期刊文献+
共找到31,688篇文章
< 1 2 250 >
每页显示 20 50 100
Studying the co-evolution of information diffusion,vaccination behavior and disease transmission in multilayer networks with local and global effects
1
作者 霍良安 武兵杰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期677-689,共13页
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf... Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time. 展开更多
关键词 information diffusion vaccination behavior disease transmission multilayer networks local and global effect
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
2
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
AR Display Method of a Person's Identifier near the Head on a Camera Screen Based on the GPS Information and Face Detection Using Ad hoc and P2P Networking
3
作者 Masahiro Gotou Kazumasa Takami 《Computer Technology and Application》 2016年第4期196-208,共13页
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ... The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments. 展开更多
关键词 Ad hoc networking AR (augmented reality) face detection GPS information person's identifier P2P communication smartphone.
下载PDF
The Immense Impact of Reverse Edges on Large Hierarchical Networks
4
作者 Haosen Cao Bin-Bin Hu +7 位作者 Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang 《Engineering》 SCIE EI CAS CSCD 2024年第5期240-249,共10页
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc... Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes. 展开更多
关键词 SYNCHRONIZABILITY Large hierarchical networks Reverse edges information flows Complex networks
下载PDF
Automatic Extraction of Medical Latent Variables from ECG Signals Utilizing a Mutual Information-Based Technique and Capsular Neural Networks for Arrhythmia Detection
5
作者 Abbas Ali Hassan Fardin Abdali-Mohammadi 《Computers, Materials & Continua》 SCIE EI 2024年第10期971-983,共13页
From a medical perspective,the 12 leads of the heart in an electrocardiogram(ECG)signal have functional dependencies with each other.Therefore,all these leads report different aspects of an arrhythmia.Their difference... From a medical perspective,the 12 leads of the heart in an electrocardiogram(ECG)signal have functional dependencies with each other.Therefore,all these leads report different aspects of an arrhythmia.Their differences lie in the level of highlighting and displaying information about that arrhythmia.For example,although all leads show traces of atrial excitation,this function is more evident in lead II than in any other lead.In this article,a new model was proposed using ECG functional and structural dependencies between heart leads.In the prescreening stage,the ECG signals are segmented from the QRS point so that further analyzes can be performed on these segments in a more detailed manner.The mutual information indices were used to assess the relationship between leads.In order to calculate mutual information,the correlation between the 12 ECG leads has been calculated.The output of this step is a matrix containing all mutual information.Furthermore,to calculate the structural information of ECG signals,a capsule neural network was implemented to aid physicians in the automatic classification of cardiac arrhythmias.The architecture of this capsule neural network has been modified to perform the classification task.In the experimental results section,the proposed model was used to classify arrhythmias in ECG signals from the Chapman dataset.Numerical evaluations showed that this model has a precision of 97.02%,recall of 96.13%,F1-score of 96.57%and accuracy of 97.38%,indicating acceptable performance compared to other state-of-the-art methods.The proposed method shows an average accuracy of 2%superiority over similar works. 展开更多
关键词 Heart diseases electrocardiogram signal signal correlation mutual information capsule neural networks
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
6
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Evolution Characteristics of Government-Industry-University Cooperative Innovation Network of Electronic Information Industry in Liaoning Province, China 被引量:8
7
作者 PENG Fei ZHANG Qiqi +2 位作者 HAN Zenglin DING Yan FU Ningning 《Chinese Geographical Science》 SCIE CSCD 2019年第3期528-540,共13页
It is important to optimize the cooperative innovation network for the improvement of economic competence and innovative power. Based on the patent information services platform, we obtain invention patent data for th... It is important to optimize the cooperative innovation network for the improvement of economic competence and innovative power. Based on the patent information services platform, we obtain invention patent data for the electronic information industry in Liaoning from 1985 to 2015. This paper analyzes the cooperative innovation network structure, its spatiotemporal evolution and the triple helix relationship of government-industry-university(GIU) by using the social network analysis method and the triple helix theory as well as UCINet, ArcGIS and NetDraw. The empirical results show that: 1) the number of the subjects of the electronic information industry GIU cooperative innovation network in Liaoning demonstrates a gradual increase from 1985 to 2015, with the same trend in concentration. In terms of its subject and its centrality, the universities have a higher position, and the industries have a lower position,while the status of the government is still unclear. 2) The cooperative innovation network presents a core-periphery structure, and the polarization effect of innovation subjects tends to be obvious. There is certain distance-decay regularity in the cooperative innovation network, and a strong geographical proximity to cooperative innovation. 3) The compactness shows a downward trend as a whole. In terms of the extent of participation, the industries are better than the government but worse than the universities. This means that the cooperative innovation network of GIU in the electronic information industry in Liaoning is in the initial stage of formation. 展开更多
关键词 government-industry-university (GIU) COOPeraTIVE innovation network triple HELIX electronic information inDUSTRY Liaoning Province
下载PDF
Simulating the Spreading of Two Competing Public Opinion Information on Complex Network 被引量:9
8
作者 Mengshu Xie Zhen Jia +1 位作者 Yanfei Chen Qixiang Deng 《Applied Mathematics》 2012年第9期1074-1078,共5页
In this paper, we investigate the regularity of spreading of information and public opinions towards two competing products in complex networks. By building its mathematical model and simulating its evolution process,... In this paper, we investigate the regularity of spreading of information and public opinions towards two competing products in complex networks. By building its mathematical model and simulating its evolution process, we have found the statistical regularity for support rates of two different products at a steady stage. The research shows that strength of the public opinion spreading is proportional to the final support rates of a product. 展开更多
关键词 COMPLEX network PUBLIC OPinION information Competing SPREADinG
下载PDF
Research on fault-tolerant control of networked control systems based on information scheduling 被引量:5
9
作者 Huo Zhihong Zhang Zhixue Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第5期1024-1028,共5页
A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced... A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources. 展开更多
关键词 networked control systems fault-tolerant control information scheduling linear matrix inequality.
下载PDF
Neural Network Based Algorithm and Simulation of Information Fusion in the Coal Mine 被引量:4
10
作者 ZHANG Xiao-qiang WANG Hui-bing YU Hong-zhen 《Journal of China University of Mining and Technology》 EI 2007年第4期595-598,共4页
The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This a... The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This assures the accurate transmission of the multi-sensor information that comes from the coal mine monitoring systems. The in-formation fusion mode was analyzed. An algorithm was designed based on this analysis and some simulation results were given. Finally,conclusions that could provide auxiliary decision making information to the coal mine dispatching officers were presented. 展开更多
关键词 neural network information fusion algorithm and simulation SENSORS
下载PDF
Design for the simulation of space based information network 被引量:1
11
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
12
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERinG threshold optimization
下载PDF
Integration and development of energy and information network in the Pan-Arctic region 被引量:2
13
作者 Xiaoxia Wei Jinyu Xiao +2 位作者 Zhe Wang Zhichun Wang Yun Tian 《Global Energy Interconnection》 2019年第6期505-513,共9页
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre... The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme. 展开更多
关键词 Energy interconnection Data center network traffic integrated development of energy and information networks Global En ergy in terconnection
下载PDF
Social networks, social capital,and the use of information technology in the urban village:A study of community groups in Manchester, England 被引量:3
14
作者 Kate WILLIAMS 《Chinese Journal of Library and Information Science》 2011年第Z1期35-48,共14页
Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at... Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose. 展开更多
关键词 Social network information technology Social capital theory
下载PDF
Exploring the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method 被引量:1
15
作者 Jing-Chao Sun Yue-Yao Li +3 位作者 Yu Xia Yi-Di Wang Yi-Xuan Jiang Yu-Qiu Li 《TMR Non-Drug Therapy》 2019年第3期95-102,共8页
Objective:Explore the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method.Methods:The complex network and point wise mutual information system-developed by ... Objective:Explore the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method.Methods:The complex network and point wise mutual information system-developed by Chinese academy of Chinese medical sciences wereused to analyze the specific acupoints,compatibility,frequency etc.Results:174 acumoxibustion prescriptions were collected,including 163 acupoints.among them eighteen acupoints were used more than 30 times such as Hegu(LI4),Zusanli(ST36),Quchi(LI11)and Fengshi(GB31).The combinations of 31 acupoints were used more than 15 times,such as the combination of Quchi(LI11)and Zusanli(ST36),the combination of acupoint Quchi(LI11)and Jianyu(LI15),Hegu and Quchi(LI11).The most commonly used treatment method for stroke treatment is to dredge the Yangming meridian and Shaoyang meridian through acupuncture the multiple acupoints located on these two meridians..The commonly used acupoints are mainly distributed in the limbs,head and face.The most commonly used specific acupoint is intersection acupoint.The usage frequency of specific acupoints are higher than that of non-specific acupoints.Conclusion:Dredging the collaterals,dispelling wind-evil and restoring consciousness are the main principle for the treatment of stroke.Specific acupoints in head,face and climbs maybe the main targeted acupoints.Combination of Yang meridians with other meridians is needed to improve the effects.The Yangming meridian and Shaoyang meridian are most used meridians and Hegu(LI4),Quchi(LI11)and Zusanli(ST36)are the most used acupionts. 展开更多
关键词 ACUPUNCTURE STROKE Data MininG Complex network POinT mutual information method
下载PDF
The Quantitative Law of Network Information Growth 被引量:1
16
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier internet economy central information base
下载PDF
Application of artificial neural network and information theory to detection of insulators
17
作者 李卫东 唐丽艳 +1 位作者 宋家骅 柳焯 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第3期32-36,共5页
Information theory is used to obtain the information gain for each identification feature, and this gain is used as the weight factor for this feature to stress the role of effective feature, and the ART model based o... Information theory is used to obtain the information gain for each identification feature, and this gain is used as the weight factor for this feature to stress the role of effective feature, and the ART model based on artificial neural network theory is then used for identification thereby forming the detection system for poor insulators. Exper iments and calculations show this approach is correct and feasible. 展开更多
关键词 information GAin artificial NEURAL network ELECTRICAL power system DETECTION of insulators
下载PDF
RESEARCH ON THE MODEL OF SPEECH RECOGNITION AND UNDERSTANDING BY USING HIERARCHICAL INFORMATION FEEDBACK
18
作者 Jiang Minghu Lin Biqin Yuan Baozong(institute of Information Science, Northern Jiaotong University, Beijing 100044) 《Journal of Electronics(China)》 1999年第3期208-214,共7页
In this paper according to the process of cognitive of human being to speech is put forward a model of speech recognition and understanding in a noisy environment. For speech recognition, two level modular Extended As... In this paper according to the process of cognitive of human being to speech is put forward a model of speech recognition and understanding in a noisy environment. For speech recognition, two level modular Extended Associative Memory Neural Networks (EAMNN) are adopted. The learning speed is 9 times faster than that of the conventional BP net. It has high self-adaptability, robustness, fault toleration and associative memory ability to the noisy speech signals. To speech understanding, the structure of hierarchical analysis and examining faults which is a combination of statistic inference and syntactic rules is adopted, to pick up the candidates of the speech recognition and to predict the next word by the statistic inference base; and the syntactic rule base reduces effectively the recognition errors and candidates of acoustic level; then by comparing and rectifying errors through information feedback and guiding the succeeding speech process, the recognition of the sentence is realized. 展开更多
关键词 NEURAL network SPEECH recognition and UNDERSTANDinG information FEEDBACK
下载PDF
Research on the Application of Computer Network Technology in Electronic Information Engineering 被引量:1
19
作者 Zhiwu Cui 《Journal of Electronic Research and Application》 2022年第3期1-5,共5页
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g... Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering. 展开更多
关键词 Computer network technology Electronic information engineering Application and management
下载PDF
Application of the fault diagnosis strategy based on hierarchical information fusion in motors fault diagnosis
20
作者 XIA Li FEI Qi 《Journal of Marine Science and Application》 2006年第1期62-68,共7页
This paper has analyzed merits and demerits of both neural network technique and of the information fusion methods based on the D-S (dempster-shafer evidence) Theory as well as their complementarity, proposed the hier... This paper has analyzed merits and demerits of both neural network technique and of the information fusion methods based on the D-S (dempster-shafer evidence) Theory as well as their complementarity, proposed the hierarchical information fusion fault diagnosis strategy by combining the neural network technique and the fused decision diagnosis based on D-S Theory, and established a corresponding functional model. Thus, we can not only solve a series of problems caused by rapid growth in size and complexity of neural network structure with diagnosis parameters increasing, but also can provide effective method for basic probability assignment in D-S Theory. The application of the strategy to diagnosing faults of motor bearings has proved that this method is of fairly high accuracy and reliability in fault diagnosis. 展开更多
关键词 neural network information fusion dempster-shafer evidence theory fault diagnosis MOTOR
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部