BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there ar...BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there are no definitive biomarkers for late risk leucopenia prediction.AIM To determine the predictive value of early monitoring of DNA-thioguanine(DNATG)or 6-thioguanine nucleotides(6TGN)for late leucopenia under a NUDT15-guided thiopurine dosing strategy in patients with Crohn’s disease(CD).METHODS Blood samples were collected within two months after thiopurine initiation for detection of metabolite concentrations.Late leucopenia was defined as a leukocyte count<3.5×10^(9)/L over two months.RESULTS Of 148 patients studied,late leucopenia was observed in 15.6%(17/109)of NUDT15/thiopurine methyltransferase(TPMT)normal and 64.1%(25/39)of intermediate metabolizers.In patients suffering late leucopenia,early DNATG levels were significantly higher than in those who did not develop late leucopenia(P=4.9×10^(-13)).The DNATG threshold of 319.43 fmol/μg DNA could predict late leucopenia in the entire sample with an area under the curve(AUC)of 0.855(sensitivity 83%,specificity 81%),and in NUDT15/TPMT normal metabolizers,the predictive performance of a threshold of 315.72 fmol/μg DNA was much more remarkable with an AUC of 0.902(sensitivity 88%,specificity 85%).6TGN had a relatively poor correlation with late leucopenia whether in the entire sample(P=0.021)or NUDT15/TPMT normal or intermediate metabolizers(P=0.018,P=0.55,respectively).CONCLUSION Proactive therapeutic drug monitoring of DNATG could be an effective strategy to prevent late leucopenia in both NUDT15/TPMT normal and intermediate metabolizers with CD,especially the former.展开更多
In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a sign...In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a significant policy innovation of macroeconomic management in the Chinese modernization.Although there are notable distinctions between the Western“Keynesian”and the“nonKeynesian”schools of thought,both of these approaches’core policy goals and methodological roots are the same,composing the traditional Western macro-fiscal approach.This approach faces increasing real dilemmas.China’s proactive fiscal policy,however,places greater emphasis on future potential growth rates in addition to equilibrium between supply and demand,achieving a fiscal policy transformation with a new approach.In this paper we argue that with such a new approach,China should reconsider the nature and reasonable level of the fiscal deficit,the function and risk assessment criteria of government debt,the scope and effects of reductions in taxes and fees,its approach and focus of demand management,and the costs and resulting efficiencies of policies in order to develop a new fiscal policy paradigm that is more in line with its stated goals.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–bod...Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions.展开更多
A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network...A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network.Due to the user mobility and the coverage of small cells,the network load often becomes unbalanced,resulting in poor network performance.Mobility management has become an important issue to ensure seamless communication when users move between cells,and proactive mobility management is one of the important functions of the active Self-Organizing Network(SON).This paper proposes a proactive mobility management framework for active SON,which transforms the original reactive load balancing into a forward-aware and proactive load balancing.The proposed framework firstly uses the BART model to predict the users’temporal and spatial mobility based on a weekly cycle and then formulate the MLB optimization problem based on the soft load.Two solutions are proposed to solve the above MLB problem.The simulation results show that the proposed method can better optimize the network performance and realize intelligent mobile management for the future network.展开更多
With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proac...With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proactive knowledge service is taken as the basic idea in the OPKS. The user knowledge requirement is taken as the driving factor and described by the user knowledge requirement. Ontologies are used to present the semantic of heterogeneous knowledge sources and ontology mapping is used to realize the interoperation of heterogeneous knowledge sources. The required knowledge is found by matching the user knowledge requirement with knowledge sources and is provided to the user proactively. System analysis and design of OPKS is carded on by adopting UML. The OPKS is implemented in Java language. Application in a certain institute shows that the OPKS can raise efficiency of knowledge utilization in knowledge-intensive enterprises.展开更多
Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimen...Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimensions: seeking structural and social job resources, as well as challenges, hindering job demands, optimizing job demands, and delegating tasks. The aim of the present study was to explore the impact of self-efficacy and work engagement on healthcare professionals’ (HP) proactive behavior. A convenience sample of 295 HP working in Primary and Secondary healthcare structures of Northern Greece completed a questionnaire that included: 1) demographic/occupational characteristics, 2) the Job Crafting Scale, 3) the Generalized Self-Efficacy Scale (GSE) and 4) the Utrecht Work Engagement Scale (UWES). Increased age was found to be associated with decreased levels of seeking social job resources (p < 0.01). Education level was positively associated with increased levels of seeking structural job resources (p < 0.01), seeking challenges (p < 0.05), and optimizing job demands (p < 0.05), while job position was found to be negatively related to delegating tasks (p < 0.01). Self-efficacy was positively associated with increased levels of seeking structural resources (p < 0.001), challenges (p < 0.001), and increased levels of optimizing job demands (p < 0.001), while it was positively associated with decreased levels of delegating tasks (p < 0.05). In addition, increased work engagement was found to be associated with increased levels of seeking social job resources (p < 0.05), challenges (p < 0.01), and optimizing job demands (p < 0.01). Findings highlight the importance of self-efficacy, work engagement and individual characteristics in the realization of a resourceful work environment and HP’ adjustment in the organization. Thus, interventions that promote HP’ JC proactive behaviors should be encouraged.展开更多
A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key dis...A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.展开更多
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a...A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.展开更多
Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented f...Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented for its proactive remanufacturing with setting up to explore the best remanufacturing time point in this work.Considering a certain model of long distance pipeline compressor impeller with the Basquin equation and the design method of impeller,the mathematical relationship between the changes of structure and life of the impeller was established.And the service mapping model between the structure and life was set up and simulated by ANSYS software.Thus,the service mapping model was applied to feedback the original design for proactive remanufacturing.In this work,the best proactive remanufacturing time point of impeller was analyzed with the service mapping model,and the structural parameter values could be optimized at this time point.Meanwhile,in the results of this simulation,it proves that the impeller under this optimization performance could satisfy the impeller operating demands.Therefore,comparing with the traditional optimization design method,the remanufacturing optimized design based on the service mapping model is feasible in proactive remanufacturing for sustainable development.展开更多
This paper attempts to broaden the theory of dynamic competences, defining them as the abilities of firms to integrate and reconstruct in a chaotic and complex environment of technical paradigm transformation (TP tra...This paper attempts to broaden the theory of dynamic competences, defining them as the abilities of firms to integrate and reconstruct in a chaotic and complex environment of technical paradigm transformation (TP transformation). We have created a semi-interactive theoretical framework based on dynamic competences, technical paradigms and innovation strategies to investigate how corporate dynamic competences support innovation during TP transformation. Under this theoretical framework, this paper attempts to open the popular question of mobile Internet industry - the black box of "micro innovation" - to conduct an in-depth case study of WeChat's micro-innovation featuring "integration" and "iteration ". The authors have discovered that the success of WeChat can be attributed to the following factors: seizure of strategic opportunities during TP transformation, effective organizational learning and knowledge management, and powerful virtual integration competences across regions, sectors and firms. These factors have led to the rapid, repetitive and precise iteration of innovation based on technical knowledge and user information. Open and coordinated innovation was carried out ahead of competitors, partners and lead customers, and effective quality control of micro-innovation was conducted to mitigate the uncertainties and risks of innovation failures. These factors have enabled WeChat to become a third-party service platform of disruptive innovation and value creation in the mobile lnternet era. The theoretical contributions of this paper are as follows:it has enriche'd the theory of dynamic competences, conducted a groundbreaking analysis on the intrinsic mechanism of micro-innovation strategy for Internet firms from the height of technical paradigms, and elaborated how dynamic competences support innovation strategies during TP transformation. This paper offers theoretical support and practical guidance for Internet firms to innovate in the context of TP transformation.展开更多
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm...This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.展开更多
基金Supported by the National Natural Science Foundation of China,No.82020108031,No.81973398,and No.82104290Guangdong Provincial Key Laboratory of Construction Foundation,No.2020B1212060034Guangdong Basic and Applied Basic Research Foundation,No.2022A1515012549 and No.2023A1515012667.
文摘BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there are no definitive biomarkers for late risk leucopenia prediction.AIM To determine the predictive value of early monitoring of DNA-thioguanine(DNATG)or 6-thioguanine nucleotides(6TGN)for late leucopenia under a NUDT15-guided thiopurine dosing strategy in patients with Crohn’s disease(CD).METHODS Blood samples were collected within two months after thiopurine initiation for detection of metabolite concentrations.Late leucopenia was defined as a leukocyte count<3.5×10^(9)/L over two months.RESULTS Of 148 patients studied,late leucopenia was observed in 15.6%(17/109)of NUDT15/thiopurine methyltransferase(TPMT)normal and 64.1%(25/39)of intermediate metabolizers.In patients suffering late leucopenia,early DNATG levels were significantly higher than in those who did not develop late leucopenia(P=4.9×10^(-13)).The DNATG threshold of 319.43 fmol/μg DNA could predict late leucopenia in the entire sample with an area under the curve(AUC)of 0.855(sensitivity 83%,specificity 81%),and in NUDT15/TPMT normal metabolizers,the predictive performance of a threshold of 315.72 fmol/μg DNA was much more remarkable with an AUC of 0.902(sensitivity 88%,specificity 85%).6TGN had a relatively poor correlation with late leucopenia whether in the entire sample(P=0.021)or NUDT15/TPMT normal or intermediate metabolizers(P=0.018,P=0.55,respectively).CONCLUSION Proactive therapeutic drug monitoring of DNATG could be an effective strategy to prevent late leucopenia in both NUDT15/TPMT normal and intermediate metabolizers with CD,especially the former.
文摘In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a significant policy innovation of macroeconomic management in the Chinese modernization.Although there are notable distinctions between the Western“Keynesian”and the“nonKeynesian”schools of thought,both of these approaches’core policy goals and methodological roots are the same,composing the traditional Western macro-fiscal approach.This approach faces increasing real dilemmas.China’s proactive fiscal policy,however,places greater emphasis on future potential growth rates in addition to equilibrium between supply and demand,achieving a fiscal policy transformation with a new approach.In this paper we argue that with such a new approach,China should reconsider the nature and reasonable level of the fiscal deficit,the function and risk assessment criteria of government debt,the scope and effects of reductions in taxes and fees,its approach and focus of demand management,and the costs and resulting efficiencies of policies in order to develop a new fiscal policy paradigm that is more in line with its stated goals.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
基金supported by the Natural Science Foundation of Hubei Province(2021CFB297)the Natural Science Foundation of Guangdong Province(2022A1515010563).
文摘Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions.
基金supported in part by the Guangdong Basic and Applied Basic Research Foundation under grant 2020A1515110269.
文摘A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network.Due to the user mobility and the coverage of small cells,the network load often becomes unbalanced,resulting in poor network performance.Mobility management has become an important issue to ensure seamless communication when users move between cells,and proactive mobility management is one of the important functions of the active Self-Organizing Network(SON).This paper proposes a proactive mobility management framework for active SON,which transforms the original reactive load balancing into a forward-aware and proactive load balancing.The proposed framework firstly uses the BART model to predict the users’temporal and spatial mobility based on a weekly cycle and then formulate the MLB optimization problem based on the soft load.Two solutions are proposed to solve the above MLB problem.The simulation results show that the proposed method can better optimize the network performance and realize intelligent mobile management for the future network.
基金The National Natural Science Foundation of China(No50674086)Specialized Research Fund for the Doctoral Program of Higher Education (No20060290508)
文摘With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proactive knowledge service is taken as the basic idea in the OPKS. The user knowledge requirement is taken as the driving factor and described by the user knowledge requirement. Ontologies are used to present the semantic of heterogeneous knowledge sources and ontology mapping is used to realize the interoperation of heterogeneous knowledge sources. The required knowledge is found by matching the user knowledge requirement with knowledge sources and is provided to the user proactively. System analysis and design of OPKS is carded on by adopting UML. The OPKS is implemented in Java language. Application in a certain institute shows that the OPKS can raise efficiency of knowledge utilization in knowledge-intensive enterprises.
文摘Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimensions: seeking structural and social job resources, as well as challenges, hindering job demands, optimizing job demands, and delegating tasks. The aim of the present study was to explore the impact of self-efficacy and work engagement on healthcare professionals’ (HP) proactive behavior. A convenience sample of 295 HP working in Primary and Secondary healthcare structures of Northern Greece completed a questionnaire that included: 1) demographic/occupational characteristics, 2) the Job Crafting Scale, 3) the Generalized Self-Efficacy Scale (GSE) and 4) the Utrecht Work Engagement Scale (UWES). Increased age was found to be associated with decreased levels of seeking social job resources (p < 0.01). Education level was positively associated with increased levels of seeking structural job resources (p < 0.01), seeking challenges (p < 0.05), and optimizing job demands (p < 0.05), while job position was found to be negatively related to delegating tasks (p < 0.01). Self-efficacy was positively associated with increased levels of seeking structural resources (p < 0.001), challenges (p < 0.001), and increased levels of optimizing job demands (p < 0.001), while it was positively associated with decreased levels of delegating tasks (p < 0.05). In addition, increased work engagement was found to be associated with increased levels of seeking social job resources (p < 0.05), challenges (p < 0.01), and optimizing job demands (p < 0.01). Findings highlight the importance of self-efficacy, work engagement and individual characteristics in the realization of a resourceful work environment and HP’ adjustment in the organization. Thus, interventions that promote HP’ JC proactive behaviors should be encouraged.
基金Project supported by the National Natural Science Foundation of China(Grant No.60273049)
文摘A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.
文摘A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.
基金Project(2011CB013406)supported by National Basic Research Program of ChinaProjects(51305119,51375133)supported by National Natural Science Foundation of China
文摘Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented for its proactive remanufacturing with setting up to explore the best remanufacturing time point in this work.Considering a certain model of long distance pipeline compressor impeller with the Basquin equation and the design method of impeller,the mathematical relationship between the changes of structure and life of the impeller was established.And the service mapping model between the structure and life was set up and simulated by ANSYS software.Thus,the service mapping model was applied to feedback the original design for proactive remanufacturing.In this work,the best proactive remanufacturing time point of impeller was analyzed with the service mapping model,and the structural parameter values could be optimized at this time point.Meanwhile,in the results of this simulation,it proves that the impeller under this optimization performance could satisfy the impeller operating demands.Therefore,comparing with the traditional optimization design method,the remanufacturing optimized design based on the service mapping model is feasible in proactive remanufacturing for sustainable development.
文摘This paper attempts to broaden the theory of dynamic competences, defining them as the abilities of firms to integrate and reconstruct in a chaotic and complex environment of technical paradigm transformation (TP transformation). We have created a semi-interactive theoretical framework based on dynamic competences, technical paradigms and innovation strategies to investigate how corporate dynamic competences support innovation during TP transformation. Under this theoretical framework, this paper attempts to open the popular question of mobile Internet industry - the black box of "micro innovation" - to conduct an in-depth case study of WeChat's micro-innovation featuring "integration" and "iteration ". The authors have discovered that the success of WeChat can be attributed to the following factors: seizure of strategic opportunities during TP transformation, effective organizational learning and knowledge management, and powerful virtual integration competences across regions, sectors and firms. These factors have led to the rapid, repetitive and precise iteration of innovation based on technical knowledge and user information. Open and coordinated innovation was carried out ahead of competitors, partners and lead customers, and effective quality control of micro-innovation was conducted to mitigate the uncertainties and risks of innovation failures. These factors have enabled WeChat to become a third-party service platform of disruptive innovation and value creation in the mobile lnternet era. The theoretical contributions of this paper are as follows:it has enriche'd the theory of dynamic competences, conducted a groundbreaking analysis on the intrinsic mechanism of micro-innovation strategy for Internet firms from the height of technical paradigms, and elaborated how dynamic competences support innovation strategies during TP transformation. This paper offers theoretical support and practical guidance for Internet firms to innovate in the context of TP transformation.
基金the Natural Science Foun-dations of China(No.62171464,61771487)the Defense Science Foundation of China(No.2019-JCJQ-JJ-221).
文摘This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.