期刊文献+
共找到315,466篇文章
< 1 2 250 >
每页显示 20 50 100
A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network
1
作者 Jinlin Xu Wansu Pan +3 位作者 Longle Cheng Haibo Tan Munan Yuan Xiaofeng Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1399-1418,共20页
The existingmultipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is alack of cooperation between the terminal and network sides, making it difficult to achieve dynamic ada... The existingmultipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is alack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptationof service requirements and network resources. To address these issues, we propose a multi-constraint pathoptimization scheme based on information fusion in SDN. The proposed scheme collects network topology andnetwork state information on the network side and computes disjoint paths between end hosts. It uses the FuzzyAnalytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters andconstructs a composite quality evaluation function for the paths to determine the priority of the disjoint paths. TheSDN controller extracts the service attributes by analyzing the packet header and selects the optimal path for flowrule forwarding. Furthermore, the service attributes are fed back to the path composite quality evaluation function,and the path priority is dynamically adjusted to achieve dynamic adaptation between service requirements andnetwork status. By continuously monitoring and analyzing the service attributes, the scheme can ensure optimalrouting decisions in response to varying network conditions and evolving service demands. The experimentalresults demonstrated that the proposed scheme can effectively improve average throughput and link utilizationwhile meeting the Quality of Service (QoS) requirements of various applications. 展开更多
关键词 SDN multi-constraint path information fusion FAHP
下载PDF
Hyperspectral Image Super-Resolution Network Based on Reinforcing Inter-Spectral Incremental Information
2
作者 Jialong Liang Qiang Li +2 位作者 Size Wang Charles Okanda Nyatega Xin Guan 《Journal of Beijing Institute of Technology》 EI CAS 2024年第4期307-325,共19页
Hyperspectral images typically have high spectral resolution but low spatial resolution,which impacts the reliability and accuracy of subsequent applications,for example,remote sensingclassification and mineral identi... Hyperspectral images typically have high spectral resolution but low spatial resolution,which impacts the reliability and accuracy of subsequent applications,for example,remote sensingclassification and mineral identification.But in traditional methods via deep convolution neural net-works,indiscriminately extracting and fusing spectral and spatial features makes it challenging toutilize the differentiated information across adjacent spectral channels.Thus,we proposed a multi-branch interleaved iterative upsampling hyperspectral image super-resolution reconstruction net-work(MIIUSR)to address the above problems.We reinforce spatial feature extraction by integrat-ing detailed features from different receptive fields across adjacent channels.Furthermore,we pro-pose an interleaved iterative upsampling process during the reconstruction stage,which progres-sively fuses incremental information among adjacent frequency bands.Additionally,we add twoparallel three dimensional(3D)feature extraction branches to the backbone network to extractspectral and spatial features of varying granularity.We further enhance the backbone network’sconstruction results by leveraging the difference between two dimensional(2D)channel-groupingspatial features and 3D multi-granularity features.The results obtained by applying the proposednetwork model to the CAVE test set show that,at a scaling factor of×4,the peak signal to noiseratio,spectral angle mapping,and structural similarity are 37.310 dB,3.525 and 0.9438,respec-tively.Besides,extensive experiments conducted on the Harvard and Foster datasets demonstratethe superior potential of the proposed model in hyperspectral super-resolution reconstruction. 展开更多
关键词 image processing hyperspectral image super-solution incremental information
下载PDF
Identify information sources with different start times in complex networks based on sparse observers
3
作者 Yuan-Zhang Deng Zhao-Long Hu +3 位作者 Feilong Lin Chang-Bing Tang Hui Wang Yi-Zhen Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期467-479,共13页
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio... The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2. 展开更多
关键词 complex networks information spread source identification backward spread centricity
下载PDF
Dynamics of information diffusion and disease transmission in time-varying multiplex networks with asymmetric activity levels
4
作者 谢笑笑 霍良安 +1 位作者 董雅芳 程英英 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期690-699,共10页
While the interaction between information and disease in static networks has been extensively investigated,many studies have ignored the characteristics of network evolution.In this study,we construct a new two-layer ... While the interaction between information and disease in static networks has been extensively investigated,many studies have ignored the characteristics of network evolution.In this study,we construct a new two-layer coupling model to explore the interactions between information and disease.The upper layer describes the diffusion of disease-related information,and the lower layer represents the disease transmission.We then use power-law distributions to examine the influence of asymmetric activity levels on dynamic propagation,revealing a mapping relationship characterizing the interconnected propagation of information and diseases among partial nodes within the network.Subsequently,we derive the disease outbreak threshold by using the microscopic Markov-chain approach(MMCA).Finally,we perform extensive Monte Carlo(MC)numerical simulations to verify the accuracy of our theoretical results.Our findings indicate that the activity levels of individuals in the disease transmission layer have a more significant influence on disease transmission compared with the individual activity levels in the information diffusion layer.Moreover,reducing the damping factor can delay disease outbreaks and suppress disease transmission,while improving individual quarantine measures can contribute positively to disease control.This study provides valuable insights into policymakers for developing outbreak prevention and control strategies. 展开更多
关键词 information diffusion disease transmission asymmetric activity levels quarantine strength
下载PDF
RAIENet:End-to-End Multitasking Road All Information Extractor
5
作者 Xuemei Chen Pengfei Ren +2 位作者 Zeyuan Xu Shuyuan Xu Yaohan Jia 《Journal of Beijing Institute of Technology》 EI CAS 2024年第5期374-388,共15页
Road lanes and markings are the bases for autonomous driving environment perception.In this paper,we propose an end-to-end multi-task network,Road All Information Extractor named RAIENet,which aims to extract the full... Road lanes and markings are the bases for autonomous driving environment perception.In this paper,we propose an end-to-end multi-task network,Road All Information Extractor named RAIENet,which aims to extract the full information of the road surface including road lanes,road markings and their correspondences.Based on the prior knowledge of pavement information,we explore and use the deep progressive relationship between lane segmentation and pavement mark-ing detection.Then,different attention mechanisms are adapted for different tasks.A lane detection accuracy of 0.807 F1-score and a ground marking accuracy of 0.971 mean average precision at intersection over union(IOU)threshold 0.5 were achieved on the newly labeled see more on road plus(CeyMo+)dataset.Of course,we also validated it on two well-known datasets Berkeley Deep-Drive 100K(BDD100K)and CULane.In addition,a post-processing method for generating bird’s eye view lane(BEVLane)using lidar point cloud information is proposed,which is used for the construction of high-definition maps and subsequent decision-making planning.The code and data are available at https://github.com/mayberpf/RAIEnet. 展开更多
关键词 autonomous driving multitasking pavement marking detection lane segmentation pavement information
下载PDF
Studying the co-evolution of information diffusion,vaccination behavior and disease transmission in multilayer networks with local and global effects
6
作者 霍良安 武兵杰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期677-689,共13页
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf... Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time. 展开更多
关键词 information diffusion vaccination behavior disease transmission multilayer networks local and global effect
下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach
7
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
下载PDF
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things
8
作者 Yaguang Lin Xiaoming Wang +1 位作者 Liang Wang Pengfei Wan 《Digital Communications and Networks》 SCIE CSCD 2024年第3期655-665,共11页
As an ingenious convergence between the Internet of Things and social networks,the Social Internet of Things(SIoT)can provide effective and intelligent information services and has become one of the main platforms for... As an ingenious convergence between the Internet of Things and social networks,the Social Internet of Things(SIoT)can provide effective and intelligent information services and has become one of the main platforms for people to spread and share information.Nevertheless,SIoT is characterized by high openness and autonomy,multiple kinds of information can spread rapidly,freely and cooperatively in SIoT,which makes it challenging to accurately reveal the characteristics of the information diffusion process and effectively control its diffusion.To this end,with the aim of exploring multi-information cooperative diffusion processes in SIoT,we first develop a dynamics model for multi-information cooperative diffusion based on the system dynamics theory in this paper.Subsequently,the characteristics and laws of the dynamical evolution process of multi-information cooperative diffusion are theoretically investigated,and the diffusion trend is predicted.On this basis,to further control the multi-information cooperative diffusion process efficiently,we propose two control strategies for information diffusion with control objectives,develop an optimal control system for the multi-information cooperative diffusion process,and propose the corresponding optimal control method.The optimal solution distribution of the control strategy satisfying the control system constraints and the control budget constraints is solved using the optimal control theory.Finally,extensive simulation experiments based on real dataset from Twitter validate the correctness and effectiveness of the proposed model,strategy and method. 展开更多
关键词 Social Internet of Things information diffusion Dynamics modeling Trend prediction Optimal control
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
9
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
10
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems
11
作者 Sang-min Lee Namgi Kim 《Computers, Materials & Continua》 SCIE EI 2024年第2期1897-1914,共18页
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ... Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets. 展开更多
关键词 Deep learning graph neural network graph convolution network graph convolution network model learning method recommender information systems
下载PDF
Wireless Information and Power Transfer in Underwater Acoustic Sensor Networks
12
作者 Feng Yizhi Ji Fei 《China Communications》 SCIE CSCD 2024年第10期256-266,共11页
Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the te... Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the terminals. The application of WIPT to the underwater acoustic sensor networks(UWASNs) not only retains the long range communication capabilities, but also provides an auxiliary and convenient energy supplement way for the terminal sensors, and thus is a promising scheme to solve the energy-limited problem for the UWASNs. In this paper, we propose the integration of WIPT into the UWASNs and provide an overview on various enabling techniques for the WIPT based UWASNs(WIPT-UWASNs) as well as pointing out future research challenges and opportunities for WIPT-UWASNs. 展开更多
关键词 underwater acoustic modem underwater acoustic sensor network(UWASN) wireless information and power transfer(WIPT)
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
13
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
Research on Heterogeneous Information Network Link Prediction Based on Representation Learning
14
作者 Yan Zhao Weifeng Rao +1 位作者 Zihui Hu Qi Zheng 《Journal of Electronic Research and Application》 2024年第5期32-37,共6页
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth... A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification. 展开更多
关键词 Heterogeneous information network Link prediction Presentation learning Deep learning Node embedding
下载PDF
Structural Complexity Analysis of Information Systems Based on Petri Nets 被引量:3
15
作者 王景光 甘仞初 《Journal of Beijing Institute of Technology》 EI CAS 1999年第4期416-423,共8页
Aim To present a quantitative method for structural complexity analysis and evaluation of information systems. Methods Based on Petri net modeling and analysis techniques and with the aid of mathematical tools in ge... Aim To present a quantitative method for structural complexity analysis and evaluation of information systems. Methods Based on Petri net modeling and analysis techniques and with the aid of mathematical tools in general net theory(GNT), a quantitative method for structure description and analysis of information systems was introduced. Results The structural complexity index and two related factors, i.e. element complexity factor and connection complexity factor were defined, and the relations between them and the parameters of the Petri net based model of the system were derived. Application example was presented. Conclusion The proposed method provides a theoretical basis for quantitative analysis and evaluation of the structural complexity and can be applied in the general planning and design processes of the information systems. 展开更多
关键词 information system Petri nets structural complexity element complexity factor connection complexity factor
下载PDF
May Protein Be as the Genetic Information Carrier?
16
作者 刘次全 黄京飞 王莹 《Zoological Research》 CAS CSCD 1993年第S1期128-139,152,共13页
The 'central dogma 'of molecular biology indicated that the direction of the genetic information flow is from DNA - RNA - protein. However, up to now, the central dogma has not obtained a sufficient theoretica... The 'central dogma 'of molecular biology indicated that the direction of the genetic information flow is from DNA - RNA - protein. However, up to now, the central dogma has not obtained a sufficient theoretical support from cybernetics and information theory. In addition, some special cases in biology, such as, although the scrapie prion is irreversibly inactivated by alkali, five procedures with more specificity for modifying nucleic acids failed to cause inactivation and when a resting cell is activated by some factors and division occurs, protein synthesis has begun before DNA synthesis etc., are also very difficult to explain clearly by the central dogma. A broad outline of a mechanism for reverse translation can easily be 'designed', based on the normal translation process, and this serves both to prove that there is no fundamental theoretical reason for the central dogma, and to illustrate why the redundancy of genetic code is not a problem.This paper, based on some previous research work of authors, from the view of cybernetics, information theory and theoretical biology, explored the possibility of protein as a genetic information carrier, the probable pairing ways between ammo acids-codons, and the direction of genetic information flows etc., at theory, by comparing and analyzing theoretically the characteristics of information carriers existing in DNA and protein. The authors inferred that perhaps protein may join the informational transferring as a genetic information carrier; the direction of genetic information flows, besides the way described by the central dogma, seem also to have another type, that is, genetic information flowing from protein - DNA (RNA) - protein, which also includes the genetic information flow in the central dogma. Undoubtedly, the research on problems about the position and roles of protein during the genetic information transferring will have an important effect on the investigation and development of molecular biology, molecular genetics and gene engineering. 展开更多
关键词 Genetic information flows Central dogma information carrier information transfer
下载PDF
Construction and Development of GMS Agricultural Information Network Based on Stakeholder Analysis
17
作者 张斌 储雪玲 杨光 《Agricultural Science & Technology》 CAS 2015年第12期2893-2896,共4页
Based on stakeholder analysis, this paper analyzed influence of stakehold- ers on construction and operation of agricultural information network (AIN) in the Greater Mekong Sub-region (GMS). It elaborated and anal... Based on stakeholder analysis, this paper analyzed influence of stakehold- ers on construction and operation of agricultural information network (AIN) in the Greater Mekong Sub-region (GMS). It elaborated and analyzed stakeholders such as China, Asian Development Bank, other GMS state government agricultural depart- ments and users. Finally, it came up with pertinent recommendations for develop- ment of GMS-AIN. 展开更多
关键词 The Greater Mekong Sub-region (GMS) information STAKEHOLDERS
下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
18
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
下载PDF
MFFNet:多级特征融合图像语义分割网络 被引量:1
19
作者 王燕 南佩奇 《计算机科学与探索》 CSCD 北大核心 2024年第3期707-717,共11页
在图像语义分割任务中,大多数方法未将不同尺度、不同层次的特征充分利用就直接进行上采样,会造成一些有效信息被当成冗余信息而被摒弃,从而降低对某些细小类别和相似类别分割的准确性和敏感性。为此,提出一个多级特征融合网络(MFFNet)... 在图像语义分割任务中,大多数方法未将不同尺度、不同层次的特征充分利用就直接进行上采样,会造成一些有效信息被当成冗余信息而被摒弃,从而降低对某些细小类别和相似类别分割的准确性和敏感性。为此,提出一个多级特征融合网络(MFFNet)。MFFNet采用编码器-解码器结构,在编码阶段,通过上下文信息提取路径和空间信息提取路径分别获取上下文信息与空间细节信息,增强像素间关联性与边界准确性;解码阶段设计一条多级特征融合路径,利用混合双边融合模块融合上下文信息;利用高低特征融合模块融合深层信息与空间信息;利用全局通道融合模块获取不同通道之间的联系,实现不同尺度信息的全局融合。MFFNet网络在PASCAL VOC 2012和Cityscapes验证集上的平均交互比(MIoU)分别为80.70%和76.33%,取得了较好的分割结果。 展开更多
关键词 编码器-解码器 上下文信息 空间信息 特征融合
下载PDF
一个基于多线程的Information/InternetAgent原型
20
作者 迟万庆 齐治昌 谭庆平 《计算机工程与科学》 CSCD 1999年第4期41-44,共4页
本文介绍了一个Information/InternetAgent原型Webbot,着重讨论了多线程、HTML文档分析和特征表示、分类算法。
关键词 信息搜集 AGENT 多线程 INTERnet 人工智能
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部