This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we ex...This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.展开更多
Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,...Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.展开更多
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods...Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.展开更多
Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study...Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging.展开更多
This paper introduces the system structure and work principle of the upgraded real time information system in Wangting Power Plant, and then expounds the realization way and function features of this system on B/S co...This paper introduces the system structure and work principle of the upgraded real time information system in Wangting Power Plant, and then expounds the realization way and function features of this system on B/S computing mode. The results of field application show the new system has good capability, reliability and expandability.展开更多
Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage ...Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.展开更多
This paper derives the variance of the information content and develops its statistical inference method. We describe the relations between information content and sensitivity, specificity, efficiency, prevalence rate...This paper derives the variance of the information content and develops its statistical inference method. We describe the relations between information content and sensitivity, specificity, efficiency, prevalence rate. If sensitivity, specificity and efficiency are fixed, the closer to 0. 5 the prevalence rate is, the more the information content. If prevalence rate and efficiency are fixed, the closer to each other the sensitivity and specificity are, the more the information content. We compare the power of information content method, efficiecy test, Youden's index test and kappa coefficient method. The information content method has higher power than the other methods in most conditions. It is especially sensitive to the difference between two sensitivities. It comes to conclusion that the information content method has more virtues than the other methods mentioned in this paper.展开更多
As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logical...As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logically lead to a hyper-surface for a black hole and consequently a reduction of the corresponding information density due to the dilution effect of these additional dimensions. The present paper argues that the counterintuitive opposite of the above is what should be expected. This surprising result is a consequence of a well known theorem on measure concentration due to I. Dvoretzky.展开更多
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in...This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.展开更多
The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deep...The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deepening of the reform of China and it’s joining to WTO, many industries and enterprises wi ll be confronted with severe challenge while being offered the opportunity to wa lk up to the world. The arrival of knowledge economy and web time has provided t he space for the innovation on enterprise management. It has also provided new m ethod and model for enterprise management, that is online management based on th e internet. The online management use an enterprise model including the goal of the enterprise and the scheme to carry out it to represent the whole operational of all the work. The online management is constructed on the integration of exp ert system, database, software and other technical models. How to scientifically manage the entire system of product, precisely master the condition of quantity and quality and analyze the rules of the change of produc t quality in order to carry out the overall control of quality, guarantee the go od condition of product as well as improve product quality and prolong it’s se rvice life was discussed in this thesis. Based on the above research the thesis also discussed how to develop the study on product quality information and const ruct it’s decision making support system. The concrete measures to improve peopl e’s concept of quality are also raised. Based on the type analysis, scientific management of product quality information should start from dynamic information of quality, instruction information as we ll as the information about the use, maintain, management and conservation of pr oduct, and induce them and further propose a design scheme of feedback system on product quality information, and then set up the blueprint of the information s ystem of product quality. This thesis included 7 chapters:1.the type of quality information;2.the content of quality information;3.the construction of the se nsitive web for transfering information, and collecting and transfering quality information rapidly and effectively;4.the way and procedure to transfer informa tion;5.the construction of quality information library for all phases; 6.the d isposal of quality information;7.the decision making support system of the mana gement of quality information;8.attach importance to three key factors on impro ving quality concept.展开更多
This paper investigates the dynamic evolution with limited learning information on a small-world network.In the system, the information among the interaction players is not very lucid, and the players are not allowed ...This paper investigates the dynamic evolution with limited learning information on a small-world network.In the system, the information among the interaction players is not very lucid, and the players are not allowed to inspectthe profit collected by its neighbors, thus the focal player cannot choose randomly a neighbor or the wealthiest one andcompare its payoff to copy its strategy.It is assumed that the information acquainted by the player declines in theform of the exponential with the geographical distance between the players, and a parameter V is introduced to denotethe inspect-ability about the players.It is found that under the hospitable conditions, cooperation increases with therandomness and is inhibited by the large connectivity for the prisoner's dilemma; however, cooperation is maximal atthe moderate rewiring probability and is chaos with the connectivity for the snowdrift game.For the two games, theacuminous sight is in favor of the cooperation under the hospitable conditions; whereas, the myopic eyes are advantageousto cooperation and cooperation increases with the randomness under the hostile condition.展开更多
文摘This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.
文摘Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.
基金supported by Sun Yat-sen University Cultivation Fund for Young Teachers(Grant No.:20000-3161102)the National Social Science Fundation of China(Grant No.:08CTQ015)
文摘Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.
文摘Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging.
文摘This paper introduces the system structure and work principle of the upgraded real time information system in Wangting Power Plant, and then expounds the realization way and function features of this system on B/S computing mode. The results of field application show the new system has good capability, reliability and expandability.
文摘Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.
文摘This paper derives the variance of the information content and develops its statistical inference method. We describe the relations between information content and sensitivity, specificity, efficiency, prevalence rate. If sensitivity, specificity and efficiency are fixed, the closer to 0. 5 the prevalence rate is, the more the information content. If prevalence rate and efficiency are fixed, the closer to each other the sensitivity and specificity are, the more the information content. We compare the power of information content method, efficiecy test, Youden's index test and kappa coefficient method. The information content method has higher power than the other methods in most conditions. It is especially sensitive to the difference between two sensitivities. It comes to conclusion that the information content method has more virtues than the other methods mentioned in this paper.
文摘As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logically lead to a hyper-surface for a black hole and consequently a reduction of the corresponding information density due to the dilution effect of these additional dimensions. The present paper argues that the counterintuitive opposite of the above is what should be expected. This surprising result is a consequence of a well known theorem on measure concentration due to I. Dvoretzky.
文摘This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.
文摘The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deepening of the reform of China and it’s joining to WTO, many industries and enterprises wi ll be confronted with severe challenge while being offered the opportunity to wa lk up to the world. The arrival of knowledge economy and web time has provided t he space for the innovation on enterprise management. It has also provided new m ethod and model for enterprise management, that is online management based on th e internet. The online management use an enterprise model including the goal of the enterprise and the scheme to carry out it to represent the whole operational of all the work. The online management is constructed on the integration of exp ert system, database, software and other technical models. How to scientifically manage the entire system of product, precisely master the condition of quantity and quality and analyze the rules of the change of produc t quality in order to carry out the overall control of quality, guarantee the go od condition of product as well as improve product quality and prolong it’s se rvice life was discussed in this thesis. Based on the above research the thesis also discussed how to develop the study on product quality information and const ruct it’s decision making support system. The concrete measures to improve peopl e’s concept of quality are also raised. Based on the type analysis, scientific management of product quality information should start from dynamic information of quality, instruction information as we ll as the information about the use, maintain, management and conservation of pr oduct, and induce them and further propose a design scheme of feedback system on product quality information, and then set up the blueprint of the information s ystem of product quality. This thesis included 7 chapters:1.the type of quality information;2.the content of quality information;3.the construction of the se nsitive web for transfering information, and collecting and transfering quality information rapidly and effectively;4.the way and procedure to transfer informa tion;5.the construction of quality information library for all phases; 6.the d isposal of quality information;7.the decision making support system of the mana gement of quality information;8.attach importance to three key factors on impro ving quality concept.
基金Supported by Natural Science Foundation of China under Grant No.10974146
文摘This paper investigates the dynamic evolution with limited learning information on a small-world network.In the system, the information among the interaction players is not very lucid, and the players are not allowed to inspectthe profit collected by its neighbors, thus the focal player cannot choose randomly a neighbor or the wealthiest one andcompare its payoff to copy its strategy.It is assumed that the information acquainted by the player declines in theform of the exponential with the geographical distance between the players, and a parameter V is introduced to denotethe inspect-ability about the players.It is found that under the hospitable conditions, cooperation increases with therandomness and is inhibited by the large connectivity for the prisoner's dilemma; however, cooperation is maximal atthe moderate rewiring probability and is chaos with the connectivity for the snowdrift game.For the two games, theacuminous sight is in favor of the cooperation under the hospitable conditions; whereas, the myopic eyes are advantageousto cooperation and cooperation increases with the randomness under the hostile condition.