期刊文献+
共找到21,557篇文章
< 1 2 250 >
每页显示 20 50 100
Tracking direct and indirect impact on technology and policy of transformative research via ego citation network
1
作者 Xian Li Xiaojun Hu 《Journal of Data and Information Science》 CSCD 2024年第3期65-87,共23页
Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy o... Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research. 展开更多
关键词 Transformative research Nobel Prize winning articles Citation networks technological impact Policy impact
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
2
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology Computer network SECURITY
下载PDF
Computer Network and Database Security Technology Optimization
3
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database Security technology Optimized path
下载PDF
Effect of Technology Support for Social Network on Agricultural Technology Diffusion 被引量:1
4
作者 旷浩源 应若平 《Agricultural Science & Technology》 CAS 2012年第1期98-102,共5页
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant... [Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion. 展开更多
关键词 Agricultural technology diffusion Social network technology support
下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
5
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE technology PRIVACY HOMOMORPHISM collection tree protocol
下载PDF
FORCE RIPPLE SUPPRESSION TECHNOLOGY FOR LINEAR MOTORS BASED ON BACK PROPAGATION NEURAL NETWORK 被引量:7
6
作者 ZHANG Dailin CHEN Youping +2 位作者 AI Wu ZHOU Zude KONG Ching Tom 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第2期13-16,共4页
Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. I... Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network. 展开更多
关键词 Linear motor (LM) Back propagation(BP) algorithm Neural network Anti-disturbance technology
下载PDF
The Comparative Research on the Location Technology of Wireless Sensor Networks 被引量:3
7
作者 Jijun ZHAO Hua LI Xin ZHAO 《Communications and Network》 2009年第2期114-120,共7页
Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies... Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently. 展开更多
关键词 WIRELESS SENSOR networkS LOCATION technology LOCATION ALGORITHM Performance Evaluation
下载PDF
The Optimization Study about Fault Self-Healing Restoration of Power Distribution Network Based on Multi-Agent Technology 被引量:3
8
作者 Fuquan Huang Zijun Liu +2 位作者 Tinghuang Wang Haitai Zhang Tony Yip 《Computers, Materials & Continua》 SCIE EI 2020年第10期865-878,共14页
In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm i... In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid. 展开更多
关键词 Multi agent technology power distribution network fault self-healing
下载PDF
Modern technology-based exploration of mechanism of traditional Chinese medicine in prevention and treatment of gastric cancer
9
作者 De-Hui Li Rui-Qi Feng 《World Journal of Gastrointestinal Oncology》 SCIE 2024年第9期3747-3751,共5页
This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to ... This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to elucidate the mechanism of action of Yigong Sang,a traditional Chinese medicine(TCM),in the treatment of gastric cancer(GC).The mechanism of action of Yigong Sang in the treatment of GC has not yet been elucidated because it is composed of multiple Chinese medicines with multiple components and multiple targets.The emergence of network pharmacology and bioinformatics analysis helps explain the mechanism of action of TCM in preventing and treating GC,and provides a possibility for TCM to transform from empirical to evidence-based medicine.This is of great significance for the application of TCM in oncology,new drug development,formula optimization,and the improvement of clinical efficacy. 展开更多
关键词 Gastric cancer Traditional Chinese medicine MECHANISM network pharmacology BIOINFORMATICS New technology
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
10
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights Management technology ZTE ISDB ATSC
下载PDF
OAM Technology of Packet Transport Network 被引量:1
11
作者 He Tingzong(ZTE Corporation,Shenzhen 518005,P.R.China) 《ZTE Communications》 2009年第1期33-35,共3页
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It... The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions. 展开更多
关键词 OAM technology of Packet Transport network PBT PTN MPLS
下载PDF
Wireless Mesh Technology and Network 被引量:1
12
作者 Zhu Jinkang (University of Science and Technology of China , Hefei 230027, China ) 《ZTE Communications》 2008年第2期1-6,共6页
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr... Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles . 展开更多
关键词 MESH Wireless Mesh technology and network WMN
下载PDF
Multi-Radio Cooperation Technology and Heterogeneous Network Convergence 被引量:1
13
作者 Huang Chuan, Zheng Baoyu (Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2008年第3期29-33,共5页
The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radi... The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible. 展开更多
关键词 RADIO RATE data Multi-Radio Cooperation technology and Heterogeneous network Convergence MRC WMN
下载PDF
Social networks, social capital,and the use of information technology in the urban village:A study of community groups in Manchester, England 被引量:3
14
作者 Kate WILLIAMS 《Chinese Journal of Library and Information Science》 2011年第Z1期35-48,共14页
Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at... Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose. 展开更多
关键词 Social network Information technology Social capital theory
下载PDF
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
15
作者 Ackim Lutepo Kai Zhang 《Communications and Network》 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence network technology Internet of Things (IoT) CYBERSECURITY Mobile Communication
下载PDF
Satellite E2E Network Slicing Based on 5G Technology 被引量:1
16
作者 ZHANG Jing WEI Xiao +1 位作者 CHENG Junfeng FENG Xu 《ZTE Communications》 2020年第4期26-33,共8页
We investigate the design of satellite network slicing for the first time to provide customized services for the diversified applications,and propose a novel scheme for satellite end-to-end(E2E) network slicing based ... We investigate the design of satellite network slicing for the first time to provide customized services for the diversified applications,and propose a novel scheme for satellite end-to-end(E2E) network slicing based on 5G technology,which provides a view of common satellite network slicing and supports flexible network deployment between the satellite and the ground.Specifically,considering the limited satellite network resource and the characteristics of the satellite channel,we propose a novel satellite E2E network slicing architecture.Therein,the deployment of the network functions between the satellite and the ground is coordinately considered.Subsequently,the classification and the isolation technologies of satellite network sub-slices are proposed adaptively based on 5G technology to support resource allocation on demand.Then,we develop the management technologies for the satellite E2E network slicing including slicing key performance indicator(KPI) design,slicing deployment,and slicing management.Finally,the analysis of the challenges and future work shows the potential research in the future. 展开更多
关键词 satellite communications E2E network slicing diversified applications 5G technology
下载PDF
Research on the Application of Computer Network Technology in Electronic Information Engineering 被引量:1
17
作者 Zhiwu Cui 《Journal of Electronic Research and Application》 2022年第3期1-5,共5页
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g... Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering. 展开更多
关键词 Computer network technology Electronic information engineering Application and management
下载PDF
Communication Technology and Application of Seismic Precursor Network Instrument
18
作者 Jianguo Wang Wei Wang +2 位作者 Huiqin Yao Xun Gao Mingdong Zhang 《Communications and Network》 2013年第1期1-4,共4页
In this paper, the communication technology of seismic precursor network instrument is introduced, including instruction format and returned information format of instrument login, status information acquisition, and ... In this paper, the communication technology of seismic precursor network instrument is introduced, including instruction format and returned information format of instrument login, status information acquisition, and current measured data acquisition. The remote monitoring alarm software is based on this technology, and also introduced that the structure of monitoring information table, abnormal alarm index, and monitoring strategy. The application of the software raises instrument running rate and observation data quality. 展开更多
关键词 network Instrument COMMUNICATION technology REMOTE MONITORING ALARM
下载PDF
Rationalizing the Use of Water in Industry—Part 1: Summary of the Instruments Developed by the Clean Technology Network in the State of Bahia and Main Results Obtained
19
作者 Asher Kiperstok Karla Esquerre +2 位作者 Ricardo Kalid Emerson Sales Geiza Oliveira 《Journal of Environmental Protection》 2013年第5期486-496,共11页
Based on cleaner production concepts, a method for water use minimization has been developed by the Clean Technology Network of Bahia (TECLIM) at one of the largest industrial complexes in Latin America located in the... Based on cleaner production concepts, a method for water use minimization has been developed by the Clean Technology Network of Bahia (TECLIM) at one of the largest industrial complexes in Latin America located in the State of Bahia, Brazil. This method is concerned with an area of secondary interest to the productive sector: the use of water. Based on the best cleaner production principles (CP), nine instruments have been developed during cooperative projects with chemical, petrochemical and copper metallurgical industries. These instruments are described in Part 2 of this paper [1]. The main benefits derived from partnership schemes include: a reduction in water consumption and effluent generation;the development of a techno-operational culture to increase eco-efficiency;and the introduction of conceptual projects to ensure the continuity of the activities in the company after the projects have been completed. The specific consumption of water was reduced by 20% as a consequence of the application of this method in Company A;a specific reduction in the generation of effluents of more than 40% was observed in Company B;a 42% fall in fresh water consumption in Company C;and a 20% decrease in the cost of effluent treatment in Company D. Among the difficulties encountered were the limited time availability of the operators and engineers for the project, the lack of measurement and calibration of available flow meters and the lack of detailed technical data. 展开更多
关键词 WATER Effluent RATIONALIZATION INDUSTRY CLEANER Production Clean technology network (TECLIM)
下载PDF
Rationalizing the Use of Water in Industry—Part 2: Instruments Developed by the Clean Technology Network in the State of Bahia
20
作者 Asher Kiperstok Karla Esquerre +2 位作者 Ricardo Kalid Emerson Sales Geiza Oliveira 《Journal of Environmental Protection》 2013年第5期497-507,共11页
The instruments developed by the Clean Technology Network of Bahia (TECLIM) at the Federal University of Bahia (UFBA) (cited in Part 1 of this paper) are presented. Factors regarding water management in industry were ... The instruments developed by the Clean Technology Network of Bahia (TECLIM) at the Federal University of Bahia (UFBA) (cited in Part 1 of this paper) are presented. Factors regarding water management in industry were examined, on the basis of experience acquired over the period of a decade in cooperative research projects with large industrial process plants located mostly in the Camacari Petrochemical Complex, Bahia State, Brazil. The main results consist of training about 1700 industry professionals in CP, the identification of about 500 ideas for the rationalization of water use, the presentation and publication of 90 articles in journals, conferences and other academic events, identification of ideas with potential water savings estimated at around 1400 t·h–1 and the reduction of at least 500 t·h–1 in effluents. Other sectors that make use of water, for example public buildings, commercial buildings, homes, shopping centers and airports can adapt and use the TECLIM method as will be exemplified. 展开更多
关键词 WATER Effluent RATIONALIZATION INDUSTRY CLEANER Production Clean technology network (TECLIM)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部