It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical fra...It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical framework for the study of RST.Taking two typical villages with different transition paths in rural areas of North China Plain as examples,this paper reveals the mechanism of RST and makes a comparative analysis.The results show that:1)after identifying problems and obligatory passage point,key actors recruit heterogeneous actors into the actor network by entrusting them with common interests,and realize RST under the system operation.2)Rural settlements under different transition paths have similarities in the problems to be solved,collective actions and policy factors,but there are differences in the transition process,mechanism and effect.The actor network and mechanism of RST through the path of new rural community construction are more complex and the transition effect is more thorough.In contrast,the degree of RST of retention development path is limited if there is no resource and location advantage.3)Based on the applicable conditions of different paths,this paper designs a logical framework of‘Situation-Structure-Behavior-Result’to scientifically guide the identification of RST paths under the background of rural revitalization.展开更多
The relationship between literature and society has been a subject of continuous exploration since the inception of literature itself.On the one hand,from Plato’s theory of mimesis onward,literature has consistently ...The relationship between literature and society has been a subject of continuous exploration since the inception of literature itself.On the one hand,from Plato’s theory of mimesis onward,literature has consistently been viewed as a representation of social reality,positioning literature as subordinate to society.On the other hand,with the rise of structuralism and the New Criticism,certain schools of thought have focused exclusively on literature itself,deliberately overlooking the complex connections between literature and society.The growing tension between these two perspectives has increasingly placed contemporary literary studies in a polarized state,leading to a crisis in the legitimacy of literary scholarship.In response to this,Rita Felski’s exploration of the uses of literature embodies a new literary sociology that offers a way out of the current impasse in literary studies.展开更多
As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance...As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance investment returns,venture capital syndication holds significant research value in the field of venture capital.This paper reviews the literature,summarizing the motivations behind the formation of joint investment networks,the conceptual characteristics of the three core theories of social network theory,and the empirical research on venture capital syndication within the framework of social network theory.It also highlights the existing research results,identifies gaps,and anticipates future research directions.展开更多
Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in th...Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.展开更多
To compensate for the limitations of previous studies,a complex network-based method is developed for determining importance measures,which combines the functional roles of the components of a mechatronic system and t...To compensate for the limitations of previous studies,a complex network-based method is developed for determining importance measures,which combines the functional roles of the components of a mechatronic system and their topological positions.First,the dependencies among the components are well-represented and well-calculated.Second,a mechatronic system is modeled as a weighted and directional functional dependency network(FDN),in which the node weights are determined by the functional roles of components in the system and their topological positions in the complex network whereas the edge weights are represented by dependency strengths.Third,given that the PageRank algorithm cannot calculate the dependency strengths among components,an improved PageRank importance measure(IPIM)algorithm is proposed,which combines the node weights and edge weights of complex networks.IPIM also considers the importance of neighboring components.Finally,a case study is conducted to investigate the accuracy of the proposed method.Results show that the method can effectively determine the importance measures of components.展开更多
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ...On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.展开更多
Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a...Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a complex network theory(CNT)for cascading failure analysis considering wind farm integration.A cascading failure power flow analysis model for complex power networks is established with improved network topology principles and methods.The network load and boundary conditions are determined to reflect the operational states of power systems.Three typical network evaluation indicators are used to evaluate the topology characteristics of power network before and after malfunction including connectivity level,global effective performance and percentage of load loss(PLL).The impacts of node removal,grid current tolerance capability,wind power instantaneous penetrations,and wind farm coupling points on the power grid are analyzed based on the IEEE 30 bus system.Through the simulation analysis,the occurrence mechanism and main influence factors of cascading failure are determined.Finally,corresponding defense strategies are proposed to reduce the hazards of cascading failure in power systems.展开更多
Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI ne...Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI networks with better connectivity and resilience under different development scenarios has become a practical problem that urgently needs to be solved.Taking Harbin,a megacity in Northeast China,as the case study,we set five simulation scenarios by adjusting the economic growth rate and extracted the GI network in multiple scenarios by integrating the minimal cumulative resistance model and the gravity model.The low‑degree‑first(LDF)strategy of complex network theory was introduced to optimize the GI network,and the optimization effect was verified by robustness analysis.Results:The results showed that in the 5%economic growth scenario,the GI network structure was more complex,and the connectivity of the network was better,while in the other scenarios,the network structure gradually degraded with economic growth.After optimization by the LDF strategy,the average degree of the GI network in multiple scenarios increased from 2.368,2.651,2.189,1.972,and 1.847 to 2.783,3.125,2.643,2.414,and 2.322,respectively,and the GI network structure connectivity and resilience were significantly enhanced in all scenarios.Conclusions:Economic growth did not necessarily lead to degradation of the GI network;there was still room for economic development in the study area,but it was limited under existing GI conditions,and the LDF strategy was an effective method to optimize the GI network.The research results provide a new perspective for the study of GI network protection with urban economic growth and serve as a methodological reference for urban GI network optimization.展开更多
In this article, we present a new type of unified dynamic scaling property for synchronizability, which can describe the scaling relationship between dynamic synehronizability and four hybrid ratios under the unified ...In this article, we present a new type of unified dynamic scaling property for synchronizability, which can describe the scaling relationship between dynamic synehronizability and four hybrid ratios under the unified hybrid network theory framework (UHNTF). Our theory results can not only be applied to judge and analyze dynamic synehronizability for most of complex networks associated with the UHNTF, but also we can flexibly adjust and design different hybrid ratios and sealing exponent to meet actual requirement for the dynanfic characteristics of the UHNTF.展开更多
This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum networ...This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum network of three nodes, thus gives the criterion of entanglement for this case, i.e. the conditions of complete separability and partial separability for a given quantum state of three bodies. Finally it discusses the general case for the quantum network of nodes.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network e...According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.展开更多
Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One ...Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One main challenge in NV is virtual network embedding(VNE). VNE is a NPhard problem. Previous VNE algorithms in the literature are mostly heuristic, while the remaining algorithms are exact. Heuristic algorithms aim to find a feasible embedding of each VN, not optimal or sub-optimal, in polynomial time. Though presenting the optimal or sub-optimal embedding per VN, exact algorithms are too time-consuming in smallscaled networks, not to mention moderately sized networks. To make a trade-off between the heuristic and the exact, this paper presents an effective algorithm, labeled as VNE-RSOT(Restrictive Selection and Optimization Theory), to solve the VNE problem. The VNERSOT can embed virtual nodes and links per VN simultaneously. The restrictive selection contributes to selecting candidate substrate nodes and paths and largely cuts down on the number of integer variables, used in the following optimization theory approach. The VNE-RSOT fights to minimize substrate resource consumption and accommodates more VNs. To highlight the efficiency of VNERSOT, a simulation against typical and stateof-art heuristic algorithms and a pure exact algorithm is made. Numerical results reveal that virtual network request(VNR) acceptance ratio of VNE-RSOT is, at least, 10% higher than the best-behaved heuristic. Other metrics, such as the execution time, are also plotted to emphasize and highlight the efficiency of VNE-RSOT.展开更多
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S...In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.展开更多
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the...Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.展开更多
Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organizat...Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities,展开更多
The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns relat...The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns related to sustainability,climate change,the just energy transition,dynamic operating environments,and complex social challenges.Such transitions present both opportunities and obstacles.The aim of this study is to provide an extensive literature review on energy transition to identify the challenges and strategies associated with navigating transformations in energy systems.Understanding these transformations is particularly critical in the face of the severe consequences of global warming,where an accelerated energy transition is viewed as a universal remedy.Adopting a socio-technological systems perspective,specifically through the application of Actor Network Theory(ANT),this research provides a theoretical foundation while categorising challenges into five distinct domains and outlining strategies across these different dimensions.These insights are specifically tailored for emerging market countries to effectively navigate energy transition while fostering the development of resilient societies.Furthermore,our findings highlight that energy transition encompasses more than a mere technological shift;it entails fundamental changes in various systemic socio-economic imperatives.Through focusing on the role of social structures in transitions,this study makes a significant and innovative contribution to ANT,which has historically been criticised for its limited acknowledgement of social structures.Consequently,we propose an emerging market energy transition framework,which not only addresses technological aspects,but also integrates social considerations.This framework paves the way for future research and exploration of energy transition dynamics.The outcomes of this study offer valuable insights to policymakers,researchers,and practitioners engaged in the mining industry,enabling them to comprehend the multifaceted challenges involved and providing practical strategies for effective resolution.Through incorporating the social dimension into the analysis,we enhance the understanding of the complex nature of energy system transformations,facilitating a more holistic approach towards achieving sustainable and resilient energy transitions in emerging markets and beyond.展开更多
Currently, the collaboration in scientific communities has been studied in order to explain, among other things, the knowledge diffusion. The quality of Graduate Programmes is often associated with the scientific coll...Currently, the collaboration in scientific communities has been studied in order to explain, among other things, the knowledge diffusion. The quality of Graduate Programmes is often associated with the scientific collaboration. This paper discusses how scientific collaboration processes can be identified and characterized through social and complex networks. For this purpose, collaboration networks of bibliographic production, research projects, and committees of PhD theses and Masters’ dissertations by researchers from a graduate program in computational modeling were studied. The data were obtained from CAPES’ reports of the period from 2001 to 2009. Among the studied indices, centrality indices indicate the presence of prominent researchers who influence others and promptly interact with other researchers in the network. The indices of complex networks reveal the presence of the small-world (i.e. these networks are favorable to increase coordination between researchers) phenomenon and indicate a behavior of scale-free degree distribution (i.e. some researchers promote clustering more than others) for one of the studied networks.展开更多
This article discusses the separability of the pure states and mixed states of the quantum network of two nodes by means of the criterion of no entanglement in terms of the covariance correlation tensor in quantum net...This article discusses the separability of the pure states and mixed states of the quantum network of two nodes by means of the criterion of no entanglement in terms of the covariance correlation tensor in quantum network theory, i.e. for a composite system consisting of two nodes. The covariance correlation tensor is equal to zero for all possible and .展开更多
基金Under the auspices of the Taishan Scholars Project Special FundsNational Natural Science Fundation of China(No.42077434,42001199)Youth Innovation Technology Project of Higher School in Shandong Province(No.2019RWG016)。
文摘It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical framework for the study of RST.Taking two typical villages with different transition paths in rural areas of North China Plain as examples,this paper reveals the mechanism of RST and makes a comparative analysis.The results show that:1)after identifying problems and obligatory passage point,key actors recruit heterogeneous actors into the actor network by entrusting them with common interests,and realize RST under the system operation.2)Rural settlements under different transition paths have similarities in the problems to be solved,collective actions and policy factors,but there are differences in the transition process,mechanism and effect.The actor network and mechanism of RST through the path of new rural community construction are more complex and the transition effect is more thorough.In contrast,the degree of RST of retention development path is limited if there is no resource and location advantage.3)Based on the applicable conditions of different paths,this paper designs a logical framework of‘Situation-Structure-Behavior-Result’to scientifically guide the identification of RST paths under the background of rural revitalization.
文摘The relationship between literature and society has been a subject of continuous exploration since the inception of literature itself.On the one hand,from Plato’s theory of mimesis onward,literature has consistently been viewed as a representation of social reality,positioning literature as subordinate to society.On the other hand,with the rise of structuralism and the New Criticism,certain schools of thought have focused exclusively on literature itself,deliberately overlooking the complex connections between literature and society.The growing tension between these two perspectives has increasingly placed contemporary literary studies in a polarized state,leading to a crisis in the legitimacy of literary scholarship.In response to this,Rita Felski’s exploration of the uses of literature embodies a new literary sociology that offers a way out of the current impasse in literary studies.
基金Exploration and Practice of Training Model Based on the Whole Career Cycle of Enterprise Employees(Grant no.2023520500240155)。
文摘As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance investment returns,venture capital syndication holds significant research value in the field of venture capital.This paper reviews the literature,summarizing the motivations behind the formation of joint investment networks,the conceptual characteristics of the three core theories of social network theory,and the empirical research on venture capital syndication within the framework of social network theory.It also highlights the existing research results,identifies gaps,and anticipates future research directions.
基金supported by the Civil Aviation Joint Fund of National Natural Science Foundation of China(No.U1533112)。
文摘Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.
基金The National Natural Science Foundation of China(No.51875429)General Program of Shenzhen Natural Science Foundation(No.JCYJ20190809142805521)Wenzhou Major Program of Scientific and Technological Innovation(No.ZG2021021).
文摘To compensate for the limitations of previous studies,a complex network-based method is developed for determining importance measures,which combines the functional roles of the components of a mechatronic system and their topological positions.First,the dependencies among the components are well-represented and well-calculated.Second,a mechatronic system is modeled as a weighted and directional functional dependency network(FDN),in which the node weights are determined by the functional roles of components in the system and their topological positions in the complex network whereas the edge weights are represented by dependency strengths.Third,given that the PageRank algorithm cannot calculate the dependency strengths among components,an improved PageRank importance measure(IPIM)algorithm is proposed,which combines the node weights and edge weights of complex networks.IPIM also considers the importance of neighboring components.Finally,a case study is conducted to investigate the accuracy of the proposed method.Results show that the method can effectively determine the importance measures of components.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Natural Science Foundation of China(No.60503015)
文摘On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.
基金this study was supported by the National Basic Research Program of China(2010CB428406)National Key Technology R&D Program of China(Grant No.2006BAB04A09)the National Science Foundation of P.R.China(Grant No.50939001 and 51079004)
基金This work was financially supported by a grant from the National Basic Research Program of China(973 Program)(No.2012CB215204)the Key Project of the CAS Knowledge Innovation Program“Research and demonstration of the coordinated control system based on multi-complementary energy storage”(No.KGCX2-EW-330).
文摘Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a complex network theory(CNT)for cascading failure analysis considering wind farm integration.A cascading failure power flow analysis model for complex power networks is established with improved network topology principles and methods.The network load and boundary conditions are determined to reflect the operational states of power systems.Three typical network evaluation indicators are used to evaluate the topology characteristics of power network before and after malfunction including connectivity level,global effective performance and percentage of load loss(PLL).The impacts of node removal,grid current tolerance capability,wind power instantaneous penetrations,and wind farm coupling points on the power grid are analyzed based on the IEEE 30 bus system.Through the simulation analysis,the occurrence mechanism and main influence factors of cascading failure are determined.Finally,corresponding defense strategies are proposed to reduce the hazards of cascading failure in power systems.
基金supported by the Fundamental Research Funds for the Central Universities,Northeast Forestry University(2572018CP06,2572017CA12)。
文摘Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI networks with better connectivity and resilience under different development scenarios has become a practical problem that urgently needs to be solved.Taking Harbin,a megacity in Northeast China,as the case study,we set five simulation scenarios by adjusting the economic growth rate and extracted the GI network in multiple scenarios by integrating the minimal cumulative resistance model and the gravity model.The low‑degree‑first(LDF)strategy of complex network theory was introduced to optimize the GI network,and the optimization effect was verified by robustness analysis.Results:The results showed that in the 5%economic growth scenario,the GI network structure was more complex,and the connectivity of the network was better,while in the other scenarios,the network structure gradually degraded with economic growth.After optimization by the LDF strategy,the average degree of the GI network in multiple scenarios increased from 2.368,2.651,2.189,1.972,and 1.847 to 2.783,3.125,2.643,2.414,and 2.322,respectively,and the GI network structure connectivity and resilience were significantly enhanced in all scenarios.Conclusions:Economic growth did not necessarily lead to degradation of the GI network;there was still room for economic development in the study area,but it was limited under existing GI conditions,and the LDF strategy was an effective method to optimize the GI network.The research results provide a new perspective for the study of GI network protection with urban economic growth and serve as a methodological reference for urban GI network optimization.
基金The work was supported by the National Natural Science Foundation of China (Grant Nos. 60874087 and 61174151).
文摘In this article, we present a new type of unified dynamic scaling property for synchronizability, which can describe the scaling relationship between dynamic synehronizability and four hybrid ratios under the unified hybrid network theory framework (UHNTF). Our theory results can not only be applied to judge and analyze dynamic synehronizability for most of complex networks associated with the UHNTF, but also we can flexibly adjust and design different hybrid ratios and sealing exponent to meet actual requirement for the dynanfic characteristics of the UHNTF.
文摘This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum network of three nodes, thus gives the criterion of entanglement for this case, i.e. the conditions of complete separability and partial separability for a given quantum state of three bodies. Finally it discusses the general case for the quantum network of nodes.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
文摘According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.
基金supported by the National Basic Research Program of China (973 Program) under Grant 2013CB329104the National Natural Science Foundation of China under Grant 61372124 and 61427801the Key Projects of Natural Science Foundation of Jiangsu University under Grant 11KJA510001
文摘Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One main challenge in NV is virtual network embedding(VNE). VNE is a NPhard problem. Previous VNE algorithms in the literature are mostly heuristic, while the remaining algorithms are exact. Heuristic algorithms aim to find a feasible embedding of each VN, not optimal or sub-optimal, in polynomial time. Though presenting the optimal or sub-optimal embedding per VN, exact algorithms are too time-consuming in smallscaled networks, not to mention moderately sized networks. To make a trade-off between the heuristic and the exact, this paper presents an effective algorithm, labeled as VNE-RSOT(Restrictive Selection and Optimization Theory), to solve the VNE problem. The VNERSOT can embed virtual nodes and links per VN simultaneously. The restrictive selection contributes to selecting candidate substrate nodes and paths and largely cuts down on the number of integer variables, used in the following optimization theory approach. The VNE-RSOT fights to minimize substrate resource consumption and accommodates more VNs. To highlight the efficiency of VNERSOT, a simulation against typical and stateof-art heuristic algorithms and a pure exact algorithm is made. Numerical results reveal that virtual network request(VNR) acceptance ratio of VNE-RSOT is, at least, 10% higher than the best-behaved heuristic. Other metrics, such as the execution time, are also plotted to emphasize and highlight the efficiency of VNE-RSOT.
基金jointly supported by the National Natural Science Foundation of China under Grant 61201198 and 61372089the Beijing Natural Science Foundation under Grant 4132015,4132007and 4132019
文摘In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.
文摘Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.
文摘Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities,
基金University of the Witwatersrand Additional funding is from the DSI-National Research Foundation(NRF)Thuthuka Grant(Grant UID:121973)and DSI-NRF CIMERA.
文摘The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns related to sustainability,climate change,the just energy transition,dynamic operating environments,and complex social challenges.Such transitions present both opportunities and obstacles.The aim of this study is to provide an extensive literature review on energy transition to identify the challenges and strategies associated with navigating transformations in energy systems.Understanding these transformations is particularly critical in the face of the severe consequences of global warming,where an accelerated energy transition is viewed as a universal remedy.Adopting a socio-technological systems perspective,specifically through the application of Actor Network Theory(ANT),this research provides a theoretical foundation while categorising challenges into five distinct domains and outlining strategies across these different dimensions.These insights are specifically tailored for emerging market countries to effectively navigate energy transition while fostering the development of resilient societies.Furthermore,our findings highlight that energy transition encompasses more than a mere technological shift;it entails fundamental changes in various systemic socio-economic imperatives.Through focusing on the role of social structures in transitions,this study makes a significant and innovative contribution to ANT,which has historically been criticised for its limited acknowledgement of social structures.Consequently,we propose an emerging market energy transition framework,which not only addresses technological aspects,but also integrates social considerations.This framework paves the way for future research and exploration of energy transition dynamics.The outcomes of this study offer valuable insights to policymakers,researchers,and practitioners engaged in the mining industry,enabling them to comprehend the multifaceted challenges involved and providing practical strategies for effective resolution.Through incorporating the social dimension into the analysis,we enhance the understanding of the complex nature of energy system transformations,facilitating a more holistic approach towards achieving sustainable and resilient energy transitions in emerging markets and beyond.
基金financial support from CNPq(the Brazilian federal grant agency).
文摘Currently, the collaboration in scientific communities has been studied in order to explain, among other things, the knowledge diffusion. The quality of Graduate Programmes is often associated with the scientific collaboration. This paper discusses how scientific collaboration processes can be identified and characterized through social and complex networks. For this purpose, collaboration networks of bibliographic production, research projects, and committees of PhD theses and Masters’ dissertations by researchers from a graduate program in computational modeling were studied. The data were obtained from CAPES’ reports of the period from 2001 to 2009. Among the studied indices, centrality indices indicate the presence of prominent researchers who influence others and promptly interact with other researchers in the network. The indices of complex networks reveal the presence of the small-world (i.e. these networks are favorable to increase coordination between researchers) phenomenon and indicate a behavior of scale-free degree distribution (i.e. some researchers promote clustering more than others) for one of the studied networks.
文摘This article discusses the separability of the pure states and mixed states of the quantum network of two nodes by means of the criterion of no entanglement in terms of the covariance correlation tensor in quantum network theory, i.e. for a composite system consisting of two nodes. The covariance correlation tensor is equal to zero for all possible and .