Global semantic structures of two large semantic networks, HowNet and WordNet, are analyzed. It is found that they are both complex networks with features of small-world and scale-free, but with special properties. Ex...Global semantic structures of two large semantic networks, HowNet and WordNet, are analyzed. It is found that they are both complex networks with features of small-world and scale-free, but with special properties. Exponents of power law degree distribution of these two networks are between 1.0 and 2. 0, different from most scale-free networks which have exponents near 3.0. Coefficients of degree correlation are lower than 0, similar to biological networks. The BA (Barabasi-Albert) model and other similar models cannot explain their dynamics. Relations between clustering coefficient and node degree obey scaling law, which suggests that there exist self-similar hierarchical structures in networks. The results suggest that structures of semantic networks are influenced by the ways we learn semantic knowledge such as aggregation and metaphor.展开更多
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect...Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given展开更多
The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks....The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.展开更多
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.展开更多
为提高煤炭企业多媒体综合业务数字网络的服务质量(QoS),针对煤炭网络及其业务特点,提出煤矿企业QoS层次网络结构和网关节点模型;借鉴区分服务DiffServ思想,利用每跳行为PHB(per hop behavior)分类与标记煤矿网络业务,提出了适用于煤矿...为提高煤炭企业多媒体综合业务数字网络的服务质量(QoS),针对煤炭网络及其业务特点,提出煤矿企业QoS层次网络结构和网关节点模型;借鉴区分服务DiffServ思想,利用每跳行为PHB(per hop behavior)分类与标记煤矿网络业务,提出了适用于煤矿的具有区分服务能力的队列分组丢弃算法和队列分组调度算法.结果表明:实施该服务质量模型,即使多业务大数据量传输时,与煤矿安全生产密切相关的业务均能得到预定带宽,分组平均延时稳定地维持在40.4~41.2ms之间,延时抖动小于0.46ms,分组丢失率为零;而拾荒业务只能占有剩余的带宽,分组平均延时在42~56ms之间变化,业务抖动在1.7~3.6ms之间变化,分组丢失率高达47.6%.展开更多
基金The National Natural Science Foundation of China(No.60275016).
文摘Global semantic structures of two large semantic networks, HowNet and WordNet, are analyzed. It is found that they are both complex networks with features of small-world and scale-free, but with special properties. Exponents of power law degree distribution of these two networks are between 1.0 and 2. 0, different from most scale-free networks which have exponents near 3.0. Coefficients of degree correlation are lower than 0, similar to biological networks. The BA (Barabasi-Albert) model and other similar models cannot explain their dynamics. Relations between clustering coefficient and node degree obey scaling law, which suggests that there exist self-similar hierarchical structures in networks. The results suggest that structures of semantic networks are influenced by the ways we learn semantic knowledge such as aggregation and metaphor.
基金the National Natural Science Foundation of China
文摘Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given
基金funded by the Enterprise Ireland Innovation Partnership Programme with Ericsson under grant agreement IP/2011/0135[6]supported by the National Natural Science Foundation of China(No.61373131,61303039,61232016,61501247)+1 种基金the PAPDCICAEET funds
文摘The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.
基金supported by the National Key R&D Program of China (2016YFF0204001)the National Key Technology Support Program (2015BAH08F02)+3 种基金the CCF-Venustech Hongyan Research Initiative (2016-009)the PAPD fundthe CICAEET fundthe Guizhou Provincial Key Laboratory of Public Big Data Program
文摘Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
文摘为提高煤炭企业多媒体综合业务数字网络的服务质量(QoS),针对煤炭网络及其业务特点,提出煤矿企业QoS层次网络结构和网关节点模型;借鉴区分服务DiffServ思想,利用每跳行为PHB(per hop behavior)分类与标记煤矿网络业务,提出了适用于煤矿的具有区分服务能力的队列分组丢弃算法和队列分组调度算法.结果表明:实施该服务质量模型,即使多业务大数据量传输时,与煤矿安全生产密切相关的业务均能得到预定带宽,分组平均延时稳定地维持在40.4~41.2ms之间,延时抖动小于0.46ms,分组丢失率为零;而拾荒业务只能占有剩余的带宽,分组平均延时在42~56ms之间变化,业务抖动在1.7~3.6ms之间变化,分组丢失率高达47.6%.