《计算机应用研究》|Application Research of Computers

政策血缘关系网络构建与传播演化机理研究

Policy lineage network construction and evolution mechanism of communication

免费全文下载 (已被下载 次)  
获取PDF全文
作者 刘刚,李涛,路彩霞,崔一冬
机构 哈尔滨工程大学 计算机科学与技术学院,哈尔滨 150001
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2019)03-020-0742-06
DOI 10.19734/j.issn.1001-3695.2017.09.0918
摘要 通过挖掘政策血缘关系对政策系统进行建模,将数量庞大的政策形式化为政策血缘网络。在此基础上构建PCL模型,通过机器学习确定模型中节点的容量定义,实现政策网络中脆性点挖掘。该方法通过挖掘政策间的相关概念,将政策体系形式化为政策谱系树模型,再由政策谱系树的节点对之间发生“树影相吸”,最终形成基于政策血缘关系的政策血缘网络。通过政策血缘网络的传播演化机理,构建了PCRL模型,通过机器学习对容量参数进行参数训练,挖掘传播演化机理。最后选取政策实例进行仿真实验,验证了方法的有效性。
关键词 政策体系;政策血缘网络;机器学习;脆性点
基金项目 黑龙江省博士后科研启动基金资助项目(LBH-Q15031)
黑龙江省教育科学规划课题项目(GLC121507)
本文URL http://www.arocmag.com/article/01-2019-03-020.html
英文标题 Policy lineage network construction and evolution mechanism of communication
作者英文名 Liu Gang, Li Tao, Lu Caixia, Cui Yidong
机构英文名 CollegeofComputerScience&Technology,HarbinEngineeringUniversity,Harbin150001,China
英文摘要 This paper modeled the policy system by mining policy lineage, it formalized a huge number of policies into policy lineage networks. On this basis, it constructed a PCL model, and determined the capacity definition of nodes in the model by machine learning to realize brittle points mining in policy network. By mining the related concepts among policies, this paper formalized the policy system into a policy pedigree tree model, and then tree-shadow attraction occured between the nodes of the policy pedigree tree. Finally, it formed a policy lineage network based on policy lineage relationship. It constructed the PCR L model by evolution mechanism of policy lineage network. It trained the capacity parameters and mined the evolution mechanism. The experimental results show the method is effective .
英文关键词 policy system; policy lineage network; machine learning; brittle points mining
参考文献 查看稿件参考文献
  [1] 赵之滢, 于海, 朱志良, 等. 基于网络社团结构的节点传播影响力分析[J] . 计算机学报, 2014, 37(4):753-755. (Zhao Zhiying, Yu Hai, Zhu Zhiliang, et al. Identifying influential spreaders based on network community structure[J] . Chinese Journal of Computers, 2014, 37(4):753-766. )
[2] 刘影. 面向领域的隐形政策血缘挖掘方法研究[D] . 哈尔滨:哈尔滨工程大学, 2013:14-33. (Liu Ying. Research on the mining method of the field-oriented recessive policy blood relation[D] . Harbin:Harbin Engineering University Engineering, 2013:14-33. )
[3] Karvounarakis G, Ives Z G, Tannen V. Querying data provenance[C] //Proc of SIGMOD Conference on Management of Data. New York:ACM Press, 2010:951-962.
[4] Bao Zhuowei, Davidson S B, Khanna S, et al. An optimal labeling scheme for workflow provenance using skeleton labels[C] // Proc of the ACM SIGMOD International Conference on Management of Data. New York:ACM Press, 2010:711-722.
[5] Moreno Y, Pastor-Satorras R, Vazquez A, et al. Critical load and congestion instabilities in scale-free networks[J] . Europhysics Letters, 2003, 62(2):292-298.
[6] Crucitti P, Latora V, Marchiori M. Model for cascading failures in complex networks[J] . Phys. Rev. E, 2004:69.
[7] Freeman L C. Centrality in social networks conceptual clarification[J] . Social Networks, 1979, 1(3):215-239.
[8] 王莉, 程学旗. 在线社会网络的动态社区发现及演化[J] . 计算机学报, 2015, 38(2):219-237. (Wang Li, Cheng Xueqi. Dynamic community in online social networks[J] . Chinese Journal of Computers, 2015, 38(2):219-237.
[9] 周涛, 张子柯, 陈关荣, 等. 复杂网络研究的机遇与挑战[J] . 电子科技大学学报, 2014, 43(1):1-5 (Zhou Tao, Zhang Zike, Chen Guanrong, et al. The opportunities and challenges of complex networks research[J] . Journal of University of Electronic Science and Technology of China, 2014, 43(1):1-5.
[10] 胡磊. 浅谈中国特色社会主义法学理论体系研究[J] . 法制博览(中旬刊), 2013(5):104-105. (Hu Lei. On the theoretical system of socialist jurisprudence with Chinese characteristics[J] . Legal Expo (mid-issue), 2013(5):104-105. )
[11] 程克勤, 李世伟, 周健. 基于边权值的网络抗毁性评估方法[J] . 计算机工程与应用, 2010, 46(35):95-96. (Cheng Keqin, Li Shiwei, Zhou Jian. Evaluation method for network invulnerability based on edge weight[J] . Computer Engineering and Applications, 2010, 46(35):95-96. )
[12] Schweitzer F, Fagiolo G, Sornette D, et al. Economic networks:the new challenges[J] . Science, 2009, 325(5939):422-425.
[13] 刘刚. 面向领域的软件需求一致性验证方法研究[D] . 哈尔滨:哈尔滨工程大学, 2008:21-54. (Liu Gang. Research on domain-orie-nted software requirement conformance verification method[D] . Harbin:Harbin Engineering University, 2008:21-54. )
[14] 刘铭, 吴冲, 刘远超, 等. 基于特征权重量化的相似度计算方法[J] . 计算机学报, 2015, 38(7):1420-1433. (Liu Ming, Wu Chong, Liu Yuanchao, et al. Similarity calculation based on feature weight evaluation[J] . Chinese Journal of Computers, 2015, 38(7):1420-1433. )
[15] 娄成武, 田旭. 中国公共政策仿真研究:现状、问题与展望[J] . 中国行政管理, 2013(3):24-98. (Lou Chengwu, Tian Xu. Public po-licy simulation research in China:current situation, problems and prospects[J] . Chinese Public Administration, 2013(3):24-98. )
收稿日期 2017/9/14
修回日期 2017/11/9
页码 742-747
中图分类号 TP391;TP301.6
文献标志码 A