期刊文献+
共找到475篇文章
< 1 2 24 >
每页显示 20 50 100
Research on Heterogeneous Information Network Link Prediction Based on Representation Learning
1
作者 Yan Zhao Weifeng Rao +1 位作者 Zihui Hu Qi Zheng 《Journal of Electronic Research and Application》 2024年第5期32-37,共6页
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth... A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification. 展开更多
关键词 Heterogeneous information network Link prediction Presentation learning Deep learning Node embedding
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
2
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
Design for the simulation of space based information network 被引量:1
3
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
下载PDF
Interruption Tolerance Routing Strategy for Space Information Network 被引量:1
4
作者 YANG Hai GUO Bingli +5 位作者 PANG Chengguang CUI Xinbin REN Huilin ZHOU Huichao KANG Chengbin HUANG Shanguo 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2022年第2期164-175,共12页
Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will con... Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers. 展开更多
关键词 space information network inter-satellite link route convergence self-update routing scheme
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
5
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
Integration and development of energy and information network in the Pan-Arctic region 被引量:2
6
作者 Xiaoxia Wei Jinyu Xiao +2 位作者 Zhe Wang Zhichun Wang Yun Tian 《Global Energy Interconnection》 2019年第6期505-513,共9页
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre... The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme. 展开更多
关键词 Energy Interconnection Data center network traffic Integrated development of energy and information networks Global En ergy In terconnection
下载PDF
Information Network Systems and Information Sharing on Administrative Websites 被引量:1
7
作者 HIROTA Denjiro 《Journal of Electronic Science and Technology of China》 2004年第3期64-69,共6页
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen... In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems. 展开更多
关键词 information network information sharing administrative websites information management systems document management systems
下载PDF
Study on control information network and its real-time property
8
作者 吴转峰 刘卫国 +1 位作者 骆光照 吴浦升 《Journal of Pharmaceutical Analysis》 SCIE CAS 2008年第1期24-32,共9页
The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a contro... The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately. 展开更多
关键词 control information network remote control three-closed-loop system virtualized reality
下载PDF
Alarm-Based Root Cause Analysis Based on Weighted Fault Propagation Topology for Distributed Information Network
9
作者 LYU Xiaomeng CHEN Hao +2 位作者 WU Zhenyu HAN Junhua GUO Huifeng 《ZTE Communications》 2022年第3期77-84,共8页
A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted faul... A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted fault propagation graph.Different from other RCA methods,it mines effective features information related to root causes from offline alarms.Combined with the information,online alarms and graph relationship of network structure are used to construct a weighted graph.Thus,this approach does not require operational experience and can be widely applied in different distributed networks.The proposed method can be used in multiple fault location cases.The experiment results show the proposed approach achieves much better performance with 6%higher precision at least for root fault location,compared with three baseline methods.Besides,we explain how the optimal parameter’s value in the random walk algorithm influences RCA results. 展开更多
关键词 distributed information network ALARM GRAPH root cause analysis random walk
下载PDF
Information Network System for WDCDS/NCSDI
10
作者 Zhao Zhonghe,Chen Huizhong,Tian Feng,Li Weidong,Wang Song,Zhou Kechang,Zhao Wei,and Huang ZhibinNational Center for Seismic Data and Information,SSB,Beijing 100045,China 《Earthquake Research in China》 1997年第2期101-106,共6页
World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information netw... World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information network system,called CSDInet,was developed in National Center for Seismic Data and Information(NCSDI)and has become the basic technical supporting system for WDC-D for Seismology.CSDInet consists of four basic parts:computer network center,LAN(Local Area Network),link to Internet,and nationwide PSTN(with dialing-up telephone line)user network.In this paper a "multi-layer multi-mode" management of data flow for this system will be explained and the data and information services will be described. 展开更多
关键词 WORK information network System for WDCDS/NCSDI SSB data MODE PSTN FTP World WIDE
下载PDF
Impact of Enforcement of Right of Communication through Information Network
11
作者 Chen Wen Attorney-at-law of the Beijing Hankun Law Firm 《中国专利与商标》 2006年第4期89-93,共5页
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20... On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu... 展开更多
关键词 PRO Impact of Enforcement of Right of Communication through information network ISP
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
12
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the Protection of the Right of Communication through information network
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
13
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the Protection of Privacy in the information network Age
原文传递
Self-surveillance in French Colonial West Africa: French Intelligence Services and the Hamallist Information Network (1910-1943)
14
作者 CISSE Chikouna 《History Research》 2016年第1期1-9,共9页
In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networ... In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networks to beat the French imperial machinery in the Nioro of the Sahara located in the French Sudan (known as Mali nowadays), leads to reconsidering the power relationship organizing the authority and the challenge to establish the authority relation during colonial period. That calls into question the idea of a sole and unique domination by French imperialism during colonization and at the same time, it indicates that indigenous people were very active in the historical processes, which determined their existence. 展开更多
关键词 French colonial Africa intelligence services Hamallist network information
下载PDF
Incorporating metapath interaction on heterogeneous information network for social recommendation
15
作者 Yanbin JIANG Huifang MA +2 位作者 Xiaohui ZHANG Zhixin LI Liang CHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期33-48,共16页
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph data.Although existing HIN-based... Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph data.Although existing HIN-based recommendation studies have achieved great success by performing message propagation between connected nodes on the defined metapaths,they have the following major limitations.Existing works mainly convert heterogeneous graphs into homogeneous graphs via defining metapaths,which are not expressive enough to capture more complicated dependency relationships involved on the metapath.Besides,the heterogeneous information is more likely to be provided by item attributes while social relations between users are not adequately considered.To tackle these limitations,we propose a novel social recommendation model MPISR,which models MetaPath Interaction for Social Recommendation on heterogeneous information network.Specifically,our model first learns the initial node representation through a pretraining module,and then identifies potential social friends and item relations based on their similarity to construct a unified HIN.We then develop the two-way encoder module with similarity encoder and instance encoder to capture the similarity collaborative signals and relational dependency on different metapaths.Extensive experiments on five real datasets demonstrate the effectiveness of our method. 展开更多
关键词 heterogeneous information network social reco-mmender system metapath interaction attention mechanism
原文传递
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation
16
作者 Wujie Hu Jinzhao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期1092-1104,共13页
Information networks are becoming increasingly important in practice. However, their escalating complexity is gradually impeding the efficiency of data mining. A novel network schema called the Behavior Schema of Info... Information networks are becoming increasingly important in practice. However, their escalating complexity is gradually impeding the efficiency of data mining. A novel network schema called the Behavior Schema of Information Networks (BSIN) is proposed to address this issue. This work defines the behavior of nodes as connected paths in BSIN, proposes a novel function distinguish behavior differences, and introduces approximate bisimulation into the acquisition of quotient sets for node types. The major highlight of BSIN is its ability to directly obtain a high-efficiency network on the basis of approximate bisimulation, rather than reducing the existing information network. It provides an effective representation of information networks, and the resulting novel network has a simple structure that more efficiently expresses semantic information than current network representations. The theoretical analysis of the connected paths between the original and the obtained networks demonstrates that errors are controllable;and semantic information is approximately retained. Case studies show that BSIN yields a simple network and is highly cost-effective. 展开更多
关键词 data mining information network approximate bisimulation controllable error
原文传递
Research on College Network Information Security Protection in the Digital Economy Era
17
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
Source-Aware Embedding Training on Heterogeneous Information Networks
18
作者 Tsai Hor Chan Chi Ho Wong +1 位作者 Jiajun Shen Guosheng Yin 《Data Intelligence》 EI 2023年第3期611-635,共25页
Heterogeneous information networks(HINs)have been extensively applied to real-world tasks,such as recommendation systems,social networks,and citation networks.While existing HIN representation learning methods can eff... Heterogeneous information networks(HINs)have been extensively applied to real-world tasks,such as recommendation systems,social networks,and citation networks.While existing HIN representation learning methods can effectively learn the semantic and structural features in the network,little awareness was given to the distribution discrepancy of subgraphs within a single HIN.However,we find that ignoring such distribution discrepancy among subgraphs from multiple sources would hinder the effectiveness of graph embedding learning algorithms.This motivates us to propose SUMSHINE(Scalable Unsupervised Multi-Source Heterogeneous Information Network Embedding)-a scalable unsupervised framework to align the embedding distributions among multiple sources of an HiN.Experimental results on real-world datasets in a variety of downstream tasks validate the performance of our method over the state-of-the-art heterogeneous information network embedding algorithms. 展开更多
关键词 Heterogeneous information network Graph representation learning Distribution alignment Recommendation system Adversarial learning Graph neural network
原文传递
Optimization of a Network Topology Generation Algorithm Based on Spatial Information Network
19
作者 Peng Yang Shijie Zhou Xiangyang Zhou 《国际计算机前沿大会会议论文集》 EI 2023年第1期246-255,共10页
Spatial information network(SIN)is a network with high speed and periodicity of node operation.In recent days,China will build a complete asteroid monitoring and warning system and a near-Earth asteroid defense system... Spatial information network(SIN)is a network with high speed and periodicity of node operation.In recent days,China will build a complete asteroid monitoring and warning system and a near-Earth asteroid defense system.This requires launching more low-Earth orbit satellites.In order to adapt to the increase in the number of near-Earth satellites,the dynamic optimization of space informa-tion network topology between satellites will have research significance.Consid-ering the visibility of satellite networking,the connectivity of satellite nodes,and the number of links connected to the whole network,with the goal of minimizing the end-to-end delay between satellite nodes in the network as the optimization goal,a network topology optimization model that meets multiple constraints is constructed,and the model is solved using greedy algorithm and simulated anneal-ing algorithm.In the process of simulated annealing,the networkflow algorithm is innovatively proposed for neighborhood solution.Experiments show that the simulated annealing hybrid neighborhood algorithm is significantly better than the simulated annealing random neighborhood algorithm. 展开更多
关键词 Spatial information network Dynamic Optimization of network Topology network Flow Algorithm Simulated Annealing Algorithm
原文传递
Optimization of multi-state generation problem based on spatial information network topology
20
作者 Peng Yang JiaYing Zhang +1 位作者 Shijie Zhou Jinyu Zhou 《High-Confidence Computing》 2023年第1期58-65,共8页
Spatial information network is a kind of satellite network with high speed node movement and fast dynamic topology change.With the increasing number of low-orbit satellites,the research on the subnets topology and dyn... Spatial information network is a kind of satellite network with high speed node movement and fast dynamic topology change.With the increasing number of low-orbit satellites,the research on the subnets topology and dynamic optimization of space information networks has become an important direction to study the destructibility of spatial information network.In this paper,two common objective functions in inter-satellite link assignment,network observation position and network communication factor are studied,and a multi-objective optimization model is constructed.Depth first search,simulated annealing,NSGA-II and adaptive optimization simulated annealing were used to analyze and solve the model.By comparing the solving efficiency of the model through simulation experiments,the difference of the results caused by the four algorithms is verified. 展开更多
关键词 Spatial information network Simulated annealing NSGA-II
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部