期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Embedded Data Acquisition in Vehicle Electronic System 被引量:3
1
作者 王建群 陈铁 《Journal of Beijing Institute of Technology》 EI CAS 2000年第4期403-407,共5页
The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide... The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank. 展开更多
关键词 embedded data acquisition INTERRUPT COMMUNICATION VEHICLE
下载PDF
Improved phase retrieval in holographic data storage based on a designed iterative embedded data
2
作者 Changyu YU Suping WANG +10 位作者 Ruixian CHEN Jianying HAO Qijing ZHENG Jinyu WANG Xianying QIU Kun WANG Dakui LIN Yi YANG Hui LI Xiao LIN Xiaodi TAN 《Frontiers of Optoelectronics》 EI CSCD 2021年第4期529-539,共11页
Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensi... Embedded data are used to retrieve phases quicker with high accuracy in phase-modulated holographic data storage(HDS).We propose a method to design an embedded data distribution using iterations to enhance the intensity of the high-frequency signal in the Fourier spectrum.The proposed method increases the antinoise performance and signal-to-noise ratio(SNR)of the Fourier spectrum distribution,realizing a more efficient phase retrieval.Experiments indicate that the bit error rate(BER)of this method can be reduced by a factor of one after 10 iterations. 展开更多
关键词 holographic data storage(HDS) phase retrieval embedded data high frequency
原文传递
A Review on the Recent Trends of Image Steganography for VANET Applications
3
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
4
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
下载PDF
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
5
作者 Chia-Chen Lin Chin-Chen Chang Yi-Hui Chen 《Journal of Electronic Science and Technology》 CAS 2012年第3期238-249,共12页
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base... Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work. 展开更多
关键词 Cover image marked image reversible data embedding watermarking.
下载PDF
平台生态嵌入、数据赋能对中小制造企业创新柔性的影响--基于资源编排视角 被引量:20
6
作者 赵慧娟 陈洪洋 +1 位作者 姜盼松 杨皎平 《研究与发展管理》 CSSCI 北大核心 2022年第5期1-15,共15页
在当今数字经济和VUCA时代,如何提高创新柔性以响应动态环境是摆在所有制造企业面前的难题。对中小制造企业而言,由于自身资源相对短缺和资源管理能力不足,其创新柔性的提升机制具有特殊性。基于资源编排理论的过程视角,结合中小制造企... 在当今数字经济和VUCA时代,如何提高创新柔性以响应动态环境是摆在所有制造企业面前的难题。对中小制造企业而言,由于自身资源相对短缺和资源管理能力不足,其创新柔性的提升机制具有特殊性。基于资源编排理论的过程视角,结合中小制造企业固有特性,引入平台生态嵌入作为构建资源组合的新形式,数据赋能作为实现资源连接和供需精准匹配的前提和基础,价值共创活动作为推动资源有效利用的新途径,并建立了三者与创新柔性间的理论模型。基于106家嵌入工业互联网平台生态的中小制造企业样本进行实证检验,结果表明:平台生态嵌入对创新柔性具有倒U形影响,并受到数据赋能的正向调节;价值共创活动在平台生态嵌入与创新柔性间存在部分中介作用;数据赋能对创新柔性具有正向作用,并调节了价值共创活动在平台生态嵌入与创新柔性之间的中介作用。本文在理论上揭开了中小制造企业创新柔性的提升机制,对资源编排理论做出有益补充,同时对中小制造企业如何有效利用工业互联网平台等资源以提升创新柔性具有一定指导意义。 展开更多
关键词 创新柔性 平台生态嵌入 数据赋能 价值共创活动
下载PDF
政府与市场关系重构的逻辑理路 被引量:5
7
作者 崔海潮 陈龙 《延安大学学报(社会科学版)》 2018年第6期84-89,共6页
政府与市场的关系是经济学最核心,也是最具争议的问题。当前学术界主要有反政府干预论、有限政府论、有为政府论、相机抉择论和社会嵌入论五种思潮。学者秉持经济学范式的不同是造成对政府与市场关系理解各异的重要根源。现有的西方主... 政府与市场的关系是经济学最核心,也是最具争议的问题。当前学术界主要有反政府干预论、有限政府论、有为政府论、相机抉择论和社会嵌入论五种思潮。学者秉持经济学范式的不同是造成对政府与市场关系理解各异的重要根源。现有的西方主流经济学理论范式忽视了社会经济运行的文化和时代背景,因而无法解释我国经济发展过程中政府与市场的关系。只有依据中国文化和新时代发展背景,扎根于中国经济社会发展的实践,构建具有中国特色的新经济学分析范式,才能够真正理解我国经济发展中政府与市场的关系定位。 展开更多
关键词 政府 市场 社会嵌入 国家观 大数据
下载PDF
大数据驱动的重大公共安全风险治理:内在逻辑与模式构建 被引量:13
8
作者 张梦茜 王超 《甘肃行政学院学报》 CSSCI 北大核心 2020年第4期37-45,125,共10页
大数据驱动是适应重大公共安全风险治理复杂性和推进国家治理现代化的重要手段。本文首先探讨了风险社会背景下重大公共安全风险的现代性特征,阐述了大数据驱动重大公共安全风险治理的基本内涵与多维视角;其次,从技术与制度互动视角厘... 大数据驱动是适应重大公共安全风险治理复杂性和推进国家治理现代化的重要手段。本文首先探讨了风险社会背景下重大公共安全风险的现代性特征,阐述了大数据驱动重大公共安全风险治理的基本内涵与多维视角;其次,从技术与制度互动视角厘清大数据驱动重大公共安全风险治理的内在逻辑,即大数据技术的源头性嵌入倒逼风险治理结构嬗变、制度体系的适应性吸纳规范大数据嵌入路径以及二者通过社会互动统合于风险治理的价值创造之中;最后,构建了以“治理情境—治理结构—治理过程—治理目标”为基本框架的大数据驱动重大公共安全风险治理模式。在未来,如何加快建立统一的大数据标准体系、探索公众参与的路径和方式以及基于大数据的风险理论创新等是学界亟待回应的关键议题。 展开更多
关键词 大数据驱动 重大公共安全风险 风险治理 技术嵌入
下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
9
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
A Steganography-Based Optical Image Encryption System Using RGB Channel Integration 被引量:1
10
作者 Cheng-Hung Chuang 《Journal of Electronic Science and Technology》 CAS 2013年第1期3-8,共6页
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm t... An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality. 展开更多
关键词 data hiding data embedding information security image steganography image cryptosystem optical security.
下载PDF
城市数字治理与治理能力现代化的行为互嵌——以新加坡为例 被引量:10
11
作者 夏银平 刘伟 《扬州大学学报(人文社会科学版)》 2020年第6期51-60,共10页
由于互联网、物联网、云计算等信息技术的广泛应用,现代城市呈现多维化、数字化、系统化的特征,衍生的数字资源正成为推动公共治理革新和经济发展变革的强大力量。新加坡通过数字治理方式与治理能力现代化目标的行为互嵌,实现了治理手... 由于互联网、物联网、云计算等信息技术的广泛应用,现代城市呈现多维化、数字化、系统化的特征,衍生的数字资源正成为推动公共治理革新和经济发展变革的强大力量。新加坡通过数字治理方式与治理能力现代化目标的行为互嵌,实现了治理手段与行为目的结合,使得治理思维、治理范式、治理导向与现实需要之间有机融合发展。新加坡“大数据+X”应用区块的成功案例为中国城市治理能力现代化建设、数字经济培育、治理效用提升、治理陷阱规避等提供了有益的参考。 展开更多
关键词 数字治理 新加坡 大数据+X 行为互嵌
下载PDF
Big data technology in infectious diseases modeling,simulation,and prediction after the COVID-19 outbreak
12
作者 Honghao Shi Jingyuan Wang +6 位作者 Jiawei Cheng Xiaopeng Qi Hanran Ji Claudio J Struchiner Daniel AM Villela Eduard V Karamov Ali S Turgiev 《Intelligent Medicine》 CSCD 2023年第2期85-96,共12页
After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im... After the outbreak of COVID-19,the interaction of infectious disease systems and social systems has challenged traditional infectious disease modeling methods.Starting from the research purpose and data,researchers im-proved the structure and data of the compartment model or used agents and artificial intelligence based models to solve epidemiological problems.In terms of modeling methods,the researchers use compartment subdivi-sion,dynamic parameters,agent-based model methods,and artificial intelligence related methods.In terms of factors studied,the researchers studied 6 categories:human mobility,nonpharmaceutical interventions(NPIs),ages,medical resources,human response,and vaccine.The researchers completed the study of factors through modeling methods to quantitatively analyze the impact of social systems and put forward their suggestions for the future transmission status of infectious diseases and prevention and control strategies.This review started with a research structure of research purpose,factor,data,model,and conclusion.Focusing on the post-COVID-19 infectious disease prediction simulation research,this study summarized various improvement methods and analyzes matching improvements for various specific research purposes. 展开更多
关键词 Infectious disease model data embedding Social system DYNAMIC Modeling the social systems
原文传递
数字创新网络嵌入对制造企业新产品开发绩效的影响研究 被引量:3
13
作者 余传鹏 黎展锋 +1 位作者 林春培 廖杨月 《管理世界》 北大核心 2024年第5期154-173,共20页
数字经济背景下,大量制造企业“借力”数字服务企业来推进其数字创新进程,本文提出数字创新网络嵌入用以表征这一现象。相比于具有高价值、相对静态、不完全流动和专有化等属性的传统战略资源,数字资源具有更强的可流动性、非专有性及... 数字经济背景下,大量制造企业“借力”数字服务企业来推进其数字创新进程,本文提出数字创新网络嵌入用以表征这一现象。相比于具有高价值、相对静态、不完全流动和专有化等属性的传统战略资源,数字资源具有更强的可流动性、非专有性及高价值依附属性,因此,基于传统创新网络嵌入的“祝福”及“诅咒”机制来解释数字创新网络嵌入与新产品开发绩效间的关系会陷入理论解释力不足的困境。本文从数字资源的属性出发,基于资源编排理论与动态能力理论,引入大数据能力为中介变量,组织结构柔性为调节变量,构建了数字创新网络嵌入影响新产品开发绩效的过程机制研究框架,以探究数字赋能制造企业新产品开发的理论路径。本文以华南地区559家制造企业为研究对象,对该研究框架进行检验,结果表明:(1)数字创新网络结构、关系嵌入与新产品开发绩效均呈倒U型关系;(2)大数据能力在适度数字创新网络嵌入与新产品开发绩效间的关系中发挥中介作用,但是,在高度数字创新网络嵌入情境下,大数据能力在数字创新网络结构、关系嵌入与新产品开发绩效间的关系中均无显著的中介效应;(3)组织结构柔性正向调节数字创新网络关系嵌入与大数据能力、新产品开发绩效间的关系,且存在有中介的调节作用,但在数字创新网络结构嵌入发挥影响的过程中调节效应不显著。研究结论对数字创新网络嵌入情境下制造企业提升新产品开发绩效的实践探索具有启示价值。 展开更多
关键词 数字创新网络结构嵌入 数字创新网络关系嵌入 大数据能力 组织结构柔性 新产品开发绩效
原文传递
Data embedding based on pixel value differencing and modulus function using indeterminate equation 被引量:2
14
作者 Wang Zhao Zhang Jie +1 位作者 Liao Xin Wen Qiaoyan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第1期95-100,共6页
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem... An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods. 展开更多
关键词 pixel value differencing modulus function indeterminate equation data embedding
原文传递
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:3
15
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
A Novel Data Embedding Method for H.264 Stereo Video Codec with Joint Prediction Scheme
16
作者 GAO Minfang,JI Xiaoyong,WANG Yuanqing Department of Electronic Science and Engineering,Nanjing University,Nanjing 210093,Jiangsu,China 《Wuhan University Journal of Natural Sciences》 CAS 2010年第1期51-56,共6页
It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the refere... It is important to reduce data redundancy of stereo video in practical applications. In this paper,first,a data embedding method for stereo video(DEMSV) is investigated by embedding the encoding data into the reference frame to encode stereo video. It can use only one channel to transfer all the video data and the receiver can choose a monocular video decoder or stereo video decoder adaptively. Then,introducing the joint prediction scheme in the coding process of DEMSV,we propose a novel data embedding method for H.264 stereo video codec with joint prediction scheme(DEMSV-JPS) to achieve high coding efficiency. Experimental results show that the proposed method can obtain high peak signal-to-noise ratio(PSNR) and compression ratio(at least 33 dB for the test sequence) . Comparing the testing methods using JPS and without using JPS,we prove that JPS can further improve the objective and visual quality. DEMSV-JPS shows such advantages and will be suitable to applications in real-time environments of stereo-video transmission. 展开更多
关键词 data embedding method H.264 stereo image stereo video joint prediction scheme (JPS)
原文传递
A Partition Checkpoint Strategy Based on Data Segment Priority
17
作者 LIANG Ping LIU Yunsheng 《Wuhan University Journal of Natural Sciences》 CAS 2012年第2期109-113,共5页
A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to r... A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to reduce the number of the transactions missing their deadlines and the recovery time.The partition checkpoint strategy takes into account the characteristics of the data and the transactions associated with it;moreover,it partitions the database according to the data segment priority and sets the corresponding checkpoint frequency to each partition for independent checkpoint operation.The simulation results show that the partition checkpoint strategy decreases the ratio of trans-actions missing their deadlines. 展开更多
关键词 embedded real-time main memory database systems database recovery partition checkpoint data segment priority
原文传递
创新生态系统双重网络嵌入对企业创新的影响机制 被引量:12
18
作者 许冠南 胡伟婕 +1 位作者 周源 吴晓波 《管理科学》 CSSCI 北大核心 2022年第3期73-86,共14页
随着科技创新活动不断突破地域、组织和技术的界限,创新研究对象由单个企业扩展到创新生态系统。创新生态系统涵盖知识和商业两个层面,其组织间联结形成了复杂交互的网络,但已有研究或囿于知识经济或商业经济某一视域,或侧重于宏观环境... 随着科技创新活动不断突破地域、组织和技术的界限,创新研究对象由单个企业扩展到创新生态系统。创新生态系统涵盖知识和商业两个层面,其组织间联结形成了复杂交互的网络,但已有研究或囿于知识经济或商业经济某一视域,或侧重于宏观环境或微观个体某一层面,缺乏从社会网络中观视角对创新生态系统中科技与市场联动作用机制的深入探讨。基于社会网络理论,把创新生态系统解构为组织间交互联结而形成的知识网络和商业网络,从网络嵌入视角构筑创新生态系统知识–商业双重网络嵌入分析框架,提出双重网络嵌入及其交互作用对企业创新影响机制的概念模型。结合企业增值税发票数据库、国家知识产权局专利数据库和中国工业企业数据库提取海量多源异构数据,对国家制造强国建设中某重点城市数控机床产业相关企业开展实证研究。利用社会网络分析方法构建150 856家机构的商业网络、48 310家机构的知识网络,获取企业在创新生态系统中的双重网络嵌入信息,并进一步对其中349家核心企业进行负二项回归分析,以对研究假设进行检验。研究结果表明,创新生态系统知识网络嵌入连通度和支配度对企业技术创新均有显著正向影响,且二者作用效果没有显著性差异;创新生态系统商业网络嵌入支配度对企业技术创新有显著正向影响,但商业网络嵌入连通度对企业技术创新的影响并不显著;创新生态系统知识网络嵌入支配度与商业网络嵌入支配度的交互作用能正向促进企业技术创新,但知识网络与商业网络嵌入连通度的交互作用并不显著。研究结果弥补了已有创新生态系统研究中知识经济与商业经济彼此割裂的缺陷,丰富了创新生态系统中科技与市场联动和协同的理论基础,拓展了创新生态系统作用机制的网络内涵,为中国构筑和完善创新生态系统、促进创新驱动发展提供政策建议。 展开更多
关键词 创新生态系统 网络嵌入 多源异构数据 社会网络分析
原文传递
全球价值链嵌入能提升工业转型升级效果吗——基于中国工业面板数据的实证检验 被引量:37
19
作者 王玉燕 林汉川 《国际贸易问题》 CSSCI 北大核心 2015年第11期51-61,共11页
国内外环境的新趋势与新特征,导致中国工业转型升级迫在眉睫。本文基于经济效益、技术创新、结构优化以及绿色驱动四大要素,构建工业转型升级效果评价体系,并运用1999-2012年23个工业行业的面板数据,测算中国工业转型升级效果。测算结... 国内外环境的新趋势与新特征,导致中国工业转型升级迫在眉睫。本文基于经济效益、技术创新、结构优化以及绿色驱动四大要素,构建工业转型升级效果评价体系,并运用1999-2012年23个工业行业的面板数据,测算中国工业转型升级效果。测算结果表明,中国工业转型升级效果变动较大,整体呈上升趋势,其中转型升级效果最高的是高技术工业,其次是劳动密集型的传统工业,接着依次是技术密集型与资本密集型的传统工业。实证检验结果显示:(1)GVC嵌入程度的加深有利于推动中国工业转型升级,但推动作用在劳动密集型以及高技术工业中较为显著;(2)工业化进程的加快、高技术工业的发展、行业内竞争性的加强以及经济自由度的提升能够推动中国工业转型升级,然而目前金融业的发展非但没能有效推动工业发展,反而限制了工业转型升级的推进。 展开更多
关键词 全球价值链嵌入 工业 转型升级效果 面板数据
原文传递
网络嵌入视角下国内外合作对科研产出的影响差异——以中国干细胞研究机构为例 被引量:13
20
作者 李文聪 何静 董纪昌 《科学学与科学技术管理》 CSSCI CSCD 北大核心 2017年第1期98-107,共10页
利用中国干细胞研究机构的合著论文数据,分析了科研机构在国际合作网络和国内合作网络中的位置嵌入、关系嵌入和结构嵌入对论文发表数和论文被引频次为代表的科研产出的影响。结果显示,科研机构在国际合作网络中占据中心位置对科研产出... 利用中国干细胞研究机构的合著论文数据,分析了科研机构在国际合作网络和国内合作网络中的位置嵌入、关系嵌入和结构嵌入对论文发表数和论文被引频次为代表的科研产出的影响。结果显示,科研机构在国际合作网络中占据中心位置对科研产出质量有正向影响,在国内合作网络中占据中心位置则对提高科研产出的数量与质量都有利;在国际和国内合作中,加强与合作伙伴的关系都能够促进科研产出,并且加强与国内合作伙伴的关系更有效;在国际合作网络中,占据结构洞位置能够显著提高科研产出,但在国内合作网络中,占据结构洞位置没有明显的优势。研究认为,科研机构应提高国际合作网络的开放性,加强国内合作关系,发挥内外两方面优势,进而提升科研产出。 展开更多
关键词 网络嵌入 科研产出 科研合作 合著网络 面板数据
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部