期刊文献+
共找到38,395篇文章
< 1 2 250 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems
2
作者 Sang-min Lee Namgi Kim 《Computers, Materials & Continua》 SCIE EI 2024年第2期1897-1914,共18页
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ... Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets. 展开更多
关键词 Deep learning graph neural network graph convolution network graph convolution network model learning method recommender information systems
下载PDF
Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP
3
作者 Menghan Zhang Fangfang Shan +1 位作者 Mengyao Liu Zhenyu Wang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1565-1580,共16页
With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment... With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy.Due to the complexity and subtlety of sensitive information,traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data,thus weakening the deep connections between text and images.In this context,this paper adopts the CLIP model as a modality discriminator.By using comparative learning between sensitive image descriptions and images,the similarity between the images and the sensitive descriptions is obtained to determine whether the images contain sensitive information.This provides the basis for identifying sensitive information using different modalities.Specifically,if the original data does not contain sensitive information,only single-modality text-sensitive information identification is performed;if the original data contains sensitive information,multimodality sensitive information identification is conducted.This approach allows for differentiated processing of each piece of data,thereby achieving more accurate sensitive information identification.The aforementioned modality discriminator can address the limitations of existing sensitive information identification technologies,making the identification of sensitive information from the original data more appropriate and precise. 展开更多
关键词 Deep learning social networks sensitive information recognition multi-modal fusion
下载PDF
Studying the co-evolution of information diffusion,vaccination behavior and disease transmission in multilayer networks with local and global effects
4
作者 霍良安 武兵杰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期677-689,共13页
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf... Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time. 展开更多
关键词 information diffusion vaccination behavior disease transmission multilayer networks local and global effect
下载PDF
Automatic Extraction of Medical Latent Variables from ECG Signals Utilizing a Mutual Information-Based Technique and Capsular Neural Networks for Arrhythmia Detection
5
作者 Abbas Ali Hassan Fardin Abdali-Mohammadi 《Computers, Materials & Continua》 SCIE EI 2024年第10期971-983,共13页
From a medical perspective,the 12 leads of the heart in an electrocardiogram(ECG)signal have functional dependencies with each other.Therefore,all these leads report different aspects of an arrhythmia.Their difference... From a medical perspective,the 12 leads of the heart in an electrocardiogram(ECG)signal have functional dependencies with each other.Therefore,all these leads report different aspects of an arrhythmia.Their differences lie in the level of highlighting and displaying information about that arrhythmia.For example,although all leads show traces of atrial excitation,this function is more evident in lead II than in any other lead.In this article,a new model was proposed using ECG functional and structural dependencies between heart leads.In the prescreening stage,the ECG signals are segmented from the QRS point so that further analyzes can be performed on these segments in a more detailed manner.The mutual information indices were used to assess the relationship between leads.In order to calculate mutual information,the correlation between the 12 ECG leads has been calculated.The output of this step is a matrix containing all mutual information.Furthermore,to calculate the structural information of ECG signals,a capsule neural network was implemented to aid physicians in the automatic classification of cardiac arrhythmias.The architecture of this capsule neural network has been modified to perform the classification task.In the experimental results section,the proposed model was used to classify arrhythmias in ECG signals from the Chapman dataset.Numerical evaluations showed that this model has a precision of 97.02%,recall of 96.13%,F1-score of 96.57%and accuracy of 97.38%,indicating acceptable performance compared to other state-of-the-art methods.The proposed method shows an average accuracy of 2%superiority over similar works. 展开更多
关键词 Heart diseases electrocardiogram signal signal correlation mutual information capsule neural networks
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
6
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 information Retrieval database Search User Behavior Patterns
下载PDF
Wireless Information and Power Transfer in Underwater Acoustic Sensor Networks
7
作者 Feng Yizhi Ji Fei 《China Communications》 SCIE CSCD 2024年第10期256-266,共11页
Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the te... Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the terminals. The application of WIPT to the underwater acoustic sensor networks(UWASNs) not only retains the long range communication capabilities, but also provides an auxiliary and convenient energy supplement way for the terminal sensors, and thus is a promising scheme to solve the energy-limited problem for the UWASNs. In this paper, we propose the integration of WIPT into the UWASNs and provide an overview on various enabling techniques for the WIPT based UWASNs(WIPT-UWASNs) as well as pointing out future research challenges and opportunities for WIPT-UWASNs. 展开更多
关键词 underwater acoustic modem underwater acoustic sensor network(UWASN) wireless information and power transfer(WIPT)
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
8
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
Research on Heterogeneous Information Network Link Prediction Based on Representation Learning
9
作者 Yan Zhao Weifeng Rao +1 位作者 Zihui Hu Qi Zheng 《Journal of Electronic Research and Application》 2024年第5期32-37,共6页
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth... A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification. 展开更多
关键词 Heterogeneous information network Link prediction Presentation learning Deep learning Node embedding
下载PDF
Intelligent 6G Wireless Network with Multi-Dimensional Information Perception 被引量:1
10
作者 YANG Bei LIANG Xin +3 位作者 LIU Shengnan JIANG Zheng ZHU Jianchi SHE Xiaoming 《ZTE Communications》 2023年第2期3-10,共8页
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in... Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research. 展开更多
关键词 6G wireless network artificial intelligence multi-dimensional information perception full spectrum fusion
下载PDF
Multi-Generator Discriminator Network Using Texture-Edge Information
11
作者 Kyeongseok Jang Seongsoo Cho Kwang Chul Son 《Computers, Materials & Continua》 SCIE EI 2023年第5期3537-3551,共15页
In the proposed paper,a parallel structure type Generative Adversarial Network(GAN)using edge and texture information is proposed.In the existing GAN-based model,many learning iterations had to be given to obtaining a... In the proposed paper,a parallel structure type Generative Adversarial Network(GAN)using edge and texture information is proposed.In the existing GAN-based model,many learning iterations had to be given to obtaining an output that was somewhat close to the original data,and noise and distortion occurred in the output image even when learning was performed.To solve this problem,the proposed model consists of two generators and three discriminators to propose a network in the form of a parallel structure.In the network,each edge information and texture information were received as inputs,learning was performed,and each character was combined and outputted through the Combine Discriminator.Through this,edge information and distortion of the output image were improved even with fewer iterations than DCGAN,which is the existing GAN-based model.As a result of learning on the network of the proposed model,a clear image with improved contour and distortion of objects in the image was output from about 50,000 iterations. 展开更多
关键词 Deep learning convolution neural network generative adversarial network edge information texture information
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
12
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
Multiplex network infomax:Multiplex network embedding via information fusion
13
作者 Qiang Wang Hao Jiang +3 位作者 Ying Jiang Shuwen Yi Qi Nie Geng Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1157-1168,共12页
For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most ... For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most existing studies on this subject mainly concentrate on monoplex networks considering a single type of relation among nodes.However,numerous real-world networks are naturally composed of multiple layers with different relation types;such a network is called a multiplex network.The majority of existing multiplex network embedding methods either overlook node attributes,resort to node labels for training,or underutilize underlying information shared across multiple layers.In this paper,we propose Multiplex Network Infomax(MNI),an unsupervised embedding framework to represent information of multiple layers into a unified embedding space.To be more specific,we aim to maximize the mutual information between the unified embedding and node embeddings of each layer.On the basis of this framework,we present an unsupervised network embedding method for attributed multiplex networks.Experimental results show that our method achieves competitive performance on not only node-related tasks,such as node classification,clustering,and similarity search,but also a typical edge-related task,i.e.,link prediction,at times even outperforming relevant supervised methods,despite that MNI is fully unsupervised. 展开更多
关键词 network embedding Multiplex network Mutual information maximization
下载PDF
Intervention against information diffusion in static and temporal coupling networks
14
作者 柴允 王友国 +1 位作者 颜俊 孙先莉 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期116-127,共12页
Information diffusion in complex networks has become quite an active research topic.As an important part of this field,intervention against information diffusion processes is attracting ever-increasing attention from ... Information diffusion in complex networks has become quite an active research topic.As an important part of this field,intervention against information diffusion processes is attracting ever-increasing attention from network and control engineers.In particular,it is urgent to design intervention schemes for the coevolutionary dynamics between information diffusion processes and coupled networks.For this purpose,we comprehensively study the problem of information diffusion intervention over static and temporal coupling networks.First,individual interactions are described by a modified activitydriven network(ADN)model.Then,we establish a novel node-based susceptible-infected-recovered-susceptible(SIRS)model to characterize the information diffusion dynamics.On these bases,three synergetic intervention strategies are formulated.Second,we derive the critical threshold of the controlled-SIRS system via stability analysis.Accordingly,we exploit a spectral optimization scheme to minimize the outbreak risk or the required budget.Third,we develop an optimal control scheme of dynamically allocating resources to minimize both system loss and intervention expense,in which the optimal intervention inputs are obtained through optimal control theory and a forward-backward sweep algorithm.Finally,extensive simulation results validate the accuracy of theoretical derivation and the performance of our proposed intervention schemes. 展开更多
关键词 information diffusion coupling networks spectral optimization optimal control
下载PDF
Power Information System Database Cache Model Based on Deep Machine Learning
15
作者 Manjiang Xing 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1081-1090,共10页
At present,the database cache model of power information system has problems such as slow running speed and low database hit rate.To this end,this paper proposes a database cache model for power information systems ba... At present,the database cache model of power information system has problems such as slow running speed and low database hit rate.To this end,this paper proposes a database cache model for power information systems based on deep machine learning.The caching model includes program caching,Structured Query Language(SQL)preprocessing,and core caching modules.Among them,the method to improve the efficiency of the statement is to adjust operations such as multi-table joins and replacement keywords in the SQL optimizer.Build predictive models using boosted regression trees in the core caching module.Generate a series of regression tree models using machine learning algorithms.Analyze the resource occupancy rate in the power information system to dynamically adjust the voting selection of the regression tree.At the same time,the voting threshold of the prediction model is dynamically adjusted.By analogy,the cache model is re-initialized.The experimental results show that the model has a good cache hit rate and cache efficiency,and can improve the data cache performance of the power information system.It has a high hit rate and short delay time,and always maintains a good hit rate even under different computer memory;at the same time,it only occupies less space and less CPU during actual operation,which is beneficial to power The information system operates efficiently and quickly. 展开更多
关键词 Deep machine learning power information system database cache model
下载PDF
Information Freshness-Oriented Trajectory Planning and Resource Allocation for UAV-Assisted Vehicular Networks
16
作者 Hao Gai Haixia Zhang +1 位作者 Shuaishuai Guo Dongfeng Yuan 《China Communications》 SCIE CSCD 2023年第5期244-262,共19页
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ... In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI). 展开更多
关键词 information freshness for vehicular networks multi-UAV trajectory planning resource allocation deep reinforcement learning
下载PDF
CoLM^(2)S:Contrastive self‐supervised learning on attributed multiplex graph network with multi‐scale information
17
作者 Beibei Han Yingmei Wei +1 位作者 Qingyong Wang Shanshan Wan 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1464-1479,共16页
Contrastive self‐supervised representation learning on attributed graph networks with Graph Neural Networks has attracted considerable research interest recently.However,there are still two challenges.First,most of t... Contrastive self‐supervised representation learning on attributed graph networks with Graph Neural Networks has attracted considerable research interest recently.However,there are still two challenges.First,most of the real‐word system are multiple relations,where entities are linked by different types of relations,and each relation is a view of the graph network.Second,the rich multi‐scale information(structure‐level and feature‐level)of the graph network can be seen as self‐supervised signals,which are not fully exploited.A novel contrastive self‐supervised representation learning framework on attributed multiplex graph networks with multi‐scale(named CoLM^(2)S)information is presented in this study.It mainly contains two components:intra‐relation contrast learning and interrelation contrastive learning.Specifically,the contrastive self‐supervised representation learning framework on attributed single‐layer graph networks with multi‐scale information(CoLMS)framework with the graph convolutional network as encoder to capture the intra‐relation information with multi‐scale structure‐level and feature‐level selfsupervised signals is introduced first.The structure‐level information includes the edge structure and sub‐graph structure,and the feature‐level information represents the output of different graph convolutional layer.Second,according to the consensus assumption among inter‐relations,the CoLM^(2)S framework is proposed to jointly learn various graph relations in attributed multiplex graph network to achieve global consensus node embedding.The proposed method can fully distil the graph information.Extensive experiments on unsupervised node clustering and graph visualisation tasks demonstrate the effectiveness of our methods,and it outperforms existing competitive baselines. 展开更多
关键词 attributed multiplex graph network contrastive self‐supervised learning graph representation learning multiscale information
下载PDF
Application of graph neural network and feature information enhancement in relation inference of sparse knowledge graph
18
作者 Hai-Tao Jia Bo-Yang Zhang +4 位作者 Chao Huang Wen-Han Li Wen-Bo Xu Yu-Feng Bi Li Ren 《Journal of Electronic Science and Technology》 EI CAS CSCD 2023年第2期44-54,共11页
At present,knowledge embedding methods are widely used in the field of knowledge graph(KG)reasoning,and have been successfully applied to those with large entities and relationships.However,in research and production ... At present,knowledge embedding methods are widely used in the field of knowledge graph(KG)reasoning,and have been successfully applied to those with large entities and relationships.However,in research and production environments,there are a large number of KGs with a small number of entities and relations,which are called sparse KGs.Limited by the performance of knowledge extraction methods or some other reasons(some common-sense information does not appear in the natural corpus),the relation between entities is often incomplete.To solve this problem,a method of the graph neural network and information enhancement is proposed.The improved method increases the mean reciprocal rank(MRR)and Hit@3 by 1.6%and 1.7%,respectively,when the sparsity of the FB15K-237 dataset is 10%.When the sparsity is 50%,the evaluation indexes MRR and Hit@10 are increased by 0.8%and 1.8%,respectively. 展开更多
关键词 Feature information enhancement Graph neural network Natural language processing Sparse knowledge graph(KG)inference
下载PDF
LC-NPLA: Label and Community Information-Based Network Presentation Learning Algorithm
19
作者 Shihu Liu Chunsheng Yang Yingjie Liu 《Intelligent Automation & Soft Computing》 2023年第12期203-223,共21页
Many network presentation learning algorithms(NPLA)have originated from the process of the random walk between nodes in recent years.Despite these algorithms can obtain great embedding results,there may be also some l... Many network presentation learning algorithms(NPLA)have originated from the process of the random walk between nodes in recent years.Despite these algorithms can obtain great embedding results,there may be also some limitations.For instance,only the structural information of nodes is considered when these kinds of algorithms are constructed.Aiming at this issue,a label and community information-based network presentation learning algorithm(LC-NPLA)is proposed in this paper.First of all,by using the community information and the label information of nodes,the first-order neighbors of nodes are reconstructed.In the next,the random walk strategy is improved by integrating the degree information and label information of nodes.Then,the node sequence obtained from random walk sampling is transformed into the node representation vector by the Skip-Gram model.At last,the experimental results on ten real-world networks demonstrate that the proposed algorithm has great advantages in the label classification,network reconstruction and link prediction tasks,compared with three benchmark algorithms. 展开更多
关键词 Label information community information network representation learning algorithm random walk
下载PDF
The Immense Impact of Reverse Edges on Large Hierarchical Networks
20
作者 Haosen Cao Bin-Bin Hu +7 位作者 Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang 《Engineering》 SCIE EI CAS CSCD 2024年第5期240-249,共10页
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc... Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes. 展开更多
关键词 SYNCHRONIZABILITY Large hierarchical networks Reverse edges information flows Complex networks
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部