When computers and communication devices are available everywhere in the future,the categories of communication will expand to cover not only the man-man and the man-machine,but also the machine-machine(M2M)communicat...When computers and communication devices are available everywhere in the future,the categories of communication will expand to cover not only the man-man and the man-machine,but also the machine-machine(M2M)communication.Someday,the traffic generated by machines will greatly exceed those of man-machine and man-man applications.Large numbers of M2M applications will need various wireless networks to support them.This paper introduces the characteristics,advantages and disadvantages of the currently available various wireless network technologies,including WiFi,Bluetooth,ZigBee,passive RFID and the 802.15 standard networks.展开更多
The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. Howev...The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities.展开更多
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni...Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.展开更多
This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also descri...This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also described.展开更多
To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public En...To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode,展开更多
Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photogr...Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photograph of Earth from a record distance of about 6 billion kilometers, all these and many other incredible achievements would have been impossible without the increasingly advanced space communication and network technologies [1]. Nowadays, these emerging space technologies have made their ambitious move toward commercialization and have been anticipated as an indispensable enabling component of the sixth-generation (6G) communications networks. For instance, numerous enterprises have envisaged massive deployment of low Earth orbit (LEO) constellations to complement the terrestrial networks and provide ubiquitous connectivity through their global footprint [2,3]. Nevertheless, entangled by terrestrial and aerospace components, the sophisticated 6G networks will involve new challenges and paradigm shifts in architectural, management, operational, and signal processing design [4–6].展开更多
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth...With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.展开更多
The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks(WMNs).There is a rule for wireless Ad hoc networks that ...The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks(WMNs).There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases,so it is hard to establish a large-scale wireless Mesh network.Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network.This article discusses key scalability technologies for Mesh Base Stations(BSs)and Mesh Mobile Stations(MSs),such as channel allocation,intelligent routing,multi-antenna,node classification,Quality of Service(QoS)differentiation and cooperative transmission.展开更多
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications.As a standard of broadband wireless access systems,IEEE 802.16 adopts Orthogonal Frequency Divisi...It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications.As a standard of broadband wireless access systems,IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing(OFDM)and multi-modulation/coding techniques at the physical layer,combines contend and pre-contract mechanisms at the Medium Access Control(MAC)layer.Based on the QoS-related concepts such as connection and service flow,IEEE 802.16 optimizes network entry and initialization,and frame format in order to improve network throughput,reduce network delay,and increase the flexibility of network configuration.Based on IEEE 802.16,WiMAX adopts Point-to-Multipoint(PMP)network topology to realize flexible networking.It is a typical application technology of broadband wireless access systems.展开更多
The network integration provides users with a new network with long connection time and a high data rate when needed,but it also brings the defects of all the networks that integrate together into the integrated netwo...The network integration provides users with a new network with long connection time and a high data rate when needed,but it also brings the defects of all the networks that integrate together into the integrated network.This will cause all kinds of existing and some new security problems in the operation of the integrated network.A complete protection based on recovery is proposed in the paper.It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data.This solution can provide the system with reliable security,and avoid Denial of Service(DoS)of the user.This solution has been proposed lately,and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.展开更多
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris...The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.展开更多
As a smart spectrum sharing technology,Cognitive Radio(CR)is becoming a hot topic in the field of wireless telecommunications.Besides providing traditional services,the cognitive radio network Media Access Control(MAC...As a smart spectrum sharing technology,Cognitive Radio(CR)is becoming a hot topic in the field of wireless telecommunications.Besides providing traditional services,the cognitive radio network Media Access Control(MAC)layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity,without causing any harmful interference to incumbents.Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode,sensing period,sensing time,sensing channel,and sensing quiet period.Access control avoids collision with primary users mainly by cooperation access and transparent access.Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model.Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.Cross-layer design combines MAC layer information with physical layer or higher layers information,such as network layer,transmission layer,to achieve global optimization.展开更多
Based on the latest research findings of 3GPP on network sharing,this paper introduces 4 solutions to WCDMA 3G network sharing:site sharing,common network sharing,geographically split network sharing,and radio access ...Based on the latest research findings of 3GPP on network sharing,this paper introduces 4 solutions to WCDMA 3G network sharing:site sharing,common network sharing,geographically split network sharing,and radio access network sharing.It also analyzes the key network sharing technologies,including the lu-Flex function in Release 5,the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6.展开更多
Satellite-terrestrial networks have garnered significant attention in recent years and are extensively applied in intelligent transportation and emergency rescue.This paper provides a comprehensive review of the lates...Satellite-terrestrial networks have garnered significant attention in recent years and are extensively applied in intelligent transportation and emergency rescue.This paper provides a comprehensive review of the latest research advancements in satellite-terrestrial integrated network(STIN)technologies from a network perspective,dividing STIN technologies into three categories according to network service flows—namely,topology maintenance,network routing,and orchestration transmission technologies.Furthermore,a novel network-layer perspective is considered to examine the applications of STINs across various domains,along with related frameworks,platforms,simulators,and datasets.Finally,this paper explores the mainstream research directions in STIN technologies,with an innovative focus on the network layer.It reviews the existing literature,outlines future trends,and discusses opportunities for collaboration with related fields.展开更多
This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of...This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of determining the structure of the chaotic neural network,the number of input layer nodes of the network is calculated by reconstructing phase space and computing its saturated embedding dimension,and then the number of hidden layer nodes is estimated by trial and error.Finally,this model is applied to predict the retail prices of eggs and compared with ARIMA.The result shows that the chaotic neural network has better nonlinear fitting ability and higher precision in the prediction of weekly retail price of eggs.The empirical result also shows that the chaotic neural network can be widely used in the field of short-term prediction of agricultural prices.展开更多
Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results r...Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results revealed the spatial structure,composition structure,hierarchical structure,group structure,and control structure of Chinese city network,as well as its dynamic factors.The major findings are:1) the spatial pattern presents a diamond structure,in which Wuhan is the central city;2) although the invention patent knowledge network is the main part of the broader inter-city innovative cooperation network,it is weaker than the utility model patent;3) as the senior level cities,Beijing,Shanghai and the cities in the Zhujiang(Pearl) River Delta Region show a strong capability of both spreading and controlling technological knowledge;4) whilst a national technology alliance has preliminarily formed,regional alliances have not been adequately established;5) even though the cooperation level amongst weak connection cities is not high,such cities still play an important role in the network as a result of their location within ′structural holes′ in the network;and 6) the major driving forces facilitating inter-city technological cooperation are geographical proximity,hierarchical proximity and technological proximity.展开更多
The home network is a major concern for the growth of digital and information society.Yet,how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes...The home network is a major concern for the growth of digital and information society.Yet,how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial"bottleneck"in the home network development.The Digital Rights Management(DRM)technology provides total solution for usage,storage,transfer,and tracing the digital contents and rights.Its basic features are systematic and controllability.Considering the growth of the new media and services and the requirements of the Intellectual Property Rights(IPR)protection in a home network,it's necessary to solve consistency problems in usage,storage,and transfer of contents and rights.In addition,it is inevitable to conduct researches of key techniques such as end-to-end secure transmission,conditional access and play,and right description.展开更多
Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology...Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.展开更多
文摘When computers and communication devices are available everywhere in the future,the categories of communication will expand to cover not only the man-man and the man-machine,but also the machine-machine(M2M)communication.Someday,the traffic generated by machines will greatly exceed those of man-machine and man-man applications.Large numbers of M2M applications will need various wireless networks to support them.This paper introduces the characteristics,advantages and disadvantages of the currently available various wireless network technologies,including WiFi,Bluetooth,ZigBee,passive RFID and the 802.15 standard networks.
文摘The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities.
文摘Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.
文摘This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also described.
文摘To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode,
文摘Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photograph of Earth from a record distance of about 6 billion kilometers, all these and many other incredible achievements would have been impossible without the increasingly advanced space communication and network technologies [1]. Nowadays, these emerging space technologies have made their ambitious move toward commercialization and have been anticipated as an indispensable enabling component of the sixth-generation (6G) communications networks. For instance, numerous enterprises have envisaged massive deployment of low Earth orbit (LEO) constellations to complement the terrestrial networks and provide ubiquitous connectivity through their global footprint [2,3]. Nevertheless, entangled by terrestrial and aerospace components, the sophisticated 6G networks will involve new challenges and paradigm shifts in architectural, management, operational, and signal processing design [4–6].
文摘With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.
基金funded by Special Standardization Foundation of the Science and Technology Commission of Shanghai Municipality under Grant 07DZ05018the Natural Science Foundation of Shanghai Municipality under Grant 07ZR14104
文摘The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks(WMNs).There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases,so it is hard to establish a large-scale wireless Mesh network.Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network.This article discusses key scalability technologies for Mesh Base Stations(BSs)and Mesh Mobile Stations(MSs),such as channel allocation,intelligent routing,multi-antenna,node classification,Quality of Service(QoS)differentiation and cooperative transmission.
文摘It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications.As a standard of broadband wireless access systems,IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing(OFDM)and multi-modulation/coding techniques at the physical layer,combines contend and pre-contract mechanisms at the Medium Access Control(MAC)layer.Based on the QoS-related concepts such as connection and service flow,IEEE 802.16 optimizes network entry and initialization,and frame format in order to improve network throughput,reduce network delay,and increase the flexibility of network configuration.Based on IEEE 802.16,WiMAX adopts Point-to-Multipoint(PMP)network topology to realize flexible networking.It is a typical application technology of broadband wireless access systems.
文摘The network integration provides users with a new network with long connection time and a high data rate when needed,but it also brings the defects of all the networks that integrate together into the integrated network.This will cause all kinds of existing and some new security problems in the operation of the integrated network.A complete protection based on recovery is proposed in the paper.It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data.This solution can provide the system with reliable security,and avoid Denial of Service(DoS)of the user.This solution has been proposed lately,and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.
基金This work was funded by the National Natural Science Foundation of China under Grant60473090.
文摘The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.
基金supported by the National Natural Science Foundation of China under Grant No.60772110.
文摘As a smart spectrum sharing technology,Cognitive Radio(CR)is becoming a hot topic in the field of wireless telecommunications.Besides providing traditional services,the cognitive radio network Media Access Control(MAC)layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity,without causing any harmful interference to incumbents.Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode,sensing period,sensing time,sensing channel,and sensing quiet period.Access control avoids collision with primary users mainly by cooperation access and transparent access.Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model.Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.Cross-layer design combines MAC layer information with physical layer or higher layers information,such as network layer,transmission layer,to achieve global optimization.
文摘Based on the latest research findings of 3GPP on network sharing,this paper introduces 4 solutions to WCDMA 3G network sharing:site sharing,common network sharing,geographically split network sharing,and radio access network sharing.It also analyzes the key network sharing technologies,including the lu-Flex function in Release 5,the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6.
基金support from the National Key Research and Development Program of China(2024YFB3108400)the Hubei Province Key Research and Development Program(2024BAB051).
文摘Satellite-terrestrial networks have garnered significant attention in recent years and are extensively applied in intelligent transportation and emergency rescue.This paper provides a comprehensive review of the latest research advancements in satellite-terrestrial integrated network(STIN)technologies from a network perspective,dividing STIN technologies into three categories according to network service flows—namely,topology maintenance,network routing,and orchestration transmission technologies.Furthermore,a novel network-layer perspective is considered to examine the applications of STINs across various domains,along with related frameworks,platforms,simulators,and datasets.Finally,this paper explores the mainstream research directions in STIN technologies,with an innovative focus on the network layer.It reviews the existing literature,outlines future trends,and discusses opportunities for collaboration with related fields.
基金financially supported by the National KeyTechnology R&D Program during the 12th Five-Year Plan period(2012BAH20B04)the 948 Program of Ministry of Agriculture,China(2013-Z1)
文摘This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of determining the structure of the chaotic neural network,the number of input layer nodes of the network is calculated by reconstructing phase space and computing its saturated embedding dimension,and then the number of hidden layer nodes is estimated by trial and error.Finally,this model is applied to predict the retail prices of eggs and compared with ARIMA.The result shows that the chaotic neural network has better nonlinear fitting ability and higher precision in the prediction of weekly retail price of eggs.The empirical result also shows that the chaotic neural network can be widely used in the field of short-term prediction of agricultural prices.
基金Under the auspices of Major Project of National Social Science Foundation of China(No.13&ZD027)National Natural Science Foundation of China(No.41201128,71433008)
文摘Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results revealed the spatial structure,composition structure,hierarchical structure,group structure,and control structure of Chinese city network,as well as its dynamic factors.The major findings are:1) the spatial pattern presents a diamond structure,in which Wuhan is the central city;2) although the invention patent knowledge network is the main part of the broader inter-city innovative cooperation network,it is weaker than the utility model patent;3) as the senior level cities,Beijing,Shanghai and the cities in the Zhujiang(Pearl) River Delta Region show a strong capability of both spreading and controlling technological knowledge;4) whilst a national technology alliance has preliminarily formed,regional alliances have not been adequately established;5) even though the cooperation level amongst weak connection cities is not high,such cities still play an important role in the network as a result of their location within ′structural holes′ in the network;and 6) the major driving forces facilitating inter-city technological cooperation are geographical proximity,hierarchical proximity and technological proximity.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society.Yet,how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial"bottleneck"in the home network development.The Digital Rights Management(DRM)technology provides total solution for usage,storage,transfer,and tracing the digital contents and rights.Its basic features are systematic and controllability.Considering the growth of the new media and services and the requirements of the Intellectual Property Rights(IPR)protection in a home network,it's necessary to solve consistency problems in usage,storage,and transfer of contents and rights.In addition,it is inevitable to conduct researches of key techniques such as end-to-end secure transmission,conditional access and play,and right description.
基金Major Project of National Social Science Foundation of China,No.21ZDA011。
文摘Patent transfer has been regarded as an important channel for the nations and regions to acquire external technology,and also a direct research object to depict the relationship between supply and demand of technology flow.Therefore,based on traceable patent transfer data,this article has established a dual-pipeline theoretical framework of transnational-domestic technology transfer from the interaction of the global and local(glocal)perspective,and combines social networks,GIS spatial analysis as well as spatial econometric model to discover the spatial evolution of China’s transnational technology channels and its determinant factors.It is found that:(1)The spatial heterogeneity of the overall network is significant while gradually weakened over time.(2)The eastward shift of the core cities involved in transnational technology channels is accelerating,from the hubs in North America(New York Bay Area,Silicon Valley,Caribbean offshore financial center,etc.)and West Europe(London offshore financial center etc.)to East Asia(Tokyo and Seoul)and Southeast Asia(Singapore),which illustrates China has decreased reliance on the technology from the USA and West Europe.(3)The four major innovation clusters:Beijing-Tianjin-Hebei region(Beijing as the hub),Yangtze River Delta(Shanghai as the hub),The Greater Bay Area(Shenzhen and Hong Kong as the hubs)and north Taiwan(Taipei and Hsinchu as the hubs),are regarded as global technology innovation hubs and China’s distribution centers in transnational technology flow.Among those,Chinese Hong Kong’s betweenness role of technology is strengthened due to linkage of transnational corporations and their branches,and low tax coverage of offshore finance,thus becoming the top city for technology transfer.Meanwhile,Chinese Taiwan’s core position is diminishing.(4)The breadth,intensity,and closeness of domestic technology transfer are conducive to the expansion of transnational technology import channels.Additionally,local economic level has positive effect on transnational technology transfer channels while technology strength and external economic linkage have multifaceted influences.