期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
社会科学方法在网络链接研究中的应用——以社会网络分析、网络空间分析、虚拟民族志为例 被引量:7
1
作者 孙建军 李江 《图书情报工作》 CSSCI 北大核心 2009年第10期37-40,66,共5页
首先分析各学科领域网络链接研究的基本特征,然后详细介绍社会网络分析、网络空间分析、虚拟民族志三种社会科学方法的含义及其在网络链接研究中的应用实例,旨在为情报学领域从事网络链接研究的学者提供新的视角。最后解释这三种社会科... 首先分析各学科领域网络链接研究的基本特征,然后详细介绍社会网络分析、网络空间分析、虚拟民族志三种社会科学方法的含义及其在网络链接研究中的应用实例,旨在为情报学领域从事网络链接研究的学者提供新的视角。最后解释这三种社会科学方法在网络链接研究领域受关注程度的差异。 展开更多
关键词 社会网络分析 网络空间分析 虚拟民族志 网络链接研究
原文传递
大数据技术在网络空间安全分析中的应用
2
作者 张秋妮 《移动信息》 2023年第11期119-121,共3页
随着大数据时代的到来,网络威胁日益增多,网络安全已成为一个全球性的重要问题。大数据技术在网络空间安全分析中具有不可忽视的优势,如高效性、自动化、实时性等。通过对网络中海量数据的分析和挖掘,大数据技术可以检测和预测网络安全... 随着大数据时代的到来,网络威胁日益增多,网络安全已成为一个全球性的重要问题。大数据技术在网络空间安全分析中具有不可忽视的优势,如高效性、自动化、实时性等。通过对网络中海量数据的分析和挖掘,大数据技术可以检测和预测网络安全威胁,进一步提高网络安全的防御能力。因此,建立一个具备大数据处理能力的网络安全平台具有重要意义。 展开更多
关键词 大数据技术 网络空间安全分析 应用
下载PDF
大数据在网络空间安全分析中的应用探究
3
作者 刘增昊 《电脑乐园》 2018年第8期354-354,共1页
现阶段,随着社会的发展,我国的现代化建设的发展也突飞猛进。随着网络技术的飞速发展,人们对网络信息的安全性越来越 重视,网络安全分析的规模不断增长,其中大数据技术在网络安全分析中的应用逐渐成为业内研究的热点。本文从网络安全分... 现阶段,随着社会的发展,我国的现代化建设的发展也突飞猛进。随着网络技术的飞速发展,人们对网络信息的安全性越来越 重视,网络安全分析的规模不断增长,其中大数据技术在网络安全分析中的应用逐渐成为业内研究的热点。本文从网络安全分析的需求入 手,分析了应用大数据技术的必要性,进而从信息的采集、存储、检索、分析等方面深入探讨了大数据技术在网络安全分析中的应用,最 后对基于大数据的网络安全分析平台建设问题进行了探讨,希望为网络安全环境的创建提供一定借鉴。 展开更多
关键词 大数据 网络空间安全分析 应用探究
下载PDF
基于GIS技术的乡村旅游用地规划实践 被引量:8
4
作者 刘佳恒 丁一 +1 位作者 魏玺 曹帅 《北京测绘》 2019年第10期1268-1271,共4页
新时代,乡村旅游对乡村振兴的贡献日益加大。乡村旅游产业,在村庄内部上常显现出空间集聚的特点。为了避免自发形成的乡村旅游产业集聚区出现选址问题,在规划阶段有必要为村庄划分旅游产业集聚区。本文利用GIS技术的缓冲区分析、网络空... 新时代,乡村旅游对乡村振兴的贡献日益加大。乡村旅游产业,在村庄内部上常显现出空间集聚的特点。为了避免自发形成的乡村旅游产业集聚区出现选址问题,在规划阶段有必要为村庄划分旅游产业集聚区。本文利用GIS技术的缓冲区分析、网络空间分析、叠置分析的方法,综合考虑了在村中发展农家乐乡村旅游活动的选址需求,从景观因素、社区参与、交通状况等因素入手,在村中寻找满足乡村旅游业需求的村内区域,减少规划的主观性,将GIS技术引入小尺度的村域内规划。 展开更多
关键词 地理信息系统(GIS) 乡村规划 乡村旅游 缓冲区分析 网络空间分析 叠置分析
下载PDF
Spatial Structural Pattern and Vulnerability of China-Japan-Korea Shipping Network 被引量:18
5
作者 GUO Jianke WANG Shaobo +1 位作者 WANG Dandan LIU Tianbao 《Chinese Geographical Science》 SCIE CSCD 2017年第5期697-708,共12页
The economies of China-Japan-Korea (CJK) are complementary, with their proximity resulting in the three countries having a high degree of interdependence with respect to trade. Currently, trade among these countries... The economies of China-Japan-Korea (CJK) are complementary, with their proximity resulting in the three countries having a high degree of interdependence with respect to trade. Currently, trade among these countries relies mainly on port-centered shipping. The development of the shipping network is integral for in-depth integration of CJK trade. This paper analyzes the overall characteristics, centrality, spatial structure, and vulnerability of the CJK shipping network using the methods of complex network analysis, blocking flow theory, and interruption and deletion of hub ports. The main findings are as follows: 1) The CJK shipping network has a small average path length and clustering coefficient, and its degree distribution follows a power-law distribution, which make the network present obvious characteristics of a Barabasi-Albert scale-free. 2) The characteristics of the multi-center point of the CJK shipping network can alleviate traffic pressure. At the same time, the network shows a clear hierarchy in the port transportation system, with cargo transport relying mainly on the ‘hub port-hub port' connection. 3) The CJK shipping network is relatively stable. Compared with ports in Japan and Korea, the main hub ports in China have a greater impact on the stability of the shipping network, in particular those ports of the central coastal region, including Shanghai, Ningbo, and Lianyungang. 展开更多
关键词 complex network blocking flow theory Barabhsi-Albert scale-free network regional differences China-Japan-Korea
下载PDF
Design and Implementation of Weibo Sentiment Analysis Based on LDA and Dependency Parsing 被引量:4
6
作者 Yonggan Li Xueguang Zhou +1 位作者 Yan Sun Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第11期91-105,共15页
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i... Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical. 展开更多
关键词 information security information content security sentiment analysis dependency parsing emotion tendency classification emotion expression extraction
下载PDF
Temporal Data Mining Using Genetic Algorithm and Neural Network——A Case Study of Air Pollutant Forecasts 被引量:1
7
作者 Shine-Wei Lin Chih-Hong Sun Chin-Han Chen 《Geo-Spatial Information Science》 2004年第1期31-38,共8页
This paper integrates genetic algorithm and neura l network techniques to build new temporal predicting analysis tools for geographic information system (GIS). These new GIS tools can be readily applied in a practical... This paper integrates genetic algorithm and neura l network techniques to build new temporal predicting analysis tools for geographic information system (GIS). These new GIS tools can be readily applied in a practical and appropriate manner in spatial and temp oral research to patch the gaps in GIS data mining and knowledge discovery functions. The specific achievement here is the integration of related artificial intellig ent technologies into GIS software to establish a conceptual spatial and temporal analysis framework. And, by using this framework to develop an artificial intelligent spatial and tempor al information analyst (ASIA) system which then is fully utilized in the existin g GIS package. This study of air pollutants forecasting provides a geographical practical case to prove the rationalization and justness of the conceptual tempo ral analysis framework. 展开更多
关键词 GIS TEMPORAL data mining genetic algorithm neural network
下载PDF
Integrating Social Mapping with Geographic Information Systems: Community Network Analysis in Sharing Sweetpotato Innovations in Papua New Guinea
8
作者 Lilly Pasa Sar Anton Mais +4 位作者 Isidora Ramita Amanda Wandau Cathy Koloa Barton Maino Gabi Lucy Maino 《Journal of Environmental Science and Engineering(A)》 2017年第11期569-579,共11页
This research drew from social learning and international development literature. The purpose of this community research was to trace the spread and impact of sweetpotato flour in two rural communities in Papua New Gu... This research drew from social learning and international development literature. The purpose of this community research was to trace the spread and impact of sweetpotato flour in two rural communities in Papua New Guinea. Research strategy was participatory learning and action utilizing participatory mapping. The paper mapping process was documented using a video recorder and field notes. Geographic Information Systems technology was then used to incorporate local spatial knowledge on scale maps to show spread of knowledge. The main finding was the identification of social networks through tracking of sweetpotato knowledge: identifying who used the knowledge and whether there were any modifications, the location of those who used the knowledge and whether this was shared and with whom. Most significant was the enabling factors that strengthened existing and potential future networks. Community leadership styles determine success of development projects. Rural communities are diverse needing participatory multi-layered methodologies that are people oriented for agricultural technologies to be learnt and utilized for improved livelihood. 展开更多
关键词 Social mapping social learning agricultural innovation SWEETPOTATO Papua New Guinea.
下载PDF
Capacity Analysis for Dynamic Space Networks
9
作者 Yang Lu Bo Li +2 位作者 Wenjing Kang Gongliang Liu Xueting Li 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第6期45-49,共5页
To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ... To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed. 展开更多
关键词 space network capacity hybrid constellation model graph theory practical cases
下载PDF
A Spatially Weighted Degree Model for Network Vulnerability Analysis 被引量:9
10
作者 WAN Neng1,ZHAN F.Benjamin1,2,CAI Zhongliang2 1.School Texas Center for Geographic Information Science,Department of Geography,Texas State University,San Marcos,TX 78666,USA 2.School of Resource and Environmental Science,Wuhan University,129 Luoyu Road,Wuhan 430079,China 《Geo-Spatial Information Science》 2011年第4期274-281,共8页
Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial... Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial networks because it does not take into consideration the geographical aspects of spatial networks.This paper proposes a spatially weighted degree model in which both the functional class and the length of network links are considered to be important factors for determining the node degrees of spatial networks.A weight coefficient is used in this new model to account for the contribution of each factor to the node degree.The proposed model is compared with the traditional degree model and an accessibility-based vulnerability model in the vulnerabil-ity analysis of a highway network.Experiment results indicate that,although node degrees of spatial networks derived from the tra-ditional degree model follow a random distribution,node degrees determined by the spatially weighted model exhibit a scale-free distribution,which is a common characteristic of robust networks.Compared to the accessibility-based model,the proposed model has similar performance in identifying critical nodes but with higher computational efficiency and better ability to reveal the overall vulnerability of a spatial network. 展开更多
关键词 GIS network analysis spatial analysis vulnerability analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部