期刊文献+
共找到9,020篇文章
< 1 2 250 >
每页显示 20 50 100
关于以Intelligence Studies取代Information Studies的建议 被引量:14
1
作者 包昌火 《情报理论与实践》 CSSCI 北大核心 2009年第7期10-11,共2页
值此《情报理论与实践》创刊45周年之际,从国际上出现的信息化和情报化两大潮流的历史背景出发,根据我国情报学界和情报学研究存在的诸多弊端,本文提出了将该刊英文译名由Information Studies改为Intelligence Studies的建议,以期推动我... 值此《情报理论与实践》创刊45周年之际,从国际上出现的信息化和情报化两大潮流的历史背景出发,根据我国情报学界和情报学研究存在的诸多弊端,本文提出了将该刊英文译名由Information Studies改为Intelligence Studies的建议,以期推动我国Intelligence Studies研究的发展。 展开更多
关键词 情报 情报学 学科发展 理论研究
下载PDF
A framework of force of information influence and application for C4KISR system
2
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Building a Business and Strategic Intelligence Policy as a Strategy for Promoting Congolese Business Progress and Healthy Economic Development in Eastern DRC
3
作者 Innocent Bora Uzima 《Intelligent Information Management》 2024年第2期77-103,共27页
The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the ea... The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the east of the DRC. The study was based on a mixed perspective consisting of objective analysis of quantitative data and interpretative analysis of qualitative data. The results showed that business and strategic intelligence policies have not been established at either company or state level, as this is an area of activity that is not known to the players in companies and public departments, and there are no units or offices in their organizational structures responsible for managing strategic information for competitiveness on the international market. In addition, there is a real need to establish strategic information management units within companies, upstream, and to set up a national strategic information management department or agency to help local companies compete in the marketplace, downstream. This reflects the importance and timeliness of building business and strategic intelligence policies to ensure economic progress and development in the eastern DRC. Business and strategic intelligence provides companies with an appropriate tool for researching, collecting, processing and disseminating information useful for decision-making among stakeholders, in order to cope with a crisis or competitive situation. The study suggests a number of key recommendations based on its findings. To the government, it is recommended to establish the national policy of business and strategic intelligence by setting up a national agency of strategic intelligence in favor of local companies;and to companies to establish business intelligence units in their organizational structures in favor of stakeholders to foster advantageous decision-making in the competitive market and achieve progress. Finally, the study suggests that studies be carried out to fully understand the opportunities and impact of business and strategic intelligence in African countries, particularly in the DRC. 展开更多
关键词 Business and Strategic intelligence Strategic information Congolese Companies Public Departments Decision-Making information Management Business and Strategic intelligence Policies PROGRESS Healthy Development Mining and Agriculture Sectors International Market Eastern DRC
下载PDF
两种情报观:Information还是Intelligence?——在情报学和情报工作中引入“Intelligence”的思考 被引量:24
4
作者 沈固朝 《术语标准化与信息技术》 2009年第1期22-30,共9页
情报(Intelligence)是分析特定事务的、具有特殊价值的信息加工产品和知识。在信息时代,如果我们在决策中不善于利用这一有力武器,我们将沉没在信息的汪洋大海之中。本文介绍了美国的情报系统,与国内"情报"(information)这一... 情报(Intelligence)是分析特定事务的、具有特殊价值的信息加工产品和知识。在信息时代,如果我们在决策中不善于利用这一有力武器,我们将沉没在信息的汪洋大海之中。本文介绍了美国的情报系统,与国内"情报"(information)这一术语的用法做了比较,并讨论了在我国情报工作和研究中引入Intelligence的意义。 展开更多
关键词 术语 情报 信息 情报学
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
5
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat intelligence Machine Learning Artificial intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Intelligent 6G Wireless Network with Multi-Dimensional Information Perception 被引量:1
6
作者 YANG Bei LIANG Xin +3 位作者 LIU Shengnan JIANG Zheng ZHU Jianchi SHE Xiaoming 《ZTE Communications》 2023年第2期3-10,共8页
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in... Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research. 展开更多
关键词 6G wireless network artificial intelligence multi-dimensional information perception full spectrum fusion
下载PDF
Application of Electronic Information Engineering in Hospital Management
7
作者 Jun Xiao Zhilan Yang 《Journal of Electronic Research and Application》 2024年第4期1-6,共6页
To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the ... To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the importance of electronic information engineering technology applied in hospital management,and discusses the specific application methods of electronic information engineering in hospital management.This aims the existing problems in the current hospital management,such as insufficient degree of informatization,data sharing difficulties,lack of professionals,etc.Corresponding improvement measures are proposed,including strengthening the construction of informatization,promoting data sharing,and cultivating professionals.It is hoped that this study will enable the majority of hospital managers to make better use of electronic information engineering technology to effectively solve the current problems faced by hospitals and to continuously improve the comprehensive competitiveness of China’s hospitals. 展开更多
关键词 Electronic information engineering Hospital management intelligence
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
8
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
Design of an Information Security Service for Medical Artificial Intelligence 被引量:1
9
作者 Yanghoon Kim Jawon Kim Hangbae Chang 《Computers, Materials & Continua》 SCIE EI 2022年第1期679-694,共16页
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 展开更多
关键词 Medical artificial intelligence medical information SECURITY convergence environment
下载PDF
Strategic information perception methods and practices in the open source intelligence 被引量:1
10
作者 曾文 Li Hui 《High Technology Letters》 EI CAS 2018年第3期330-336,共7页
Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this pape... Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this paper mainly expounds the perception method for strategic information perception in the open source intelligence environment as well as the framework and basic process of information perception. This paper argues that in order to match the information perception result with the information depiction result,it conducts practical exploration for the results of information acquisition,perception,depiction and analysis. This paper introduces and develops a monitoring platform for information perception. The results show that the method proposed in this paper is feasible. 展开更多
关键词 open source intelligence (OSINT) open source information (OSIF) information perception methods and practices information science and technology
下载PDF
Self-surveillance in French Colonial West Africa: French Intelligence Services and the Hamallist Information Network (1910-1943)
11
作者 CISSE Chikouna 《History Research》 2016年第1期1-9,共9页
In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networ... In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networks to beat the French imperial machinery in the Nioro of the Sahara located in the French Sudan (known as Mali nowadays), leads to reconsidering the power relationship organizing the authority and the challenge to establish the authority relation during colonial period. That calls into question the idea of a sole and unique domination by French imperialism during colonization and at the same time, it indicates that indigenous people were very active in the historical processes, which determined their existence. 展开更多
关键词 French colonial Africa intelligence services Hamallist network information
下载PDF
China, France and the Netherlands to Deepen Cooperation on Information Technology and Artificial Intelligence
12
《Bulletin of the Chinese Academy of Sciences》 2017年第3期131-131,共1页
On July 11,2017,an agreement was signed in Beijing to renew and strengthen the collaboration between the CAS Institute of Automation(CASIA,China),Institut National de Recherche en Informatique et en Automatique(Inria,... On July 11,2017,an agreement was signed in Beijing to renew and strengthen the collaboration between the CAS Institute of Automation(CASIA,China),Institut National de Recherche en Informatique et en Automatique(Inria,France),and Centrum Wiskunde&Informatica(CWI,the Netherlands),which are the founding members of the Sino-European Laboratory in Computer Science, 展开更多
关键词 CAS China France and the Netherlands to Deepen Cooperation on information Technology and Artificial intelligence
下载PDF
基于Informer算法的网联车辆运动轨迹预测模型 被引量:3
13
作者 赵懂宇 王志建 宋程龙 《计算机应用研究》 CSCD 北大核心 2024年第4期1029-1033,共5页
自动驾驶汽车可以根据轨迹预测算法计算周边车辆的运动轨迹,并作出反应以降低行车风险,而传统的轨迹预测模型在长时间序列预测的情况下会产生较大的误差。为解决这一问题,提出了一种以Informer算法为基础的轨迹预测模型,并根据公开数据... 自动驾驶汽车可以根据轨迹预测算法计算周边车辆的运动轨迹,并作出反应以降低行车风险,而传统的轨迹预测模型在长时间序列预测的情况下会产生较大的误差。为解决这一问题,提出了一种以Informer算法为基础的轨迹预测模型,并根据公开数据集NGSIM进行实验分析。首先通过对称指数移动平均法(sEMA)对原始数据进行滤波处理,并在原有的Informer编码器中加入了联合归一化层对不同车辆进行特征提取处理,减少了不同车辆之间的运动误差,通过考虑车辆的本身速度信息与周围环境的车辆运动信息,提高了预测精度,最后经过解码器得到未来时刻的车辆轨迹分布。结果表明,模型对车辆的轨迹预测误差在0.5 m以内;通过对轨迹预测的MAE与MSE结果分析可知,预测时间超过0.3 s以后,Informer模型的轨迹预测效果明显优于其他算法,验证了模型和算法的有效性。 展开更多
关键词 智能交通控制 自动驾驶车辆 轨迹数据预测 informer模型 注意力模型 特征提取
下载PDF
Exploiting Human Pose and Scene Information for Interaction Detection
14
作者 Manahil Waheed Samia Allaoua Chelloug +4 位作者 Mohammad Shorfuzzaman Abdulmajeed Alsufyani Ahmad Jalal Khaled Alnowaiser Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第3期5853-5870,共18页
Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has at... Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has attractedmany researchers to this field. Inspired by the existing recognition systems,this paper proposes a new and efficient human-object interaction recognition(HOIR) model which is based on modeling human pose and scene featureinformation. There are different aspects involved in an interaction, includingthe humans, the objects, the various body parts of the human, and the backgroundscene. Themain objectives of this research include critically examiningthe importance of all these elements in determining the interaction, estimatinghuman pose through image foresting transform (IFT), and detecting the performedinteractions based on an optimizedmulti-feature vector. The proposedmethodology has six main phases. The first phase involves preprocessing theimages. During preprocessing stages, the videos are converted into imageframes. Then their contrast is adjusted, and noise is removed. In the secondphase, the human-object pair is detected and extracted from each image frame.The third phase involves the identification of key body parts of the detectedhumans using IFT. The fourth phase relates to three different kinds of featureextraction techniques. Then these features are combined and optimized duringthe fifth phase. The optimized vector is used to classify the interactions in thelast phase. TheMSRDaily Activity 3D dataset has been used to test this modeland to prove its efficiency. The proposed system obtains an average accuracyof 91.7% on this dataset. 展开更多
关键词 Artificial intelligence daily activities human interactions human pose information image foresting transform scene feature information
下载PDF
Intelligent Agent-Based System for Digital Library Information Retrieval 被引量:1
15
作者 师雪霖 牛振东 +1 位作者 宋瀚涛 宋丽哲 《Journal of Beijing Institute of Technology》 EI CAS 2003年第4期450-454,共5页
A new information search model is reported and the design and implementation of a system based on intelligent agent is presented. The system is an assistant information retrieval system which helps users to search wha... A new information search model is reported and the design and implementation of a system based on intelligent agent is presented. The system is an assistant information retrieval system which helps users to search what they need. The system consists of four main components: interface agent, information retrieval agent, broker agent and learning agent. They collaborate to implement system functions. The agents apply learning mechanisms based on an improved ID3 algorithm. 展开更多
关键词 intelligent agent information retrieval agent cooperation machine learning
下载PDF
Intelligent Information Processing in Imaging Fuzes 被引量:1
16
作者 王克勇 郑链 宋承天 《Journal of Beijing Institute of Technology》 EI CAS 2003年第1期64-67,共4页
In order to study the problem of intelligent information processing in new types of imaging fuze, the method of extracting the invariance features of target images is adopted, and radial basis function neural network ... In order to study the problem of intelligent information processing in new types of imaging fuze, the method of extracting the invariance features of target images is adopted, and radial basis function neural network is used to recognize targets. Owing to its ability of parallel processing, its robustness and generalization, the method can realize the recognition of the conditions of missile-target encounters, and meet the requirements of real-time recognition in the imaging fuze. It is shown that based on artificial neural network target recognition and burst point control are feasible. 展开更多
关键词 imaging fuze target recognition neural network radial basis function intelligent information processing
下载PDF
Investigation of MAS structure and intelligent^(+) information processing mechanism of hypersonic target detection and recognition system 被引量:2
17
作者 WU Xia LI Yan +4 位作者 SUN Yongjian CHEN Alei CHEN Jianwen MA Jianchao CHEN Hao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第6期1105-1115,共11页
The hypersonic target detection and recognition system is studied,on the basis of overall planning and design,a multi-agent system(MAS)structure and intelligent+information processing mechanism based on target detecti... The hypersonic target detection and recognition system is studied,on the basis of overall planning and design,a multi-agent system(MAS)structure and intelligent+information processing mechanism based on target detection and recognition are proposed,and the multi-agent operation process is analyzed and designed in detail.In the specific agents construction,the information fusion technology is introduced to defining the embedded agents and their interrelations in the system structure,and the intelligent processing ability of complex and uncertain problems is emphatically analyzed from the aspects of autonomy and collaboration.The aim is to optimize the information processing strategy of the hypersonic target detection and recognition system and improve the robustness and rapidity of the system. 展开更多
关键词 hypersonic target detection recognition intelligent information fusion multi-agent system(MAS)
下载PDF
Clicking through the Clickstream: A Novel Statistical Modeling Approach to Improve Information Usage of Clickstream Data by E-Commerce Entities
18
作者 Corban Allenbrand 《Intelligent Information Management》 2023年第3期180-215,共36页
Success or failure of an E-commerce platform is often reduced to its ability to maximize the conversion rate of its visitors. This is commonly regarded as the capacity to induce a purchase from a visitor. Visitors pos... Success or failure of an E-commerce platform is often reduced to its ability to maximize the conversion rate of its visitors. This is commonly regarded as the capacity to induce a purchase from a visitor. Visitors possess individual characteristics, histories, and objectives which complicate the choice of what platform features that maximize the conversion rate. Modern web technology has made clickstream data accessible allowing a complete record of a visitor’s actions on a website to be analyzed. What remains poorly constrained is what parts of the clickstream data are meaningful information and what parts are accidental for the problem of platform design. In this research, clickstream data from an online retailer was examined to demonstrate how statistical modeling can improve clickstream information usage. A conceptual model was developed that conjectured relationships between visitor and platform variables, visitors’ platform exit rate, boune rate, and decision to purchase. Several hypotheses on the nature of the clickstream relationships were posited and tested with the models. A discrete choice logit model showed that the content of a website, the history of website use, and the exit rate of pages visited had marginal effects on derived utility for the visitor. Exit rate and bounce rate were modeled as beta distributed random variables. It was found that exit rate and its variability for pages visited were associated with site content, site quality, prior visitor history on the site, and technological preferences of the visitor. Bounce rate was also found to be influenced by the same factors but was in a direction opposite to the registered hypotheses. Most findings supported that clickstream data is amenable to statistical modeling with interpretable and comprehensible models. 展开更多
关键词 Business intelligence intelligent information Management Web Analytics Web Technology Management Exit Rate Bounce Rate Online Consumer Model Discrete Choice Model
下载PDF
Intelligent Multi-Agent Based Information Management Methods to Direct Complex Industrial Systems 被引量:1
19
作者 Danilo Avola Luigi Cinque Giuseppe Placidi 《Intelligent Information Management》 2012年第6期338-347,共10页
In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related coo... In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted. 展开更多
关键词 INDUSTRIAL SYSTEMS information Management intelligENT AGENTS MULTI-AGENT SYSTEMS
下载PDF
Intelligent Resources Management System Design in Information Centric Networking 被引量:2
20
作者 Hengyang Zhang Shixiang Zhu +2 位作者 Renchao Xie Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2017年第8期105-123,共19页
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and... Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity. 展开更多
关键词 information centric networking traffi c estimation cache resources allocation time series analysis intelligent analysis
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部