E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ...E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
In the field of intangible cultural heritage' s digital protection, a lot of research work has been made by all countries in the world, while the research on the digital commuuication of intangible cultural heritage ...In the field of intangible cultural heritage' s digital protection, a lot of research work has been made by all countries in the world, while the research on the digital commuuication of intangible cultural heritage is few and especially rarely seen in China. Under the premise, in this paper, the factors influencing intangible cultural heritage in the communication process are analyzed based on the information characteristics of intangible cultural heritage and the advantages of I-Space framework model in researching information transfer. Also, combined with the birch bark making technology in Heilongjiang province, the knowledge-based and signified communication strategy of intangible cultural heritage is proposed, aiming at providing new ideas for the researches on the digital communication of intangible cultural heritage.展开更多
Social networks are the result of a couple of circumstances such as the current development of communication technology and the improvement of the opportunities for communication, access to new ideas, web-based inform...Social networks are the result of a couple of circumstances such as the current development of communication technology and the improvement of the opportunities for communication, access to new ideas, web-based information, electronic resources and database serving millions of people all over the world. Social networks have increased their public influence, which contain videotaped speeches and presentations. Multimodality has become a characteristic feature of contemporary political virtual communication. Bulgarian politicians appreciate the Internet as a tool for building popularity in its wealth of features, forms, and modes. Communicative tools and techniques have changed. The forms of the Bulgarian political communication found in the virtual environment such as sites, blogs, social networks, video clips, virtual forums, etc. are heterogeneous. Bulgarian citizens accept the Internet as a tool for increased political and social activities. Civil oratory, which is seen as a mechanism for efficient organizing of public events during election campaigns, protests, and demonstrations, is also present in the social networks. The citizens use a combination of verbal and visual elements; they are bloggers and participants in virtual political forums and actively participate in the spread of all kinds of forms of the social networks. They take part in the street demonstrations and organize performances; they ridicule politicians through posters and cartoons published online. Verbal and visual messages of the citizens come to real life during the protests and to virtual life in the social networks. The polyphony of social networks is a manifestation of virtual civil communication where the citizens in their virtual projection as netizens build up a new complex model of communication.展开更多
The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. ...The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. Inspired by the method of performing non-unitary operators by the linear combination of unitary operations, we proposed a quantum algorithm for the simulation of the universal single-qubit channel, described by a convex combination of "quasi-extreme" channels corresponding to four Kraus operators, and is scalable to arbitrary higher dimension. We demonstrated the whole algorithm experimentally using the universal IBM cloud-based quantum computer and studied the properties of different qubit quantum channels. We illustrated the quantum capacity of the general qubit quantum channels, which quantifies the amount of quantum information that can be protected. The behavior of quantum capacity in different channels revealed which types of noise processes can support information transmission, and which types are too destructive to protect information. There was a general agreement between the theoretical predictions and the experiments, which strongly supports our method. By realizing the arbitrary quhit channel, this work provides a universally- accepted way to explore various properties of quantum channels and novel prospect for quantum communication.展开更多
基金sponsored by the National Natural Science Foundation of China under grant number No. 61100008, 61201084the China Postdoctoral Science Foundation under Grant No. 2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund (Postdoctoral Youth Talent Program) under Grant No. LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No. LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No. QC2015076Funds for the Central Universities of China under grant number HEUCF100602
文摘E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
文摘In the field of intangible cultural heritage' s digital protection, a lot of research work has been made by all countries in the world, while the research on the digital commuuication of intangible cultural heritage is few and especially rarely seen in China. Under the premise, in this paper, the factors influencing intangible cultural heritage in the communication process are analyzed based on the information characteristics of intangible cultural heritage and the advantages of I-Space framework model in researching information transfer. Also, combined with the birch bark making technology in Heilongjiang province, the knowledge-based and signified communication strategy of intangible cultural heritage is proposed, aiming at providing new ideas for the researches on the digital communication of intangible cultural heritage.
文摘Social networks are the result of a couple of circumstances such as the current development of communication technology and the improvement of the opportunities for communication, access to new ideas, web-based information, electronic resources and database serving millions of people all over the world. Social networks have increased their public influence, which contain videotaped speeches and presentations. Multimodality has become a characteristic feature of contemporary political virtual communication. Bulgarian politicians appreciate the Internet as a tool for building popularity in its wealth of features, forms, and modes. Communicative tools and techniques have changed. The forms of the Bulgarian political communication found in the virtual environment such as sites, blogs, social networks, video clips, virtual forums, etc. are heterogeneous. Bulgarian citizens accept the Internet as a tool for increased political and social activities. Civil oratory, which is seen as a mechanism for efficient organizing of public events during election campaigns, protests, and demonstrations, is also present in the social networks. The citizens use a combination of verbal and visual elements; they are bloggers and participants in virtual political forums and actively participate in the spread of all kinds of forms of the social networks. They take part in the street demonstrations and organize performances; they ridicule politicians through posters and cartoons published online. Verbal and visual messages of the citizens come to real life during the protests and to virtual life in the social networks. The polyphony of social networks is a manifestation of virtual civil communication where the citizens in their virtual projection as netizens build up a new complex model of communication.
基金supported by the National Basic Research Program of China (Grant No. 2015CB921002)the National Natural Science Foundation of China (Grant Nos. 11175094, and 91221205)the Fund of Key Laboratory (Grant No. 9140C75010215ZK65001)
文摘The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. Inspired by the method of performing non-unitary operators by the linear combination of unitary operations, we proposed a quantum algorithm for the simulation of the universal single-qubit channel, described by a convex combination of "quasi-extreme" channels corresponding to four Kraus operators, and is scalable to arbitrary higher dimension. We demonstrated the whole algorithm experimentally using the universal IBM cloud-based quantum computer and studied the properties of different qubit quantum channels. We illustrated the quantum capacity of the general qubit quantum channels, which quantifies the amount of quantum information that can be protected. The behavior of quantum capacity in different channels revealed which types of noise processes can support information transmission, and which types are too destructive to protect information. There was a general agreement between the theoretical predictions and the experiments, which strongly supports our method. By realizing the arbitrary quhit channel, this work provides a universally- accepted way to explore various properties of quantum channels and novel prospect for quantum communication.