期刊文献+
共找到98篇文章
< 1 2 5 >
每页显示 20 50 100
Informal Networks of Power and Control of Deviation in Post-Soviet Non-Democracies
1
作者 Nicolas Hayoz 《International Relations and Diplomacy》 2016年第1期60-69,共10页
Informal networks, practices and institutions may be observed in many different social contexts, particularly in politics. In certain political regimes, certain forms of informality are to be expected and are also tol... Informal networks, practices and institutions may be observed in many different social contexts, particularly in politics. In certain political regimes, certain forms of informality are to be expected and are also tolerated more than in others. Political informality in Eastern Europe may be presented on an axis with two poles, with many variants or combinations of informality and formality between them. These positions also allow the identification of specific regime types and legal systems. This chapter seeks to contextualize the distinction between the formal and the informal and to relate it to types of political regime, the principal focus resting on informal politics. Specific political contexts may produce practices of informality that have become so generalised that they can be described as cultures of informality. The interesting question is: to what extent are specific forms of informal structures more resilient in particular regime types than in others? Particularly looking at some of the more-or-less autocratic Euroasiatic states, one can easily recognize that the very purpose of informal politics and institutions is to restrict or eliminate political competition. Forms and meanings of what is informal and formal change the further one moves eastwards. Formal rules are and may be used together with informal institutions to control society. All this points to specific cultures of informality that can be observed, as well as different cultures of trust and distrust. On the other hand, such cultures of informality have to be considered in the context of specific political systems, together with their regimes (the concrete configurations of political power) and their organisations. This paper looks particularly at hybrid non-democracies and suggests one might consider them, in the perspective ofNiklas Luhmann's system theory, as parasites of functional differentiation. 展开更多
关键词 informal politics informal networks authoritarian regimes RUSSIA functional differentiation legalnihilism
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
2
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
Research on Heterogeneous Information Network Link Prediction Based on Representation Learning
3
作者 Yan Zhao Weifeng Rao +1 位作者 Zihui Hu Qi Zheng 《Journal of Electronic Research and Application》 2024年第5期32-37,共6页
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth... A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification. 展开更多
关键词 Heterogeneous information network Link prediction Presentation learning Deep learning Node embedding
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
4
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
CONNECTING INFORMAL NETWORKS TO MANAGEMENT OF TACIT KNOWLEDGE 被引量:1
5
作者 Kun NIE Shufang LIN +1 位作者 Tieju MA Yoshiteru NAKAMORI 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2010年第2期237-253,共17页
The relationship between tacit knowledge and informal networks has not been fully explored. Tacit knowledge cannot be well managed directly, because it is deeply embedded in individual actions and experiences. This st... The relationship between tacit knowledge and informal networks has not been fully explored. Tacit knowledge cannot be well managed directly, because it is deeply embedded in individual actions and experiences. This study proposes an approach to managing informal networks as a new middle way to facilitate the sharing and transferring of tacit knowledge, owing to the fact that tacit knowledge is mostly shared and transferred through informal networks. To support the idea of the approach, an empirical case study of applying the approach to management of a large scientific project is also included. Our findings suggest that informal networks play essential roles for management of tacit knowledge, and thus good management of informal networks can lead to efficient sharing and transferring of tacit knowledge. 展开更多
关键词 informal networks tacit knowledge case study
原文传递
Heterogeneous Network Embedding: A Survey
6
作者 Sufen Zhao Rong Peng +1 位作者 Po Hu Liansheng Tan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期83-130,共48页
Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the stru... Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks(HINs)into low-dimensional embeddings;this task is called heterogeneous network embedding(HNE).Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification,recommender systems,and information retrieval.Here,we provide a comprehensive survey of key advancements in the area of HNE.First,we define an encoder-decoder-based HNE model taxonomy.Then,we systematically overview,compare,and summarize various state-of-the-art HNE models and analyze the advantages and disadvantages of various model categories to identify more potentially competitive HNE frameworks.We also summarize the application fields,benchmark datasets,open source tools,andperformance evaluation in theHNEarea.Finally,wediscuss open issues and suggest promising future directions.We anticipate that this survey will provide deep insights into research in the field of HNE. 展开更多
关键词 Heterogeneous information networks representation learning heterogeneous network embedding graph neural networks machine learning
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
7
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
ESR-PINNs:Physics-informed neural networks with expansion-shrinkage resampling selection strategies
8
作者 刘佳楠 侯庆志 +1 位作者 魏建国 孙泽玮 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期337-346,共10页
Neural network methods have been widely used in many fields of scientific research with the rapid increase of computing power.The physics-informed neural networks(PINNs)have received much attention as a major breakthr... Neural network methods have been widely used in many fields of scientific research with the rapid increase of computing power.The physics-informed neural networks(PINNs)have received much attention as a major breakthrough in solving partial differential equations using neural networks.In this paper,a resampling technique based on the expansion-shrinkage point(ESP)selection strategy is developed to dynamically modify the distribution of training points in accordance with the performance of the neural networks.In this new approach both training sites with slight changes in residual values and training points with large residuals are taken into account.In order to make the distribution of training points more uniform,the concept of continuity is further introduced and incorporated.This method successfully addresses the issue that the neural network becomes ill or even crashes due to the extensive alteration of training point distribution.The effectiveness of the improved physics-informed neural networks with expansion-shrinkage resampling is demonstrated through a series of numerical experiments. 展开更多
关键词 physical informed neural networks RESAMPLING partial differential equation
下载PDF
Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks
9
作者 Rui Xu Xiaoqiang Di +3 位作者 Hao Luo Hui Qi Xiongwen He Wenping Lei 《Computers, Materials & Continua》 SCIE EI 2023年第5期3903-3922,共20页
In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite netw... In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite networks.Setting up cache space at any node enables users to access data nearby,thus relieving the processing pressure on the servers.However,the existing caching strategies still suffer from the lack of global planning of cache contents and low utilization of cache resources due to the lack of fine-grained division of cache contents.To address the issues mentioned,a cooperative caching strategy(CSTL)for remote sensing satellite networks based on a two-layer caching model is proposed.The two-layer caching model is constructed by setting up separate cache spaces in the satellite network and the ground station.Probabilistic caching of popular contents in the region at the ground station to reduce the access delay of users.A content classification method based on hierarchical division is proposed in the satellite network,and differential probabilistic caching is employed for different levels of content.The cached content is also dynamically adjusted by analyzing the subsequent changes in the popularity of the cached content.In the two-layer caching model,ground stations and satellite networks collaboratively cache to achieve global planning of cache contents,rationalize the utilization of cache resources,and reduce the propagation delay of remote sensing data.Simulation results show that the CSTL strategy not only has a high cache hit ratio compared with other caching strategies but also effectively reduces user request delay and server load,which satisfies the timeliness requirement of remote sensing data transmission. 展开更多
关键词 Information centric networking caching strategy two-layer caching model hierarchical division
下载PDF
Information Freshness-Oriented Trajectory Planning and Resource Allocation for UAV-Assisted Vehicular Networks
10
作者 Hao Gai Haixia Zhang +1 位作者 Shuaishuai Guo Dongfeng Yuan 《China Communications》 SCIE CSCD 2023年第5期244-262,共19页
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ... In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI). 展开更多
关键词 information freshness for vehicular networks multi-UAV trajectory planning resource allocation deep reinforcement learning
下载PDF
Design for the simulation of space based information network 被引量:1
11
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
下载PDF
Interruption Tolerance Routing Strategy for Space Information Network 被引量:1
12
作者 YANG Hai GUO Bingli +5 位作者 PANG Chengguang CUI Xinbin REN Huilin ZHOU Huichao KANG Chengbin HUANG Shanguo 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2022年第2期164-175,共12页
Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will con... Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers. 展开更多
关键词 space information network inter-satellite link route convergence self-update routing scheme
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
13
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
ICN Based Vehicle-to-Cloud Delivery for Multimedia Streaming in Urban Vehicular Networks 被引量:1
14
作者 Wei Quan Fei Song +1 位作者 Chengxiao Yu Mingchuan Zhang 《China Communications》 SCIE CSCD 2016年第9期103-112,共10页
Mobile multimedia streaming is an open topic in vehicular environment. Due to the high intermittent links, it has become a critical challenge to deliver high quality video streaming in vehicular networks. In this pape... Mobile multimedia streaming is an open topic in vehicular environment. Due to the high intermittent links, it has become a critical challenge to deliver high quality video streaming in vehicular networks. In this paper, we reform the Information Centric Networking (ICN) concept for multimedia delivery in urban vehicular networks. By leveraging the 1CN perspective, we highlight that vehicular peers can obtain multimedia chunks via the vehicle-to-cloud (V2C) approach to improve the delivery quality. Based on this, we propose a lightweight multipath selection strategy to guide the network system to adaptively adjust the forwarding means. Extensive simulations show that the proposed solution can optimize the utilization of network paths, lighten network loads as well as avoid wasting resources. 展开更多
关键词 information centric networking vehicle-to-cloud multimedia streaming VANET
下载PDF
Integration and development of energy and information network in the Pan-Arctic region 被引量:2
15
作者 Xiaoxia Wei Jinyu Xiao +2 位作者 Zhe Wang Zhichun Wang Yun Tian 《Global Energy Interconnection》 2019年第6期505-513,共9页
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre... The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme. 展开更多
关键词 Energy Interconnection Data center network traffic Integrated development of energy and information networks Global En ergy In terconnection
下载PDF
Intelligent Resources Management System Design in Information Centric Networking 被引量:2
16
作者 Hengyang Zhang Shixiang Zhu +2 位作者 Renchao Xie Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2017年第8期105-123,共19页
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and... Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity. 展开更多
关键词 information centric networking traffi c estimation cache resources allocation time series analysis intelligent analysis
下载PDF
Relaying Strategy Based on Estimated Information for Multi-Antenna Cooperative Networks 被引量:1
17
作者 Shuangshuang Han Peng Zhang +1 位作者 Feijin Shi Fei-Yue Wang 《China Communications》 SCIE CSCD 2017年第8期157-165,共9页
A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared e... A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity. 展开更多
关键词 MIMO system cooperative network soft information
下载PDF
The Quantitative Law of Network Information Growth 被引量:1
18
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier Internet economy central information base
下载PDF
Information Network Systems and Information Sharing on Administrative Websites 被引量:1
19
作者 HIROTA Denjiro 《Journal of Electronic Science and Technology of China》 2004年第3期64-69,共6页
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen... In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems. 展开更多
关键词 information network information sharing administrative websites information management systems document management systems
下载PDF
Study on control information network and its real-time property
20
作者 吴转峰 刘卫国 +1 位作者 骆光照 吴浦升 《Journal of Pharmaceutical Analysis》 SCIE CAS 2008年第1期24-32,共9页
The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a contro... The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately. 展开更多
关键词 control information network remote control three-closed-loop system virtualized reality
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部