期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
复杂网络节点重要性的综合评价方法 被引量:20
1
作者 赵凤花 杨波 《武汉理工大学学报(信息与管理工程版)》 CAS 2015年第4期461-464,共4页
针对现有的复杂网络节点重要性的评价指标,如度、接近中心性和介数等为单一评价指标存在的局限性问题,构建了一种多属性决策的节点重要性综合评价方法。并用于探讨关键词同现网络节点的重要性,且与词频统计及单指标判断方法进行分析比较... 针对现有的复杂网络节点重要性的评价指标,如度、接近中心性和介数等为单一评价指标存在的局限性问题,构建了一种多属性决策的节点重要性综合评价方法。并用于探讨关键词同现网络节点的重要性,且与词频统计及单指标判断方法进行分析比较,探讨其中差异,实验验证了该方法的有效性。 展开更多
关键词 复杂网络 节点重要性 综合评价 网络节点度 介数中心性 接近中心性
下载PDF
基于白质纤维束的胶质瘤患者脑功能网络分析 被引量:5
2
作者 朱威州 陶玲 +2 位作者 钱志余 丁尚文 胥传健 《北京生物医学工程》 2013年第5期449-455,共7页
目的复杂网络理论揭示了人脑结构和功能网络中的很多拓扑属性,通过基于白质纤维束的脑功能网络建模方法分析胶质瘤患者功能网络变异特性。方法首先基于matlab平台利用spm8数据包对数据进行预处理,然后采用磁共振白质纤维束和小世界网络... 目的复杂网络理论揭示了人脑结构和功能网络中的很多拓扑属性,通过基于白质纤维束的脑功能网络建模方法分析胶质瘤患者功能网络变异特性。方法首先基于matlab平台利用spm8数据包对数据进行预处理,然后采用磁共振白质纤维束和小世界网络理论对20例正常人和20例神经胶质瘤患者进行脑功能网络建模。通过对脑功能网络连接度、簇系数和平均路径等参数分析,研究胶质瘤患者小世界拓扑属性。结果对比正常人,被试神经胶质瘤患者脑功能网络遭到破坏,患者脑网络的小世界属性及网络容错能力明显下降,信息传输最大的脑功能区区域发生转移,平均路径在额中回、旁中央小叶、顶叶等区域出现异常。结论胶质瘤患者脑功能网络变异明显,小世界属性显著降低。 展开更多
关键词 白质纤维束 小世界网络 胶质瘤 网络节点度 脑功能网络
下载PDF
自适应网络结构断边重连方法设计与实现
3
作者 董广智 由佳 王战 《计算机仿真》 北大核心 2022年第8期427-431,共5页
为使自适应网络负载更加平衡,减少节点拥塞现象的发生概率,基于移动agent平台,设计一种断边重连方法。利用移动agent及对应服务器,架构出适用于自适应网络的移动agent框架,以独立集的最小连通支配集为基础,架构自适应网络结构。根据最... 为使自适应网络负载更加平衡,减少节点拥塞现象的发生概率,基于移动agent平台,设计一种断边重连方法。利用移动agent及对应服务器,架构出适用于自适应网络的移动agent框架,以独立集的最小连通支配集为基础,架构自适应网络结构。根据最大独立集下最小连通支配集算法,创建对应邻域节点的信息列表,将节点局部邻域信息缩小于两跳的界限中,采用构建的广播算法,令网络通过sink节点实现广播功能,矢量化处理网络结构。带入能理想实现断边重连的节点度值,实现整个自适应网络断边重连流程。实验探究环节中,根据集聚系数可知,所建自适应网络具备断边重连实验可行性;通过网络负载与度关联的指标数值变化发现,所提方法对均衡网络负载有较好的有效性,且重新连边的两节点间关联程度较高。 展开更多
关键词 自适应网络 矢量化处理 断边重连 网络节点度
下载PDF
基于复杂网络的社交网络用户影响力研究 被引量:3
4
作者 徐杰 王菊韵 张海云 《中国传媒大学学报(自然科学版)》 2017年第2期67-73,共7页
基于复杂网络理论对社交网络用户影响力进行分析,可以为社会营销、舆情监测、信息检索等众多领域的研究提供支持。传统的网页排序算法虽然可以对有向社交网络的用户影响力进行分析,但仍存在缺陷且复杂度较高。本文提出了一种对无向社交... 基于复杂网络理论对社交网络用户影响力进行分析,可以为社会营销、舆情监测、信息检索等众多领域的研究提供支持。传统的网页排序算法虽然可以对有向社交网络的用户影响力进行分析,但仍存在缺陷且复杂度较高。本文提出了一种对无向社交网络进行用户影响力评价的方法,弱化了将有向网络视为无向网络研究而带来的误差,并可以高效地得到重要节点,适用范围更广。首先,本文采用网络节点的度中心性、介数中心性、接近中心性、聚类系数作为节点重要度评价指标,通过对计算数据归一化处理并取均值得到用户影响力排序的基准。其次,采用k-核分解法粗粒化地将重要度相似的节点进行归类,来检验排序的合理性。最后,通过仿真实验以及k-核分解、与HITS算法比较验证了此方法的科学性和正确性。 展开更多
关键词 社交网络 用户影响力 网络节点重要 k-核分解
下载PDF
基于弥散张量追踪技术的胶质瘤患者结构网络的节点度研究
5
作者 朱威州 陶玲 +1 位作者 钱志余 胥传健 《生物医学工程学杂志》 EI CAS CSCD 北大核心 2013年第6期1309-1314,共6页
目前临床上迫切需要一种有效的脑胶质瘤患者脑功能损伤的检测手段,理解其发病机制。本研究提出弥散张量追踪技术与"小世界"网络相结合的方法,利用脑结构网络中节点度来研究颞叶区胶质瘤患者大脑的复杂网络拓扑属性。实验结果... 目前临床上迫切需要一种有效的脑胶质瘤患者脑功能损伤的检测手段,理解其发病机制。本研究提出弥散张量追踪技术与"小世界"网络相结合的方法,利用脑结构网络中节点度来研究颞叶区胶质瘤患者大脑的复杂网络拓扑属性。实验结果表明:对比正常被试组,不同等级的胶质瘤患者脑网络均遭到不同程度破坏,但破坏程度与肿瘤等级无关。网络中功能连接的度分布均呈异质性较明显的指数截断幂律分布。同时胶质瘤患者组的信息传输最大的脑功能区域发生转移,且存在语言功能区和感觉功能区等区域的缺失。 展开更多
关键词 白质纤维束 小世界网络 胶质瘤 网络节点度
原文传递
Analysis on Refinery System as a Complex Task-resource Network 被引量:4
6
作者 刘苏昱 荣冈 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2013年第3期253-262,共10页
Refinery system, a typical example of process systems, is presented as complex network in this paper. The topology of this system is described by task-resource network and modeled as directed and weighted graph, in wh... Refinery system, a typical example of process systems, is presented as complex network in this paper. The topology of this system is described by task-resource network and modeled as directed and weighted graph, in which nodes represent various tasks and edges denote the resources exchanged among tasks. Using the properties of node degree distribution, strength distribution and other weighted quantities, we demonstrate the heterogeneity of the network and point out the relation between structural characters of vertices and the functionality of correspond- ing tasks. The above phenomena indicate that the design requirements and principles of production process contrib- ute to the heterogeneous features of the network. Besides, betweenness centrality of nodes can be used as an impor- tance indicator to provide additional information for decision making. The correlations between structure and weighted properties are investigated to further address the influence brought by production schemes in system con- nectivity patterns. Cascading failures model is employed to analyze the robustness of the network when targeted at- tack happens. Two capacity assignment strategies are compared in order to improve the robustness of the network at certain cost. The refinery system displays more reliable behavior when the protecting strategy considers heteroge- neous properties. This phenomenon further implies the structure-activity relationship of the refinery system and provides insightful suggestions for process system design. The results also indicate that robustness analysis is a _promising applicat!on of methodologies from complex networks to process system engineering.. 展开更多
关键词 zomplex network refinery system structure-activity relationship HETEROGENEITY robusmess
下载PDF
Modeling and Robustness of Knowledge Network in Supply Chain 被引量:1
7
作者 王道平 沈睿芳 《Transactions of Tianjin University》 EI CAS 2014年第2期151-156,共6页
The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as... The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as scale-free networks.In this paper,the knowledge network model in supply chain is established,in which the preferential attachment mechanism based on the node strength is adopted to simulate the growth and evolution of the network.The nodes in the network have a certain preference in the choice of a knowledge partner.On the basis of the network model,the robustness of the three network models based on different preferential attachment strategies is investigated.The robustness is also referred to as tolerances when the nodes are subjected to random destruction and malicious damage.The simulation results of this study show that the improved network has higher connectivity and stability. 展开更多
关键词 knowledge network preferential attachment MODELING ROBUSTNESS
下载PDF
A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks 被引量:2
8
作者 CHEN Xi SUN Liang +1 位作者 MA Jian Feng MA Zhuo 《China Communications》 SCIE CSCD 2015年第4期117-129,共13页
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc... In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks. 展开更多
关键词 opportunistic networks trustmanagement key management forwardingprotocols verified feedback packet
下载PDF
Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling 被引量:1
9
作者 Ding Xiaojin Song Tiecheng Zhang Gengxin 《Journal of Southeast University(English Edition)》 EI CAS 2019年第3期318-324,共7页
In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pa... In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS. 展开更多
关键词 wireless heterogeneous network physical-layer security source-destination pair scheduling
下载PDF
Available capacity and robust wireless mesh connectivity of TDD-based networks
10
作者 宋甲英 Li +2 位作者 Xu Zhong Zhangdui 《High Technology Letters》 EI CAS 2011年第1期80-85,共6页
This paper addresses the available capacity and robust connectivity of time division duplex based wireless mesh networks (TDD-based WMNs). A stochastic model is presented for TDD-based WMNs. Considering the paramete... This paper addresses the available capacity and robust connectivity of time division duplex based wireless mesh networks (TDD-based WMNs). A stochastic model is presented for TDD-based WMNs. Considering the parameters that affect the network performance like ratio of control slots number to data slots number, collision probability, node density and average hopcounts, the availa- ble capacity for each node is inferred. Meanwhile, the order of transmission range for robust connec- tivity of large scale WMNs is derived. With the stochastic model and inferred available capacity per node, the performance of TDD-based WMNs using IEEE 802.16 standard is analyzed under various conditions. Simulation results indicate that the available capacity of IEEE 802.16-based TDD-based WMNs and the theoretical result have the same increasing and decreasing trend as the node density increases. Simulation results also illustrate the optimal value of the ratio of control slots number to data slots number that maximizes the available capacity. 展开更多
关键词 wireless mesh networks (WMNs) TDD/TDMA performance analysis available capacity robust connectivity
下载PDF
多波次导弹发射中的规划问题 被引量:1
11
作者 周梦源 逯伯亮 +1 位作者 李海友 杨靖三 《数学的实践与认识》 北大核心 2018年第15期265-275,共11页
为了有效提高导弹在未来战场的作战效果和安全性,对两波次导弹发射任务分配策略进行研究,提出了导弹发射和装弹运输决策优化模型.问题一中,使用0—1规划方法建立了以最大时间最小为目标的优化模型使得发射车整体暴露时间最短.问题... 为了有效提高导弹在未来战场的作战效果和安全性,对两波次导弹发射任务分配策略进行研究,提出了导弹发射和装弹运输决策优化模型.问题一中,使用0—1规划方法建立了以最大时间最小为目标的优化模型使得发射车整体暴露时间最短.问题二中,使用遍历排序最小法,从给定的5个道路节点中选取2个作为临时增设转载点,保证发射任务的整体暴露时间最短.问题三中,在第一问的基础上,同样保证任务的整体暴露时间最短,采用逆向分配思想从6个可选隐蔽待机点选出3个放置新增发射装置.问题四中,根据网络节点重要度思想,结合题中路网特点,基于节点度,集聚系数和节点介数的综合性指标,量化分析得到最可能受攻击破坏的3个道路节点.问题五中,利用网络分散控制系统原理,对问题一中的路线进行分散调整,缩短单台发射装置的最长暴露时间,使得执行任务过程最大程度规避敌人侦查和打击. 展开更多
关键词 0—1规划模型 逆向分配 网络节点重要
原文传递
2021年64卷第3期中文摘要
12
《中国科学:技术科学》 EI CSCD 北大核心 2021年第3期I0001-I0004,共4页
网络排序算法综述:代表性方法、改进方法及其应用刘佳琦,李雪蓉,董纪昌网络节点重要度的排序是网络科学领域的核心问题之一,节点排序算法在搜索引擎,社交网络和推荐系统等许多应用场景中扮演着重要的角色,本文系统介绍了三种具有代表性... 网络排序算法综述:代表性方法、改进方法及其应用刘佳琦,李雪蓉,董纪昌网络节点重要度的排序是网络科学领域的核心问题之一,节点排序算法在搜索引擎,社交网络和推荐系统等许多应用场景中扮演着重要的角色,本文系统介绍了三种具有代表性的节点接序方法:基于中心性的节点排序算法、PageRank算法和HITS算法,此外,本文还研究了这些代表性方法的最新扩展和改进算法,并给出了几个主要的应用领域,基于现有文献的调研,本文试图提出未来有价值的研究方向本文的结论对学术界和企业界都有一定的启示和帮助. 展开更多
关键词 PAGERANK算法 HITS算法 搜索引擎 网络节点重要 社交网络 中文摘要 应用场景 节点排序
原文传递
A weighted network evolving model with capacity constraints
13
作者 WU XiaoHuan ZHU JinFu +1 位作者 WU WeiWei GE Wei 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1619-1626,共8页
Most of existing works on complex network assumed that the nodes and edges were uncapacitated during the evolving process,and displayed "rich club" phenomenon.Here we will show that the "rich club"... Most of existing works on complex network assumed that the nodes and edges were uncapacitated during the evolving process,and displayed "rich club" phenomenon.Here we will show that the "rich club" could be changed to "common rich" if we consider the node capacity.In this paper,we define the node and edge attractive index with node capacity,and propose a new evolving model on the base of BBV model,with evolving simulations of the networks.In the new model,an entering node is linked with an existing node according to the preferential attachment mechanism defined with the attractive index of the existing node.We give the theoretical approximation and simulation solutions.If node capacity is finite,the rich node may not be richer further when the node strength approaches or gets to the node capacity.This is confirmed by analyzing the passenger traffic and routes of Chinese main airports.Due to node strength being function of time t,we can use the theoretical approximation solution to forecast how node strength changes and the time when node strength reaches its maximum value. 展开更多
关键词 complex network EVOLVING weighted network capacity constraints SIMULATION
原文传递
Modeling Dynamic Evolution of Online Friendship Network
14
作者 吴联仁 闫强 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第10期599-603,共5页
In this paper,we study the dynamic evolution of friendship network in SNS(Social Networking Site).Our analysis suggests that an individual joining a community depends not only on the number of friends he or she has wi... In this paper,we study the dynamic evolution of friendship network in SNS(Social Networking Site).Our analysis suggests that an individual joining a community depends not only on the number of friends he or she has within the community,but also on the friendship network generated by those friends.In addition,we propose a model which is based on two processes:first,connecting nearest neighbors;second,strength driven attachment mechanism.The model reflects two facts:first,in the social network it is a universal phenomenon that two nodes are connected when they have at least one common neighbor;second,new nodes connect more likely to nodes which have larger weights and interactions,a phenomenon called strength driven attachment(also called weight driven attachment).From the simulation results,we find that degree distribution P(k),strength distribution P(s),and degree-strength correlation are all consistent with empirical data. 展开更多
关键词 friendship network common neighbor CNN strength driven
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部