期刊文献+

信息和知识的度量 被引量:3

Measure of Information and Knowledge
下载PDF
导出
摘要 论述了信息的定义,并提出其广义定义;阐述了信息的属性、使用特性、资源特性和分类;介绍了香农各态历经过程特性的信息语法学度量;提出了非各态历经过程特性的信息,即非各态历经平稳随机过程、非平稳随机过程和突发过程特性的信息的语法学、语义学和语用学3种度量,从而形成了完整的随机过程特性的信息度量分析;重点讨论了具有模糊特性的信息语义学度量。最后,介绍了知识量概念及其在反导防御决策中的应用。 The definition of information is discribed and the broad sense definition of information is presented. The attributes, use characteristics and resource characteristics of information, and the classifications of information are discussed. The grammar measure of Shannon information with ergodic processes characteristics is introduced. Grammar measures, semantics measures and pragmatics measure of information with non-ergodic processes are invented, i. e. , non-ergodic stationary random processes, non-stationary random processes and abruptly process characteris- tics. Therefore, the full measure analysis of information with random process characteristics is formed. The definition measure of information with fuzz characteristics is discussed with an em- phasis. Finally, the conception of knowledge amount and its application in missile defense deci- sion are introduced.
作者 刘兴 赵敏
出处 《指挥信息系统与技术》 2013年第5期39-45,70,共8页 Command Information System and Technology
关键词 信息 信息量 知识量 信息度量 information amount of information amount of knowledge measure of information
  • 相关文献

参考文献1

  • 1Wikipedia. Information[EB/OL].http://www.en.wikipedia.org/wiki/Information,2011.

同被引文献17

  • 1贾利,武喆,黄云,张晋陶.日军C^4ISR系统建设浅析[J].外军信息战,2006(5):29-33. 被引量:1
  • 2刘兴,梁维泰,赵敏.一体化空天防御系统[M].北京:国防工业出版社,2011.
  • 3Bell LaPadulaL. Secure computing systems ; mathe-matical foundation and model [R]. MITRE Report, 1973 ,2547(2):1-5.
  • 4Feng N, Wang H J, Li M. A security risk analysismodel for information systems : causal relationships of riskfactors and vulnerability propagation analysis[J]. Informationsciences,2014,256 : 57-73.
  • 5Maconachy W V, Schou C D. A model for informa-tion assurance : an integrated approach[C]. Proceedings of the2001 IEEE Workshop on Information Assurance Security,2001:180-185.
  • 6Lim M J H, Negnevitsky M,Hartnett J. Personal-ity Trait Based Simulation Model of the E-mail System[J],International Journal of Network Security ,2006,3 (2) : 164-182.
  • 7Aral S,Walker D. Identifying influential and sus-ceptible members of social networks[J]. Science, 2012, 337(6092):337-341.
  • 8Domingos P,Richardson M. Mining the networkvalue of customers[C]. Proceedings of the seventh ACMSIGKDD international conference on Knowledge discoveryand data mining, ACM, 2001 : 57-66.
  • 9Goldsmith Pinkham P,Imbens G W. Social net-works and the identification of peer effects [J]. Journal ofBusiness & Economic Statistics,2013,31(3) :253-264.
  • 10Brock W A, Durlauf S N. Discrete choice with so-cial interactions[J]. The Review of Economic Studies, 2001,68(2):235-260.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部