期刊文献+
共找到130篇文章
< 1 2 7 >
每页显示 20 50 100
Information Network System for WDCDS/NCSDI
1
作者 Zhao Zhonghe,Chen Huizhong,Tian Feng,Li Weidong,Wang Song,Zhou Kechang,Zhao Wei,and Huang ZhibinNational Center for Seismic Data and Information,SSB,Beijing 100045,China 《Earthquake Research in China》 1997年第2期101-106,共6页
World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information netw... World Data Center-D for Seismology(WDCDS)is a member of the World Data Center System under ICSU and is one of the nine World Data Centers located in China(WDC-D).During the period from 1993 to 1996,an information network system,called CSDInet,was developed in National Center for Seismic Data and Information(NCSDI)and has become the basic technical supporting system for WDC-D for Seismology.CSDInet consists of four basic parts:computer network center,LAN(Local Area Network),link to Internet,and nationwide PSTN(with dialing-up telephone line)user network.In this paper a "multi-layer multi-mode" management of data flow for this system will be explained and the data and information services will be described. 展开更多
关键词 WORK information network system for WDCDS/NCSDI SSB data MODE PSTN FTP World WIDE
下载PDF
Information Network Systems and Information Sharing on Administrative Websites 被引量:1
2
作者 HIROTA Denjiro 《Journal of Electronic Science and Technology of China》 2004年第3期64-69,共6页
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen... In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems. 展开更多
关键词 information network information sharing administrative websites information management systems document management systems
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
3
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network
4
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
下载PDF
Information Freshness-Oriented Trajectory Planning and Resource Allocation for UAV-Assisted Vehicular Networks
5
作者 Hao Gai Haixia Zhang +1 位作者 Shuaishuai Guo Dongfeng Yuan 《China Communications》 SCIE CSCD 2023年第5期244-262,共19页
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ... In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI). 展开更多
关键词 information freshness for vehicular networks multi-UAV trajectory planning resource allocation deep reinforcement learning
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
6
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
Design for the simulation of space based information network 被引量:1
7
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
8
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
Integration and development of energy and information network in the Pan-Arctic region 被引量:2
9
作者 Xiaoxia Wei Jinyu Xiao +2 位作者 Zhe Wang Zhichun Wang Yun Tian 《Global Energy Interconnection》 2019年第6期505-513,共9页
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre... The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme. 展开更多
关键词 Energy Interconnection Data center network traffic Integrated development of energy and information networks Global En ergy In terconnection
下载PDF
Study on control information network and its real-time property
10
作者 吴转峰 刘卫国 +1 位作者 骆光照 吴浦升 《Journal of Pharmaceutical Analysis》 SCIE CAS 2008年第1期24-32,共9页
The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a contro... The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately. 展开更多
关键词 control information network remote control three-closed-loop system virtualized reality
下载PDF
Alarm-Based Root Cause Analysis Based on Weighted Fault Propagation Topology for Distributed Information Network
11
作者 LYU Xiaomeng CHEN Hao +2 位作者 WU Zhenyu HAN Junhua GUO Huifeng 《ZTE Communications》 2022年第3期77-84,共8页
A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted faul... A distributed information network with complex network structure always has a challenge of locating fault root causes.In this paper,we propose a novel root cause analysis(RCA)method by random walk on the weighted fault propagation graph.Different from other RCA methods,it mines effective features information related to root causes from offline alarms.Combined with the information,online alarms and graph relationship of network structure are used to construct a weighted graph.Thus,this approach does not require operational experience and can be widely applied in different distributed networks.The proposed method can be used in multiple fault location cases.The experiment results show the proposed approach achieves much better performance with 6%higher precision at least for root fault location,compared with three baseline methods.Besides,we explain how the optimal parameter’s value in the random walk algorithm influences RCA results. 展开更多
关键词 distributed information network ALARM GRAPH root cause analysis random walk
下载PDF
Effects of information transmission delay and channel blocking on synchronization in scale-free Hodgkin-Huxley neuronal networks
12
作者 Qing-Yun Wang Yan-Hong Zheng 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2011年第6期1052-1058,共7页
In this paper,we investigate the evolution of spatiotemporal patterns and synchronization transitions in dependence on the information transmission delay and ion channel blocking in scale-free neuronal networks.As the... In this paper,we investigate the evolution of spatiotemporal patterns and synchronization transitions in dependence on the information transmission delay and ion channel blocking in scale-free neuronal networks.As the underlying model of neuronal dynamics,we use the Hodgkin-Huxley equations incorporating channel blocking and intrinsic noise.It is shown that delays play a significant yet subtle role in shaping the dynamics of neuronal networks.In particular,regions of irregular and regular propagating excitatory fronts related to the synchronization transitions appear intermittently as the delay increases.Moreover,the fraction of working sodium and potassium ion channels can also have a significant impact on the spatiotemporal dynamics of neuronal networks.As the fraction of blocked sodium channels increases,the frequency of excitatory events decreases,which in turn manifests as an increase in the neuronal synchrony that,however,is dysfunctional due to the virtual absence of large-amplitude excitations.Expectedly,we also show that larger coupling strengths improve synchronization irrespective of the information transmission delay and channel blocking.The presented results are also robust against the variation of the network size,thus providing insights that could facilitate understanding of the joint impact of ion channel blocking and information transmission delay on the spatiotemporal dynamics of neuronal networks. 展开更多
关键词 Scale-free neuronal networks - information transmission delay Ion channel blocking SYNCHRONIZATION
下载PDF
Impact of Enforcement of Right of Communication through Information Network
13
作者 Chen Wen Attorney-at-law of the Beijing Hankun Law Firm 《中国专利与商标》 2006年第4期89-93,共5页
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20... On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu... 展开更多
关键词 PRO Impact of Enforcement of Right of Communication through information network ISP
下载PDF
Heterogeneous Network Embedding: A Survey
14
作者 Sufen Zhao Rong Peng +1 位作者 Po Hu Liansheng Tan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期83-130,共48页
Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the stru... Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks(HINs)into low-dimensional embeddings;this task is called heterogeneous network embedding(HNE).Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification,recommender systems,and information retrieval.Here,we provide a comprehensive survey of key advancements in the area of HNE.First,we define an encoder-decoder-based HNE model taxonomy.Then,we systematically overview,compare,and summarize various state-of-the-art HNE models and analyze the advantages and disadvantages of various model categories to identify more potentially competitive HNE frameworks.We also summarize the application fields,benchmark datasets,open source tools,andperformance evaluation in theHNEarea.Finally,wediscuss open issues and suggest promising future directions.We anticipate that this survey will provide deep insights into research in the field of HNE. 展开更多
关键词 Heterogeneous information networks representation learning heterogeneous network embedding graph neural networks machine learning
下载PDF
ESR-PINNs:Physics-informed neural networks with expansion-shrinkage resampling selection strategies
15
作者 刘佳楠 侯庆志 +1 位作者 魏建国 孙泽玮 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期337-346,共10页
Neural network methods have been widely used in many fields of scientific research with the rapid increase of computing power.The physics-informed neural networks(PINNs)have received much attention as a major breakthr... Neural network methods have been widely used in many fields of scientific research with the rapid increase of computing power.The physics-informed neural networks(PINNs)have received much attention as a major breakthrough in solving partial differential equations using neural networks.In this paper,a resampling technique based on the expansion-shrinkage point(ESP)selection strategy is developed to dynamically modify the distribution of training points in accordance with the performance of the neural networks.In this new approach both training sites with slight changes in residual values and training points with large residuals are taken into account.In order to make the distribution of training points more uniform,the concept of continuity is further introduced and incorporated.This method successfully addresses the issue that the neural network becomes ill or even crashes due to the extensive alteration of training point distribution.The effectiveness of the improved physics-informed neural networks with expansion-shrinkage resampling is demonstrated through a series of numerical experiments. 展开更多
关键词 physical informed neural networks RESAMPLING partial differential equation
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
16
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the Protection of the Right of Communication through information network
下载PDF
Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks
17
作者 Rui Xu Xiaoqiang Di +3 位作者 Hao Luo Hui Qi Xiongwen He Wenping Lei 《Computers, Materials & Continua》 SCIE EI 2023年第5期3903-3922,共20页
In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite netw... In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite networks.Setting up cache space at any node enables users to access data nearby,thus relieving the processing pressure on the servers.However,the existing caching strategies still suffer from the lack of global planning of cache contents and low utilization of cache resources due to the lack of fine-grained division of cache contents.To address the issues mentioned,a cooperative caching strategy(CSTL)for remote sensing satellite networks based on a two-layer caching model is proposed.The two-layer caching model is constructed by setting up separate cache spaces in the satellite network and the ground station.Probabilistic caching of popular contents in the region at the ground station to reduce the access delay of users.A content classification method based on hierarchical division is proposed in the satellite network,and differential probabilistic caching is employed for different levels of content.The cached content is also dynamically adjusted by analyzing the subsequent changes in the popularity of the cached content.In the two-layer caching model,ground stations and satellite networks collaboratively cache to achieve global planning of cache contents,rationalize the utilization of cache resources,and reduce the propagation delay of remote sensing data.Simulation results show that the CSTL strategy not only has a high cache hit ratio compared with other caching strategies but also effectively reduces user request delay and server load,which satisfies the timeliness requirement of remote sensing data transmission. 展开更多
关键词 information centric networking caching strategy two-layer caching model hierarchical division
下载PDF
User satisfaction-based quality evaluation model and survey analysis of network information service
18
作者 LEI Xue JIAO Yuying 《Chinese Journal of Library and Information Science》 2009年第2期32-41,共10页
On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of the... On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of their convenience,information quality,personalization and site aesthetics,which may affect the overall satisfaction of users.Statistical analysis was also made to build a user satisfaction-based quality evaluation system of network information service. 展开更多
关键词 network information service Evaluation model User satisfaction
下载PDF
CAS COMPUTER NETWORK INFORMATION CENTER
19
《Bulletin of the Chinese Academy of Sciences》 1996年第2期179-181,共3页
The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key pro... The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC). 展开更多
关键词 NET FTP CAS COMPUTER network information CENTER CNIC CMC
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
20
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the Protection of Privacy in the information network Age
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部