query node
Recently Published Documents


TOTAL DOCUMENTS

4
(FIVE YEARS 1)

H-INDEX

0
(FIVE YEARS 0)

Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Anas Maazu Kademi ◽  
Ahmet Hasan Koltuksuz

PurposeThis paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions, precisely, inherently spatial basis that produces an unprecedented space–time continuum, in which cyber-enabled relations evolve.Design/methodology/approachMultidisciplinary theoretical approaches are needed to describe complex systems, which in this paper are integrated in a quest for the principles underlying the structural organization and dynamics of cyberspace. A theoretic framework is presented, and the spatial conception of cyber-enabled physical, social, information and thinking spaces and entities existence are provided.FindingsWith spatial objects and spatial properties, cyberspace is inherently spatial. Its basic constructs are founded on its spatial qualities and producing radical space–time compression, cyber-enabled spaces in which dynamic relations develop and thrive. The cyberspatial object operations are primarily built on foundations that depend on physical space and other spatial metaphors. Information space, basically missing in the literature, is an important part of cyberspace.Research limitations/implicationsThis work suggested a novel analytical approach to describing cyberspace from broader perspectives and fields. Due to the novelty and divergence of cyber concepts, an interdisciplinary study and methodology are needed. Thus, more research toward theoretical direction could help many of the practical implementations of concepts.Practical implicationsThe research is of particular significance in cyberspatial mechanics to describe the dynamics and behavior of cyber physical systems. For example, object-based analysis functions like spatial query, node pattern analysis, cluster analysis, spatial similarity analysis and location modeling.Originality/valueComplementing the existing literature and defining information space to the research sphere, a theoretical framework providing a fundamental understanding of cyberspatial objects and the general cyberspace foundation has been proposed, resulting in a formalized concept of existence, interactions and applications and services, with respect to philosophy, science and technology, respectively.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Yue Li ◽  
Hongqi Wang ◽  
Liqun Yu ◽  
Sarah Yvonne Cooper ◽  
Jing-Yan Wang

In this paper, we propose to embed a content-rich network for the purpose of similarity searching for a query node. In this network, besides the information of the nodes and edges, we also have the content of each node. We use the convolutional neural network (CNN) to represent the content of each node and then use the graph convolutional network (GCN) to further represent the node by merging the representations of its neighboring nodes. The GCN output is further fed to a deep encoder-decoder model to convert each node to a Gaussian distribution and then convert back to its node identity. The dissimilarity between the two nodes is measured by the Wasserstein distance between their Gaussian distributions. We define the nodes of the network to be positives if they are relevant to the query node and negative if they are irrelevant. The labeling of the positives/negatives is based on an upper bound and a lower bound of the Wasserstein distances between the candidate nodes and the query nodes. We learn the parameters of CNN, GCN, encoder-decoder model, Gaussian distributions, and the upper bound and lower bounds jointly. The learning problem is modeled as a minimization problem to minimize the losses of node identification, network structure preservation, positive/negative query-specific relevance-guild distance, and model complexity. An iterative algorithm is developed to solve the minimization problem. We conducted experiments over benchmark networks, especially innovation networks, to verify the effectiveness of the proposed method and showed its advantage over the state-of-the-art methods.


2014 ◽  
Vol 681 ◽  
pp. 239-243
Author(s):  
Jun Bo Pei ◽  
Jin Chun Gao ◽  
Yuan An Liu ◽  
Xiao Lei Ma

XML based publish/subscribe systems are on tremendous rise during recent years. In order to get interested documents, the subscribers submit an XPath Query. In such applications, there is often a mismatch between how publishers describe entities and how different subscribers express their interests. Lots of researches focus on filtering mechanisms, exists such as XFilter, YFilter, Afilter etc, but most of these mechanisms do not use the structural property of XML. This paper proposes an approach which dose XPath query expansion based on structural information. Firstly check query node in OWL classes and return semantically related data performing semantic normalized. Secondly, perform structural expansion depend on the XSD which set constraint on content published. Experiment results show that our approach performs well across a range of XPath queries and documents.


2013 ◽  
Vol 846-847 ◽  
pp. 283-287
Author(s):  
Hong Mei Wang ◽  
Xu Ming Long ◽  
Ai Ling Luo

To saves water resources and low carbon environmental, we have designed a smart monitoring watering system based on power carrier and wireless communications, the system schema is divided into three layer, background server control the concentrated controller through wireless core network; each concentrated controller controls watering system through power carrier network; watering systems as the terminal access points of The Internet of Things , directly control the location regional's temperature, humidity and the soil situation, thereby achieved unmanned unattended, automatically watering. System integrates technology as wireless communications, power line carrier, single-chip microcomputer , application in LCD and so on, through hardware and software design, realizes data storage, the node information query, node failures and cable guard alarm function. Experimental results show that the overall system has low power consumption, high reliability, strong anti-jamming ability, so that it can better meet site's needs.


Sign in / Sign up

Export Citation Format

Share Document