In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth...A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification.展开更多
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ...Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.展开更多
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ...In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI).展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
A condition monitoring method of deep-hole drilling based on multi-sensor information fusion is discussed. The signal of vibration and cutting force are collected when the condition of deep-hole drilling on stainless ...A condition monitoring method of deep-hole drilling based on multi-sensor information fusion is discussed. The signal of vibration and cutting force are collected when the condition of deep-hole drilling on stainless steel 0Cr17Ni4Cu4Nb is normal or abnormal. Four eigenvectors are extracted on time-domain and frequency-domain analysis of the signals. Then the four eigenvectors are combined and sent to neural networks to dispose. The fusion results indicate that multi-sensor information fusion is superior to single-sensor information, and that cutting force signal can reflect the condition of cutting tool better than vibration signal.展开更多
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem...Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.展开更多
Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will con...Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared e...A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity.展开更多
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and...Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.展开更多
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre...The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.展开更多
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
We consider a quadratic Gaussian distributed lossy source coding setup with an additional constraint of identical reconstructions between the encoder and the decoder.The setup consists of two correlated Gaussian sourc...We consider a quadratic Gaussian distributed lossy source coding setup with an additional constraint of identical reconstructions between the encoder and the decoder.The setup consists of two correlated Gaussian sources,wherein one of them has to be reconstructed to be within some distortion constraint and match with a corresponding reconstruction at the encoder,while the other source acts as coded side information.We study the tradeoff between the rates of two encoders for a given distortion constraint on the reconstruction.An explicit characterization of this trade-off is the main result of the paper.We also give close inner and outer bounds for the discrete memoryless version of the problem.展开更多
In this paper,we investigate the evolution of spatiotemporal patterns and synchronization transitions in dependence on the information transmission delay and ion channel blocking in scale-free neuronal networks.As the...In this paper,we investigate the evolution of spatiotemporal patterns and synchronization transitions in dependence on the information transmission delay and ion channel blocking in scale-free neuronal networks.As the underlying model of neuronal dynamics,we use the Hodgkin-Huxley equations incorporating channel blocking and intrinsic noise.It is shown that delays play a significant yet subtle role in shaping the dynamics of neuronal networks.In particular,regions of irregular and regular propagating excitatory fronts related to the synchronization transitions appear intermittently as the delay increases.Moreover,the fraction of working sodium and potassium ion channels can also have a significant impact on the spatiotemporal dynamics of neuronal networks.As the fraction of blocked sodium channels increases,the frequency of excitatory events decreases,which in turn manifests as an increase in the neuronal synchrony that,however,is dysfunctional due to the virtual absence of large-amplitude excitations.Expectedly,we also show that larger coupling strengths improve synchronization irrespective of the information transmission delay and channel blocking.The presented results are also robust against the variation of the network size,thus providing insights that could facilitate understanding of the joint impact of ion channel blocking and information transmission delay on the spatiotemporal dynamics of neuronal networks.展开更多
The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a contro...The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately.展开更多
A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the informatio...A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the information of current TCP/ IP network connection information, including IDs of processes which established connections, establishing time, local address, local port, remote address, remote port, etc., from a physical memory on Windows Xflsta operating system. This method is reliable and efficient. It is verified on Windows Vista, Windows Vista SP1, Windows Vista SP2.展开更多
The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reas...The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.展开更多
With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created...With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created a brand of new social form and social network, which is an extension of the real social life. The purpose of this paper is to clarify the concept of a freedom of information analyzed by the principle of free network information. In this paper, theoretical and empirical combination is based on using multidisciplinary theory study from the perspective of moral cognition of this analysis. The problems of the network ethics which try to find out the method to solve the problem, standardize and strengthen the construction of the new good network ethics, purify network environment, and improve people's spiritual world and moral accomplishment, have important theoretical and empirical significance.展开更多
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
基金Science and Technology Research Project of Jiangxi Provincial Department of Education(Project No.GJJ211348,GJJ211347 and GJJ2201056)。
文摘A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification.
基金supported by the China Postdoctoral Science Foundation (Grant No.2020M673687)。
文摘Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.
基金supported in part by the Project of International Cooperation and Exchanges NSFC under Grant No.61860206005in part by the Joint Funds of the NSFC under Grant No.U22A2003.
文摘In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI).
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘A condition monitoring method of deep-hole drilling based on multi-sensor information fusion is discussed. The signal of vibration and cutting force are collected when the condition of deep-hole drilling on stainless steel 0Cr17Ni4Cu4Nb is normal or abnormal. Four eigenvectors are extracted on time-domain and frequency-domain analysis of the signals. Then the four eigenvectors are combined and sent to neural networks to dispose. The fusion results indicate that multi-sensor information fusion is superior to single-sensor information, and that cutting force signal can reflect the condition of cutting tool better than vibration signal.
基金This project was supported by the National "863" High-Tech Research and Development Program of China(2002AA7170)
文摘Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.
基金the National Natural Science Foundations of China(Nos.61771074,62171059)。
文摘Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
基金supported in part by the National Natural Science Foundation of China 61501461, 61471269, 71232006, and61533019the Early Career Development Award of SKLMCCS (Y3S9021F34)
文摘A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity.
基金supported by the National High Technology Research and Development Program(863)of China(No.2015AA016101)the National Natural Science Fund(No.61300184)Beijing Nova Program(No.Z151100000315078)
文摘Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.
基金supported by the Corporation Science and Technology Program of Global Energy Interconnection Group Ltd. (GEIGC-D-[2018]024)by the National Natural Science Foundation of China (61472042, 61772079)
文摘The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
文摘We consider a quadratic Gaussian distributed lossy source coding setup with an additional constraint of identical reconstructions between the encoder and the decoder.The setup consists of two correlated Gaussian sources,wherein one of them has to be reconstructed to be within some distortion constraint and match with a corresponding reconstruction at the encoder,while the other source acts as coded side information.We study the tradeoff between the rates of two encoders for a given distortion constraint on the reconstruction.An explicit characterization of this trade-off is the main result of the paper.We also give close inner and outer bounds for the discrete memoryless version of the problem.
基金supported by the National Natural Science Foundation of China(11172017 and 10972001)the Fujian Natural Science Foundation of China(2009J05004)a Key Project of Fujian Provincial Universities(Information Technology Research Based on Mathematics)
文摘In this paper,we investigate the evolution of spatiotemporal patterns and synchronization transitions in dependence on the information transmission delay and ion channel blocking in scale-free neuronal networks.As the underlying model of neuronal dynamics,we use the Hodgkin-Huxley equations incorporating channel blocking and intrinsic noise.It is shown that delays play a significant yet subtle role in shaping the dynamics of neuronal networks.In particular,regions of irregular and regular propagating excitatory fronts related to the synchronization transitions appear intermittently as the delay increases.Moreover,the fraction of working sodium and potassium ion channels can also have a significant impact on the spatiotemporal dynamics of neuronal networks.As the fraction of blocked sodium channels increases,the frequency of excitatory events decreases,which in turn manifests as an increase in the neuronal synchrony that,however,is dysfunctional due to the virtual absence of large-amplitude excitations.Expectedly,we also show that larger coupling strengths improve synchronization irrespective of the information transmission delay and channel blocking.The presented results are also robust against the variation of the network size,thus providing insights that could facilitate understanding of the joint impact of ion channel blocking and information transmission delay on the spatiotemporal dynamics of neuronal networks.
文摘The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately.
基金This work is supported by the National Natural Science Foundation of China (61070163) and Shandong Natural Science Foundation (Y2008G35).
文摘A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the information of current TCP/ IP network connection information, including IDs of processes which established connections, establishing time, local address, local port, remote address, remote port, etc., from a physical memory on Windows Xflsta operating system. This method is reliable and efficient. It is verified on Windows Vista, Windows Vista SP1, Windows Vista SP2.
文摘The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.
文摘With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created a brand of new social form and social network, which is an extension of the real social life. The purpose of this paper is to clarify the concept of a freedom of information analyzed by the principle of free network information. In this paper, theoretical and empirical combination is based on using multidisciplinary theory study from the perspective of moral cognition of this analysis. The problems of the network ethics which try to find out the method to solve the problem, standardize and strengthen the construction of the new good network ethics, purify network environment, and improve people's spiritual world and moral accomplishment, have important theoretical and empirical significance.