Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and simila...Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and similarly, the infected individuals can be sorted into different classes according to their infectivity. Moreover, some diseases may develop through several stages. Many authors have shown that the individuals' relation can be viewed as a complex network. So in this paper, in order to better explain the dynamical behavior of epidemics, we consider different epidemic models on complex networks, and obtain the epidemic threshold for each ease. Finally, we present numerical simulations for each case to verify our results.展开更多
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory...The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.展开更多
Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this...Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this paper explores the causes of network behavior anomie for college students, which mainly include: dissatisfaction in real communication, game addiction to the network, craving online pornography, and hooking on online shopping. In addition, it also investigates the ways to wipe out mental frustration in such a cyber era. These ways mainly are to strenzthen online education and management, to make psychological counseling, and to carry on frustration education.展开更多
"Using technology to support learning" gradually becomes the main trend of technology application and technology-curriculum integration at home and abroad. The empirical research based on newly-established universit..."Using technology to support learning" gradually becomes the main trend of technology application and technology-curriculum integration at home and abroad. The empirical research based on newly-established universities shows that college students' usage intention on network course and study behavior is not real. Study behavior of network course is passive and outside stimulation. They are more concerned about the usefulness and relative advantages of the learning mode in the network course learning; however, learning environment of the network course at present still is given on material and tool level. The institutions should, in compliance with the trend of higher education development in the world, actively build learning environment to meet the learning needs of students in the information age, deepen the reform of information technology application and curriculum based on the learner-centered concept, focus on the training of initiative learning of college students, put community impact into full play to promote the integration of the superiority of the material platform and initiative, and finally improve the efficiency and quality of teaching and education.展开更多
Bistable behavior of neuronal complex networks is investigated in the limited-sustained-activity regime when the network is composed of excitatory and inhibitory neurons.The standard stability analysis is performed on...Bistable behavior of neuronal complex networks is investigated in the limited-sustained-activity regime when the network is composed of excitatory and inhibitory neurons.The standard stability analysis is performed on the two metastable states separately.Both theoretical analysis and numerical simulations show consistently that the difference between time scales of excitatory and inhibitory populations can influence the dynamical behaviors of the neuronal networks dramatically,leading to the transition from bistable behaviors with memory effects to the collapse of bistable behaviors.These results may suggest one possible neuronal information processing by only tuning time scales.展开更多
The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the t...The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the transition, which is now topology-dependent, from the active state to that with no activity. This could be a naive model for the wakening and sleeping of a brain-like system, i.e., a multi-component system with two different dynamical behavior.展开更多
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni...The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.展开更多
ADVN (2,2'-Azobis (2,4-dimethyl) valeronitrile), a free radical initiator, is widely applied for the polymerization reaction of polymers in the chemical industries. When ADVN releases free radical during the deco...ADVN (2,2'-Azobis (2,4-dimethyl) valeronitrile), a free radical initiator, is widely applied for the polymerization reaction of polymers in the chemical industries. When ADVN releases free radical during the decomposition process, it can accompany abundant heat and huge pressure to increase the possibility of thermal runaway and hazard, causing unacceptable thermal explosion or fire accidents. To develop an inherently safer process for ADVN, the thermal stability parameters of ADVN were obtained to investigate thermal decomposition characteristics using a DSC (differential scanning calorimetry) and TG (thermogravimetry). We used various kinetic models to completely depict the kinetic behavior and determine the thermal safety parameters for ADVN. The green thermal analysis approach could be used to substitute for complicated procedures and large-scale experiments of traditional thermal analysis methods, avoiding environmental pollution and energy depletion.展开更多
We introduce Tsallis mapping in Bianconi-Barabgsi (B-B) fitness model of growing networks. This mapping addresses the dynamical behavior of the fitness model within the framework of nonextensive statistics mechanics...We introduce Tsallis mapping in Bianconi-Barabgsi (B-B) fitness model of growing networks. This mapping addresses the dynamical behavior of the fitness model within the framework of nonextensive statistics mechanics, which is characterized by a dimensionless nonextensivity parameter q. It is found that this new phenomenological parameter plays an important role in the evolution of networks: the underlying evolving networks may undergo a different phases depending on the q exponents, comparing to the original B-B fitness model, and the corresponding critical transition temperature Tc is also identified.展开更多
Behavioral responses triggered by the perceived risk of experiencing the disease represent a key ingredient in the spread of epidemics across human population.In this paper,two forms of individual awareness(i.e.,the r...Behavioral responses triggered by the perceived risk of experiencing the disease represent a key ingredient in the spread of epidemics across human population.In this paper,two forms of individual awareness(i.e.,the risk perception of an emerging epidemic) are addressed:Contact awareness that increases with individual contact number,and local awareness that increases with the fraction of infected contacts.By extending the probability generating functionology,the author shows that it is possible to track the evolution of the degree distributions among susceptible and infected individuals when the underlying network of contacts is represented by a semi-random configuration model.It is hopefully to shed some light on the dynamic aspects of networked epidemiological models.展开更多
Potential behavior prediction involves understanding the latent human behavior of specific groups,and can assist organizations in making strategic decisions.Progress in information technology has made it possible to a...Potential behavior prediction involves understanding the latent human behavior of specific groups,and can assist organizations in making strategic decisions.Progress in information technology has made it possible to acquire more and more data about human behavior.In this paper,we examine behavior data obtained in realworld scenarios as an information network composed of two types of objects(humans and actions)associated with various attributes and three types of relationships(human-human,human-action,and action-action),which we call the heterogeneous behavior network(HBN).To exploit the abundance and heterogeneity of the HBN,we propose a novel network embedding method,human-action-attribute-aware heterogeneous network embedding(a4 HNE),which jointly considers structural proximity,attribute resemblance,and heterogeneity fusion.Experiments on two real-world datasets show that this approach outperforms other similar methods on various heterogeneous information network mining tasks for potential behavior prediction.展开更多
This paper investigates the finite-time generalized outer synchronization between two complex dynamical networks with different dynamical behaviors. The two networks can be undirected or directed, and they may also co...This paper investigates the finite-time generalized outer synchronization between two complex dynamical networks with different dynamical behaviors. The two networks can be undirected or directed, and they may also contain isolated nodes and clusters. By using suitable controllers, sufficient conditions for finite-time generalized outer synchronization are derived based on the finite-time stability theory. Finally, numerical examples are examined to illustrate the effectiveness of the analytical results. The effect of control parameters on the synchronization time is also numerically demonstrated.展开更多
基金Supported by the Foundation of Anhui Education Bureau under Grant No.KJ2007A003the Natural Science Foundation of Anhui,China under Grant No.070416225+2 种基金a Grant from the Health,Welfare and Food Bureau of the Hong Kong SAR GovernmentNSFC under Grant No.10672146supported by Shanghai Leading Academic Discipline Project,Project Number:S30104
文摘Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and similarly, the infected individuals can be sorted into different classes according to their infectivity. Moreover, some diseases may develop through several stages. Many authors have shown that the individuals' relation can be viewed as a complex network. So in this paper, in order to better explain the dynamical behavior of epidemics, we consider different epidemic models on complex networks, and obtain the epidemic threshold for each ease. Finally, we present numerical simulations for each case to verify our results.
基金Shanghai Education Commission Foundation for Excellent Young High Education Teachers,China(No.xqz05001No.YYY-07008)
文摘The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.
文摘Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this paper explores the causes of network behavior anomie for college students, which mainly include: dissatisfaction in real communication, game addiction to the network, craving online pornography, and hooking on online shopping. In addition, it also investigates the ways to wipe out mental frustration in such a cyber era. These ways mainly are to strenzthen online education and management, to make psychological counseling, and to carry on frustration education.
文摘"Using technology to support learning" gradually becomes the main trend of technology application and technology-curriculum integration at home and abroad. The empirical research based on newly-established universities shows that college students' usage intention on network course and study behavior is not real. Study behavior of network course is passive and outside stimulation. They are more concerned about the usefulness and relative advantages of the learning mode in the network course learning; however, learning environment of the network course at present still is given on material and tool level. The institutions should, in compliance with the trend of higher education development in the world, actively build learning environment to meet the learning needs of students in the information age, deepen the reform of information technology application and curriculum based on the learner-centered concept, focus on the training of initiative learning of college students, put community impact into full play to promote the integration of the superiority of the material platform and initiative, and finally improve the efficiency and quality of teaching and education.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11105095 and 11005077by the Natural Science Foundation of Higher Education Institutions of Jiangsu Province under Grant No.11KJB140008
文摘Bistable behavior of neuronal complex networks is investigated in the limited-sustained-activity regime when the network is composed of excitatory and inhibitory neurons.The standard stability analysis is performed on the two metastable states separately.Both theoretical analysis and numerical simulations show consistently that the difference between time scales of excitatory and inhibitory populations can influence the dynamical behaviors of the neuronal networks dramatically,leading to the transition from bistable behaviors with memory effects to the collapse of bistable behaviors.These results may suggest one possible neuronal information processing by only tuning time scales.
基金supported by National Natural Science Foundation of China under Grant No. 10675060
文摘The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the transition, which is now topology-dependent, from the active state to that with no activity. This could be a naive model for the wakening and sleeping of a brain-like system, i.e., a multi-component system with two different dynamical behavior.
文摘The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.
文摘ADVN (2,2'-Azobis (2,4-dimethyl) valeronitrile), a free radical initiator, is widely applied for the polymerization reaction of polymers in the chemical industries. When ADVN releases free radical during the decomposition process, it can accompany abundant heat and huge pressure to increase the possibility of thermal runaway and hazard, causing unacceptable thermal explosion or fire accidents. To develop an inherently safer process for ADVN, the thermal stability parameters of ADVN were obtained to investigate thermal decomposition characteristics using a DSC (differential scanning calorimetry) and TG (thermogravimetry). We used various kinetic models to completely depict the kinetic behavior and determine the thermal safety parameters for ADVN. The green thermal analysis approach could be used to substitute for complicated procedures and large-scale experiments of traditional thermal analysis methods, avoiding environmental pollution and energy depletion.
基金Supported by the National Natural Science Foundation of China under Grant No. 10875058the Initiative Plan of Shanghai Education Committee under Grant No. 10YZ76the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry (SRF for ROCS,SEM)
文摘We introduce Tsallis mapping in Bianconi-Barabgsi (B-B) fitness model of growing networks. This mapping addresses the dynamical behavior of the fitness model within the framework of nonextensive statistics mechanics, which is characterized by a dimensionless nonextensivity parameter q. It is found that this new phenomenological parameter plays an important role in the evolution of networks: the underlying evolving networks may undergo a different phases depending on the q exponents, comparing to the original B-B fitness model, and the corresponding critical transition temperature Tc is also identified.
基金supported by Air Force Office of Scientific Research under Grant No.FA9550-09-1-0165
文摘Behavioral responses triggered by the perceived risk of experiencing the disease represent a key ingredient in the spread of epidemics across human population.In this paper,two forms of individual awareness(i.e.,the risk perception of an emerging epidemic) are addressed:Contact awareness that increases with individual contact number,and local awareness that increases with the fraction of infected contacts.By extending the probability generating functionology,the author shows that it is possible to track the evolution of the degree distributions among susceptible and infected individuals when the underlying network of contacts is represented by a semi-random configuration model.It is hopefully to shed some light on the dynamic aspects of networked epidemiological models.
基金Project supported by the National Natural Science Foundation of China(Nos.U1509206,61625107,and U1611461)the Key Program of Zhejiang Province,China(No.2015C01027).
文摘Potential behavior prediction involves understanding the latent human behavior of specific groups,and can assist organizations in making strategic decisions.Progress in information technology has made it possible to acquire more and more data about human behavior.In this paper,we examine behavior data obtained in realworld scenarios as an information network composed of two types of objects(humans and actions)associated with various attributes and three types of relationships(human-human,human-action,and action-action),which we call the heterogeneous behavior network(HBN).To exploit the abundance and heterogeneity of the HBN,we propose a novel network embedding method,human-action-attribute-aware heterogeneous network embedding(a4 HNE),which jointly considers structural proximity,attribute resemblance,and heterogeneity fusion.Experiments on two real-world datasets show that this approach outperforms other similar methods on various heterogeneous information network mining tasks for potential behavior prediction.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61203304,61203055 and 10901145the Fundamental Research Funds for the Central Universities under Grant Nos.2011QNA26,2010LKSX04,and 2010LKSX01
文摘This paper investigates the finite-time generalized outer synchronization between two complex dynamical networks with different dynamical behaviors. The two networks can be undirected or directed, and they may also contain isolated nodes and clusters. By using suitable controllers, sufficient conditions for finite-time generalized outer synchronization are derived based on the finite-time stability theory. Finally, numerical examples are examined to illustrate the effectiveness of the analytical results. The effect of control parameters on the synchronization time is also numerically demonstrated.