期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
D-ATIS系统数字部分异常的安全隐患研究分析
1
作者 庞郁赢 《现代信息科技》 2022年第1期21-24,共4页
随着航班量不断增加,空管压力与日俱增,这对空中交通管制工作提出越来越高的要求。目前,数字化航站自动情报服务系统和管制综合信息系统成为塔台管制员实施空中交通指挥的重要生产设施。文章首先介绍了珠海空管站D-ATIS系统以及与管综... 随着航班量不断增加,空管压力与日俱增,这对空中交通管制工作提出越来越高的要求。目前,数字化航站自动情报服务系统和管制综合信息系统成为塔台管制员实施空中交通指挥的重要生产设施。文章首先介绍了珠海空管站D-ATIS系统以及与管综系统的数据交互,针对D-ATIS系统数字部分异常数导致管综系统无法获取通播信息的安全隐患,从人机环境管理方面进行分析并提出改进措施与建议,以期为相关人员提供参考。 展开更多
关键词 D-ATIS系统 管制综合信息系统 通播信息
下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
2
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
3
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
Research on the Digital Communication Strategy of Intangible Cultural Heritage under the New Media Environment
4
作者 Chunhui ZHENG Longtao GAI 《International Journal of Technology Management》 2013年第9期134-137,共4页
In the field of intangible cultural heritage' s digital protection, a lot of research work has been made by all countries in the world, while the research on the digital commuuication of intangible cultural heritage ... In the field of intangible cultural heritage' s digital protection, a lot of research work has been made by all countries in the world, while the research on the digital commuuication of intangible cultural heritage is few and especially rarely seen in China. Under the premise, in this paper, the factors influencing intangible cultural heritage in the communication process are analyzed based on the information characteristics of intangible cultural heritage and the advantages of I-Space framework model in researching information transfer. Also, combined with the birch bark making technology in Heilongjiang province, the knowledge-based and signified communication strategy of intangible cultural heritage is proposed, aiming at providing new ideas for the researches on the digital communication of intangible cultural heritage. 展开更多
关键词 Intangible Cultural Heritage Digital communication I-Space Conceptual Reference Model
下载PDF
Virtual Political Communication in Bulgaria
5
作者 Ivanka Mavrodieva 《Journalism and Mass Communication》 2014年第12期756-765,共10页
Social networks are the result of a couple of circumstances such as the current development of communication technology and the improvement of the opportunities for communication, access to new ideas, web-based inform... Social networks are the result of a couple of circumstances such as the current development of communication technology and the improvement of the opportunities for communication, access to new ideas, web-based information, electronic resources and database serving millions of people all over the world. Social networks have increased their public influence, which contain videotaped speeches and presentations. Multimodality has become a characteristic feature of contemporary political virtual communication. Bulgarian politicians appreciate the Internet as a tool for building popularity in its wealth of features, forms, and modes. Communicative tools and techniques have changed. The forms of the Bulgarian political communication found in the virtual environment such as sites, blogs, social networks, video clips, virtual forums, etc. are heterogeneous. Bulgarian citizens accept the Internet as a tool for increased political and social activities. Civil oratory, which is seen as a mechanism for efficient organizing of public events during election campaigns, protests, and demonstrations, is also present in the social networks. The citizens use a combination of verbal and visual elements; they are bloggers and participants in virtual political forums and actively participate in the spread of all kinds of forms of the social networks. They take part in the street demonstrations and organize performances; they ridicule politicians through posters and cartoons published online. Verbal and visual messages of the citizens come to real life during the protests and to virtual life in the social networks. The polyphony of social networks is a manifestation of virtual civil communication where the citizens in their virtual projection as netizens build up a new complex model of communication. 展开更多
关键词 virtual political communication SITES blogs social networks virtual political forums
下载PDF
Efficient universal quantum channel simulation in IBM's cloud quantum computer 被引量:1
6
作者 Shi-Jie Wei Tao Xin Gui-Lu Long 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2018年第7期44-53,共10页
The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. ... The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. Inspired by the method of performing non-unitary operators by the linear combination of unitary operations, we proposed a quantum algorithm for the simulation of the universal single-qubit channel, described by a convex combination of "quasi-extreme" channels corresponding to four Kraus operators, and is scalable to arbitrary higher dimension. We demonstrated the whole algorithm experimentally using the universal IBM cloud-based quantum computer and studied the properties of different qubit quantum channels. We illustrated the quantum capacity of the general qubit quantum channels, which quantifies the amount of quantum information that can be protected. The behavior of quantum capacity in different channels revealed which types of noise processes can support information transmission, and which types are too destructive to protect information. There was a general agreement between the theoretical predictions and the experiments, which strongly supports our method. By realizing the arbitrary quhit channel, this work provides a universally- accepted way to explore various properties of quantum channels and novel prospect for quantum communication. 展开更多
关键词 quantum channel quantum algorithm quantum capacity IBM quantum cloud
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部