The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive st...The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive structure for measuring the worth of data elements,hindering effective navigation of the changing digital environment.This paper aims to fill this research gap by introducing the innovative concept of“data components.”It proposes a graphtheoretic representation model that presents a clear mathematical definition and demonstrates the superiority of data components over traditional processing methods.Additionally,the paper introduces an information measurement model that provides a way to calculate the information entropy of data components and establish their increased informational value.The paper also assesses the value of information,suggesting a pricing mechanism based on its significance.In conclusion,this paper establishes a robust framework for understanding and quantifying the value of implicit information in data,laying the groundwork for future research and practical applications.展开更多
Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". ...Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization.展开更多
Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on...Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on Shannon’s information theory. Using information entropy, it preserves the mathematical form and quantitatively measures the information amount of a symbol and a bit in the machine component classification coding system. It also gets the maximum value of information amount and the corresponding coding scheme when the category of symbols is fixed. Samples are given to show how to evaluate the information amount of component codes and how to optimize a coding system.展开更多
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ...With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs.展开更多
This paper brings forward a novel dynamic multiple access network selection scheme(NDMAS),which could achieve less energy loss and improve the poor adaptive capability caused by the variable network parameters.Firstly...This paper brings forward a novel dynamic multiple access network selection scheme(NDMAS),which could achieve less energy loss and improve the poor adaptive capability caused by the variable network parameters.Firstly,a multiple access network selection mathematical model based on information theory is presented.From the perspective of information theory,access selection is essentially a process to reduce the information entropy in the system.It can be found that the lower the information entropy is,the better the system performance fulfills.Therefore,this model is designed to reduce the information entropy by removing redundant parameters,and to avoid the computational cost as well.Secondly,for model implementation,the Principal Component Analysis(PCA) is employed to process the observation data to find out the related factors which affect the users most.As a result,the information entropy is decreased.Theoretical analysis proves that system loss and computational complexity have been decreased by using the proposed approach,while the network QoS and accuracy are guaranteed.Finally,simulation results show that our scheme achieves much better system performance in terms of packet delay,throughput and call blocking probability than other currently existing ones.展开更多
Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to infor...Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to information loss and poor monitoring performance. To address dimension reduction and information preservation simultaneously, this paper proposes a novel PC selection scheme named full variable expression. On the basis of the proposed relevance of variables with each principal component, key principal components can be determined.All the key principal components serve as a low-dimensional representation of the entire original variables, preserving the information of original data space without information loss. A squared Mahalanobis distance, which is introduced as the monitoring statistic, is calculated directly in the key principal component space for fault detection. To test the modeling and monitoring performance of the proposed method, a numerical example and the Tennessee Eastman benchmark are used.展开更多
In order to explore the correlation between the adjacent segments of a long term EEG, an improved principal component analysis(PCA) method based on mutual information algorithm is proposed. A one-dimension EEG time se...In order to explore the correlation between the adjacent segments of a long term EEG, an improved principal component analysis(PCA) method based on mutual information algorithm is proposed. A one-dimension EEG time series is divided equally into many segments, so that each segment can be regarded as an independent variables and multi-segmented EEG can be expressed as a data matrix. Then, we substitute mutual information matrix for covariance matrix in PCA and conduct the relevance analysis of segmented EEG. The experimental results show that the contribution rate of first principal component(FPC) of segmented EEG is more larger than others, which can effectively reflect the difference of epileptic EEG and normal EEG with the change of segment number. In addition, the evolution of FPC conduce to identify the time-segment locations of abnormal dynamic processes of brain activities,these conclusions are helpful for the clinical analysis of EEG.展开更多
A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal...A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.展开更多
Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed...Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed of chiral dialkyl glutamides and achiral vibration-induced emission(VIE)moiety,which can switch on CPL after a simple gelation process.It is noteworthy that the CPL colors vary in different solvents,and this is attributed to various self-assembly-induced microstructures,in which the VIE moiety is restrained to different degrees.Accordingly,a multidimensional code system composed of a quick response code,a ultraviolet(UV)light-activated color code,and a CPL information figure was constructed.To our satisfaction,the system possesses multiple information-storage functions.The orthogonal anticounterfeiting and CPLenhanced encryption functions also improve the system information encryption ability.In brief,this study provides a practical example of CPL applied to information security and an effective approach to obtain a single-component color-tunable CPL material with multiple information storage and encryption functions as well.展开更多
基金supported by the EU H2020 Research and Innovation Program under the Marie Sklodowska-Curie Grant Agreement(Project-DEEP,Grant number:101109045)National Key R&D Program of China with Grant number 2018YFB1800804+2 种基金the National Natural Science Foundation of China(Nos.NSFC 61925105,and 62171257)Tsinghua University-China Mobile Communications Group Co.,Ltd,Joint Institutethe Fundamental Research Funds for the Central Universities,China(No.FRF-NP-20-03)。
文摘The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive structure for measuring the worth of data elements,hindering effective navigation of the changing digital environment.This paper aims to fill this research gap by introducing the innovative concept of“data components.”It proposes a graphtheoretic representation model that presents a clear mathematical definition and demonstrates the superiority of data components over traditional processing methods.Additionally,the paper introduces an information measurement model that provides a way to calculate the information entropy of data components and establish their increased informational value.The paper also assesses the value of information,suggesting a pricing mechanism based on its significance.In conclusion,this paper establishes a robust framework for understanding and quantifying the value of implicit information in data,laying the groundwork for future research and practical applications.
基金Supported by the National Natural Science Foundation of China (60572162)
文摘Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization.
基金Projects supported by the Hi-Tech Research and Development Pro-gram (863) of China (No. 2004AA84ts03) and the Science and Technology Committee of Zhejiang Province (No. 2004C31018), China
文摘Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on Shannon’s information theory. Using information entropy, it preserves the mathematical form and quantitatively measures the information amount of a symbol and a bit in the machine component classification coding system. It also gets the maximum value of information amount and the corresponding coding scheme when the category of symbols is fixed. Samples are given to show how to evaluate the information amount of component codes and how to optimize a coding system.
基金supported in part by the National Key R&D Program of China under Grant 2019YFB2102400,2016YFF0204001in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.
文摘With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs.
基金supported by National Natural Science Foundation of China under Grant No.60971083National International Science and Technology Cooperation Project of China (No.2010DFA11320)
文摘This paper brings forward a novel dynamic multiple access network selection scheme(NDMAS),which could achieve less energy loss and improve the poor adaptive capability caused by the variable network parameters.Firstly,a multiple access network selection mathematical model based on information theory is presented.From the perspective of information theory,access selection is essentially a process to reduce the information entropy in the system.It can be found that the lower the information entropy is,the better the system performance fulfills.Therefore,this model is designed to reduce the information entropy by removing redundant parameters,and to avoid the computational cost as well.Secondly,for model implementation,the Principal Component Analysis(PCA) is employed to process the observation data to find out the related factors which affect the users most.As a result,the information entropy is decreased.Theoretical analysis proves that system loss and computational complexity have been decreased by using the proposed approach,while the network QoS and accuracy are guaranteed.Finally,simulation results show that our scheme achieves much better system performance in terms of packet delay,throughput and call blocking probability than other currently existing ones.
基金Supported by the National Natural Science Foundation of China(No.61374140)Shanghai Pujiang Program(Project No.12PJ1402200)
文摘Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to information loss and poor monitoring performance. To address dimension reduction and information preservation simultaneously, this paper proposes a novel PC selection scheme named full variable expression. On the basis of the proposed relevance of variables with each principal component, key principal components can be determined.All the key principal components serve as a low-dimensional representation of the entire original variables, preserving the information of original data space without information loss. A squared Mahalanobis distance, which is introduced as the monitoring statistic, is calculated directly in the key principal component space for fault detection. To test the modeling and monitoring performance of the proposed method, a numerical example and the Tennessee Eastman benchmark are used.
基金Natural Science Foundatoin of Fujian Province of Chinagrant number:2010J01210,2012J01280
文摘In order to explore the correlation between the adjacent segments of a long term EEG, an improved principal component analysis(PCA) method based on mutual information algorithm is proposed. A one-dimension EEG time series is divided equally into many segments, so that each segment can be regarded as an independent variables and multi-segmented EEG can be expressed as a data matrix. Then, we substitute mutual information matrix for covariance matrix in PCA and conduct the relevance analysis of segmented EEG. The experimental results show that the contribution rate of first principal component(FPC) of segmented EEG is more larger than others, which can effectively reflect the difference of epileptic EEG and normal EEG with the change of segment number. In addition, the evolution of FPC conduce to identify the time-segment locations of abnormal dynamic processes of brain activities,these conclusions are helpful for the clinical analysis of EEG.
基金supported by the Fundamental Research Funds for the Central Universities under Grants No.2013B08214,No2009B32114the National Natural Science Foundation of China under Grants No.61271232,No.60972045,No.61071089+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2012D05the University Postgraduate Research and Innovation Project in Jiangsu Province under Grant No.CXZZ11_0395
文摘A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.
基金support from the National Key Research and Development Program of China(grant no.2022YFB3203500)the National Natural Science Foundation of China(grant nos.21788102,22125803,and 22020102006)+2 种基金project support by the Shanghai Municipal Science and Technology Major Project(grant no.2018SHZDZX03)the Program of Shanghai Academic/Technology Research Leader(grant no.20XD1421300)the Fundamental Research Funds for the Central Universities.
文摘Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed of chiral dialkyl glutamides and achiral vibration-induced emission(VIE)moiety,which can switch on CPL after a simple gelation process.It is noteworthy that the CPL colors vary in different solvents,and this is attributed to various self-assembly-induced microstructures,in which the VIE moiety is restrained to different degrees.Accordingly,a multidimensional code system composed of a quick response code,a ultraviolet(UV)light-activated color code,and a CPL information figure was constructed.To our satisfaction,the system possesses multiple information-storage functions.The orthogonal anticounterfeiting and CPLenhanced encryption functions also improve the system information encryption ability.In brief,this study provides a practical example of CPL applied to information security and an effective approach to obtain a single-component color-tunable CPL material with multiple information storage and encryption functions as well.