In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies...The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies are introduced into the Metropolitan Area Network(MAN).Ring network control protocols and ring network protection technologies are applied to guarantee manageability and reliability required in the telecom networks.The Ethernet Ring Protection(ERP) and Resilient Packet Ring(RPR) are two different ring protection technologies.The Transport Multi-Protocol Label Switching(T-MPLS) network uses the T-MPLS Shared Protection Ring(TM-SPRing) technology to provide ring protection.Carriers can expand the protection as needed and use appropriate ring technologies to meet the requirements of Carrier Ethernet(CE).展开更多
The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technolog...The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technology and cognitive theory, the evolution from existing radio networks to future reconfigurable radio networks with the cognitive ability becomes possible. Nowadays the research aspects of E2R include the system architecture of reconfigurable radio networks and some key technologies for their evolution.展开更多
As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the rese...As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit.展开更多
With the continuous development and improvement of China's social economy, People's living standards have been improved, computer network technology and it can also be compatible with electronic information en...With the continuous development and improvement of China's social economy, People's living standards have been improved, computer network technology and it can also be compatible with electronic information engineering, Let our country market has produced a lot of new electronic information products, These new electronic products drive socio oeconomic development, The people's living standards have been improved, At the same time, it has also brought convenience to all walks of life in the society;But in the construction of electronic information engineering, The application of computer technology still needs further refinement, There are still some problems in the computer network technology, Therefore, we should attach great importance to the development of computer network technology, Let the computer network technology play a corresponding role in the electronic information engineering, In order to constantly promote the social and economic process.展开更多
Computer network technology plays a core role in electronic information engineering, and has a positive significance in information transmission, data sharing, security protection and other aspects. The integration of...Computer network technology plays a core role in electronic information engineering, and has a positive significance in information transmission, data sharing, security protection and other aspects. The integration of the two plays an important role in promoting the development of electronic information engineering. With the development of computer network technology, it will inevitably be more deeply and widely applied in electronic information engineering, and the two will achieve a deeper integration. The transmission and sharing of network information are completed through electronic information engineering. Computer network technology promotes the development of electronic information engineering. When computer network technology is combined with electronic information engineering, it can fundamentally improve the development level of electronic information engineering. In the development of social economy and science and technology, electronic information engineering will usher in a broader space for development, which is also a demand for computer network technology.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni...Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology...Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.展开更多
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr...Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .展开更多
The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radi...The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.展开更多
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It...The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.展开更多
Networking is the core area of national strategic emerging industry development of information industry; it will play an important role in national economic development. Currently, it is hot issue of global research a...Networking is the core area of national strategic emerging industry development of information industry; it will play an important role in national economic development. Currently, it is hot issue of global research at home and abroad regardless of the mention of its development of a national strategic level, it is called the third wave of the world information industry following the computer, and internet.展开更多
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the...Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.展开更多
Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evo...Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evolution and convergenceof current communication networks. It also fol-展开更多
As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been stan...As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.展开更多
With the continuous development of science and technology and economic level in our country, especially in recent years, the development of Internet technology has brought great convenience to people's work and li...With the continuous development of science and technology and economic level in our country, especially in recent years, the development of Internet technology has brought great convenience to people's work and life. The application of computer network technology is more and more extensive, and it plays a huge role in all walks of life, so the importance of network security is highlighted. Therefore, in vocational education, a group of talents with professional knowledge of computer network security technology will be trained by reforming the teaching mode. This paper is a discussion based on the task-driven teaching reform of computer network security technology in vocational education.展开更多
Background:Risk substances in cosmetics have long been associated with adverse reactions.However,as risk substances become more concealed and diversified,conventional targeted analysis methods are no longer sufficient...Background:Risk substances in cosmetics have long been associated with adverse reactions.However,as risk substances become more concealed and diversified,conventional targeted analysis methods are no longer sufficient to meet regulatory requirements.Objective:To construct a rapid and effective non-targeted screening method for the identification of risk substances,and to provide a high-throughput method for toxicity assessment.Methods:Molecular networking was utilized for the non-targeted screening of risk substances in facial skincare products,and the toxicity of these risk substances was evaluated through molecular docking and quantitative structure-activity relationship(QSAR)models.Results:Through molecular networking,we identified seven known prohibited ingredients,six of which were confirmed using standard substances.In addition,17 potential risk substances were discovered within molecular clusters containing prohibited ingredients,including antibiotics,antihistamines,and phthalates,etc.Notably,chloramphenicol base and N-desmethyl chlorpheniramine exhibited stronger binding affinity to keratin 5/14 than chloramphenicol and chlorpheniramine through molecular docking,respectively.Additionally,toxicity prediction results indicated that the carcinogenicity of antibiotics presented gender differences in mice and rats,and two chlorpheniramine derivatives also showed carcinogenicity in mice.Moreover,of the 24 compounds,11 showed skin sensitization,while 14 caused skin irritation.Furthermore,half of these compounds demonstrated potential developmental toxicity,and only 4-nitrobenzenethiol was found to be mutagenic.Conclusion:In this study,we developed a visualization strategy for non-targeted screening of risk substances and a high-throughput method for initial toxicity assessment of risk substances.展开更多
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
基金supported by the National High-Tech Research and Development Plan of China ("863" Program) under Grant No.2006AA01Z246.
文摘The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies are introduced into the Metropolitan Area Network(MAN).Ring network control protocols and ring network protection technologies are applied to guarantee manageability and reliability required in the telecom networks.The Ethernet Ring Protection(ERP) and Resilient Packet Ring(RPR) are two different ring protection technologies.The Transport Multi-Protocol Label Switching(T-MPLS) network uses the T-MPLS Shared Protection Ring(TM-SPRing) technology to provide ring protection.Carriers can expand the protection as needed and use appropriate ring technologies to meet the requirements of Carrier Ethernet(CE).
基金supported by the National Natural Science Foundation of China under Grant No. 60632030the E3 Project(FP7-ICT-2007-216248) with in Community’s Seventh Framework Program.
文摘The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technology and cognitive theory, the evolution from existing radio networks to future reconfigurable radio networks with the cognitive ability becomes possible. Nowadays the research aspects of E2R include the system architecture of reconfigurable radio networks and some key technologies for their evolution.
文摘As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit.
文摘With the continuous development and improvement of China's social economy, People's living standards have been improved, computer network technology and it can also be compatible with electronic information engineering, Let our country market has produced a lot of new electronic information products, These new electronic products drive socio oeconomic development, The people's living standards have been improved, At the same time, it has also brought convenience to all walks of life in the society;But in the construction of electronic information engineering, The application of computer technology still needs further refinement, There are still some problems in the computer network technology, Therefore, we should attach great importance to the development of computer network technology, Let the computer network technology play a corresponding role in the electronic information engineering, In order to constantly promote the social and economic process.
文摘Computer network technology plays a core role in electronic information engineering, and has a positive significance in information transmission, data sharing, security protection and other aspects. The integration of the two plays an important role in promoting the development of electronic information engineering. With the development of computer network technology, it will inevitably be more deeply and widely applied in electronic information engineering, and the two will achieve a deeper integration. The transmission and sharing of network information are completed through electronic information engineering. Computer network technology promotes the development of electronic information engineering. When computer network technology is combined with electronic information engineering, it can fundamentally improve the development level of electronic information engineering. In the development of social economy and science and technology, electronic information engineering will usher in a broader space for development, which is also a demand for computer network technology.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
基金Major Project of National Social Science Foundation of China,No.21ZDA011。
文摘Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.
基金This work was funded by the Natural Science Foundation of China under Grant 60572066
文摘Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .
基金the Natural Science Foundation of Jiangsu Province under Grant No.BK2007729
文摘The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.
文摘The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.
文摘Networking is the core area of national strategic emerging industry development of information industry; it will play an important role in national economic development. Currently, it is hot issue of global research at home and abroad regardless of the mention of its development of a national strategic level, it is called the third wave of the world information industry following the computer, and internet.
文摘Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.
文摘Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evolution and convergenceof current communication networks. It also fol-
文摘As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.
文摘With the continuous development of science and technology and economic level in our country, especially in recent years, the development of Internet technology has brought great convenience to people's work and life. The application of computer network technology is more and more extensive, and it plays a huge role in all walks of life, so the importance of network security is highlighted. Therefore, in vocational education, a group of talents with professional knowledge of computer network security technology will be trained by reforming the teaching mode. This paper is a discussion based on the task-driven teaching reform of computer network security technology in vocational education.
基金supported by the Scientific and technological innovation project of Guangdong Provincial Drug Administration(ZA20230069,2024ZDZ04)the Science and Technology Plan Project of Guangdong Provincial(2023A1111120025).
文摘Background:Risk substances in cosmetics have long been associated with adverse reactions.However,as risk substances become more concealed and diversified,conventional targeted analysis methods are no longer sufficient to meet regulatory requirements.Objective:To construct a rapid and effective non-targeted screening method for the identification of risk substances,and to provide a high-throughput method for toxicity assessment.Methods:Molecular networking was utilized for the non-targeted screening of risk substances in facial skincare products,and the toxicity of these risk substances was evaluated through molecular docking and quantitative structure-activity relationship(QSAR)models.Results:Through molecular networking,we identified seven known prohibited ingredients,six of which were confirmed using standard substances.In addition,17 potential risk substances were discovered within molecular clusters containing prohibited ingredients,including antibiotics,antihistamines,and phthalates,etc.Notably,chloramphenicol base and N-desmethyl chlorpheniramine exhibited stronger binding affinity to keratin 5/14 than chloramphenicol and chlorpheniramine through molecular docking,respectively.Additionally,toxicity prediction results indicated that the carcinogenicity of antibiotics presented gender differences in mice and rats,and two chlorpheniramine derivatives also showed carcinogenicity in mice.Moreover,of the 24 compounds,11 showed skin sensitization,while 14 caused skin irritation.Furthermore,half of these compounds demonstrated potential developmental toxicity,and only 4-nitrobenzenethiol was found to be mutagenic.Conclusion:In this study,we developed a visualization strategy for non-targeted screening of risk substances and a high-throughput method for initial toxicity assessment of risk substances.