A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth...A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification.展开更多
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem...Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.展开更多
Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will con...Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre...The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a contro...The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately.展开更多
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ...Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.展开更多
A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted faul...A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted fault propagation graph.Different from other RCA methods,it mines effective features information related to root causes from offline alarms.Combined with the information,online alarms and graph relationship of network structure are used to construct a weighted graph.Thus,this approach does not require operational experience and can be widely applied in different distributed networks.The proposed method can be used in multiple fault location cases.The experiment results show the proposed approach achieves much better performance with 6%higher precision at least for root fault location,compared with three baseline methods.Besides,we explain how the optimal parameter’s value in the random walk algorithm influences RCA results.展开更多
World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information netw...World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information network system,called CSDInet,was developed in National Center for Seismic Data and Information(NCSDI)and has become the basic technical supporting system for WDC-D for Seismology.CSDInet consists of four basic parts:computer network center,LAN(Local Area Network),link to Internet,and nationwide PSTN(with dialing-up telephone line)user network.In this paper a "multi-layer multi-mode" management of data flow for this system will be explained and the data and information services will be described.展开更多
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20...On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...展开更多
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a...The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.展开更多
In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networ...In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networks to beat the French imperial machinery in the Nioro of the Sahara located in the French Sudan (known as Mali nowadays), leads to reconsidering the power relationship organizing the authority and the challenge to establish the authority relation during colonial period. That calls into question the idea of a sole and unique domination by French imperialism during colonization and at the same time, it indicates that indigenous people were very active in the historical processes, which determined their existence.展开更多
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph data.Although existing HIN-based...Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph data.Although existing HIN-based recommendation studies have achieved great success by performing message propagation between connected nodes on the defined metapaths,they have the following major limitations.Existing works mainly convert heterogeneous graphs into homogeneous graphs via defining metapaths,which are not expressive enough to capture more complicated dependency relationships involved on the metapath.Besides,the heterogeneous information is more likely to be provided by item attributes while social relations between users are not adequately considered.To tackle these limitations,we propose a novel social recommendation model MPISR,which models MetaPath Interaction for Social Recommendation on heterogeneous information network.Specifically,our model first learns the initial node representation through a pretraining module,and then identifies potential social friends and item relations based on their similarity to construct a unified HIN.We then develop the two-way encoder module with similarity encoder and instance encoder to capture the similarity collaborative signals and relational dependency on different metapaths.Extensive experiments on five real datasets demonstrate the effectiveness of our method.展开更多
Information networks are becoming increasingly important in practice. However, their escalating complexity is gradually impeding the efficiency of data mining. A novel network schema called the Behavior Schema of Info...Information networks are becoming increasingly important in practice. However, their escalating complexity is gradually impeding the efficiency of data mining. A novel network schema called the Behavior Schema of Information Networks (BSIN) is proposed to address this issue. This work defines the behavior of nodes as connected paths in BSIN, proposes a novel function distinguish behavior differences, and introduces approximate bisimulation into the acquisition of quotient sets for node types. The major highlight of BSIN is its ability to directly obtain a high-efficiency network on the basis of approximate bisimulation, rather than reducing the existing information network. It provides an effective representation of information networks, and the resulting novel network has a simple structure that more efficiently expresses semantic information than current network representations. The theoretical analysis of the connected paths between the original and the obtained networks demonstrates that errors are controllable;and semantic information is approximately retained. Case studies show that BSIN yields a simple network and is highly cost-effective.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
A multi-path routing algorithm based on network coding is proposed for combating long propagation delay and high bit error rate of space information networks. On the basis of traditional multi-path routing, the algori...A multi-path routing algorithm based on network coding is proposed for combating long propagation delay and high bit error rate of space information networks. On the basis of traditional multi-path routing, the algorithm uses a random linear network coding strategy to code data pack- ets. Code number is determined by the next hop link status and the number of current received packets sent by the upstream node together. The algorithm improves retransmission and cache mechanisms through using redundancy caused by network coding. Meanwhile, the algorithm also adopts the flow distribution strategy based on time delay to balance network load. Simulation results show that the proposed routing algorithm can effectively improve packet delivery rate, reduce packet delay, and enhance network performance.展开更多
Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link predic...Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link prediction. Most existing network studies are on homogeneous networks, where nodes and links are assumed from one single type. In reality, however, heterogeneous information networks can better model the real-world systems, which are typically semi-structured and typed, following a network schema. In order to mine these heterogeneous information networks directly, we propose to explore the meta structure of the information network, i.e., the network schema. The concepts of meta-paths are proposed to systematically capture numerous semantic relationships across multiple types of objects, which are defined as a path over the graph of network schema. Meta-paths can provide guidance for search and mining of the network and help analyze and understand the semantic meaning of the objects and relations in the network. Under this framework, similarity search and other mining tasks such as relationship prediction and clustering can be addressed by systematic exploration of the network meta structure. Moreover, with user's guidance or feedback, we can select the best meta-path or their weighted combination for a specific mining task.展开更多
With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However...With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However,due to the openness of the air-to-ground channel,the device will face a series of security threats when accessing SIN,such as replay attacks,eavesdropping attacks,impersonation attacks,and man-in-the-middle attacks.These security threats will lead to illegal entity access and further endanger the reliability and availability of the system.Although scholars have proposed many enhanced security access authentication protocols,most of them have been proved to have security vulnerabilities.In addition,with the development of quantum computing,the previous authentication protocols based on some asymmetric cryptographic mechanisms such as discrete logarithm and elliptic curve cryptographic mechanisms may face new security challenges.In this context,this paper proposes a novel antiquantum access authentication protocol based on ring learning with errors(RLWE),which meets more security requirements and greatly reduces the authentication delay through prenegotiation.Through the security analysis and performance analysis,it is shown that our protocol can be more suitable for delaysensitive IoT devices to access SIN while ensuring higher security.展开更多
基金Science and Technology Research Project of Jiangxi Provincial Department of Education(Project No.GJJ211348,GJJ211347 and GJJ2201056)。
文摘A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification.
基金This project was supported by the National "863" High-Tech Research and Development Program of China(2002AA7170)
文摘Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.
基金the National Natural Science Foundations of China(Nos.61771074,62171059)。
文摘Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
基金supported by the Corporation Science and Technology Program of Global Energy Interconnection Group Ltd. (GEIGC-D-[2018]024)by the National Natural Science Foundation of China (61472042, 61772079)
文摘The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
文摘The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately.
基金supported by the China Postdoctoral Science Foundation (Grant No.2020M673687)。
文摘Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.
基金supported by ZTE Industry-University-Institute Cooperation Funds under Grant No.HC-CN-20201120009。
文摘A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted fault propagation graph.Different from other RCA methods,it mines effective features information related to root causes from offline alarms.Combined with the information,online alarms and graph relationship of network structure are used to construct a weighted graph.Thus,this approach does not require operational experience and can be widely applied in different distributed networks.The proposed method can be used in multiple fault location cases.The experiment results show the proposed approach achieves much better performance with 6%higher precision at least for root fault location,compared with three baseline methods.Besides,we explain how the optimal parameter’s value in the random walk algorithm influences RCA results.
文摘World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information network system,called CSDInet,was developed in National Center for Seismic Data and Information(NCSDI)and has become the basic technical supporting system for WDC-D for Seismology.CSDInet consists of four basic parts:computer network center,LAN(Local Area Network),link to Internet,and nationwide PSTN(with dialing-up telephone line)user network.In this paper a "multi-layer multi-mode" management of data flow for this system will be explained and the data and information services will be described.
文摘On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
文摘The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.
文摘In this article, with the use of the Agency mode, I try to shed light on the resilient capacity of African societies to the foreign inroad in the 20th century. In 1910-1940, the success of Hamallist Information Networks to beat the French imperial machinery in the Nioro of the Sahara located in the French Sudan (known as Mali nowadays), leads to reconsidering the power relationship organizing the authority and the challenge to establish the authority relation during colonial period. That calls into question the idea of a sole and unique domination by French imperialism during colonization and at the same time, it indicates that indigenous people were very active in the historical processes, which determined their existence.
基金supported by the National Natural Science Foundation of China(Grant Nos.61762078,62276073,61966009 and U22A2099)the Industrial Support Project of Gansu Colleges(No.2022CYZC11)+3 种基金the Natural Science Foundation of Gansu Province(21JR7RA114)the Northwest Normal University Young Teachers Research Capacity Promotion Plan(NWNU-LKQN2019-2)the Industrial Support Project of Gansu Colleges(No.2022CYZC11)the Northwest Normal University Post-graduate Research Funding Project(2021KYZZ02107).
文摘Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph data.Although existing HIN-based recommendation studies have achieved great success by performing message propagation between connected nodes on the defined metapaths,they have the following major limitations.Existing works mainly convert heterogeneous graphs into homogeneous graphs via defining metapaths,which are not expressive enough to capture more complicated dependency relationships involved on the metapath.Besides,the heterogeneous information is more likely to be provided by item attributes while social relations between users are not adequately considered.To tackle these limitations,we propose a novel social recommendation model MPISR,which models MetaPath Interaction for Social Recommendation on heterogeneous information network.Specifically,our model first learns the initial node representation through a pretraining module,and then identifies potential social friends and item relations based on their similarity to construct a unified HIN.We then develop the two-way encoder module with similarity encoder and instance encoder to capture the similarity collaborative signals and relational dependency on different metapaths.Extensive experiments on five real datasets demonstrate the effectiveness of our method.
基金supported by the National Natural Science Foundation of China(No.12261027)the Innovation Project of Guangxi Graduate Education(No.YCBZ2021027).
文摘Information networks are becoming increasingly important in practice. However, their escalating complexity is gradually impeding the efficiency of data mining. A novel network schema called the Behavior Schema of Information Networks (BSIN) is proposed to address this issue. This work defines the behavior of nodes as connected paths in BSIN, proposes a novel function distinguish behavior differences, and introduces approximate bisimulation into the acquisition of quotient sets for node types. The major highlight of BSIN is its ability to directly obtain a high-efficiency network on the basis of approximate bisimulation, rather than reducing the existing information network. It provides an effective representation of information networks, and the resulting novel network has a simple structure that more efficiently expresses semantic information than current network representations. The theoretical analysis of the connected paths between the original and the obtained networks demonstrates that errors are controllable;and semantic information is approximately retained. Case studies show that BSIN yields a simple network and is highly cost-effective.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
基金supported by the National Natural Science Foundation of China (No. 60929003)
文摘A multi-path routing algorithm based on network coding is proposed for combating long propagation delay and high bit error rate of space information networks. On the basis of traditional multi-path routing, the algorithm uses a random linear network coding strategy to code data pack- ets. Code number is determined by the next hop link status and the number of current received packets sent by the upstream node together. The algorithm improves retransmission and cache mechanisms through using redundancy caused by network coding. Meanwhile, the algorithm also adopts the flow distribution strategy based on time delay to balance network load. Simulation results show that the proposed routing algorithm can effectively improve packet delivery rate, reduce packet delay, and enhance network performance.
基金supported in part by the U.S.Army Research Laboratory under Cooperative Agreement No.W911NF-09-2-0053(NS-CTA),NSF ⅡS-0905215,CNS-09-31975MIAS,a DHS-IDS Center for Multimodal Information Access and Synthesis at UIUC
文摘Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link prediction. Most existing network studies are on homogeneous networks, where nodes and links are assumed from one single type. In reality, however, heterogeneous information networks can better model the real-world systems, which are typically semi-structured and typed, following a network schema. In order to mine these heterogeneous information networks directly, we propose to explore the meta structure of the information network, i.e., the network schema. The concepts of meta-paths are proposed to systematically capture numerous semantic relationships across multiple types of objects, which are defined as a path over the graph of network schema. Meta-paths can provide guidance for search and mining of the network and help analyze and understand the semantic meaning of the objects and relations in the network. Under this framework, similarity search and other mining tasks such as relationship prediction and clustering can be addressed by systematic exploration of the network meta structure. Moreover, with user's guidance or feedback, we can select the best meta-path or their weighted combination for a specific mining task.
基金supported by the National Natural Science Foundation of China under Grant 61672092.
文摘With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However,due to the openness of the air-to-ground channel,the device will face a series of security threats when accessing SIN,such as replay attacks,eavesdropping attacks,impersonation attacks,and man-in-the-middle attacks.These security threats will lead to illegal entity access and further endanger the reliability and availability of the system.Although scholars have proposed many enhanced security access authentication protocols,most of them have been proved to have security vulnerabilities.In addition,with the development of quantum computing,the previous authentication protocols based on some asymmetric cryptographic mechanisms such as discrete logarithm and elliptic curve cryptographic mechanisms may face new security challenges.In this context,this paper proposes a novel antiquantum access authentication protocol based on ring learning with errors(RLWE),which meets more security requirements and greatly reduces the authentication delay through prenegotiation.Through the security analysis and performance analysis,it is shown that our protocol can be more suitable for delaysensitive IoT devices to access SIN while ensuring higher security.