• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yun Jian, Liu Xiangdong, and Liu Yongkui. Computational Modeling of a Social Phenomenon: Evolution of Cultural Identity and Cultural Territory[J]. Journal of Computer Research and Development, 2013, 50(12): 2590-2602.
Citation: Yun Jian, Liu Xiangdong, and Liu Yongkui. Computational Modeling of a Social Phenomenon: Evolution of Cultural Identity and Cultural Territory[J]. Journal of Computer Research and Development, 2013, 50(12): 2590-2602.

Computational Modeling of a Social Phenomenon: Evolution of Cultural Identity and Cultural Territory

More Information
  • Published Date: December 14, 2013
  • Cultural identity is one of the core problems in cultural field. Cultural identity problem refers to the phenomenon of cultural erosion and cultural integration appearing on the cultural territory inconsistent with geological boundaries. This phenomenon is caused by the evolution of the sense of cultural identity. Before the social computing methods are introduced in, this problem is a typically social science problem which can’t be applied to computing experiments. In this paper, we apply social computing methods to this problem. The experimental research of it is brought into a risk-free space. Using the artificial social modeling techniques based on the multi-agents, we have identified several computing factors. These computing factors can characterize the cross-cultural communication and the internal stability of the cultural environment. The factors such as cultural resist-digestion inertia factor, cultural identity status factor, geological distance factor among different populations and the psychological and behavior characteristics factors of “hate-to-leave” are included. Based on these factors, the computational model is given to describe the phenomenon of cultural erosion, cultural integration and cultural protection. We make a lot of social computing experiments and the results show that all the selected computing factors affect the evolution of cultural identity and cultural territory in different ways, and the evolution law can be derived from this computational model. In future, this model can play a role in the scheme design of cultural protection and effectiveness evaluation of solutions.
  • Related Articles

    [1]Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin. Survey of Protocol Security of Industrial Control System[J]. Journal of Computer Research and Development, 2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    [2]He Kewen, Zhang Jiachen, Liu Xiaoguang, Wang Gang. Fingerprint Search Optimization for Deduplication on Emerging Storage Devices[J]. Journal of Computer Research and Development, 2020, 57(2): 269-280. DOI: 10.7544/issn1000-1239.2020.20190543
    [3]Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai. Transport Protocols for Data Center Networks: A Survey[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84. DOI: 10.7544/issn1000-1239.2020.20190519
    [4]Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an. Object-Based Data De-Duplication Method for OpenXML Compound Files[J]. Journal of Computer Research and Development, 2015, 52(7): 1546-1557. DOI: 10.7544/issn1000-1239.2015.20140093
    [5]Cao Jian, Wang Xingwei, Zhang Jinhong, Huang Min. A Data Driven Cognitive Routing Protocol for Information-Centric Networking[J]. Journal of Computer Research and Development, 2015, 52(4): 798-805. DOI: 10.7544/issn1000-1239.2015.20148404
    [6]Li Chao, Wang Shupeng, Yun Xiaochun, Zhou Xiaoyang, Chen Ming. A Reading Performance Improvement Method in Deduplication Based on Pipeline[J]. Journal of Computer Research and Development, 2013, 50(1): 90-100.
    [7]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [8]Fu Yinjin, Xiao Nong, and Liu Fang. Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
    [9]Jin Hai, Luo Fei, Zhang Qin, and Zhang Hao. An Efficient Data Transfer Protocol for P2P-Based High Performance Computing[J]. Journal of Computer Research and Development, 2006, 43(9): 1543-1549.
    [10]Liu Yi, Pang Liaojun, and Wang Yumin. An Optimistic Payment Protocol Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(10): 1686-1691.

Catalog

    Article views (982) PDF downloads (686) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return