Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countrie...Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.展开更多
The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both t...The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.展开更多
This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyze...This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyzes the significance of strengthening the protection of proprietary IPRs and implementing a strategy for technology standards and then discusses the actual work and future arrangement of proprietary IPRs and technology standard strategies. It points out that the enhancement of proprietary IPRs protection and implementation of technology standard strategies is the only way for enterprises to remain competitive.展开更多
Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the r...Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the resources needed to develop standards.Therefore,enterprises actively join technology standard alliances(TSAs)to seek collaborative innovation and develop technology standards to gain more competitive advantages.This study addresses a crucial issue for enterprises in TSAs and attempts to help them overcome the confines of organisational distance(OD)and improve technology standard alliance performance(TSAP).Through an empirical study of 325 Chinese information and manufacturing enterprises participating in TSAs,we find that OD negatively affects TSAP,and that exploratory learning(ERL)and exploitative learning(EIL)play mediating roles in the relationship between OD and TSAP.The innovation climate(IC)plays a moderating role in the relationship between OD and ERL,and OD and EIL.The results might deepen the understanding of OD in the context of TSAs and have implications for enterprise standardisation practices.展开更多
It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented tech...It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented technology hcensing imphed, for patented technology hcensing is a prerequisite for the existence and development of technology standards. Therefore, technology standards create a good many potential chances for hcensing patented technologies concerning them. Superficially speaking, patent holders achieve huge profits mainly by means of hcensing patented technologies through a standard mainly in the form of a patent pool; however, in fact, it is know-how licensing behind the patented technology involved in the standard that really helps patent holders make huge profits.展开更多
A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices...The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.展开更多
Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water sa...Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water saving technology is to offer important science basis for revising standard plan and standardize research plan. This paper introduces the present situation of our urban domestic water saving technical standard system, problem and the development direction in the future, as well as project planning of constructing urban domestic water saving technical standard system.展开更多
Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chua...Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.展开更多
In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technolog...In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.展开更多
As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends ...As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.展开更多
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime sea...Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime search and rescue, navigation channel measurement, monitoring and inspection of the oil and sewage spills from ships at sea, it can effectively expand the uses of monitoring sea areas, reduce the phenomenon of illegal use of sea, which can improve modernization construction in maritime supervision. According to the UAV (unmanned aerial vehicle) development and application, this paper explores the advantages of the UAV application in maritime adminstration, as well as the characteristics of maritime adminstration, put forward some countermeasures and suggestions of UAV applied in maritime adminstration.展开更多
Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.H...Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.Here,a flexible organic device with 2,7-dioctyl[1]benzothieno[3,2-b][1]benzothiophene(C8-BTBT)and 2,9-didecyldinaphtho[2,3-b:2′,3′-f]thieno[3,2-b]thiophene(C10-DNTT)heterostructural channel having excellent synaptic behaviors was fabricated on muscovite(MICA)substrate,which has a memory window greater than 20 V.This device shows better electrical characteristics than organic field effect transistors with single organic semiconductor channel.Furthermore,the device simulates organism synaptic behaviors successfully,such as paired-pulse facilitation(PPF),long-term potentiation/depression(LTP/LTD)process,and transition from short-term memory(STM)to long-term memory(LTM)by optical and electrical modulations.Importantly,the neuromorphic computing function was verified using the Modified National Institute of Standards and Technology(MNIST)pattern recognition,with a recognition rate nearly 100%without noise.This research proposes a flexible organic heterojunction with the ultra-high recognition rate in MNIST pattern recognition and provides the possibility for future flexible wearable neuromorphic computing devices.展开更多
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite....This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.展开更多
文摘Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.
基金National "863"Program of China (No. 2005AA123410)
文摘The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.
文摘This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyzes the significance of strengthening the protection of proprietary IPRs and implementing a strategy for technology standards and then discusses the actual work and future arrangement of proprietary IPRs and technology standard strategies. It points out that the enhancement of proprietary IPRs protection and implementation of technology standard strategies is the only way for enterprises to remain competitive.
基金supported by the National Natural Science Foundation of China(72372051)
文摘Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the resources needed to develop standards.Therefore,enterprises actively join technology standard alliances(TSAs)to seek collaborative innovation and develop technology standards to gain more competitive advantages.This study addresses a crucial issue for enterprises in TSAs and attempts to help them overcome the confines of organisational distance(OD)and improve technology standard alliance performance(TSAP).Through an empirical study of 325 Chinese information and manufacturing enterprises participating in TSAs,we find that OD negatively affects TSAP,and that exploratory learning(ERL)and exploitative learning(EIL)play mediating roles in the relationship between OD and TSAP.The innovation climate(IC)plays a moderating role in the relationship between OD and ERL,and OD and EIL.The results might deepen the understanding of OD in the context of TSAs and have implications for enterprise standardisation practices.
文摘It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented technology hcensing imphed, for patented technology hcensing is a prerequisite for the existence and development of technology standards. Therefore, technology standards create a good many potential chances for hcensing patented technologies concerning them. Superficially speaking, patent holders achieve huge profits mainly by means of hcensing patented technologies through a standard mainly in the form of a patent pool; however, in fact, it is know-how licensing behind the patented technology involved in the standard that really helps patent holders make huge profits.
文摘A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
基金National Natural Science Foundation Subject(60536030,60676038)Tianjin Key Basic Research Project(06YFJZJC00200)
文摘The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.
基金The national basic platform project of science and technology.This paper is a part of standard system of water resource used continuously in China.(2004DEA70920-04)
文摘Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water saving technology is to offer important science basis for revising standard plan and standardize research plan. This paper introduces the present situation of our urban domestic water saving technical standard system, problem and the development direction in the future, as well as project planning of constructing urban domestic water saving technical standard system.
文摘Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.
文摘In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.
文摘As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.
文摘This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime search and rescue, navigation channel measurement, monitoring and inspection of the oil and sewage spills from ships at sea, it can effectively expand the uses of monitoring sea areas, reduce the phenomenon of illegal use of sea, which can improve modernization construction in maritime supervision. According to the UAV (unmanned aerial vehicle) development and application, this paper explores the advantages of the UAV application in maritime adminstration, as well as the characteristics of maritime adminstration, put forward some countermeasures and suggestions of UAV applied in maritime adminstration.
基金the National Key Research and Development Program of China(No.2021YFA1202600)the National Natural Science Foundation of China(Nos.92064009 and 22175042)+3 种基金the Science and Technology Commission of Shanghai Municipality(No.22501100900)the China Postdoctoral Science Foundation(Nos.2022TQ0068 and 2023M740644)the Shanghai Sailing Program(Nos.23YF1402200 and 23YF1402400)Jiashan Fudan Institute.
文摘Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.Here,a flexible organic device with 2,7-dioctyl[1]benzothieno[3,2-b][1]benzothiophene(C8-BTBT)and 2,9-didecyldinaphtho[2,3-b:2′,3′-f]thieno[3,2-b]thiophene(C10-DNTT)heterostructural channel having excellent synaptic behaviors was fabricated on muscovite(MICA)substrate,which has a memory window greater than 20 V.This device shows better electrical characteristics than organic field effect transistors with single organic semiconductor channel.Furthermore,the device simulates organism synaptic behaviors successfully,such as paired-pulse facilitation(PPF),long-term potentiation/depression(LTP/LTD)process,and transition from short-term memory(STM)to long-term memory(LTM)by optical and electrical modulations.Importantly,the neuromorphic computing function was verified using the Modified National Institute of Standards and Technology(MNIST)pattern recognition,with a recognition rate nearly 100%without noise.This research proposes a flexible organic heterojunction with the ultra-high recognition rate in MNIST pattern recognition and provides the possibility for future flexible wearable neuromorphic computing devices.
基金Supported by the National High Technology Research and Development Program of China (863 Program) ( 2007AA01Z411)the National Natural Science Foundation of China ( 60673071, 60970115 )
文摘This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.