Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan Oct 2023

Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan

Bulletin of Chinese Academy of Sciences (Chinese Version)

By studying the technological innovation and industrial development process of semiconductor, digital computer and radio, this study analyzes the path, conditions and force of science-based technological innovation and its industrialization, establishes a chain reaction model of large-scale technological innovation and diffusion, and compares it with market-based technological innovation. It is found that the large-scale aggregation of scientific research institutions and industrial laboratories accelerates the speed of technological innovation, and diffuses along two paths of scientific research institutions to enterprises and enterprises to enterprises, forming a chain reaction of large-scale technological innovation. Strategic demand is the basic driving force for the …


On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao Aug 2023

On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …


Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan Aug 2023

Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …


Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi Aug 2023

Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …


From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou Apr 2023

From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …


Thoughts On New It Technique System, Ninghui Sun Jan 2022

Thoughts On New It Technique System, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new period of information society dominated by digital economy. To adapt to the requirements of the new development stage of China, and to achieve the key technologies development, it is necessary to accelerate the construction of a new selfreliance and self-improvement IT technique system. The article gives some thoughts on the demand, principle, and key method on above issues, and the new paradigm of research at Institute of Computing Technology, Chinese Academy of Sciences.


Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun Jan 2022

Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

RISC-Ⅴ has been obtained huge attentions and extensively invested over the past decade due to its exciting slogan that "Instruction Sets Want to be Free". Based on RISC-Ⅴ, we are able to build a "human community with a shared future" in the CPU chip area, although there are still many challenges. China should explore its capability to make more contributions in building the open-source chip ecosystem.


Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang Jan 2022

Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Currently, network technology is deeply integrated with the physical world. Traditional network architectures cannot support the differentiated, customizable, and deterministic needs of industrial Internet and other services. Exploring new network architecture and core technology has officially become the strategic commanding heights of the global Internet competition. To this end, the paper reviews the evolution and trends of the network, analyzes how to achieve high-performance, low-cost, intelligent network development strategies for establishing an autonomous and controllable future network. Two conclusions are drawn as follows. (1) Through the exploration of network construction in recent decades, integration, openness, intelligence, customization and integration of …


Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun Jan 2022

Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

Self-reliance and self-strengthening at high level does not depend on a single technique, but on the formation of an advantageous national tech-system, so called "country-as-a-platform". Information tech-system refers to the whole one that closely connects devices, components, complete machine, system software, middleware, and application software with a series of technical standards and intellectual property rights. We are entering the IT 3.0 era characterized by integration of human-cyber-physical world. The IT 3.0 era will certainly produce a new tech-system different from the IT 1.0 and IT 2.0 eras, which is a rare opportunity for China to build a self-reliance and self-strengthening …


From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan Jan 2022

From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Chip is the foundation of the modern information society. As the world is entering a new era of human-cyber-physical ternary computing, with diverse intelligent applications over trillions of devices, chip with specialized architecture will be heavily demanded in both numbers and types. However, chip design is very costly, which usually requires a long design cycle, complicated process, and high professional developers. Hence, there is a large gap between the need of tremendous chips and the high cost of chip design in the new era. This study proposes Chip Learning, a learning-based method to perform the entire chip design, including logic …


Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie Jan 2022

Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie

Bulletin of Chinese Academy of Sciences (Chinese Version)

In response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing, a new kind of operating system named Ubiquitous Operating System (UOS) is emerging and under exploration for further development. The human-cyberphysical ternary ubiquitous computing has many new features, such as open and dynamic environment, diverse requirements, and complex application scenarios. New ubiquitous applications pose special demands on ubiquitous sensing and connection, lightweight computing and artificial intelligence, dynamic adaptation, feedback and control, natural human-computer-interaction, etc. To support these new requirements, a software definition mechanism is in need to flexibly control hardware, data resources, platforms, and applications. This …


Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun Jan 2022

Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new era of human-cyber-physical ternary computing with diverse intelligent applications over trillions of devices. This calls for a new type of cyberinfrastructure characterized by a planet-scale, high-goodput, low-entropy computing network, colloquially named Information Superbahn. This article highlights the vision of Information Superbahn, including fundamental requirements, key scientific problems, and a candidate system architecture. The goal of building the Information Superbahn is to natively support humancyber-physical systems and low-entropy computing modes, to reduce the effects of systems disorder. Compared with existing network computing systems, such as Internet, cloud computing, big data and Internet of Things, Information …


Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang Jan 2022

Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Cyberspace security has been an important part in ensuring economic development and supporting the progress of modern science and technology. As more and more applications are relying on information technology (IT), it becomes very important to improve the security situation of cyberspace. How to take effective measures to practically improve the cyberspace security situation has become the core problem disscussed in this paper. This paper addresses it from the perspectives of "talent, finance and infrastructure". First, on the premise of insufficient supply of cyberspace security talents, this paper proposes to establish the ability certification of talents transferred from other IT …