期刊文献+
共找到96篇文章
< 1 2 5 >
每页显示 20 50 100
Study on the Impact of Network Information Management on the Compliance of Maintenance Hemodialysis Patients
1
作者 Chunyan Liu Xuebao Liu 《Journal of Clinical and Nursing Research》 2025年第9期137-143,共7页
This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’... This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’compliance.A network information management model for MHD patients was constructed around three management schemes:“software reminders+follow-up guidance”,“dietary records+self-management reminders”,and“dialysis plan+precise weight management”.These schemes were respectively used to optimize anemia management,control the risk of hyperphosphatemia,and improve toxin clearance efficiency.A controlled experiment was conducted,with an experimental group and a control group set up for comparative practice.The results showed that the network information management model can effectively improve patients’anemia,help alleviate mineral metabolism disorders and the accumulation of small-molecule toxins,and exert a positive impact on patients’treatment compliance. 展开更多
关键词 network information management Maintenance hemodialysis PATIENTS COMPLIANCE IMPACT
暂未订购
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
2
作者 Dapeng Wu Jian Liu +3 位作者 Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin 《Digital Communications and Networks》 2025年第2期563-573,共11页
Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV).With the increasing popularity of digital photography and Internet technology,more and more users are sharing images on CPN.However,many images are shared without any privacy processing,exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI)algorithms.Existing image sharing methods lack fine-grained image sharing policies and cannot protect user privacy.To address this issue,we propose a social relationship-driven privacy customization protection model for publishers and co-photographers.We construct a heterogeneous social information network centered on social relationships,introduce a user intimacy evaluation method with time decay,and evaluate privacy levels considering user interest similarity.To protect user privacy while maintaining image appreciation,we design a lightweight face-swapping algorithm based on Generative Adversarial Network(GAN)to swap faces that need to be protected.Our proposed method minimizes the loss of image utility while satisfying privacy requirements,as shown by extensive theoretical and simulation analyses. 展开更多
关键词 Cyber-physical networks Customized privacy Face-swapping Heterogeneous information network Deep fakes
在线阅读 下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
3
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
在线阅读 下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
4
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
在线阅读 下载PDF
Research on Heterogeneous Information Network Link Prediction Based on Representation Learning
5
作者 Yan Zhao Weifeng Rao +1 位作者 Zihui Hu Qi Zheng 《Journal of Electronic Research and Application》 2024年第5期32-37,共6页
A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and oth... A heterogeneous information network,which is composed of various types of nodes and edges,has a complex structure and rich information content,and is widely used in social networks,academic networks,e-commerce,and other fields.Link prediction,as a key task to reveal the unobserved relationships in the network,is of great significance in heterogeneous information networks.This paper reviews the application of presentation-based learning methods in link prediction of heterogeneous information networks.This paper introduces the basic concepts of heterogeneous information networks,and the theoretical basis of representation learning,and discusses the specific application of the deep learning model in node embedding learning and link prediction in detail.The effectiveness and superiority of these methods on multiple real data sets are demonstrated by experimental verification. 展开更多
关键词 Heterogeneous information network Link prediction Presentation learning Deep learning Node embedding
在线阅读 下载PDF
Copyright Authorization Statement
6
《Meteorological and Environmental Research》 2025年第3期80-80,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission AUTHORIZATION PUBLICATION meteorological environmental research
在线阅读 下载PDF
Copyright Authorization Statement
7
《Meteorological and Environmental Research》 2025年第1期75-75,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission AUTHORIZATION PUBLICATION meteorological environmental research
在线阅读 下载PDF
Copyright Authorization Statement
8
《Agricultural Science & Technology》 2025年第2期24-24,共1页
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist... Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 information network transmission information network COPYRIGHT digital reproduction Agricultural Science Technology COMPILATION AUTHORIZATION PUBLICATION
暂未订购
Copyright Authorization Statement
9
《Agricultural Science & Technology》 2025年第1期6-6,共1页
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist... Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 information network transmission information network COPYRIGHT digital reproduction Agricultural Science Technology COMPILATION AUTHORIZATION PUBLICATION
在线阅读 下载PDF
Copyright Authorization Statement
10
《Meteorological and Environmental Research》 2025年第2期61-61,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission AUTHORIZATION PUBLICATION meteorological environmental research
在线阅读 下载PDF
Research of multi-path routing based on network coding in space information networks 被引量:3
11
作者 Yu Geng Zhong Congjiu +3 位作者 Lan Xiaoyu Zhang Chi Wei Lina Liu Yansong 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2014年第3期663-669,共7页
A multi-path routing algorithm based on network coding is proposed for combating long propagation delay and high bit error rate of space information networks. On the basis of traditional multi-path routing, the algori... A multi-path routing algorithm based on network coding is proposed for combating long propagation delay and high bit error rate of space information networks. On the basis of traditional multi-path routing, the algorithm uses a random linear network coding strategy to code data pack- ets. Code number is determined by the next hop link status and the number of current received packets sent by the upstream node together. The algorithm improves retransmission and cache mechanisms through using redundancy caused by network coding. Meanwhile, the algorithm also adopts the flow distribution strategy based on time delay to balance network load. Simulation results show that the proposed routing algorithm can effectively improve packet delivery rate, reduce packet delay, and enhance network performance. 展开更多
关键词 Flow distribution Multi-path routing network coding RETRANSMISSION Space information networks
原文传递
Interruption Tolerance Routing Strategy for Space Information Network 被引量:1
12
作者 YANG Hai GUO Bingli +5 位作者 PANG Chengguang CUI Xinbin REN Huilin ZHOU Huichao KANG Chengbin HUANG Shanguo 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2022年第2期164-175,共12页
Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will con... Frequent inter-satellite link(ISL)handovers will induce service interruption in large-scale space information networks,since traditional distributed/centralized routing strategy-based route convergence/update will consume considerable time(compared with ground networks)derived from long ISL delay and flooding between hundreds or even thousands of satellites.During the network convergence/update stage,the lack of up-to-date forwarding information may cause severe packet loss.Considering the fact that ISL handovers for close-to-earth constellation are predictable and all the ISL handover information could be stored in each satellite during the network initialization,we propose a self-update routing scheme based on open shortest path first(OSPF-SUR)to address the slow route convergence problem caused by frequent ISL handovers.First,for predictable ISL handovers,forwarding tables are updated according to locally stored ISL handover information without link state advertisement(LSA)flooding.Second,for unexpected ISL failures,flooding could be triggered to complete route convergence.In this manner,network convergence time is radically descended by avoiding unnecessary LSA flooding for predictable ISL handovers.Simulation results show that the average packet loss rate caused by ISL handovers is reduced by 90.5%and 61.3%compared with standard OSPF(with three Hello packets confirmation)and OSPF based on interface state(without three Hello packets confirmation),respectively,during a period of topology handover.And the average endto-end delay is also decreased by 47.6%,9.6%,respectively.The packet loss rate of the proposed OSPF-SUR does not change along with the increase of the frequency of topology handovers. 展开更多
关键词 space information network inter-satellite link route convergence self-update routing scheme
在线阅读 下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
13
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
在线阅读 下载PDF
Research on Network Cognition Model and Mechanism of Intelligent Information Network 被引量:1
14
作者 Nannan Dong Hao Yin +5 位作者 Baoquan Ren Hongjun Li Xiangwu Gong Xudong Zhong Junmei Han Jiazheng Lyu 《China Communications》 SCIE CSCD 2023年第2期257-277,共21页
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ... Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model. 展开更多
关键词 intelligent information network network cognition multi-domain perception network knowledge
在线阅读 下载PDF
ICN Based Vehicle-to-Cloud Delivery for Multimedia Streaming in Urban Vehicular Networks 被引量:1
15
作者 Wei Quan Fei Song +1 位作者 Chengxiao Yu Mingchuan Zhang 《China Communications》 SCIE CSCD 2016年第9期103-112,共10页
Mobile multimedia streaming is an open topic in vehicular environment. Due to the high intermittent links, it has become a critical challenge to deliver high quality video streaming in vehicular networks. In this pape... Mobile multimedia streaming is an open topic in vehicular environment. Due to the high intermittent links, it has become a critical challenge to deliver high quality video streaming in vehicular networks. In this paper, we reform the Information Centric Networking (ICN) concept for multimedia delivery in urban vehicular networks. By leveraging the 1CN perspective, we highlight that vehicular peers can obtain multimedia chunks via the vehicle-to-cloud (V2C) approach to improve the delivery quality. Based on this, we propose a lightweight multipath selection strategy to guide the network system to adaptively adjust the forwarding means. Extensive simulations show that the proposed solution can optimize the utilization of network paths, lighten network loads as well as avoid wasting resources. 展开更多
关键词 information centric networking vehicle-to-cloud multimedia streaming VANET
在线阅读 下载PDF
Design for the simulation of space based information network 被引量:1
16
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
在线阅读 下载PDF
Relaying Strategy Based on Estimated Information for Multi-Antenna Cooperative Networks 被引量:1
17
作者 Shuangshuang Han Peng Zhang +1 位作者 Feijin Shi Fei-Yue Wang 《China Communications》 SCIE CSCD 2017年第8期157-165,共9页
A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared e... A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity. 展开更多
关键词 MIMO system cooperative network soft information
在线阅读 下载PDF
Exploiting global information in complex network repair processes 被引量:1
18
作者 Tianyu WANG Jun ZHANG Sebastian WANDELT 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第3期1086-1100,共15页
Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity a... Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger components at a low cost only with local information.In this paper,we discuss the effectiveness and efficiency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair. 展开更多
关键词 Complex network Global information Greedy ranking Optimality Self-healing
原文传递
The Quantitative Law of Network Information Growth 被引量:1
19
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier Internet economy central information base
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部