簡易檢索 / 詳目顯示

研究生: 謝兆賢
Hsieh, Chao-Hsien
論文名稱: 設計和實作網路社交活動之社群服務系統
Design and Implementation of a Social Service System for Social Network Activities
指導教授: 李強
Lee, Chiang
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2015
畢業學年度: 103
語文別: 英文
論文頁數: 132
中文關鍵詞: 多媒體資料庫社群網路視訊點播跨平台
外文關鍵詞: Multimedia, Database, Social network, Video-on-demand, Cross-platform
相關次數: 點閱:109下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 當傳統面對面的社交活動延伸到社群網路時,便產生許多新的應用,它不只維繫了人與人之間的關係,並且擴大了個人社交圈的範圍。在這類的網路社群中,若是有一種人具有說服他人與影響他人的能力時,這種人便稱為網路熱門意見領袖(iPOL)。
    本研究針對訓練後的網路熱門意見領袖,開發幾個子系統,以便提升他們的曝光度和增加他們的跟隨者。同時,也進一步對網路熱門意見領袖的影響力進行分析。在我們的研究中,電子名片用來提升社群曝光度,IPS和AVOD用來增加社群跟隨者。其中,IPS能夠即時的處理文字、聲音或影片檔案,加強跟隨者使用上的便利,讓更多的跟隨者願意參與。AVOD則提供多媒體影片,藉以吸引更多的跟隨者參與。最後,在iPOL的影響力分析上,我們以同性戀社群為探討案例來評估網路熱門意見領袖(iPOL)的影響力。此案例在傳遞HIV相關資訊的有效性、提高匿名HIV檢測的頻率,和減少使用網路的男男性接觸者間的危險行為上,具有相當的果效。

    Traditional face-to-face social activities, when extended to the Internet community, brings forth many new applications. They not only help maintain the relationship among people but also expands the range of personal social circle. In such a social network, a person possessing the capability of persuading people and influencing them is called the Internet Popular Opinion Leader (iPOL).
    This study developed several subsystems for trained iPOLs in order to enhance their exposure and increase their followers. It also further analyzed the effect of iPOL. In our study, electronic name cards were used to enhance social exposure, then IPS and AVOD were used to increase social followership. IPS can handle text, sound, or video files in real-time, making it more convenient for followers to use, and this attracts more followers to join in. AVOD attracts participation of more followers by providing multimedia films. Finally, with regard to impact analysis of iPOL, we studied the gay community in order to assess the impact of iPOL. This case was considerably effective in disseminating HIV-related information, improving the frequency of anonymous HIV testing, and reducing high-risk behavior among Internet-using MSM.

    CHINESE ABSTRACT I ABSTRACT II ACKNOWLEDGEMENTS III TABLE OF CONTENTS IV LIST OF TABLES VIII LIST OF FIGURES IX CHAPTER ONE INTRODUCTION 1 1.1 Motivation 3 1.1.1 Enhanced Social Exposure 4 1.1.2 Enhanced Social Followership 6 1.1.3 Analysis of Social Impact 10 1.2 Our Approach 11 1.2.1 Enhanced Social Exposure 11 1.2.2 Enhanced Social Followership 11 1.2.3 Analysis of Social Impact 12 1.3 Summary of Our Contributions 13 1.4 Organization 16 CHAPTER TWO ENVIRONMENT AND RELATED WORKS 17 2.1 Environment 17 2.1.1 System Architecture 17 2.1.2 System Model 19 2.2 Related Works 22 2.2.1 Enhanced Social Exposure 22 2.2.2 Enhanced Social Followership 26 2.2.3 Analysis of Social Impact 31 CHAPTER THREE PORTABLE NAME CARD TYPESETTING SYSTEM 32 3.1 Introduction 32 3.2 System Architecture 33 3.2.1 Data Collection 33 3.2.2 System Authentication 34 3.2.3 Typesetting Method 37 3.2.4 QR Code Generator and Merger 40 3.3 Prototype Generation 41 3.4 Experiment Results 43 3.4.1 Query Time of a Name Card, as Compared to Manual Operation and PNCTS 43 3.4.2 PNCTS Name Card Acquisition Times Across Multiple Platforms 44 3.4.3 Effect of the Number of Variables Between Mobile Device and PC 45 3.4.4 Effect of Number of Characters 47 3.5 Summary 48 CHAPTER FOUR MULTIMEDIA SERVICE IN CLIENT-SERVER 49 4.1 Introduction 49 4.2 Environment 51 4.2.1 The Difference of FTP, HTTP, and TCP/IP 52 4.2.2 HTML5 54 4.2.3 WebSocket and Socket 56 4.2.4 Visual Basic for Applications 57 4.3 Proposed System 57 4.3.1 System Design 57 4.3.2 Server for Central Management 59 4.3.3 Client for Audience 59 4.3.4 Client for Lecturer 60 4.3.5 Processing Flow and Methodology 61 4.4 Prototype: IPS in Web Application 65 4.5 Prototype Evaluation 69 4.6 Summary 74 CHAPTER FIVE MULTIMEDIA SERVICE IN CLOUD 76 5.1 Introduction 76 5.2 Environment and Related Technologies 78 5.2.1 Classifications of Framework 79 5.2.2 Technologies of Framework 82 5.3 Methodology 84 5.3.1 System Architecture 85 5.3.2 Consumer Controlling Procedure 89 5.3.3 Content Provider Controlling Procedure 91 5.3.4 Administrator Controlling Procedure 93 5.3.5 Queuing Port Allocation Algorithm 95 5.4 Case Study 97 5.5 Measurements 102 5.5.1 Experimental Setup 102 5.5.2 Experimental Results 103 5.6 Summary 106 CHAPTER SIX EFFECTS OF INTERNET POPULAR OPINION LEADERS 111 6.1 Introduction 111 6. 2 Methods 114 6.2.1 Study Design 114 6.2.2 Recruitment and Consent Procedures 114 6.2.3 Internet Popular Opinion Leaders Intervention 115 6.2.4 Measures 116 6.2.5 Analysis 117 6.2.6 Result 118 6.3 Summary 122 CHAPTER SEVEN CONCLUSIONS 123 REFERENCES 128

    [1] Chang, Y.-H., C.-H. Chu, and M.-S. Chen. A general scheme for extracting QR code from a non-uniform background in camera phones and applications. in 2007 Ninth IEEE International Symposium on Multimedia. 2007. Taichung, Taiwan.
    [2] Lai, Y.-C., et al. A GPS navigation system with QR code decoding and friend positioning in smart phones. in 2010 2nd International Conference on Education Technology and Computer. 2010. Shanghai.
    [3] Liu, Y., J. Yang, and M. Liu. Recognition of QR code with mobile phones. in 2008 Control and Decision Conference. 2008. Yantai, Shandong, China.
    [4] Sun, A., Y. Sun, and C. Liu. The QR-code reorganization in illegible snapshots taken by mobile phones. in 2007 International Conference on Computational Science and Its Applications. 2007. Kuala Lumpur.
    [5] Williamson, A.M., Teacher preparation trends: Using YouTube to assess and supplement online learning. eLearn, 2012. 2012(8): p. 1.
    [6] Tsai, S.-C., Integration of multimedia courseware into ESP instruction for technological purposes in higher technical education. Educational Technology & Society, 2012. 15(2): p. 50-61.
    [7] Watanabe, T., et al. A new security testing method for detecting flash vulnerabilities by generating test patterns. in 2010 13th International Conference on Network-Based Information Systems. 2010. Takayama, Japan: IEEE.
    [8] Bellovin, S.M., et al., Results of the security in ActiveX workshop, 2000: Pittsburgh: CERT Coordination Center, Carnegie Mellon University.
    [9] Cortes, F. and R. Lüling, A parallel continuous media server complying to the RTSP protocol, in Multimedia Applications, Services and Techniques—ECMAST'98, D. Hutchison and R. Schafer, Editors. 1998, Springer Berlin: Heidelberg. p. 97-110.
    [10] Subashini, S. and V. Kavitha, A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 2011. 34(1): p. 1-11.
    [11] Kelly, J.A., Popular opinion leaders and HIV prevention peer education: Resolving discrepant findings, and implications for the development of effective community programmes. AIDS Care, 2004. 16(2): p. 139-150.
    [12] Zhu, G., et al. HTML5 based media player for real-time video surveillance. in 2012 5th International Congress on Image and Signal Processing. 2012. Chongqing, Sichuan, China: IEEE.
    [13] Rhodes, S., D. Bowie, and K. Hergenrather, Collecting behavioural data using the World Wide Web: Considerations for researchers. Journal of Epidemiology and Community Health, 2003. 57(1): p. 68-73.
    [14] Sutheebanjard, P. and W. Premchaiswadi. QR-code generator. in 2010 8th International Conference on ICT and Knowledge Engineering. 2010. Bangkok.
    [15] Linden, G., M. Conover, and J. Robertson, The Netflix prize, computer science outreach, and Japanese mobile phones. Communications of the ACM, 2009. 52(10): p. 8-9.
    [16] Wakahara, T., N. Yamamoto, and H. Ochi, Image processing of dotted picture in QR code of cellular phones. International Journal of Computer Systems Science & Engineering, 2012. 27(1): p. 73-81.
    [17] Boyle, J.J., Automated typesetting of existing computer tabular data. IEEE Transactions on Engineering Writing and Speech, 1968. 11(2): p. 129-133.
    [18] Boyle, J.J., Computerized typesetting-an overview. IEEE Transactions on Engineering Writing and Speech, 1969. 12(2): p. 28-29.
    [19] Corley, F., High-quality computer typesetting for text, formulas, and listings. IEEE Transactions on Engineering Writing and Speech, 1969. 12(2): p. 46-49.
    [20] Kuney, J., Processing manuscripts for input to a computerized typesetting system for scientific journals. IEEE Transactions on Engineering Writing and Speech, 1969. 12(2): p. 49-52.
    [21] Pierson, J.L., A computer program for electronic typesetting. IEEE Transactions on Engineering Writing and Speech, 1971. 14(2): p. 46-52.
    [22] Iwasaki, H., Developing a lisp‐based preprocessor for TEX documents. Software: Practice and Experience, 2002. 32(14): p. 1345-1363.
    [23] Fernández‐Iglesias, M., et al., Generating high quality printouts from content management systems: A cost‐effective approach. Software: Practice and Experience, 2005. 35(11): p. 1007-1026.
    [24] Filgueiras, M., Implementing a symbolic music processing system. Software: Practice and Experience, 1998. 28(5): p. 493-512.
    [25] Yang, Q.C. and J.F. Zhu. Technology of document automatic typesetting based on XML. in 2012 2nd International Conference on Applied Social Science. 2012. Newark, NJ.
    [26] Lee, S.-L., A decision support system for luggage typesetting. Expert Systems with Applications, 2008. 35(4): p. 1620-1627.
    [27] Harada, S., K. Morinaga, and M. Hirakawa. Development of an interactive business card creation support system using genetic algorithm. in Proceedings of the 2005 International Conference on Active Media Technology. 2005. Kagawa, Japan: IEEE.
    [28] Davids, C., et al. SIP APIs for voice and video communications on the Web. in Proceedings of the 5th International Conference on Principles, Systems and Applications of IP Telecommunications. 2011. Chicago.
    [29] Bang, J. and D. Kim, Efficient RTSP-based multiple buffering and packet transmission methods for delivering OMA PoC box service. Computer Networks, 2012. 56(15): p. 3468-3478.
    [30] Liu, C. Multimedia over IP: RSVP, RTP, RTCP, RTSP. Technical report, 2000; Available from: http://www-kiv.zcu.cz/~ledvina/vyuka/PDS/PDS-tut/Multimedia
    /ip_multimedia.pdf.
    [31] Pimentel, V. and B.G. Nickerson, Communicating and displaying real-time data with WebSocket. IEEE Internet Computing, 2012. 16(4): p. 45-53.
    [32] Hoy, M.B., HTML5: A new standard for the Web. Medical Reference Services Quarterly, 2011. 30(1): p. 50-55.
    [33] Fukai, Y., et al. Web browser based GUI for TV. in 2012 IEEE 1st Global Conference on Consumer Electronics. 2012. Tokyo: IEEE.
    [34] Ota, K., H. Kubota, and T. Gotoh, Media cloud service with optimized video processing and platform. Fujitsu Scientific & Technical Journal, 2011. 47(4): p. 395-400.
    [35] Callegati, F., W. Cerroni, and A. Campi, Application scenarios for cognitive transport service in next-generation networks. IEEE Communications Magazine, 2012. 50(3): p. 62-69.
    [36] Gonçalves, P., et al., Dynamic resource management in clouds: A probabilistic approach. IEICE Transactions on Communications, 2012. 95(8): p. 2522-2529.
    [37] Wang, X., et al., AMES-Cloud: A framework of adaptive mobile video streaming and efficient social video sharing in the clouds. IEEE Transactions on Multimedia, 2013. 15(4): p. 811-820.
    [38] Angeli, D. and E. Masala, A cost-effective cloud computing framework for accelerating multimedia communication simulations. Journal of Parallel and Distributed Computing, 2012. 72(10): p. 1373-1385.
    [39] Kelly, J.A., Sexually transmitted disease prevention approaches that work. Interventions to reduce risk behavior among individuals, groups, and communities. Sexually Transmitted Diseases, 1993. 21(2 Suppl): p. S73-S75.
    [40] Rogers, E.M., Diffusion of innovations. 1995, New York: The Free Press.
    [41] Sivaram, S., et al., Development of an opinion leader-led HIV prevention intervention among alcohol users in Chennai, India. AIDS Education and Prevention, 2004. 16(2): p. 137-149.
    [42] NIMH Collaborative HIV/STD Prevention Trial Group, Design and integration of ethnography within an international behavior change HIV/sexually transmitted disease prevention trial. AIDS (London, England), 2007. 21(Suppl 2): p. S37.
    [43] Chung, W.-H., A smartphone watch for mobile surveillance service. Personal and Ubiquitous Computing, 2012. 16(6): p. 687-696.
    [44] Nowlan, M.F., et al. Fitting square pegs through round pipes: Unordered delivery wire-compatible with TCP and TLS. in Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. 2012. Berkeley.
    [45] Gezelter, R. The WebSocket protocol – past travails are to be avoided. 2011; Available from: http://www.rlgsc.com/blog/ruminations/websocket-rediscovered-travails.html.
    [46] Hickson, I. HTML 5 W3C working draft. 2011; Available from: http://www.w3.org/TR/html5/.
    [47] Pascual Espada, J., et al., Extensible architecture for context-aware mobile web applications. Expert Systems with Applications, 2012. 39(10): p. 9686-9694.
    [48] Jobs, S. Thoughts on flash. 2010; Available from: http://www.apple.com/hotnews/thoughts-on-flash/.
    [49] Hickson, I. The WebSocket API. 2013; Available from: http://dev.w3.org/html5/websockets/.
    [50] Jacobson, R., Microsoft Excel 2000/ Visual Basic for applications fundamentals. 1999, Redmond, WA: Microsoft Press.
    [51] Wells, E. and S. Harshbarger, Microsoft Excel 97 developers handbook: Example filled solutions oriented guide that helps you. 1997, Redmond, WA: Microsoft Press.
    [52] Little, S., R. Ferguson, and S. Rüger, Finding and reusing learning materials with multimedia similarity search and social networks. Technology, Pedagogy and Education, 2012. 21(2): p. 255-271.
    [53] Plaza, I., et al., Mobile applications in an aging society: Status and trends. Journal of Systems and Software, 2011. 84(11): p. 1977-1988.
    [54] Dykeman, H., M.H. Ammar, and J.W. Wong. Scheduling algorithms for videotex systems under broadcast delivery. in IEEE International Conference on Communications. 1986. Toronto.
    [55] Wong, J.W., Broadcast delivery. IEEE Journals and Magazines, 1988. 76(12): p. 1566-1577.
    [56] Chen, B. and Z. Xu. A framework for browser-based multiplayer online games using WebGL and WebSocket. in 2011 International Conference on Multimedia Technology. 2011. Hangzhou, China.
    [57] Banerjee, K.S. TCP servers: TCP servers: A TCP/IP offloading architecture for Internet servers using memory-mapped communication. Master Thesis, The Graduate School—New Brunswick Rutgers, The State University of New Jersey, NJ, USA.
    [58] Maly, R.J., et al., Comparison of centralized (client-server) and decentralized (peer-to-peer) networking, 2003, ETH Zurich: Zurich. p. 1-12.
    [59] Hu, N.-Z., et al., A cloud system for mobile medical services of traditional Chinese medicine. Journal of Medical Systems, 2013. 37(6): p. 1-13.
    [60] Espada, J.P., et al., Extensible architecture for context-aware mobile Web applications. Expert Systems with Applications, 2012. 39(10): p. 9686-9694.
    [61] Ma, K.J., et al., Mobile video delivery with HTTP. IEEE Communications Magazine, 2011. 49(4): p. 166-175.
    [62] Klausner, J.D., et al., Tracing a syphilis outbreak through cyberspace. JAMA, 2000. 284(4): p. 447-449.
    [63] Tashima, K.T., et al., Internet sex-seeking leads to acute HIV infection: A report of two cases. International Journal of STD & AIDS, 2003. 14(4): p. 285-286.
    [64] Hospers, H.J., et al., A new meeting place: Chatting on the Internet, e-dating and sexual risk behaviour among Dutch men who have sex with men. AIDS, 2005. 19(10): p. 1097-1101.
    [65] McFarlane, M., S.S. Bull, and C.A. Rietmeijer, The Internet as a newly emerging risk environment for sexually transmitted diseases. JAMA, 2000. 284(4): p. 443-446.
    [66] Ko, N.-Y., et al., Online sex-seeking, substance use, and risky behaviors in Taiwan: Results from the 2010 Asia Internet MSM sex survey. Archives of Sexual Behavior, 2012. 41(5): p. 1273-1282.
    [67] Khosropour, C.M. and P.S. Sullivan, Predictors of retention in an online follow-up study of men who have sex with men. Journal of Medical Internet Research, 2011. 13(3): p. e47.
    [68] Jaganath, D., et al., Harnessing online peer education (HOPE): Integrating C-POL and social media to train peer leaders in HIV prevention. AIDS Care, 2012. 24(5): p. 593-600.
    [69] Bull, S.S., et al., Case study: An ethics case study of HIV prevention research on Facebook: The Just/Us study. Journal of Pediatric Psychology, 2011. 2011(Feb): p. 1-11.
    [70] Noar, S.M., H.G. Black, and L.B. Pierce, Efficacy of computer technology-based HIV prevention interventions: A meta-analysis. AIDS, 2009. 23(1): p. 107-115.
    [71] Aral, S. and D. Walker, Identifying influential and susceptible members of social networks. Science, 2012. 337(6092): p. 337-341.
    [72] Mo, P.K. and N.S. Coulson, Exploring the communication of social support within virtual communities: A content analysis of messages posted to an online HIV/AIDS support group. Cyberpsychology & Behavior, 2008. 11(3): p. 371-374.
    [73] De la Torre-Díez, I., F.J. Díaz-Pernas, and M. Antón-Rodríguez, A content analysis of chronic diseases social groups on Facebook and Twitter. Telemedicine and e-Health, 2012. 18(6): p. 404-408.
    [74] Young, S.D., et al., Effect of a community popular opinion leader HIV/STI intervention on stigma in urban, coastal Peru. AIDS and Behavior, 2011. 15(5): p. 930-937.
    [75] Wei, C., et al., Social marketing interventions to increase HIV/STI testing uptake among men who have sex with men and male-to-female transgender women. Cochrane Database Systematic Reviews, 2011: p. DOI: 10.1002/14651858.
    [76] Young, S.D. and E. Rice, Online social networking technologies, HIV knowledge, and sexual risk and testing behaviors among homeless youth. AIDS and Behavior, 2011. 15(2): p. 253-260.

    下載圖示 校內:2017-01-23公開
    校外:2017-01-23公開
    QR CODE