Resource Type

Journal Article 441

Year

2024 1

2023 48

2022 45

2021 59

2020 49

2019 34

2018 33

2017 29

2016 37

2015 7

2014 1

2013 3

2012 3

2011 6

2010 1

2009 5

2008 10

2007 11

2006 10

2005 14

open ︾

Keywords

neural network 16

Deep learning 10

Artificial intelligence 9

Neural network 8

Machine learning 7

Software-defined networking (SDN) 7

cyberspace 5

cyberspace security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Boolean control networks 3

Network security 3

fuzzy sets 3

5G 2

Accelerator 2

Artificial intelligence (AI) 2

BP algorithm 2

open ︾

Search scope:

排序: Display mode:

Measurement and analysis of content diffusion characteristics in opportunity environments with Spark Research Article

Xiao-hong Zhang, Kai Qian, Jian-ji Ren, Zong-pu Jia, Tian-peng Jiang, Quan Zhang,xh.zhang@hpu.edu.cn,renjianji@hpu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 10,   Pages 1404-1414 doi: 10.1631/FITEE.1900137

Abstract: s provide a chance to offload the tremendous cellular traffic generated by sharing popular content on mobile networks. Analyzing the content spread characteristics in real opportunity environments can discover important clues for traffic offloading decision making. However, relevant published work is very limited since it is not easy to collect data from real environments. In this study, we elaborate the analysis on the dataset collected from a real opportunity environment formed by the users of Xender, which is one of the leading mobile applications for content sharing. To discover content transmission characteristics, scale, speed, and type analyses are implemented on the dataset. The analysis results show that file transmission has obvious periodicity, that only a very small fraction of files spread widely, and that application files have much higher probability to be popular than other files. We also propose a solution to maximize file spread scales, which is very helpful for forecasting popular files. The experimental results verify the effectiveness and usefulness of our solution.

Keywords: 内容传播;设备通信;机会网络;线性阈值模型    

The Lead Fast Reactor: An Opportunity for the Future? Vies & Comments

Alessandro Alemberti

Engineering 2016, Volume 2, Issue 1,   Pages 59-62 doi: 10.1016/J.ENG.2016.01.022

A robust optimization model considering probability distribution

Ding Ran,Li Qiqiang,Zhang Yuanpeng

Strategic Study of CAE 2008, Volume 10, Issue 9,   Pages 70-73

Abstract:

Robust optimization is a method to process optimization problem under uncertainty. The current robust optimization methods have some deficiencies in application conditions and probability utilization. Based on the chance constraints programming, two kinds of robust constraints according to two different kinds of probability distribution of the stochastic parameters are proposed, and a novel robust optimization model is proposed. The feasible solutions of this model can be controlled to satisfy the robust index. This model can be used in the situations that both sides of the constraints contain stochastic parameters, and can be easily extended to non-liner models. The simulation results illustrate the validity of the model.

Keywords: uncertainty     robust optimization     stochastic programming     chance constraints    

The situations and opportunities of the world oil and gas upstream international cooperation

Tong Xiaoguang

Strategic Study of CAE 2011, Volume 13, Issue 4,   Pages 15-19

Abstract:

The paper emphases the necessity of making use of overseas oil and gas, and mainly analyzes the upstream cooperation situations and opportunities of Iraq, Iran, Brazil, Canada, Venezuela and North America and the contact variation trends of the world oil and gas international cooperation,and then points out the main directions to expand present upstream international cooperation.

Keywords: oil and gas upstream international cooperation     Iraq     deep water oil and gas exploration     heavy oil and oil sand     unconventional gas    

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cyber sovereignty guarantee has attracted great attention around the world. From the perspective of China's cyber sovereignty situation, this paper analyzes the main problems related to China's cyber sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense, and jurisdiction. Corresponding countermeasures and suggestions are also provided. The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse right on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace security interests.

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract:

The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison. This paper describes scenes of network behavior as differential manifolds. Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathematical description of the network behavior path and behavior utility. Based on the principle of differential geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility. We also provide a calculation framework for assessment of the network’s attack-defense confrontation on the strength of behavior utility. Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior.

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001

Abstract:

Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.

Keywords: cyberspace     cyberspace sovereignty     stakeholder    

Big Data Research in Italy: A Perspective Perspective

Sonia Bergamaschi,Emanuele Carlini,Michelangelo Ceci,Barbara Furletti,Fosca Giannotti,Donato Malerba,Mario Mezzanzanica,Anna Monreale,Gabriella Pasi,Dino Pedreschi,Raffele Perego,Salvatore Ruggieri

Engineering 2016, Volume 2, Issue 2,   Pages 163-170 doi: 10.1016/J.ENG.2016.02.011

Abstract:

The aim of this article is to synthetically describe the research projects that a selection of Italian universities is undertaking in the context of big data. Far from being exhaustive, this article has the objective of offering a sample of distinct applications that address the issue of managing huge amounts of data in Italy, collected in relation to diverse domains.

Keywords: Big data     Smart cities     Energy     Job offers     Privacy    

Future Internet: trends and challenges Special Feature on Future Network-Review Article

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9,   Pages 1185-1194 doi: 10.1631/FITEE.1800445

Abstract: Traditional networks face many challenges due to the diversity of applications, such as cloud computing, Internet of Things, and the industrial Internet. Future Internet needs to address these challenges to improve network scalability, security, mobility, and quality of service. In this work, we survey the recently proposed architectures and the emerging technologies that meet these new demands. Some cases for these architectures and technologies are also presented. We propose an integrated framework called the service customized network which combines the strength of current architectures, and discuss some of the open challenges and opportunities for future Internet. We hope that this work can help readers quickly understand the problems and challenges in the current research and serves as a guide and motivation for future network research.

Keywords: Future Internet     Network architecture     Service customized network    

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010

Abstract:

The rapid development of quantum information has brought new opportunities and challenges to modern information technologies. As one of the popular research directions in the field of quantum information, quantum networks aim to utilize the fundamental properties of quantum mechanics to achieve long-distance (secure) communications or provide computational capabilities superior to classical computing networks through distributed computing. The study of quantum networks holds great significance in advancing the practicality of quantum information. To gain a comprehensive understanding of the development trajectory of quantum networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloud computing, and quantum teleportation networks, based on different application scenarios and technical approaches. It provides comprehensive reviews of both domestic and international research progress and the challenges faced in each aspect. Furthermore, in conjunction with the practical implementation of quantum networks, the key technologies that need to be overcome in the development of quantum network systems, involving link establishment, information transmission, networking protocols, and physical hardware, are summarized. Overall, the development of quantum networks is still in the primary stage. At this stage, actively addressing challenges and seizing opportunities are of great significance to enhance the technological prowess of China. Therefore, to promote the development of quantum network systems in China, suggestions are proposed from three aspects: strengthening investment in the research and development of fundamental hardware infrastructure, attaching importance to the theoretical research of quantum networks, and enhancing interdisciplinary research and talent cultivation.

Keywords: quantum information     quantum network     quantum cryptography network     quantum cloud computing network     quantum teleportation network    

Machine Learning in Chemical Engineering: Strengths, Weaknesses, Opportunities, and Threats Perspective

Maarten R. Dobbelaere, Pieter P. Plehiers, Ruben Van de Vijver, Christian V. Stevens, Kevin M. Van Geem

Engineering 2021, Volume 7, Issue 9,   Pages 1201-1211 doi: 10.1016/j.eng.2021.03.019

Abstract:

Chemical engineers rely on models for design, research, and daily decision-making, often with potentially large financial and safety implications. Previous efforts a few decades ago to combine artificial intelligence and chemical engineering for modeling were unable to fulfill the expectations. In the last five years, the increasing availability of data and computational resources has led to a resurgence in machine learning-based research. Many recent efforts have facilitated the roll-out of machine learning techniques in the research field by developing large databases, benchmarks, and representations for chemical applications and new machine learning frameworks. Machine learning has significant advantages over traditional modeling techniques, including flexibility, accuracy, and execution speed. These strengths also come with weaknesses, such as the lack of interpretability of these black-box models. The greatest opportunities involve using machine learning in time-limited applications such as real-time optimization and planning that require high accuracy and that can build on models with a self-learning ability to recognize patterns, learn from data, and become more intelligent over time. The greatest threat in artificial intelligence research today is inappropriate use because most chemical engineers have had limited training in computer science and data analysis. Nevertheless, machine learning will definitely become a trustworthy element in the modeling toolbox of chemical engineers.

Keywords: Artificial intelligence     Machine learning     Reaction engineering     Process engineering    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Information Network—— Frontier of Information Engineering Science

Zhong Yixin

Strategic Study of CAE 1999, Volume 1, Issue 1,   Pages 24-29

Abstract:

Information Network has been grown up and spread out to the entire globe extremely swiftly in recent years. It has also very quickly turned out to be a world-wide new infrastructure of the society and made great influence to the ways people work, live, learn and think.The astonished phenomenon has been regarded as a real frontier and focus in science and engineering, extracting great attentions from science and engineering circle as well as the whole world.

An attempt is made in the paper to establish a new discipline, the information network engineering, based on the above phenomenon.First, the concept of information network is re-defined clearly here and then the working mechanism of information network is analyzed in depth. A comparative discussion on the functions embodied in human activities and that performed in information network is carried out and the working relationship between man and information network is found to be the socalled symbiosis. As a result of the analyses above, a list of the important issues and directions in information network engineering study is briefly summarized.

Keywords: information network     intelligent productive tools     network age     information network engineering    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation strategy    

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003

Abstract:

Cyberspace security has been a crucial part in national security and is more and more important in the development of economy and society. Based on the current situation of international cyberspace security, this article analyzes the opportunities and challenges that China is confronted with, and study China's international cyberspace security strategy suitable for its own value and national interest. We then propose the objectives, principles and tasks of the strategy.

Keywords: cyberspace security     cyberspace governance     cyberspace strategy    

Title Author Date Type Operation

Measurement and analysis of content diffusion characteristics in opportunity environments with Spark

Xiao-hong Zhang, Kai Qian, Jian-ji Ren, Zong-pu Jia, Tian-peng Jiang, Quan Zhang,xh.zhang@hpu.edu.cn,renjianji@hpu.edu.cn

Journal Article

The Lead Fast Reactor: An Opportunity for the Future?

Alessandro Alemberti

Journal Article

A robust optimization model considering probability distribution

Ding Ran,Li Qiqiang,Zhang Yuanpeng

Journal Article

The situations and opportunities of the world oil and gas upstream international cooperation

Tong Xiaoguang

Journal Article

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Journal Article

Big Data Research in Italy: A Perspective

Sonia Bergamaschi,Emanuele Carlini,Michelangelo Ceci,Barbara Furletti,Fosca Giannotti,Donato Malerba,Mario Mezzanzanica,Anna Monreale,Gabriella Pasi,Dino Pedreschi,Raffele Perego,Salvatore Ruggieri

Journal Article

Future Internet: trends and challenges

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Journal Article

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Journal Article

Machine Learning in Chemical Engineering: Strengths, Weaknesses, Opportunities, and Threats

Maarten R. Dobbelaere, Pieter P. Plehiers, Ruben Van de Vijver, Christian V. Stevens, Kevin M. Van Geem

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Information Network—— Frontier of Information Engineering Science

Zhong Yixin

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Journal Article