Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy o...Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to ...This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to elucidate the mechanism of action of Yigong Sang,a traditional Chinese medicine(TCM),in the treatment of gastric cancer(GC).The mechanism of action of Yigong Sang in the treatment of GC has not yet been elucidated because it is composed of multiple Chinese medicines with multiple components and multiple targets.The emergence of network pharmacology and bioinformatics analysis helps explain the mechanism of action of TCM in preventing and treating GC,and provides a possibility for TCM to transform from empirical to evidence-based medicine.This is of great significance for the application of TCM in oncology,new drug development,formula optimization,and the improvement of clinical efficacy.展开更多
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni...Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.展开更多
With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no ...With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.展开更多
Objective:To study the mechanism of action of Xiayuxue Tang in treating hepatic fibrosis by combining GEO data mining,network pharmacology,and molecular docking technology,and provide new research directions for the t...Objective:To study the mechanism of action of Xiayuxue Tang in treating hepatic fibrosis by combining GEO data mining,network pharmacology,and molecular docking technology,and provide new research directions for the treatment of hepatic fibrosis.Method:Utilizing multiple databases,we aim to identify the relevant targets of various components in Xiayuxue Tang and their associations with hepatic fibrosis.After pinpointing the key targets through interaction analysis,we will construct both the compound-target network and the protein interaction network for Xiayuxue Tang.Conclusively,we will conduct GO and KEGG enrichment analyses on these key targets,followed by molecular docking verification.Result:Through mining the GEO database,171 related targets were identified.When combined with other databases,a total of 2,343 hepatic fibrosis-related targets were obtained.Xiayuxue Tang comprises 82 related components,which include 26 active components from rhubarb,1 from ground beetle worm,46 from peach kernels,with a total of 314 predicted targets.The GO enrichment analysis revealed 748 biological processes,32 cellular components,and 73 molecular functions,while the KEGG enrichment analysis identified 222 pathways.Molecular docking verification confirmed that effective compounds can bind stably to key proteins,exhibiting strong binding activity.This underscores the potential efficacy of Xiayuxue Tang in addressing hepatic fibrosis.Conclusion:Xiayuxue Tang exerts regulatory effects on hepatic fibrosis through different targets and pathways,suggesting that the herbal compound has the characteristics of multiple pathways and targets.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant...[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. I...Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.展开更多
The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns relat...The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns related to sustainability,climate change,the just energy transition,dynamic operating environments,and complex social challenges.Such transitions present both opportunities and obstacles.The aim of this study is to provide an extensive literature review on energy transition to identify the challenges and strategies associated with navigating transformations in energy systems.Understanding these transformations is particularly critical in the face of the severe consequences of global warming,where an accelerated energy transition is viewed as a universal remedy.Adopting a socio-technological systems perspective,specifically through the application of Actor Network Theory(ANT),this research provides a theoretical foundation while categorising challenges into five distinct domains and outlining strategies across these different dimensions.These insights are specifically tailored for emerging market countries to effectively navigate energy transition while fostering the development of resilient societies.Furthermore,our findings highlight that energy transition encompasses more than a mere technological shift;it entails fundamental changes in various systemic socio-economic imperatives.Through focusing on the role of social structures in transitions,this study makes a significant and innovative contribution to ANT,which has historically been criticised for its limited acknowledgement of social structures.Consequently,we propose an emerging market energy transition framework,which not only addresses technological aspects,but also integrates social considerations.This framework paves the way for future research and exploration of energy transition dynamics.The outcomes of this study offer valuable insights to policymakers,researchers,and practitioners engaged in the mining industry,enabling them to comprehend the multifaceted challenges involved and providing practical strategies for effective resolution.Through incorporating the social dimension into the analysis,we enhance the understanding of the complex nature of energy system transformations,facilitating a more holistic approach towards achieving sustainable and resilient energy transitions in emerging markets and beyond.展开更多
Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies...Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.展开更多
In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm i...In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It...The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.展开更多
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr...Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .展开更多
The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radi...The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.展开更多
Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at...Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose.展开更多
Firms are embedded in complex networks,where diverse ideas combine and generate new ideas.Shareholders of firms are of-ten seen as critical external resources that have significant influence on firm innovation.The cur...Firms are embedded in complex networks,where diverse ideas combine and generate new ideas.Shareholders of firms are of-ten seen as critical external resources that have significant influence on firm innovation.The current literature tends to focus on the rela-tionship between firms and their shareholders,while paying less attention to the connections between firms with the same shareholders.This article identifies two types of network spillover effects,intra-city network effect and inter-city network effect,by visualizing the co-ownership networks in China’s electric vehicle(EV)industry.We find that firms with the same shareholders,which are defined as co-owned EV firms,are more innovative than non-co-owned ones.Furthermore,there are two dominant types of firm co-ownership ties formed by corporate and financial institution shareholders.While corporate shareholders help exploiting local tacit knowledge,financial institutions are more active in bridging inter-city connections.The conclusion is confirmed at both firm and city levels.This paper theor-izes the firm co-ownership network as a new form of institutional proximity and tested the result empirically.For policy consideration,we have emphasized the importance of building formal or informal inter-firm network,and the government should further enhance the knowledge flow channel by institutional construction.展开更多
Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of...Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.71974167).
文摘Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
基金2023 Government-funded Project of the Outstanding Talents Training Program in Clinical Medicine,No.ZF2023165Key Research and Development Projects of Hebei Province,No.18277731D.
文摘This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to elucidate the mechanism of action of Yigong Sang,a traditional Chinese medicine(TCM),in the treatment of gastric cancer(GC).The mechanism of action of Yigong Sang in the treatment of GC has not yet been elucidated because it is composed of multiple Chinese medicines with multiple components and multiple targets.The emergence of network pharmacology and bioinformatics analysis helps explain the mechanism of action of TCM in preventing and treating GC,and provides a possibility for TCM to transform from empirical to evidence-based medicine.This is of great significance for the application of TCM in oncology,new drug development,formula optimization,and the improvement of clinical efficacy.
文摘Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.
文摘With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.
基金funded by the National Natural Science Foundation of China(Grant Nos.82204755,81960751,and 81660705)the Guangxi Young and Middle-aged Teachers’Research Ability Improvement Project(Grant No.2022KY1667)+4 种基金the Guangxi Zhuangyao Pharmaceutical Key Laboratory(Grant Nos.GXZYZZ2019-1,GXZYZZ2020-07)the Guangxi Natural Science Foundation Youth Project(Grant No.2020GXNSFBA297094)the Guangxi University of Traditional Chinese Medicine School-level Project Youth Fund(Grant No.2022QN008)Faculty of Chinese Medicine Science Guangxi University of Chinese Medicine Research Project(2022MS008,2022QJ001)Faculty of Chinese Medicine Science Guangxi University of Chinese Medicine,Autonomous Region-level Innovation and Entrepreneurship Training Program for College Students(S202213643016).
文摘Objective:To study the mechanism of action of Xiayuxue Tang in treating hepatic fibrosis by combining GEO data mining,network pharmacology,and molecular docking technology,and provide new research directions for the treatment of hepatic fibrosis.Method:Utilizing multiple databases,we aim to identify the relevant targets of various components in Xiayuxue Tang and their associations with hepatic fibrosis.After pinpointing the key targets through interaction analysis,we will construct both the compound-target network and the protein interaction network for Xiayuxue Tang.Conclusively,we will conduct GO and KEGG enrichment analyses on these key targets,followed by molecular docking verification.Result:Through mining the GEO database,171 related targets were identified.When combined with other databases,a total of 2,343 hepatic fibrosis-related targets were obtained.Xiayuxue Tang comprises 82 related components,which include 26 active components from rhubarb,1 from ground beetle worm,46 from peach kernels,with a total of 314 predicted targets.The GO enrichment analysis revealed 748 biological processes,32 cellular components,and 73 molecular functions,while the KEGG enrichment analysis identified 222 pathways.Molecular docking verification confirmed that effective compounds can bind stably to key proteins,exhibiting strong binding activity.This underscores the potential efficacy of Xiayuxue Tang in addressing hepatic fibrosis.Conclusion:Xiayuxue Tang exerts regulatory effects on hepatic fibrosis through different targets and pathways,suggesting that the herbal compound has the characteristics of multiple pathways and targets.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
基金Supported by the National Social Science Foundation of China:the Sociological Study on the Technology Adoption Behaviors of Farmers(08BSH049)~~
文摘[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金National Natural Science Foundation of China(No. 60474021)
文摘Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.
基金University of the Witwatersrand Additional funding is from the DSI-National Research Foundation(NRF)Thuthuka Grant(Grant UID:121973)and DSI-NRF CIMERA.
文摘The pursuit of improved quality of life standards has significantly influenced the contemporary mining model in the 21st century.This era is witnessing an unprecedented transformation driven by pressing concerns related to sustainability,climate change,the just energy transition,dynamic operating environments,and complex social challenges.Such transitions present both opportunities and obstacles.The aim of this study is to provide an extensive literature review on energy transition to identify the challenges and strategies associated with navigating transformations in energy systems.Understanding these transformations is particularly critical in the face of the severe consequences of global warming,where an accelerated energy transition is viewed as a universal remedy.Adopting a socio-technological systems perspective,specifically through the application of Actor Network Theory(ANT),this research provides a theoretical foundation while categorising challenges into five distinct domains and outlining strategies across these different dimensions.These insights are specifically tailored for emerging market countries to effectively navigate energy transition while fostering the development of resilient societies.Furthermore,our findings highlight that energy transition encompasses more than a mere technological shift;it entails fundamental changes in various systemic socio-economic imperatives.Through focusing on the role of social structures in transitions,this study makes a significant and innovative contribution to ANT,which has historically been criticised for its limited acknowledgement of social structures.Consequently,we propose an emerging market energy transition framework,which not only addresses technological aspects,but also integrates social considerations.This framework paves the way for future research and exploration of energy transition dynamics.The outcomes of this study offer valuable insights to policymakers,researchers,and practitioners engaged in the mining industry,enabling them to comprehend the multifaceted challenges involved and providing practical strategies for effective resolution.Through incorporating the social dimension into the analysis,we enhance the understanding of the complex nature of energy system transformations,facilitating a more holistic approach towards achieving sustainable and resilient energy transitions in emerging markets and beyond.
文摘Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.
基金This work is supported by the project of Hebei power technology of state grid from 2018 to 2019:Research and application of real-time situation assessment and visualization(SZKJXM20170445).
文摘In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
文摘The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.
基金This work was funded by the Natural Science Foundation of China under Grant 60572066
文摘Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .
基金the Natural Science Foundation of Jiangsu Province under Grant No.BK2007729
文摘The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.
基金supported by the Manchester Digital Development Agency,the University of Manchester Ahmed Iqbal Race Relations Resource Center,the University of Michigan Non-Profit and Public Management Center and the Alliance for Community Technology
文摘Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose.
基金Under the auspices of Natural Science Foundation of China(No.42122006,41971154)。
文摘Firms are embedded in complex networks,where diverse ideas combine and generate new ideas.Shareholders of firms are of-ten seen as critical external resources that have significant influence on firm innovation.The current literature tends to focus on the rela-tionship between firms and their shareholders,while paying less attention to the connections between firms with the same shareholders.This article identifies two types of network spillover effects,intra-city network effect and inter-city network effect,by visualizing the co-ownership networks in China’s electric vehicle(EV)industry.We find that firms with the same shareholders,which are defined as co-owned EV firms,are more innovative than non-co-owned ones.Furthermore,there are two dominant types of firm co-ownership ties formed by corporate and financial institution shareholders.While corporate shareholders help exploiting local tacit knowledge,financial institutions are more active in bridging inter-city connections.The conclusion is confirmed at both firm and city levels.This paper theor-izes the firm co-ownership network as a new form of institutional proximity and tested the result empirically.For policy consideration,we have emphasized the importance of building formal or informal inter-firm network,and the government should further enhance the knowledge flow channel by institutional construction.
基金Under the auspices of China Scholarship Council。
文摘Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.