As artificial intelligence(AI)technology has continued to develop,its efficient data processing and pattern recognition capabilities have significantly improved the precision and speed of decision-making processes,and...As artificial intelligence(AI)technology has continued to develop,its efficient data processing and pattern recognition capabilities have significantly improved the precision and speed of decision-making processes,and it has been widely applied across various fields.In the field of astronomy,AI techniques have demonstrated unique advantages,particularly in the identification of pulsars and their candidates.AI is able to address the challenges of pulsar celestial body identification and classification because of its accuracy and efficiency.This paper systematically surveys commonly used AI models for pulsar candidate identification,analyzing and discussing the typical applications of machine learning,artificial neural networks,convolutional neural networks,and generative adversarial networks in candidate identification.Furthermore,it explores how th.e introduction of AI techniques not only enhances the efficiency and accuracy of pulsar identification but also provides new perspectives and tools for pulsar survey data processing,thus playing a significant role in advancing pulsar research and the field of astronomy.展开更多
This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introdu...This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introduction to artificial intelligence and big data technology,the application strategies of artificial intelligence and big data technology in computer hardware,software,and network monitoring,as well as the application strategies of artificial intelligence and big data technology in computer process,access,and network control.This analysis aims to serve as a reference for the application of artificial intelligence and big data technology in computer monitoring and control,ultimately enhancing the security of computer systems.展开更多
In recent years,the network public opinion reversal governance events have occurred frequently.Over time,the repeated truth of the matter will not only weaken the rational judgment of the public to a certain extent,so...In recent years,the network public opinion reversal governance events have occurred frequently.Over time,the repeated truth of the matter will not only weaken the rational judgment of the public to a certain extent,so that its negative emotions accumulate,but also have a serious impact on the credibility of the media and the government,and may even further intensify social contradictions.Therefore,in the face of such a complex online public opinion space,accurately identifying the truth behind the incident and how to carry out the reversal of online public opinion governance is particularly critical.And blockchain technology,with its advantages of decentralization and immutable information,provides new technical support for the network public opinion reversal governance.Based on this,this paper gives an overview and analysis of blockchain technology and network public opinion reversal,and on this basis introduces the network public opinion reversal governance mechanism based on blockchain technology,aiming to further optimize the network public opinion reversal governance process,for reference only.展开更多
With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communic...With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system.展开更多
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic...The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.展开更多
The core sampling experiments were conducted after hydraulic fracturing in the three-dimensional development zone of Fuling shale gas.Six coring wells of different well types were systematically designed.Based on the ...The core sampling experiments were conducted after hydraulic fracturing in the three-dimensional development zone of Fuling shale gas.Six coring wells of different well types were systematically designed.Based on the integrated engineering technology of post-fracturing drilling,coring and monitoring of shale and the analysis of fracture source tracing,the evaluation of the fracture network after fracturing in the three-dimensional development of shale gas was conducted.The data of core fractures after fracturing indicate that three major types of fractures are formed after fracturing:natural fractures,hydraulic fractures,and fractures induced by external mechanical force,which are further classified into six subcategories:natural structural fractures,natural bedding fractures,hydraulic fractures,hydraulically activated fractures,drilling induced fractures,and fractures induced by core transportation.The forms of the artificial fracture network after fracturing are complex.Hydraulic fractures and hydraulically activated fractures interweave with each other,presenting eight forms of artificial fracture networks,among which the“一”-shaped fracture is the most common,accounting for approximately 70%of the total fractures.When the distance to the fractured wellbore is less than 35 m,the density of the artificial fracture network is relatively high;when it is 35–100 m,the density is lower;and when it is beyond 100 m,the density gradually increases.The results of the fracture tracing in the core sampling area confirm that the current fracturing technology can essentially achieve the differential transformation of the reservoir in the main area of Jiaoshiba block in Fuling.The three-layer three-dimensional development model can efficiently utilize shale gas reserves,although there is still room for improvement in the complexity and propagation uniformity of fractures.It is necessary to further optimize technologies such as close-cutting combined with temporary blocking and deflection within fractures or at fracture mouths,as well as limited flow perforation techniques,to promote the balanced initiation and extension of fractures.展开更多
Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy o...Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens...With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.展开更多
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant...[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.展开更多
This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to ...This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to elucidate the mechanism of action of Yigong Sang,a traditional Chinese medicine(TCM),in the treatment of gastric cancer(GC).The mechanism of action of Yigong Sang in the treatment of GC has not yet been elucidated because it is composed of multiple Chinese medicines with multiple components and multiple targets.The emergence of network pharmacology and bioinformatics analysis helps explain the mechanism of action of TCM in preventing and treating GC,and provides a possibility for TCM to transform from empirical to evidence-based medicine.This is of great significance for the application of TCM in oncology,new drug development,formula optimization,and the improvement of clinical efficacy.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. I...Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.展开更多
Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies...Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.展开更多
In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm i...In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.展开更多
The increasing availability of ubiquitous sensor data on the built environment holds great potential for a new generation of travel and mobility research.Bluetooth technology,for example,is already vastly used in vehi...The increasing availability of ubiquitous sensor data on the built environment holds great potential for a new generation of travel and mobility research.Bluetooth technology,for example,is already vastly used in vehicular transportation management solutions and services.Current studies discuss the potential of this emerging technology for pedestrian mobility research,but it has yet to be examined in a large urban setting.One of the main problems is detecting pedestrians from Bluetooth records since their behavior and movement patterns share similarities with other urban transportation modes.This study aims to accurately detect pedestrians using a network of 65 Bluetooth detectors located in Tel-Aviv,Israel,which record on average over 60,000 unique daily Bluetooth Media-Access-Control addresses.We propose a detection methodology that includes system calibration,effective travel time calculation,and classification by velocity that takes into consideration the probability of vehicular traffic jams.An evaluation of the proposed methodology presents a promising pedestrian detection accuracy rate of 89%.We showcase the results of pedestrian traffic analysis,together with a discussion on the data analysis challenges and limitations.To the best of our knowledge,this work is the first to analyze pedestrian records detection from a Bluetooth network employed in a dynamic urban environment setting.展开更多
Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology...Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It...The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.展开更多
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr...Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .展开更多
基金supported by the National Key R&D Program of China(2021YFC2203502 and 2022YFF0711502)the National Natural Science Foundation of China(NSFC)(12173077)+4 种基金the Tianshan Talent Project of Xinjiang Uygur Autonomous Region(2022TSYCCX0095 and 2023TSYCCX0112)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(PTYQ2022YZZD01)China National Astronomical Data Center(NADC)the Operation,Maintenance and Upgrading Fund for Astronomical Telescopes and Facility Instruments,budgeted from the Ministry of Finance of China(MOF)and administrated by the Chinese Academy of Sciences(CAS)Natural Science Foundation of Xinjiang Uygur Autonomous Region(2022D01A360)。
文摘As artificial intelligence(AI)technology has continued to develop,its efficient data processing and pattern recognition capabilities have significantly improved the precision and speed of decision-making processes,and it has been widely applied across various fields.In the field of astronomy,AI techniques have demonstrated unique advantages,particularly in the identification of pulsars and their candidates.AI is able to address the challenges of pulsar celestial body identification and classification because of its accuracy and efficiency.This paper systematically surveys commonly used AI models for pulsar candidate identification,analyzing and discussing the typical applications of machine learning,artificial neural networks,convolutional neural networks,and generative adversarial networks in candidate identification.Furthermore,it explores how th.e introduction of AI techniques not only enhances the efficiency and accuracy of pulsar identification but also provides new perspectives and tools for pulsar survey data processing,thus playing a significant role in advancing pulsar research and the field of astronomy.
文摘This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introduction to artificial intelligence and big data technology,the application strategies of artificial intelligence and big data technology in computer hardware,software,and network monitoring,as well as the application strategies of artificial intelligence and big data technology in computer process,access,and network control.This analysis aims to serve as a reference for the application of artificial intelligence and big data technology in computer monitoring and control,ultimately enhancing the security of computer systems.
基金Gansu Provincial Department of Education:Innovation Fund Project for College Teachers:Research on the Governance of Network Public Opinion Reversal Based on Blockchain Technology(NO.2025A-137)Teaching Reform Research at the School Level of Gansu University of Political Science and Law in 2024:Research and Implementation of CSCW Cloud Storage Collective Lesson Preparation System Based on Blockchain Technology(NO.GZJG2024-A04)+1 种基金2024 Gansu University of Political Science and Law“Three in One Education”Research:Project Research and Implementation of CSCW Network Teaching Platform Based on Web in the Direction of Network Education(NO.GZSQYR-37)2024 Lanzhou Philosophy and Social Sciences Planning Project:Research on Cloud Governance of Network Public Opinion for Major Public Events in Lanzhou City(NO.24-B45)。
文摘In recent years,the network public opinion reversal governance events have occurred frequently.Over time,the repeated truth of the matter will not only weaken the rational judgment of the public to a certain extent,so that its negative emotions accumulate,but also have a serious impact on the credibility of the media and the government,and may even further intensify social contradictions.Therefore,in the face of such a complex online public opinion space,accurately identifying the truth behind the incident and how to carry out the reversal of online public opinion governance is particularly critical.And blockchain technology,with its advantages of decentralization and immutable information,provides new technical support for the network public opinion reversal governance.Based on this,this paper gives an overview and analysis of blockchain technology and network public opinion reversal,and on this basis introduces the network public opinion reversal governance mechanism based on blockchain technology,aiming to further optimize the network public opinion reversal governance process,for reference only.
文摘With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system.
基金supported by the National Natural Science Foundation of China(62202215)Liaoning Province Applied Basic Research Program(Youth Special Project,2023JH2/101600038)+2 种基金Shenyang Youth Science and Technology Innovation Talent Support Program(RC220458)Guangxuan Program of Shenyang Ligong University(SYLUGXRC202216)Basic Research Special Funds for Undergraduate Universities in Liaoning Province(LJ212410144067).
文摘The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.
文摘The core sampling experiments were conducted after hydraulic fracturing in the three-dimensional development zone of Fuling shale gas.Six coring wells of different well types were systematically designed.Based on the integrated engineering technology of post-fracturing drilling,coring and monitoring of shale and the analysis of fracture source tracing,the evaluation of the fracture network after fracturing in the three-dimensional development of shale gas was conducted.The data of core fractures after fracturing indicate that three major types of fractures are formed after fracturing:natural fractures,hydraulic fractures,and fractures induced by external mechanical force,which are further classified into six subcategories:natural structural fractures,natural bedding fractures,hydraulic fractures,hydraulically activated fractures,drilling induced fractures,and fractures induced by core transportation.The forms of the artificial fracture network after fracturing are complex.Hydraulic fractures and hydraulically activated fractures interweave with each other,presenting eight forms of artificial fracture networks,among which the“一”-shaped fracture is the most common,accounting for approximately 70%of the total fractures.When the distance to the fractured wellbore is less than 35 m,the density of the artificial fracture network is relatively high;when it is 35–100 m,the density is lower;and when it is beyond 100 m,the density gradually increases.The results of the fracture tracing in the core sampling area confirm that the current fracturing technology can essentially achieve the differential transformation of the reservoir in the main area of Jiaoshiba block in Fuling.The three-layer three-dimensional development model can efficiently utilize shale gas reserves,although there is still room for improvement in the complexity and propagation uniformity of fractures.It is necessary to further optimize technologies such as close-cutting combined with temporary blocking and deflection within fractures or at fracture mouths,as well as limited flow perforation techniques,to promote the balanced initiation and extension of fractures.
基金supported by the National Natural Science Foundation of China(Grant No.71974167).
文摘Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
文摘With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.
基金Supported by the National Social Science Foundation of China:the Sociological Study on the Technology Adoption Behaviors of Farmers(08BSH049)~~
文摘[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.
基金2023 Government-funded Project of the Outstanding Talents Training Program in Clinical Medicine,No.ZF2023165Key Research and Development Projects of Hebei Province,No.18277731D.
文摘This review comments on the article“To explore the mechanism of Yigong San anti-gastric cancer and immune regulation”.We are interested that the article applied network pharmacology and bioinformatics techniques to elucidate the mechanism of action of Yigong Sang,a traditional Chinese medicine(TCM),in the treatment of gastric cancer(GC).The mechanism of action of Yigong Sang in the treatment of GC has not yet been elucidated because it is composed of multiple Chinese medicines with multiple components and multiple targets.The emergence of network pharmacology and bioinformatics analysis helps explain the mechanism of action of TCM in preventing and treating GC,and provides a possibility for TCM to transform from empirical to evidence-based medicine.This is of great significance for the application of TCM in oncology,new drug development,formula optimization,and the improvement of clinical efficacy.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金National Natural Science Foundation of China(No. 60474021)
文摘Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.
文摘Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.
基金This work is supported by the project of Hebei power technology of state grid from 2018 to 2019:Research and application of real-time situation assessment and visualization(SZKJXM20170445).
文摘In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.
文摘The increasing availability of ubiquitous sensor data on the built environment holds great potential for a new generation of travel and mobility research.Bluetooth technology,for example,is already vastly used in vehicular transportation management solutions and services.Current studies discuss the potential of this emerging technology for pedestrian mobility research,but it has yet to be examined in a large urban setting.One of the main problems is detecting pedestrians from Bluetooth records since their behavior and movement patterns share similarities with other urban transportation modes.This study aims to accurately detect pedestrians using a network of 65 Bluetooth detectors located in Tel-Aviv,Israel,which record on average over 60,000 unique daily Bluetooth Media-Access-Control addresses.We propose a detection methodology that includes system calibration,effective travel time calculation,and classification by velocity that takes into consideration the probability of vehicular traffic jams.An evaluation of the proposed methodology presents a promising pedestrian detection accuracy rate of 89%.We showcase the results of pedestrian traffic analysis,together with a discussion on the data analysis challenges and limitations.To the best of our knowledge,this work is the first to analyze pedestrian records detection from a Bluetooth network employed in a dynamic urban environment setting.
基金Major Project of National Social Science Foundation of China,No.21ZDA011。
文摘Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
文摘The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.
基金This work was funded by the Natural Science Foundation of China under Grant 60572066
文摘Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .