期刊文献+
共找到3,239篇文章
< 1 2 162 >
每页显示 20 50 100
Tree Network Formation in Poisson Equation Models and the Implications for the Maximum Entropy Production Principle
1
作者 Hiroshi Serizawa Takashi Amemiya Kiminori Itoh 《Natural Science》 2014年第7期514-527,共14页
This paper presents not only practical but also instructive mathematical models to simulate tree network formation using the Poisson equation and the Finite Difference Method (FDM). Then, the implications for entropic... This paper presents not only practical but also instructive mathematical models to simulate tree network formation using the Poisson equation and the Finite Difference Method (FDM). Then, the implications for entropic theories are discussed from the viewpoint of Maximum Entropy Production (MEP). According to the MEP principle, open systems existing in the state far from equilibrium are stabilized when entropy production is maximized, creating dissipative structures with low entropy such as the tree-shaped network. We prepare two simulation models: one is the Poisson equation model that simulates the state far from equilibrium, and the other is the Laplace equation model that simulates the isolated state or the state near thermodynamic equilibrium. The output of these equations is considered to be positively correlated to entropy production of the system. Setting the Poisson equation model so that entropy production is maximized, tree network formation is advanced. We suppose that this is due to the invocation of the MEP principle, that is, entropy of the system is lowered by emitting maximal entropy out of the system. On the other hand, tree network formation is not observed in the Laplace equation model. Our simulation results will offer the persuasive evidence that certifies the effect of the MEP principle. 展开更多
关键词 DISSIPATIVE Structure Far from Equilibrium Fractal POISSON Equation Maximum ENTROPY PRODUCTION (MEP) PRINCIPLE Minimum ENTROPY PRODUCTION (MinEP) PRINCIPLE tree network
下载PDF
Verifying hierarchical network nonlocality in general quantum networks
2
作者 杨舒媛 侯晋川 贺衎 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期199-208,共10页
Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full networ... Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full network nonlocality(FNN), l-level quantum network nonlocality(l-QNN) was defined in arxiv. 2306.15717 quant-ph(2024). FQNN is a NN that can be generated only from a network with all sources being non-classical. This is beyond the existing standard network nonlocality, which may be generated from a network with only a non-classical source. One of the challenging tasks is to establish corresponding Bell-like inequalities to demonstrate the FQNN or l-QNN. Up to now, the inequality criteria for FQNN and l-QNN have only been established for star and chain networks. In this paper, we devote ourselves to establishing Bell-like inequalities for networks with more complex structures. Note that star and chain networks are special kinds of tree-shaped networks. We first establish the Bell-like inequalities for verifying l-QNN in k-forked tree-shaped networks. Such results generalize the existing inequalities for star and chain networks. Furthermore, we find the Bell-like inequality criteria for l-QNN for general acyclic and cyclic networks. Finally, we discuss the demonstration of l-QNN in the well-known butterfly networks. 展开更多
关键词 full network nonlocality hierarchical network nonlocality tree network
下载PDF
基于TREE-LSTM算法的船舶汽轮机组变负荷故障诊断
3
作者 王灏桐 李彦军 +1 位作者 杨龙滨 史建新 《舰船科学技术》 北大核心 2024年第17期110-115,共6页
针对船舶汽轮机组变负荷过程故障诊断中的耦合参数时序特征难以捕捉以及正常参数变动的干扰等问题,引入TREE-LSTM神经网络模型以实现复杂非线性系统动态数据分类。首先建立某船舶汽轮机组仿真模型,分析并进行故障仿真;随后进行数据预处... 针对船舶汽轮机组变负荷过程故障诊断中的耦合参数时序特征难以捕捉以及正常参数变动的干扰等问题,引入TREE-LSTM神经网络模型以实现复杂非线性系统动态数据分类。首先建立某船舶汽轮机组仿真模型,分析并进行故障仿真;随后进行数据预处理与特征工程;最后训练TREE-LSTM模型进行故障诊断,并与SVM、LSTM等模型进行比较。TREE-LSTM模型对于船舶汽轮机组变负荷过程的故障诊断正确率为98.7%,正确率最高。由于引入时间序列与复杂神经网络拓扑结构,TREE-LSTM在处理非线性系统动态数据分类问题时效果更好。 展开更多
关键词 汽轮机组 动态仿真 故障诊断 树形长短时记忆网络
下载PDF
基于深度哈希与VP-Tree的快速图像检索方法
4
作者 吴宗胜 李红 薛茹 《西南民族大学学报(自然科学版)》 CAS 2024年第5期544-553,共10页
针对高维特征图像检索中的精度和速度挑战,提出了一种结合深度哈希技术和VP-Tree索引的快速图像检索方法.该方法首先设计了一个轻量级的深度卷积编码网络,并在网络中引入了卷积块注意力模块和空间金字塔池化技术,以增强特征提取能力;然... 针对高维特征图像检索中的精度和速度挑战,提出了一种结合深度哈希技术和VP-Tree索引的快速图像检索方法.该方法首先设计了一个轻量级的深度卷积编码网络,并在网络中引入了卷积块注意力模块和空间金字塔池化技术,以增强特征提取能力;然后通过该网络模型将图像数据集中每幅图像的高维特征转化为二进制哈希编码,并与其对应的图像编号组成一个哈希表;接着使用所有图像的哈希编码来构建一个VP-Tree,在执行图像检索时将使用待查询图像的哈希编码从VP-Tree中快速找到与其距离最近的节点;最后根据这些节点的哈希值从哈希表中取出对应的结果图像.实验结果表明,所提方法在保持高检索精度的同时显著提升了检索速度(在MNIST、FASHION-MNIST和CIFAR-10上的检索速度分别提高了24.17、8.61和4.01倍). 展开更多
关键词 图像检索 深度哈希 卷积神经网络 VP-tree
下载PDF
A NOTE ON THE NESTEDNESS PROPERTY FOR ORDERED MEDIAN PROBLEMS IN TREE NETWORKS
5
作者 TANG Huajun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2013年第3期335-340,共6页
The nestedness property has become an increasingly important means for devising efficient algorithms for network location problems.There have been attempts to explore the nestedness property of network location proble... The nestedness property has become an increasingly important means for devising efficient algorithms for network location problems.There have been attempts to explore the nestedness property of network location problems with some special cases of the convex ordered median objectives.However,there is little research on the nestedness property for those problems with the concave ordered median objectives.This paper constructs a tree network T and shows that the nestedness property cannot hold for the concave ordered median problem,which fills a gap in the research on the nestedness property.Finally,the authors pose an open problem on identifying the nestedness property for the continuous strategic ordered median problem. 展开更多
关键词 Nestedness property ordered median problem tree network.
原文传递
Machine Learning Models for Heterogenous Network Security Anomaly Detection
6
作者 Mercy Diligence Ogah Joe Essien +1 位作者 Martin Ogharandukun Monday Abdullahi 《Journal of Computer and Communications》 2024年第6期38-58,共21页
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptio... The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptions. Conventional detection approaches face challenges in keeping up with the ever-changing strategies of cyber-attacks, resulting in heightened susceptibility and significant harm to network infrastructures. In order to tackle this urgent issue, this project focused on developing an effective anomaly detection system that utilizes Machine Learning technology. The suggested model utilizes contemporary machine learning algorithms and frameworks to autonomously detect deviations from typical network behaviour. It promptly identifies anomalous activities that may indicate security breaches or performance difficulties. The solution entails a multi-faceted approach encompassing data collection, preprocessing, feature engineering, model training, and evaluation. By utilizing machine learning methods, the model is trained on a wide range of datasets that include both regular and abnormal network traffic patterns. This training ensures that the model can adapt to numerous scenarios. The main priority is to ensure that the system is functional and efficient, with a particular emphasis on reducing false positives to avoid unwanted alerts. Additionally, efforts are directed on improving anomaly detection accuracy so that the model can consistently distinguish between potentially harmful and benign activity. This project aims to greatly strengthen network security by addressing emerging cyber threats and improving their resilience and reliability. 展开更多
关键词 Cyber-Security network Anomaly Detection Machine Learning Random Forest Decision tree Gaussian Naive Bayes
下载PDF
Immunizations on small worlds of tree-based wireless sensor networks 被引量:1
7
作者 李峤 张百海 +2 位作者 崔灵果 范衠 Athanasios V.Vasilakos 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第5期25-33,共9页
The sensor virus is a serious threat,as an attacker can simply send a single packet to compromise the entire sensor network.Epidemics become drastic with link additions among sensors when the small world phenomena occ... The sensor virus is a serious threat,as an attacker can simply send a single packet to compromise the entire sensor network.Epidemics become drastic with link additions among sensors when the small world phenomena occur.Two immunization strategies,uniform immunization and temporary immunization,are conducted on small worlds of tree-based wireless sensor networks to combat the sensor viruses.With the former strategy,the infection extends exponentially,although the immunization effectively reduces the contagion speed.With the latter strategy,recurrent contagion oscillations occur in the small world when the spatial-temporal dynamics of the epidemic are considered.The oscillations come from the small-world structure and the temporary immunization.Mathematical analyses on the small world of the Cayley tree are presented to reveal the epidemic dynamics with the two immunization strategies. 展开更多
关键词 epidemic immunization small world tree-based networks
下载PDF
A NOVEL INTRUSION DETECTION MODE BASED ON UNDERSTANDABLE NEURAL NETWORK TREES 被引量:1
8
作者 Xu Qinzhen Yang Luxi +1 位作者 Zhao Qiangfu He Zhenya 《Journal of Electronics(China)》 2006年第4期574-579,共6页
Several data mining techniques such as Hidden Markov Model (HMM), artificial neural network, statistical techniques and expert systems are used to model network packets in the field of intrusion detection. In this pap... Several data mining techniques such as Hidden Markov Model (HMM), artificial neural network, statistical techniques and expert systems are used to model network packets in the field of intrusion detection. In this paper a novel intrusion detection mode based on understandable Neural Network Tree (NNTree) is pre-sented. NNTree is a modular neural network with the overall structure being a Decision Tree (DT), and each non-terminal node being an Expert Neural Network (ENN). One crucial advantage of using NNTrees is that they keep the non-symbolic model ENN’s capability of learning in changing environments. Another potential advantage of using NNTrees is that they are actually “gray boxes” as they can be interpreted easily if the num-ber of inputs for each ENN is limited. We showed through experiments that the trained NNTree achieved a simple ENN at each non-terminal node as well as a satisfying recognition rate of the network packets dataset. We also compared the performance with that of a three-layer backpropagation neural network. Experimental results indicated that the NNTree based intrusion detection model achieved better performance than the neural network based intrusion detection model. 展开更多
关键词 Intrusion detection Neural network tree (NNtree Expert Neural network (ENN) Decision tree (DT) Self-organized feature learning
下载PDF
Fetal distress prediction using discriminant analysis, decision tree, and artificial neural network 被引量:7
9
作者 Mei-Ling Huang Yung-Yan Hsu 《Journal of Biomedical Science and Engineering》 2012年第9期526-533,共8页
Fetal distress is one of the main factors to cesarean section in obstetrics and gynecology. If the fetus lack of oxygen in uterus, threat to the fetal health and fetal death could happen. Cardiotocography (CTG) is the... Fetal distress is one of the main factors to cesarean section in obstetrics and gynecology. If the fetus lack of oxygen in uterus, threat to the fetal health and fetal death could happen. Cardiotocography (CTG) is the most widely used technique to monitor the fetal health and fetal heart rate (FHR) is an important index to identify occurs of fetal distress. This study is to propose discriminant analysis (DA), decision tree (DT), and artificial neural network (ANN) to evaluate fetal distress. The results show that the accuracies of DA, DT and ANN are 82.1%, 86.36% and 97.78%, respectively. 展开更多
关键词 FETAL DISTRESS CARDIOTOCOGRAPHY (CTG) DISCRIMINANT Analysis Decision tree Artificial Neural network
下载PDF
Assessing the performance of decision tree and neural network models in mapping soil properties 被引量:6
10
作者 Fatemeh HATEFFARD Payam DOLATI +1 位作者 Ahmad HEIDARI Ali Asghar ZOLFAGHARI 《Journal of Mountain Science》 SCIE CSCD 2019年第8期1833-1847,共15页
To build any spatial soil database, a set of environmental data including digital elevation model(DEM) and satellite images beside geomorphic landscape description are essentials. Such a database, integrates field obs... To build any spatial soil database, a set of environmental data including digital elevation model(DEM) and satellite images beside geomorphic landscape description are essentials. Such a database, integrates field observations and laboratory analyses data with the results obtained from qualitative and quantitative models. So far, various techniques have been developed for soil data processing. The performance of Artificial Neural Network(ANN) and Decision Tree(DT) models was compared to map out some soil attributes in Alborz Province, Iran. Terrain attributes derived from a DEM along with Landsat 8 ETM+, geomorphology map, and the routine laboratory analyses of the studied area were used as input data. The relationships between soil properties(including sand, silt, clay, electrical conductivity, organic carbon, and carbonates) and the environmental variables were assessed using the Pearson Correlation Coefficient and Principle Components Analysis. Slope, elevation, geomforms, carbonate index, stream network, wetness index, and the band’s number 2, 3, 4, and 5 were the most significantly correlated variables. ANN and DT did not show the same accuracy in predicting all parameters. The DT model showed higher performances in estimating sand(R^2=0.73), silt(R^2=0.70), clay(R^2=0.72), organic carbon(R^2=0.71), and carbonates(R^2=0.70). While the ANN model only showed higher performance in predicting soil electrical conductivity(R^2=0.95). The results showed that determination the best model to use, is dependent upon the relation between the considered soil properties with the environmental variables. However, the DT model showed more reasonable results than the ANN model in this study. The results showed that before using a certain model to predict variability of all soil parameters, it would be better to evaluate the efficiency of all possible models for choosing the best fitted model for each property. In other words, most of the developed models are sitespecific and may not be applicable to use for predicting other soil properties or other area. 展开更多
关键词 Digital SOIL MAPPING SOIL properties environmental VARIABLES Artificial Neural network DECISION tree
下载PDF
A Study on Priority Based ZigBee Network Performance Analysis with Tree Routing Method 被引量:1
11
作者 Nazrul Islam Md. Jaminul Haque Biddut +1 位作者 Asma Islam Swapna Mehedy Hasan Rafsan Jany 《Journal of Computer and Communications》 2015年第8期1-10,共10页
The Wireless Sensor Network (WSN) is spatially distributed autonomous sensor to sense special task. WSN like ZigBee network forms simple interconnecting, low power, and low processing capability wireless devices. The ... The Wireless Sensor Network (WSN) is spatially distributed autonomous sensor to sense special task. WSN like ZigBee network forms simple interconnecting, low power, and low processing capability wireless devices. The ZigBee devices facilitate numerous applications such as pervasive computing, security monitoring and control. ZigBee end devices collect sensing data and send them to ZigBee Coordinator. The Coordinator processes end device requests. The effect of a large number of random unsynchronized requests may degrade the overall network performance. An effective technique is particularly needed for synchronizing available node’s request processing to design a reliable ZigBee network. In this paper, region based priority mechanism is implemented to synchronize request with Tree Routing Method. Riverbed is used to simulate and analyze overall ZigBee network performance. The results show that the performance of the overall priority based ZigBee network model is better than without a priority based model. This research paves the way for further designing and modeling a large scale ZigBee network. 展开更多
关键词 WSN ZigBee network tree ROUTING METHOD Performance Analysis RIVERBED
下载PDF
A Tree-Based Data Collecting Network Structure for Wireless Sensor Networks 被引量:3
12
作者 Chi-Tsun Cheng Chi K. Tse Francis C. M. Lau 《Journal of Electronic Science and Technology of China》 2008年第3期274-278,共5页
In a sensor network with a large number of densely populated sensor nodes, a single target of interest may be detected by multiple sensor nodes simultaneously. Data collected from the sensor nodes are usually highly c... In a sensor network with a large number of densely populated sensor nodes, a single target of interest may be detected by multiple sensor nodes simultaneously. Data collected from the sensor nodes are usually highly correlated, and hence energy saving using in-network data fusion becomes possible. A traditional data fusion scheme starts with dividing the network into clusters, followed by electing a sensor node as cluster head in each cluster. A cluster head is responsible for collecting data from all its cluster members, performing data fusion on these data and transmitting the fused data to the base station. Assuming that a sensor node is only capable of handling a single node-to-node transmission at a time and each transmission takes T time-slots, a cluster head with n cluster members will take at least nT time-slots to collect data from all its cluster members. In this paper, a tree-based network structure and its formation algorithms are proposed. Simulation results show that the proposed network structure can greatly reduce the delay in data collection. 展开更多
关键词 CLUSTER data transmission network structure sensor network trees
下载PDF
Core-based Shared Tree Multicast Routing Algorithms for LEO Satellite IP Networks 被引量:6
13
作者 Cheng Lianzhen Zhang Jun Liu Kai 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2007年第4期353-361,共9页
A new core-based shared tree algorithm, viz core-cluster combination-based shared tree (CCST) algorithm and the weighted version (i.e. w-CCST algorithm) are proposed in order to resolve the channel resources waste... A new core-based shared tree algorithm, viz core-cluster combination-based shared tree (CCST) algorithm and the weighted version (i.e. w-CCST algorithm) are proposed in order to resolve the channel resources waste problem in typical source-based multicast routing algorithms in low earth orbit (LEO) satellite IP networks. The CCST algorithm includes the dynamic approximate center (DAC) core selection method and the core-cluster combination multicast route construction scheme. Without complicated onboard computation, the DAC method is uniquely developed for highly dynamic networks of periodical and regular movement. The core-cluster combination method takes core node as the initial core-cluster, and expands it stepwise to construct an entire multicast tree at the lowest tree cost by a shortest path scheme between the newly-generated core-cluster and surplus group members, which results in great bandwidth utilization. Moreover, the w-CCST algorithm is able to strike a balance between performance of tree cost and that of end-to-end propagation delay by adjusting the weighted factor to meet strict end-to-end delay requirements of some real-time multicast services at the expense of a slight increase in tree cost. Finally, performance comparison is conducted between the proposed algorithms and typical algorithms in LEO satellite IP networks. Simulation results show that the CCST algorithm significantly decreases the average tree cost against to the others, and also the average end-to-end propagation delay ofw-CCST algorithm is lower than that of the CCST algorithm. 展开更多
关键词 satellite IP networks LEO multicast routing shared tree CORE
下载PDF
Using junction trees for structural learning of Bayesian networks 被引量:1
14
作者 Mingmin Zhu Sanyang Liu +1 位作者 Youlong Yang Kui Liu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第2期286-292,共7页
The learning Bayesian network (BN) structure from data is an NP-hard problem and still one of the most exciting chal- lenges in the machine learning. In this work, a novel algorithm is presented which combines ideas... The learning Bayesian network (BN) structure from data is an NP-hard problem and still one of the most exciting chal- lenges in the machine learning. In this work, a novel algorithm is presented which combines ideas from local learning, constraint- based, and search-and-score techniques in a principled and ef- fective way. It first reconstructs the junction tree of a BN and then performs a K2-scoring greedy search to orientate the local edges in the cliques of junction tree. Theoretical and experimental results show the proposed algorithm is capable of handling networks with a large number of variables. Its comparison with the well-known K2 algorithm is also presented. 展开更多
关键词 Bayesian network (BN) junction tree scoring function structural learning conditional independence.
下载PDF
Analysis of thermal conductivity in tree-like branched networks
15
作者 寇建龙 陆杭军 +1 位作者 吴锋民 许友生 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第4期1553-1559,共7页
Asymmetric tree-like branched networks are explored by geometric algorithms. Based on the network, an analysis of the thermal conductivity is presented. The relationship between effective thermal conductivity and geom... Asymmetric tree-like branched networks are explored by geometric algorithms. Based on the network, an analysis of the thermal conductivity is presented. The relationship between effective thermal conductivity and geometric structures is obtained by using the thermal-electrical analogy technique. In all studied cases, a clear behaviour is observed, where angle (δ,θ) among parent branching extended lines, branches and parameter of the geometric structures have stronger effects on the effective thermal conductivity. When the angle δ is fixed, the optical diameter ratio β+ is dependent on angle θ. Moreover, γand m are not related to β*. The longer the branch is, the smaller the effective thermal conductivity will be. It is also found that when the angle θ〈δ2, the higher the iteration m is, the lower the thermal conductivity will be and it tends to zero, otherwise, it is bigger than zero. When the diameter ratio β1 〈 0.707 and angle δ is bigger, the optimal k of the perfect ratio increases with the increase of the angle δ; when β1 〉 0.707, the optimal k decreases. In addition, the effective thermal conductivity is always less than that of single channel material. The present results also show that the effective thermal conductivity of the asymmetric tree-like branched networks does not obey Murray's law. 展开更多
关键词 effective thermal conductivity asymmetric tree-like branched networks geometric parameters
下载PDF
FPGA-Based Network Traffic Security: Design and Implementation Using C5.0 Decision Tree Classifier 被引量:2
16
作者 Tarek Salah Sobh Mohamed Ibrahiem Amer 《Journal of Electronic Science and Technology》 CAS 2013年第4期393-403,共11页
In this work, a hardware intrusion detection system (IDS) model and its implementation are introduced to perform online real-time traffic monitoring and analysis. The introduced system gathers some advantages of man... In this work, a hardware intrusion detection system (IDS) model and its implementation are introduced to perform online real-time traffic monitoring and analysis. The introduced system gathers some advantages of many IDSs: hardware based from implementation point of view, network based from system type point of view, and anomaly detection from detection approach point of view. In addition, it can detect most of network attacks, such as denial of services (DOS), leakage, etc. from detection behavior point of view and can detect both internal and external intruders from intruder type point of view. Gathering these features in one IDS system gives lots of strengths and advantages of the work. The system is implemented by using field programmable gate array (FPGA), giving a more advantages to the system. A C5.0 decision tree classifier is used as inference engine to the system and gives a high detection ratio of 99.93%. 展开更多
关键词 C5.0 decision tree field programm-able gate array network monitoring network security.
下载PDF
Network security equipment evaluation based on attack tree with risk fusion
17
作者 CHENG Ran LU Yue-ming 《网络与信息安全学报》 2017年第7期70-77,共8页
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A... Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation. 展开更多
关键词 网络安全 信息安全 网络技术 安全管理
下载PDF
ORPOM model for optimum distribution of tree ring sampling based on the climate observation network
18
作者 Long Ma TingXi Liu +3 位作者 YanYun Luo HongLan Ji ShiQiang Li JunXiao Shi 《Research in Cold and Arid Regions》 2010年第6期547-554,共8页
Tree ring dating plays an important role in obtaining past climate information.The fundamental study of obtaining tree ring samples in typical climate regions is particularly essential.The optimum distribution of tree... Tree ring dating plays an important role in obtaining past climate information.The fundamental study of obtaining tree ring samples in typical climate regions is particularly essential.The optimum distribution of tree ring sampling sites based on climate information from the Climate Observation Network(ORPOM model) is presented in this article.In this setup,the tree rings in a typical region are used for surface representation,by applying excellent correlation with the climate information as the main principle.Taking the Horqin Sandy Land in the cold and arid region of China as an example,the optimum distribution range of the tree ring sampling sites was obtained through the application of the ORPOM model,which is considered a reasonably practical scheme. 展开更多
关键词 CLIMATE monitoring network tree ring sampling site optimum model Horqin Sandy Land
下载PDF
Finite family trees of continuous time birth and death processes for evaluating the transmitting speed of information on communication networks
19
作者 马驰 王汉兴 《Journal of Shanghai University(English Edition)》 CAS 2007年第3期237-240,共4页
A finite random graph generated by continuous time birth and death processes with exponentially distributed waiting times was investigated, which is similar to a communication network in daily life. The vertices are t... A finite random graph generated by continuous time birth and death processes with exponentially distributed waiting times was investigated, which is similar to a communication network in daily life. The vertices are the living particles, and directed edges go from mothers to daughters. The size of the communication network was studied. Furthermore, the probability of successfully connecting senders with receivers and the transmitting speed of information were obtained. 展开更多
关键词 birth and death processes family tree random graph communication networks
下载PDF
Complex tree: the basic framework of protein-protein interaction networks
20
作者 DaiChuan Ma YuanBo Diao +3 位作者 YiZhou Li YanZi Guo Jiang Wu MengLong Li 《Natural Science》 2010年第9期998-1004,共7页
In living cells, proteins are dynamically connec ted through biochemical reactions, so its functi onal features are properly encoded into protein protein interaction networks (PINs). Up to pres ent, many efforts have ... In living cells, proteins are dynamically connec ted through biochemical reactions, so its functi onal features are properly encoded into protein protein interaction networks (PINs). Up to pres ent, many efforts have been devoted to exploring the basic feature of PINs. However, it is still a challenging problem to explore a universal pr operty of PINs. Here we employed the complex networks theory to analyze the proteinprotein interactions from Database of Interacting Prot ein. Complex tree: the unique framework of PINs was revealed by three topological properties of the giant component of PINs (GCOP), including rightskewed degree distributions, relatively sm all clustering coefficients and short characteristic path lengths. Furthermore, we proposed a no nlinearly growth model: complex tree model to reflect the tree framework, the simulation resu lts of this model showed that GCOPs were well represented by our model, which could be help ful for understanding the treestructure: basic framework of PINs. Source code and binaries freely available for download at http://cic.scu. edu.cn/bioinformatics/STM/STM_code.rar. 展开更多
关键词 COMPLEX networkS COMPLEX tree PINS MODEL SIMULATION
下载PDF
上一页 1 2 162 下一页 到第
使用帮助 返回顶部