the digital economy era and propose a research trend based on the Chinese context

    Pushing the Limits of Valiant\u27s Universal Circuits: Simpler, Tighter and More Compact

    Get PDF
    A universal circuit (UC) is a general-purpose circuit that can simulate arbitrary circuits (up to a certain size nn). Valiant provides a kk-way recursive construction of universal circuits (STOC 1976), where kk tunes the complexity of the recursion. More concretely, Valiant gives theoretical constructions of 2-way and 4-way UCs of asymptotic (multiplicative) sizes 5nlogn5n\log n and 4.75nlogn4.75 n\log n respectively, which matches the asymptotic lower bound Ω(nlogn)\Omega(n\log n) up to some constant factor. Motivated by various privacy-preserving cryptographic applications, Kiss et al. (Eurocrypt 2016) validated the practicality of 2-way universal circuits by giving example implementations for private function evaluation. G{ü}nther et al. (Asiacrypt 2017) and Alhassan et al. (J. Cryptology 2020) implemented the 2-way/4-way hybrid UCs with various optimizations in place towards making universal circuits more practical. Zhao et al. (Asiacrypt 2019) optimized Valiant\u27s 4-way UC to asymptotic size 4.5nlogn4.5 n\log n and proved a lower bound 3.64nlogn3.64 n\log n for UCs under Valiant framework. As the scale of computation goes beyond 10-million-gate (n=107n=10^7) or even billion-gate level (n=109n=10^9), the constant factor in circuit size plays an increasingly important role in application performance. In this work, we investigate Valiant\u27s universal circuits and present an improved framework for constructing universal circuits with the following advantages. [*Simplicity*] Parameterization is no longer needed. In contrast to that previous implementations resort to a hybrid construction combining k=2k=2 and k=4k=4 for a tradeoff between fine granularity and asymptotic size-efficiency, our construction gets the best of both worlds when configured at the lowest complexity (i.e., k=2k=2). [*Compactness*] Our universal circuits have asymptotic size 3nlogn3n\log n, improving upon the best previously known 4.5nlogn4.5n\log n by 33\% and beating the 3.64nlogn3.64n\log n lower bound for UCs constructed under Valiant\u27s framework (Zhao et al., Asiacrypt 2019). [*Tightness*] We show that under our new framework the universal circuit size is lower bounded by 2.95nlogn2.95 n\log n, which almost matches the 3nlogn3n\log n circuit size of our 2-way construction. We implement the 2-way universal circuits and evaluate its performance with other implementations, which confirms our theoretical analysis

    β-Sitosterol Ameliorates Endometrium Receptivity in PCOS-Like Mice: The Mediation of Gut Microbiota

    Get PDF
    Background: Polycystic ovary syndrome (PCOS), one of the most common endocrine diseases in women of childbearing age, has been found to be accompanied by changes in the gut microbiota. The Bu Shen Yang Xue formula (BSYXF) is a traditional Chinese medicine widely used for the treatment of PCOS. This study aimed to investigate whether the protective effects of β-sitosterol, the main active ingredient of BSYXF, on PCOS was mediated by regulating gut microbiota.Methods: The presence of β-sitosterol in BSYXF was detected by liquid chromatography-mass spectrometry. The PCOS-like mouse model was induced by dehydroepiandrosterone. The fecal supernatant of β-sitosterol-treated mice was prepared for fecal microbiota transplantation (FMT). Body weight and wet weight of the uterus and ovary of the mice were recorded for organ index calculation. Hematoxylin and eosin stain was used to assess the endometrial morphology and microenvironment changes. Expression of endometrial receptivity markers cyclooxygenase-2 (COX-2), Integrin ανβ3, leukemia inhibitory factor (LIF), and homeobox A10 (HOXA10) in the endometrium were determined by immunohistochemistry and western blot analysis. Enzyme-linked immunosorbent assay was employed to detect the expression of follicle stimulating hormone (FSH), luteinizing hormone (LH), progesterone (P), and testosterone (T) in the serum. The diversity of gut microbiota was examined by 16S rDNA gene sequencing.Results: With the treatment of β-sitosterol and β-sitosterol-FMT, the uterine index of PCOS-like mice increased, the ovarian index decreased, levels of COX-2, LH and T decreased, and levels of Integrin ανβ3, LIF, HOXA10, FSH, and P increased. Under β-sitosterol treatment, the structure of the gut microbiota in PCOS-like mice was also changed.Conclusion: β-sitosterol regulates the endometrial receptivity of PCOS and harmonizes the sex hormone balance, which may be related to the changes in the structure and composition of gut microbiota, thus affecting the pathological process of PCOS

    Association between modes of delivery and postpartum dietary patterns: A cross-sectional study in Northwest China

    Get PDF
    Objective: Puerperae’ dietary patterns (DPs) during the puerperium may be influenced by the mode of delivery, but population studies on this topic are scarce. This study aims to explore the relationship between DPs and different modes of delivery among puerperae. Methods: A cross-sectional study was conducted on 3,345 parturients in Lanzhou, China. The postpartum food intake was measured by a food frequency questionnaire (FFQ). Factor analysis was used to determine the DPs. Multiple linear regression was employed to examine the association between the mode of delivery and DP. Results: In this study, two DPs, i.e., traditional and modern DPs, were identified. Traditional DP was characterized by high energy-adjusted intake of tubers, coarse cereals, rice, whole grains, fishery products, and eggs. Modern DP included a high intake of coffee, non-sugary drinks, wine, tea, and fishery products. Compared with participants with vaginal delivery (reference category), cesarean section had an inverse association with modern DP (β: −0.11, 95% CI: −0.36, −0.09). A significant interaction was found between education level, monthly household income, alcohol drinking, and modes of delivery. The inverse association between cesarean section and modern DP or the intake of coffee was significant among puerperae with higher or lower monthly household income. However, the inverse association between cesarean section and traditional DP was only found among puerperae with higher monthly household income. Moreover, among the participants with high education, cesarean section was positively associated with intake of vegetables. Conclusion: Cesarean puerperae with higher levels of education and those with lower and higher monthly household income had less unhealthy foods intake than those who had vaginal delivery. They need to be accounted for in educational programs and interventions focused on healthy diet recommendations in puerperium.This project was funded by the Chongqing Social Science Planning Project (2017YBSH057) and joint project of the Ministry of Technology and Ministry of Health (2021MSXM215) and Discipline Cultivation Fund of the First Affiliated Hospital of Chongqing Medical University. The funders had no role in the design, analysis, data interpretation and publication of findings

    Author Correction: The flying spider-monkey tree fern genome provides insights into fern evolution and arborescence (Nature Plants, (2022), 8, 5, (500-512), 10.1038/s41477-022-01146-6)

    Get PDF
    Correction to: Nature Plantshttps://doi.org/10.1038/s41477-022-01146-6, published online 9 May 2022. In the version of the article initially published, Dipak Khadka, who collected the samples in Nepal, was thanked in the Acknowledgements instead of being listed as an author. His name and affiliation (GoldenGate International College, Tribhuvan University, Battisputali, Kathmandu, Nepal) have been added to the authorship in the HTML and PDF versions of the article

    Identification of Glycine Receptor α3 as a Colchicine-Binding Protein

    Get PDF
    Colchicine (Col) is considered a kind of highly effective alkaloid for preventing and treating acute gout attacks (flares). However, little is known about the underlying mechanism of Col in pain treatment. We have previously developed a customized virtual target identification method, termed IFPTarget, for small-molecule target identification. In this study, by using IFPTarget and ligand similarity ensemble approach (SEA), we show that the glycine receptor alpha 3 (GlyRα3), which play a key role in the processing of inflammatory pain, is a potential target of Col. Moreover, Col binds directly to the GlyRα3 as determined by the immunoprecipitation and bio-layer interferometry assays using the synthesized Col-biotin conjugate (linked Col and biotin with polyethylene glycol). These results suggest that GlyRα3 may mediate Col-induced suppression of inflammatory pain. However, whether GlyRα3 is the functional target of Col and serves as potential therapeutic target in gouty arthritis requires further investigations

    cryptanalysis of mame compression function

    No full text
    Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Institute of Electrical and Electronics Engineers (IEEE); Northeastern University at Qinhuangdao (NEUQ); Dalian University of Technology; National Natural Science Foundation of China (NSFC)MAME is a compression function designed for hardware-oriented hash functions which can be used in applications with reduced hardware requirements and was described in CHES 2007. This paper first gives the 22, 23, 24 rounds attacks using the cryptanalysis on generalized Feistel. For 22 rounds, the complexity of collision attack and second preimage are respective 297 and 2197 ;For 23 rounds, collision attack and second preimage need extra space and precomputation, require about 264 tables and every table is about 264;For 24 rounds, the precomputation need about 2128 tables and every table is about 264. Then we improve the 24 rounds attack using the internal structure of round function. New attack doesnt need large precomputation and space. The complexity of new second preimage attack is about 2224 and the complexity of new collision attack is about 2112. © 2010 IEEE

    Epidemiological characteristics of malignant tumor mortality among residents in Yuyao from 2014 to 2021

    No full text
    ObjectiveTo determine the death level and change trend of malignant tumors among residents in Yuyao, and to provide support for accurate prevention and control of malignant tumors.MethodsWe collected the death monitoring data of Yuyao registered residents from 2014 to 2021, and calculated the indicators, including crude mortality rate (CMR), standardized mortality rate (SMR), potential years of life lost (PYLL), average years of life lost (AYLL), and PYLL rate (PYLLR). We also calculated the average annual change percentage (AAPC) using Joinpoint regression model.ResultsThere were 13 754 deaths from malignant tumors in Yuyao from 2014 to 2021, accounting for 26.54% of the total deaths in the same period. The average annual mortality rate was 205.63/105, and the standardized mortality rate was 115.62/105. The SMR showed a downward trend in 8 years (AAPC=-4.76%, t=-2.296, P=0.061). The average annual mortality of malignant tumors was 274.15/105, and the standardized mortality was 149.83/105. The average annual mortality of female malignant tumors was 139.03/105, the standardized mortality was 81.01/105. Male mortality was higher than the female mortality (χ2=1 487.389, P<0.001).The mortality rate of malignant tumors increased with age (AAPC=54.94%,t=27.678,P<0.001). The mortality rate of malignant tumors in different age groups showed a downward trend in 8 years (AAPC=-5.74% for 0- years old group, -8.49% for 15- years old group, -6.02% for 45- years old group, and -3.49% for ≥65 years old group). The top five causes of death from malignant tumors in residents were lung cancer, gastric cancer, liver cancer, esophageal cancer and colorectal cancer, accounting for 68.15% of all deaths from malignant tumors. Lung cancer ranked first among the causes of death from male and female malignant tumors. PYLL caused by malignant tumor death was 96 585.50 person years, AYLL was 7.02 years per person , and PYLLR was 16.42‰.ConclusionThe mortality rate of malignant tumors among registered residents in Yuyao is on the decline, but it is still the primary death cause threatening the residents. Lung cancer is the malignant tumor that causes the greatest loss of life. It is urgent to build a comprehensive intervention system for malignant tumors that focuses on men, middle-aged and elderly people, advocate a healthy lifestyle, and combine early screening and reasonable treatment to block disease progress

    biclique cryptanalysis of reduced-round piccolo block cipher

    No full text
    Piccolo is a lightweight block cipher, with a fixed 64-bit block size and variable key length 80- or 128-bit, which was proposed at CHES 2011. The iterative structure of Piccolo is a variant of Generalized Feistel Network. The transformation utilizing different-size-word based permutation improves diffusion property of Piccolo and the simple key schedule algorithm reduces hardware costs. By analyzing the distribution of the subkeys, we present a biclique cryptanalysis of full round Piccolo-80 without postwhitening keys and 28-round Piccolo-128 without prewhitening keys. The attacks are respectively with data complexity of 248 and 224 chosen ciphertexts, and with time complexity of 278.95 and 2126.79 encryptions. &copy; 2012 Springer-Verlag.Piccolo is a lightweight block cipher, with a fixed 64-bit block size and variable key length 80- or 128-bit, which was proposed at CHES 2011. The iterative structure of Piccolo is a variant of Generalized Feistel Network. The transformation utilizing different-size-word based permutation improves diffusion property of Piccolo and the simple key schedule algorithm reduces hardware costs. By analyzing the distribution of the subkeys, we present a biclique cryptanalysis of full round Piccolo-80 without postwhitening keys and 28-round Piccolo-128 without prewhitening keys. The attacks are respectively with data complexity of 248 and 224 chosen ciphertexts, and with time complexity of 278.95 and 2126.79 encryptions. &copy; 2012 Springer-Verlag
    corecore