A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countrie...Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.展开更多
The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both t...The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.展开更多
The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices...The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.展开更多
In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technolog...In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.展开更多
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
Organized and hosted by the Standardization Administration of China, the National Conference on Technological Innovation of Standardization was held in Beijing on March 13th. In his speech at the conference, Mr. L... Organized and hosted by the Standardization Administration of China, the National Conference on Technological Innovation of Standardization was held in Beijing on March 13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the General Administration of Quality Supervision, Inspection and Quarantine, called for the vigorous implementation of technological standardization strategies to substantially elevate the overall level of Chinese standards. Mr. Li Xueyong, Vice Minister of the Ministry of Science and Technology, attended and addressed the conference, while Mr.Liu Pingjun, Administrator of the Standardization Administration of China, delivered a work report.……展开更多
As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends ...As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.展开更多
Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the r...Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the resources needed to develop standards.Therefore,enterprises actively join technology standard alliances(TSAs)to seek collaborative innovation and develop technology standards to gain more competitive advantages.This study addresses a crucial issue for enterprises in TSAs and attempts to help them overcome the confines of organisational distance(OD)and improve technology standard alliance performance(TSAP).Through an empirical study of 325 Chinese information and manufacturing enterprises participating in TSAs,we find that OD negatively affects TSAP,and that exploratory learning(ERL)and exploitative learning(EIL)play mediating roles in the relationship between OD and TSAP.The innovation climate(IC)plays a moderating role in the relationship between OD and ERL,and OD and EIL.The results might deepen the understanding of OD in the context of TSAs and have implications for enterprise standardisation practices.展开更多
Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.H...Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.Here,a flexible organic device with 2,7-dioctyl[1]benzothieno[3,2-b][1]benzothiophene(C8-BTBT)and 2,9-didecyldinaphtho[2,3-b:2′,3′-f]thieno[3,2-b]thiophene(C10-DNTT)heterostructural channel having excellent synaptic behaviors was fabricated on muscovite(MICA)substrate,which has a memory window greater than 20 V.This device shows better electrical characteristics than organic field effect transistors with single organic semiconductor channel.Furthermore,the device simulates organism synaptic behaviors successfully,such as paired-pulse facilitation(PPF),long-term potentiation/depression(LTP/LTD)process,and transition from short-term memory(STM)to long-term memory(LTM)by optical and electrical modulations.Importantly,the neuromorphic computing function was verified using the Modified National Institute of Standards and Technology(MNIST)pattern recognition,with a recognition rate nearly 100%without noise.This research proposes a flexible organic heterojunction with the ultra-high recognition rate in MNIST pattern recognition and provides the possibility for future flexible wearable neuromorphic computing devices.展开更多
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite....This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.展开更多
文摘A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
文摘Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.
基金National "863"Program of China (No. 2005AA123410)
文摘The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.
基金National Natural Science Foundation Subject(60536030,60676038)Tianjin Key Basic Research Project(06YFJZJC00200)
文摘The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.
文摘In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.
文摘This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘 Organized and hosted by the Standardization Administration of China, the National Conference on Technological Innovation of Standardization was held in Beijing on March 13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the General Administration of Quality Supervision, Inspection and Quarantine, called for the vigorous implementation of technological standardization strategies to substantially elevate the overall level of Chinese standards. Mr. Li Xueyong, Vice Minister of the Ministry of Science and Technology, attended and addressed the conference, while Mr.Liu Pingjun, Administrator of the Standardization Administration of China, delivered a work report.……
文摘As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.
基金supported by the National Natural Science Foundation of China(72372051)
文摘Technology standards are key elements for enterprises to dominate a market.The globalisation of innovation has intensified standard competition,making it generally difficult for a single enterprise to obtain all the resources needed to develop standards.Therefore,enterprises actively join technology standard alliances(TSAs)to seek collaborative innovation and develop technology standards to gain more competitive advantages.This study addresses a crucial issue for enterprises in TSAs and attempts to help them overcome the confines of organisational distance(OD)and improve technology standard alliance performance(TSAP).Through an empirical study of 325 Chinese information and manufacturing enterprises participating in TSAs,we find that OD negatively affects TSAP,and that exploratory learning(ERL)and exploitative learning(EIL)play mediating roles in the relationship between OD and TSAP.The innovation climate(IC)plays a moderating role in the relationship between OD and ERL,and OD and EIL.The results might deepen the understanding of OD in the context of TSAs and have implications for enterprise standardisation practices.
基金the National Key Research and Development Program of China(No.2021YFA1202600)the National Natural Science Foundation of China(Nos.92064009 and 22175042)+3 种基金the Science and Technology Commission of Shanghai Municipality(No.22501100900)the China Postdoctoral Science Foundation(Nos.2022TQ0068 and 2023M740644)the Shanghai Sailing Program(Nos.23YF1402200 and 23YF1402400)Jiashan Fudan Institute.
文摘Traditional computing structures are blocked by the von Neumann bottleneck,and neuromorphic computing devices inspired by the human brain which integrate storage and computation have received more and more attention.Here,a flexible organic device with 2,7-dioctyl[1]benzothieno[3,2-b][1]benzothiophene(C8-BTBT)and 2,9-didecyldinaphtho[2,3-b:2′,3′-f]thieno[3,2-b]thiophene(C10-DNTT)heterostructural channel having excellent synaptic behaviors was fabricated on muscovite(MICA)substrate,which has a memory window greater than 20 V.This device shows better electrical characteristics than organic field effect transistors with single organic semiconductor channel.Furthermore,the device simulates organism synaptic behaviors successfully,such as paired-pulse facilitation(PPF),long-term potentiation/depression(LTP/LTD)process,and transition from short-term memory(STM)to long-term memory(LTM)by optical and electrical modulations.Importantly,the neuromorphic computing function was verified using the Modified National Institute of Standards and Technology(MNIST)pattern recognition,with a recognition rate nearly 100%without noise.This research proposes a flexible organic heterojunction with the ultra-high recognition rate in MNIST pattern recognition and provides the possibility for future flexible wearable neuromorphic computing devices.
基金Supported by the National High Technology Research and Development Program of China (863 Program) ( 2007AA01Z411)the National Natural Science Foundation of China ( 60673071, 60970115 )
文摘This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.