期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
基于异质信息网络分析的主题感知群推荐方法研究 被引量:3
1
作者 张馨悦 岳峰 +1 位作者 王含茹 王刚 《计算机应用研究》 CSCD 北大核心 2022年第2期436-441,446,共7页
在社交网络上面向群组推荐物品时,已有研究大多基于群成员的完整偏好,运用一些合成策略生成群推荐结果。但在实际中,促使群成员加入目标群的可能只是其完整偏好中与该群相关的部分偏好。因此,使用群成员的完整偏好进行推荐便会带来大量... 在社交网络上面向群组推荐物品时,已有研究大多基于群成员的完整偏好,运用一些合成策略生成群推荐结果。但在实际中,促使群成员加入目标群的可能只是其完整偏好中与该群相关的部分偏好。因此,使用群成员的完整偏好进行推荐便会带来大量的噪声,损害推荐效果。为解决这一问题,提出了一种基于异质信息网络分析的主题感知群推荐方法HINGR_GT(heterogeneous information network analysis based group recommendation method with group topic considered),针对每个群组构建面向群组的异质社交网络子图,将成员偏好中与群组无关的偏好提前排除在外,在此基础上使用异质网络表示学习方法为群组生成物品推荐。为验证所提方法的有效性,在豆瓣电影数据集上进行了实验,结果表明所提方法在所有评价指标上均取得了更好的效果。 展开更多
关键词 群推荐 偏好噪声 异质信息网络分析 表示学习
下载PDF
农业院校计算机实验室信息网络安全分析
2
作者 胡萍 《电脑知识与技术》 2014年第10期6614-6615,共2页
该文首次对农业院校的计算机实验室的信息网络安全事件进行了统计和特点分析,通过调查分析出其主要特点:(1)感染恶意代码是主要威胁;(2)垃圾邮件、网页遭篡改、端口扫描问题依然存在;(3)网络钓鱼问题增长较快。分析出农业院... 该文首次对农业院校的计算机实验室的信息网络安全事件进行了统计和特点分析,通过调查分析出其主要特点:(1)感染恶意代码是主要威胁;(2)垃圾邮件、网页遭篡改、端口扫描问题依然存在;(3)网络钓鱼问题增长较快。分析出农业院校的实验室信息网络安全事件发生的原因。并且为计算机实验室信息网络安全研究提供了参考。 展开更多
关键词 农业院校 计算机实验室 信息网络安全分析
下载PDF
甘肃省1999年碘盐监测信息网络资料分析报告 被引量:2
3
作者 杨海霞 伏旭东 +2 位作者 康芬艳 李剑 张育新 《地方病通报》 2002年第2期57-58,共2页
甘肃省 1999年各监测层次 (生产、批发、零售、居民户 )的盐碘合格率分别为 95 .5 5 % ,92 .5 5 % ,93.11% ,86 .82 % ,私盐冲销是居民户盐碘合格率低的主要原因。由于经费不足及交通工具缺乏等原因 ,致使监测工作存在未按方案执行、漏... 甘肃省 1999年各监测层次 (生产、批发、零售、居民户 )的盐碘合格率分别为 95 .5 5 % ,92 .5 5 % ,93.11% ,86 .82 % ,私盐冲销是居民户盐碘合格率低的主要原因。由于经费不足及交通工具缺乏等原因 ,致使监测工作存在未按方案执行、漏报、不按时上报、不报等问题 。 展开更多
关键词 信息网络资料分析 碘盐 监测 甘肃 碘缺乏病 防治
下载PDF
电力企业信息网络安全分析与防范措施
4
作者 石倩 刘烨 《缔客世界》 2019年第8期55-55,共1页
当前,社会发展进程加快,各行各业的发展也日新月异,电力行业的发展也有了显著的提高。然而,作为许多国家重要的“网络战场”,电力系统的安全问题日益突出。如何保证电力系统的安全稳定运行,已成为当前电力企业建设和发展的主要研究对象... 当前,社会发展进程加快,各行各业的发展也日新月异,电力行业的发展也有了显著的提高。然而,作为许多国家重要的“网络战场”,电力系统的安全问题日益突出。如何保证电力系统的安全稳定运行,已成为当前电力企业建设和发展的主要研究对象。目前,电力监控系统的网络安全水平因地而异,如何统一电力监控系统的网络安全水平是一个亟待解决的问题。 展开更多
关键词 电力企业 信息网络安全分析 防范措施
下载PDF
基于K阶互信息估计的位置感知网络表征学习 被引量:2
5
作者 储晓恺 范鑫鑫 毕经平 《计算机研究与发展》 EI CSCD 北大核心 2021年第8期1612-1623,共12页
随着网络结构数据持续、快速的增长,各种复杂网络数据分析与应用层出不穷.近年来,网络表征学习已经成为各类网络分析任务的主流方法.网络表征学习的主要目标是依据节点间连接关系,学习高质量的节点表征向量,从而辅助分析下游任务.然而,... 随着网络结构数据持续、快速的增长,各种复杂网络数据分析与应用层出不穷.近年来,网络表征学习已经成为各类网络分析任务的主流方法.网络表征学习的主要目标是依据节点间连接关系,学习高质量的节点表征向量,从而辅助分析下游任务.然而,现有的表征学习方法未考虑节点在网络中的位置信息.为了解决这一问题,提出了一种位置感知网络表征学习模型PMI,该模型通过最大化每个中心节点与各阶邻居之间的互信息,从而将节点的位置信息学入表征向量中.在表征训练过程中,PMI模型激励每个中心节点记住并识别其每阶的邻居节点,从而间接记录其位置信息.在4个不同领域的真实数据集上进行了多标签分类、网络重构、链接预测等多个代表性网络分析任务实验,实验结果表明提出的PMI模型可以学到高质量的节点表征向量,与现有的表征学习模型相比,PMI模型能够在多个下游任务上有较大幅度提升.此外,还设计邻居对齐任务对PMI模型进行进一步的分析,结果表明PMI模型学到的节点表征能够有效识别不同阶的邻居节点并捕获自身的位置信息,从而为各种下游任务生成合理有效的表征. 展开更多
关键词 网络表征学习 信息估计 节点表征 信息网络分析 神经网络 节点分类 链接预测
下载PDF
一种网络中心战数据传输效率度量方法 被引量:2
6
作者 肖鹏 王岩 于海霞 《雷达与对抗》 2021年第2期15-18,共4页
从提升网络中心战整体打击优势和作战效能的角度出发,提出了一种网络数据传输效率度量方法。结合具体作战场景模拟,定量分析了网络中心战作战模式下系统节点对数据传输路径的影响,为从源头提升整个网络拓扑结构信息传输效率提供了仿真... 从提升网络中心战整体打击优势和作战效能的角度出发,提出了一种网络数据传输效率度量方法。结合具体作战场景模拟,定量分析了网络中心战作战模式下系统节点对数据传输路径的影响,为从源头提升整个网络拓扑结构信息传输效率提供了仿真验证的总体设计思路和一种评估试验项目设计方案。 展开更多
关键词 网络中心战 体系作战 协同电子战 信息网络分析
下载PDF
Analysis of Types and Changes of Village-level Economy in Rural Gongyi City, Henan Province Since 1990 被引量:11
7
作者 QIAO Jiajun KONG Yunfeng LI Xiaojian 《Chinese Geographical Science》 SCIE CSCD 2008年第2期101-108,共8页
Based on the research on the rural living standard in China in terms of annual net income per capita, we de-fine six types of village-level economy, i.e. "to be extremely poor", "to make a basic living&... Based on the research on the rural living standard in China in terms of annual net income per capita, we de-fine six types of village-level economy, i.e. "to be extremely poor", "to make a basic living", "to dress warmly and eat one's fill", "to try to enrich (to disengage poverty)", "to be well-off" and "to be affluent". The data of average annual net income of all the 292 villages between 1990 and 2004 in rural Gongyi City, Henan Province were collected, veri-fied and classified. By using standard deviation, coefficient of variation and regression analysis, it is found that the Gongyi's rural economy has boosted up remarkably from the relative-poverty and absolute-poverty stages in 1990 to the well-off in 2004. However, the absolute differences between villages present a trend of enlargement, while the rela-tive differences fluctuating. On the other hand, spatial analysis of village-level economy shows that most villages with relatively high economic development level were located along national expressway and most villages with abso-lute-poverty lay in remote mountainous areas in 1990. Since the 1990s, the rapid urbanization and industrialization have had strongly positive effects on rural economic growth. Initial economic foundation, natural resources and tradi-tional techniques also contribute to village economy. From the perspective of geography, villages with location advan-tages, such as near urban center or industrial parks, have more chances for their economic development and the "core-periphery" economic structure has been presented in the process of rural development. 展开更多
关键词 rural village village-level economy net income spatial analysis Gongyi City
下载PDF
Effective search with saliency-based matching and cluster-based browsing 被引量:4
8
作者 张晓宇 《High Technology Letters》 EI CAS 2013年第1期105-109,共5页
Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies... Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies on human perception, and major emphasis on the saliently similar aspect of objects to be compared is placed and thus the search result is more agreeable for users. After relevant results are obtained, the cluster-based browsing algorithm is adopted for search result presentation based on social network analysis. By organizing the results in clustered lists, the user can have a general understanding of the whole collection by viewing only a small part of results and locate those of major interest rapidly. Experimental results demonstrate the advantages of the proposed algorithm over the traditional work. 展开更多
关键词 information retrieval saliency-based matching human perception cluster-based browsing social network
下载PDF
Network Pharmacology-based Analysis on the Molecular Biological Mechanisms of Xin Hui Tong Formula in Coronary Heart Disease Treatment 被引量:4
9
作者 WU Hua-Ying ZHANG Chen +5 位作者 WANG Zhao-Hua ZHANG Shi-Ying LI Jing LI Feng HUANG Hui-Yong LI Liang 《Digital Chinese Medicine》 2019年第2期86-96,共11页
Objective To investigate the potential molecular mechanism of Xin Hui Tong Formula (XHTF) in the treatment of coronary heart disease (CHD) by using network pharmacology and bioinformatics. Methods The targets network ... Objective To investigate the potential molecular mechanism of Xin Hui Tong Formula (XHTF) in the treatment of coronary heart disease (CHD) by using network pharmacology and bioinformatics. Methods The targets network of CHD was constructed through Therapeutic Targets Database (TTD) and Drugbank database;The XHTF pharmacodynamic molecule-targets network and the XHTF pharmacodynamic molecule-CHD targets network were explored by the traditional Chinese medicine systems pharmacology database and analysis platform (TCMSP). And the multi-targets mechanism and molecular regulation network of XHTF in the treatment of CHD were explored from multiple perspectives by Gene Ontology (GO) analysis and Kyoto Encyclopedia of Genes and Genomes (KEGG) database pathway enrichment analysis. Results A total of 88 CHD targets were screened out through the Therapeutic Targets and the Drugbank database. 393 compounds and corresponding 205 drug targets of XHTF were retrieved from TCMSP. A total of 13 known targets directly related to the development of CHD were retrieved from the disease-related databases: TP53, MAPK14, NFKB1, HSPA5, PLG, PTGS2, ADRB1, NOS2, CYP3A4, GRIA2, CYP2A6, GRIA1, PTGS1. XHTF also contained 118 drug targets that directly interact with CHD targets. GO enrichment analysis showed that the biological processes of 13 direct targets proteins were found to be mainly enriched in response to drug, cellular response to biotic stimulus, long-chain fatty acid metabolic process, fatty acid metabolic process and regulation of blood pressure. KEGG pathway enrichment analysis found that XHTF participated in the CHD pathological process mainly through retrograde endocannabinoid signaling, regulation of lipolysis in adipocytes, cAMP signaling pathway, chemical carcinogenesis and other pathways. Conclusions XHTF plays a role in the treatment of CHD through multiple targets and multiple pathways, and provides a scientific basis for the theory of "virtual standard" in the treatment of CHD. 展开更多
关键词 Xin Hui Tong Formula (XHTF) Coronary heart disease Network pharmacology Network analysis BIOINFORMATICS
下载PDF
A Method on Extracting Network Connection Information from 64- bit Windows 7 Memory Images 被引量:3
10
作者 Wang Lianhai Xu Lijuan Zhang Shuhui 《China Communications》 SCIE CSCD 2010年第6期44-51,共8页
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicio... Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient. 展开更多
关键词 computer forensics computer live forensics memory analysis digital forensics
下载PDF
Temporal Data Mining Using Genetic Algorithm and Neural Network——A Case Study of Air Pollutant Forecasts 被引量:1
11
作者 Shine-Wei Lin Chih-Hong Sun Chin-Han Chen 《Geo-Spatial Information Science》 2004年第1期31-38,共8页
This paper integrates genetic algorithm and neura l network techniques to build new temporal predicting analysis tools for geographic information system (GIS). These new GIS tools can be readily applied in a practical... This paper integrates genetic algorithm and neura l network techniques to build new temporal predicting analysis tools for geographic information system (GIS). These new GIS tools can be readily applied in a practical and appropriate manner in spatial and temp oral research to patch the gaps in GIS data mining and knowledge discovery functions. The specific achievement here is the integration of related artificial intellig ent technologies into GIS software to establish a conceptual spatial and temporal analysis framework. And, by using this framework to develop an artificial intelligent spatial and tempor al information analyst (ASIA) system which then is fully utilized in the existin g GIS package. This study of air pollutants forecasting provides a geographical practical case to prove the rationalization and justness of the conceptual tempo ral analysis framework. 展开更多
关键词 GIS TEMPORAL data mining genetic algorithm neural network
下载PDF
Network Analysis Modeling Towards GIS Based on Object-Relation Database
12
作者 YUEPeng WANGYandong +1 位作者 GONGJianya HUANGXianfeng 《Geo-Spatial Information Science》 2004年第3期174-179,共6页
This paper compares the differences between the mathematical model in graph theory and GIS network analysis model. Thus it claims that the GIS network analysis model needs to solve. Then this paper introduces the spat... This paper compares the differences between the mathematical model in graph theory and GIS network analysis model. Thus it claims that the GIS network analysis model needs to solve. Then this paper introduces the spatial data management methods in object\|relation database for GIS and discusses its effects on the network analysis model. Finally it puts forward the GIS network analysis model based on the object\|relation database. The structure of the model is introduced in detail and research is done to the internal and external memory data structure of the model. The results show that it performs well in practice. 展开更多
关键词 network analysis GIS object-relation database
下载PDF
业内动态
13
《网上俱乐部(电脑安全专家)》 2004年第10期16-16,共1页
最高人民法院,最高人民检察院联合出台司法解释,严打淫秽网站和声讯台;《2004年度全国信息网络安全状况调查分析报告》出台;丰田公司安全官声称一些安全公司夸大宣传;Gartner副总称Windows是史上时间最长的Beta测试;
关键词 网络安全 计算机网络 信息安全 《2004年度全国信息网络安全状况调查分析报告》
下载PDF
Personalized Metaheuristic Clustering Onto Web Documents
14
作者 Wookey Lee 《潍坊学院学报》 2004年第4期1-4,共4页
Optimal clustering for the web documents is known to complicated cornbinatorial Optimization problem and it is hard to develop a generally applicable oplimal algorithm. An accelerated simuIated arlneaIing aIgorithm is... Optimal clustering for the web documents is known to complicated cornbinatorial Optimization problem and it is hard to develop a generally applicable oplimal algorithm. An accelerated simuIated arlneaIing aIgorithm is developed for automatic web document classification. The web document classification problem is addressed as the problem of best describing a match between a web query and a hypothesized web object. The normalized term frequency and inverse document frequency coefficient is used as a measure of the match. Test beds are generated on - line during the search by transforming model web sites. As a result, web sites can be clustered optimally in terms of keyword vectofs of corresponding web documents. 展开更多
关键词 METAHEURISTIC Simulated Annealing Web Clustering Combinatorial Optimization VISUALIZATION
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
15
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
An analysis of the differentiation rules and influencing factors of venture capital in Beijing-Tianjin-Hebei urban agglomeration 被引量:5
16
作者 方嘉雯 《Journal of Geographical Sciences》 SCIE CSCD 2018年第4期514-528,共15页
Under China's innovation-driven development strategy, venture capital has become an important driving force in urban agglomeration integration and collaborative innovation. This paper uses social network analysis ... Under China's innovation-driven development strategy, venture capital has become an important driving force in urban agglomeration integration and collaborative innovation. This paper uses social network analysis to analyze spatiotemporal differences of venture capital in the Beijing-Tianjin-Hebei urban agglomeration for the period 2005–2015. A gravity model and panel data regression model are used to reveal the influencing factors on spatiotemporal differences in venture capital in the region. This study finds that there is a certain cyclical fluctuation and uneven differentiation in the venture capital network in the Beijing-Tianjin-Hebei urban agglomeration in terms of total investment, and that the three centers of venture capital(Beijing, Shijiazhuang and Tangshan) have a stimulatory effect on surrounding cities; flows of venture capital between cities display certain networking rules, but they are slow to develop and strongly centripetal; there is a strong positive correlation between levels of information infrastructure development and economic development and venture capital investment; and places with relatively underdeveloped financial environments and service industries are less able to apply the fruits of innovation and entrepreneurship and to attract funds. This study can act as a reference for the Beijing-Tianjin-Hebei urban agglomeration in building a world-class super urban agglomeration with the best innovation capabilities in China. 展开更多
关键词 venture capital Beijing-Tianjin-Hebei urban agglomeration differentiation influencing factors gravity model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部