Search scope:
排序: Display mode:
Quantifying multiple social relationships based on a multiplex stochastic block model Science Letter
Mincheng Wu, Zhen Li, Cunqi Shao, Shibo He,s18he@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 11, Pages 1458-1462 doi: 10.1631/FITEE.2000617
Keywords: 社交网络;多重网络;随机块模型
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Output tracking of delayed logical control networks withmulti-constraint Research Articles
Ya-ting ZHENG, Jun-e FENG
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2, Pages 316-323 doi: 10.1631/FITEE.1900376
Keywords: Logical control networks Multi-constraint Output tracking Stabilization State-dependent delay Semi-tensor product
Multiple Knowledge Representation of Artificial Intelligence
Yunhe Pan
Engineering 2020, Volume 6, Issue 3, Pages 216-217 doi: 10.1016/j.eng.2019.12.011
Yi Yang, Yueting Zhuang, Yunhe Pan,yangyics@zju.edu.cn,yzhuang@zju.edu.cn,panyh@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 12, Pages 1551-1684 doi: 10.1631/FITEE.2100463
Keywords: 多重知识表达;人工智能;大数据
Miniaturized five fundamental issues about visual knowledge Perspectives
Yun-he Pan,panyh@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.2040000
Keywords: 视觉知识表达;视觉识别;视觉形象思维模拟;视觉知识学习;多重知识表达
Multi-stage Model Updating Method via Substructure Analysis
Guo Li,Li Zhaoxia,Chen Hongtian
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 42-48
Basing on substructure analysis, original research on multi-stage model updating method (MSMUM) is presented to reduce the uncertainties in traditional model updating process. The kernel philosophy of the multi-stage model updating method is used to update a complicated FE model with multi steps, i. e. firstly localize the model errors and then update the error parameters. Comparing with the computed results, it is shown that the error localization methods and the parameter updating methods developed here are fine. As a case study, the model of the Runyang Nancha suspension bridge tower is updated with the MSMUM. Comparing the updated FE model here with the updated model using traditional updating method, it could be concluded that the multi-stage updating method is more effective.
Keywords: model updating substructure error localization parameters updating Runyang Bridge
The Mechanics of 3D Multi-body Contact System of Long Shell and Tyres
Liang Xiaoling,Xiao Yougang,Li Xuejun
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 41-44
According to the high iterative feature of shell and tyre structure, the multi-level substructure technique is adopted to set up the multi-body contact model between tyres and long shell. Applying parametric quadratic programming method, the multi-body contact FEM analysis of the No.2 rotary kiln in Henan Branch of China Aluminum Company is done, and the conclusions are as follows: The equivalent stress of shell at supports changes 5 times, and at other parts changes 4 times; the strength of shell at supports is weak, and at other parts is affluent; the strength of shell at the supports 2 and 3 is the weakest.
Keywords: shell multi-body contact multi-level substructure mechanical property
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002
As cyberspace carries more and more national, public, and private interests, the issue of a cyber sovereignty guarantee has attracted great attention around the world. From the perspective of China's cyber sovereignty situation, this paper analyzes the main problems related to China's cyber sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense, and jurisdiction. Corresponding countermeasures and suggestions are also provided. The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse right on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace security interests.
Keywords: cyber sovereignty cyber right of independence cyber right of equality cyber right of self-defense cyber right of jurisdiction cyber border defense
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison. This paper describes scenes of network behavior as differential manifolds. Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathematical description of the network behavior path and behavior utility. Based on the principle of differential geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility. We also provide a calculation framework for assessment of the network’s attack-defense confrontation on the strength of behavior utility. Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior.
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Research on Cyberspace Sovereignty
Fang Binxing,Zou Peng and Zhu Shibing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001
Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.
Keywords: cyberspace cyberspace sovereignty stakeholder
A novel multiple-outlier-robust Kalman filter Research Articles
Yulong HUANG, Mingming BAI, Yonggang ZHANG,heuedu@163.com,mingming.bai@hrbeu.edu.cn,zhangyg@hrbeu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3, Pages 422-437 doi: 10.1631/FITEE.2000642
Keywords: Kalman filtering Multiple statistical similarity measure Multiple outliers Fixed-point iteration State estimate
Future Internet: trends and challenges Special Feature on Future Network-Review Article
Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9, Pages 1185-1194 doi: 10.1631/FITEE.1800445
Keywords: Future Internet Network architecture Service customized network
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010
The rapid development of quantum information has brought new opportunities and challenges to modern information technologies. As one of the popular research directions in the field of quantum information, quantum networks aim to utilize the fundamental properties of quantum mechanics to achieve long-distance (secure) communications or provide computational capabilities superior to classical computing networks through distributed computing. The study of quantum networks holds great significance in advancing the practicality of quantum information. To gain a comprehensive understanding of the development trajectory of quantum networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloud computing, and quantum teleportation networks, based on different application scenarios and technical approaches. It provides comprehensive reviews of both domestic and international research progress and the challenges faced in each aspect. Furthermore, in conjunction with the practical implementation of quantum networks, the key technologies that need to be overcome in the development of quantum network systems, involving link establishment, information transmission, networking protocols, and physical hardware, are summarized. Overall, the development of quantum networks is still in the primary stage. At this stage, actively addressing challenges and seizing opportunities are of great significance to enhance the technological prowess of China. Therefore, to promote the development of quantum network systems in China, suggestions are proposed from three aspects: strengthening investment in the research and development of fundamental hardware infrastructure, attaching importance to the theoretical research of quantum networks, and enhancing interdisciplinary research and talent cultivation.
Keywords: quantum information quantum network quantum cryptography network quantum cloud computing network quantum teleportation network
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.
Keywords: rail transit cyberspace security network architecture customized network network attack
Title Author Date Type Operation
Quantifying multiple social relationships based on a multiplex stochastic block model
Mincheng Wu, Zhen Li, Cunqi Shao, Shibo He,s18he@zju.edu.cn
Journal Article
Output tracking of delayed logical control networks withmulti-constraint
Ya-ting ZHENG, Jun-e FENG
Journal Article
Multiple knowledge representation for big data artificial intelligence: framework, applications, and case studies
Yi Yang, Yueting Zhuang, Yunhe Pan,yangyics@zju.edu.cn,yzhuang@zju.edu.cn,panyh@zju.edu.cn
Journal Article
Miniaturized five fundamental issues about visual knowledge
Yun-he Pan,panyh@zju.edu.cn
Journal Article
Multi-stage Model Updating Method via Substructure Analysis
Guo Li,Li Zhaoxia,Chen Hongtian
Journal Article
The Mechanics of 3D Multi-body Contact System of Long Shell and Tyres
Liang Xiaoling,Xiao Yougang,Li Xuejun
Journal Article
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Journal Article
Calculation of the Behavior Utility of a Network System: Conception and Principle
Changzhen Hu
Journal Article
A novel multiple-outlier-robust Kalman filter
Yulong HUANG, Mingming BAI, Yonggang ZHANG,heuedu@163.com,mingming.bai@hrbeu.edu.cn,zhangyg@hrbeu.edu.cn
Journal Article
Future Internet: trends and challenges
Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU
Journal Article
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Journal Article