期刊文献+
共找到11,847篇文章
< 1 2 250 >
每页显示 20 50 100
UAF-based integration of design and simulation model for system-of-systems
1
作者 FENG Yimin GE Ping +2 位作者 SHAO Yanli ZOU Qiang LIU Yusheng 《Journal of Systems Engineering and Electronics》 2025年第1期108-126,共19页
Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses si... Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach.In this study,a unified requirement modeling approach is proposed based on unified architecture framework(UAF).Theoretical models are proposed which compose formalized descriptions from both topdown and bottom-up perspectives.Based on the description,the UAF profile is proposed to represent the SoS mission and constituent systems(CS)goal.Moreover,the agent-based simulation information is also described based on the overview,design concepts,and details(ODD)protocol as the complement part of the SoS profile,which can be transformed into different simulation platforms based on the eXtensible markup language(XML)technology and model-to-text method.In this way,the design of the SoS is simulated automatically in the early design stage.Finally,the method is implemented and an example is given to illustrate the whole process. 展开更多
关键词 model-based systems engineering unified architecture framework(UAF) system-of-systems engineering model transformation SIMULATION
在线阅读 下载PDF
Architecture to Secure Electrical Control System in Cyber-Physical System
2
作者 Depeng Li 《Journal of Information Security》 2025年第1期149-157,共9页
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc... It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope. 展开更多
关键词 architecture Control System FRAMEWORK
在线阅读 下载PDF
基于SOS-LSTM的核电站隐蔽攻击方法研究
3
作者 王东风 张雄 +2 位作者 黄宇 邓鉴湧 郭峰 《动力工程学报》 CAS CSCD 北大核心 2024年第6期930-938,共9页
针对实现隐蔽攻击需要获取攻击目标高精度估计模型的问题,提出一种基于共生生物搜索算法优化长短期记忆神经网络(SOS-LSTM)的隐蔽攻击方法。首先,将攻击目标的反馈控制器输出和输入信号作为长短期记忆神经网络的数据集,通过训练得到受... 针对实现隐蔽攻击需要获取攻击目标高精度估计模型的问题,提出一种基于共生生物搜索算法优化长短期记忆神经网络(SOS-LSTM)的隐蔽攻击方法。首先,将攻击目标的反馈控制器输出和输入信号作为长短期记忆神经网络的数据集,通过训练得到受攻击区域的估计模型,再利用估计模型设计隐蔽攻击器向受攻击对象施加攻击信号。此外,使用SOS算法优化LSTM的网络参数来提升隐蔽攻击器的性能。对核电站一回路控制系统进行隐蔽攻击的仿真实验结果表明,该攻击方法在对目标控制系统输出信号实现预先设定攻击行为的同时具有较高隐蔽性。 展开更多
关键词 核电站 一回路控制系统 隐蔽攻击 共生生物搜索算法 长短期记忆神经网络
在线阅读 下载PDF
Functionality evaluation of system of systems architecture based on extended influence diagrams 被引量:1
4
作者 ZHANG Mengmeng CHEN Honghui +2 位作者 ZHANG Xiaoxue LUO Aimin LIU Junxian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期510-518,共9页
System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensur... System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensure requirements have been met.Multiple qualities are discussed in the literature of SoSA evaluation, while research on functionality is scarce. In order to assess SoSA functionality, an extended influence diagram(EID) is developed in this paper. Meanwhile, a simulation method is proposed to elicit the conditional probabilities in EID through designing and executing SoSA. An illustrative anti-missile architecture case is introduced for EID development, architecture design, and simulation. 展开更多
关键词 system of systems architecturesosA) functionality evaluation extended influence diagram(EID) anti-missile architecture SIMULATION
在线阅读 下载PDF
Toward Cloud Computing QoS Architecture:Analysis of Cloud Systems and Cloud Services 被引量:21
5
作者 Mohammad Hossein Ghahramani MengChu Zhou Chi Tin Hon 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2017年第1期6-18,共13页
Cloud can be defined as a new computing paradigm that provides scalable, on-demand, and virtualized resources for users. In this style of computing, users can access a shared pool of computing resources which are prov... Cloud can be defined as a new computing paradigm that provides scalable, on-demand, and virtualized resources for users. In this style of computing, users can access a shared pool of computing resources which are provisioned with minimal management efforts of users. Yet there are some obstacles and concerns about the use of clouds. Guaranteeing quality of service QoS by service providers can be regarded as one of the main concerns for companies tending to use it. Service provisioning in clouds is based on service level agreements representing a contract negotiated between users and providers. According to this contract, if a provider cannot satisfy its agreed application requirements, it should pay penalties as compensation. In this paper, we intend to carry out a comprehensive survey on the models proposed in literature with respect to the implementation principles to address the QoS guarantee issue. © 2014 Chinese Association of Automation. 展开更多
关键词 Cloud computing Distributed computer systems System of systems systems engineering Telecommunication services Web services
在线阅读 下载PDF
Modeling the dynamic alignment of business and information systems via the lens of human-centered architecture evolution 被引量:1
6
作者 ZHANG Mengmeng YI Shuanghui +3 位作者 CHEN Honghui LUO Aimin LIU Junxian ZHANG Xiaoxue 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期881-888,共8页
The complexity of business and information systems(IS)alignment is a growing concern for researchers and practitioners alike.The extant research on alignment architecture fails to consider the human viewpoint,which ma... The complexity of business and information systems(IS)alignment is a growing concern for researchers and practitioners alike.The extant research on alignment architecture fails to consider the human viewpoint,which makes it difficult to embrace emergent complexity.This paper contributes to the extant literature in the following ways.First,we combine an enterprise architecture(EA)framework with a human viewpoint to address alignment issues in the architecture design phase;second,we describe a dynamic alignment model by developing a humancentered meta-model that explains first-and second-order changes and their effects on alignment evolution.This paper provides better support for the theoretical research and the practical application of dynamic alignment. 展开更多
关键词 business and information systems(IS)alignment human viewpoint enterprise architecture(EA) META-MODEL dynamic alignment
在线阅读 下载PDF
Ripple-effect analysis for operational architecture of air defense systems with supernetwork modeling 被引量:5
7
作者 Zhigang Zou Fuxian Liu +2 位作者 Shiman Sun Lu Xia Chengli Fan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期249-264,共16页
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model... In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints. 展开更多
关键词 operational architecture air defense system super-network model Laplace spectral radius ripple-effect analysis.
在线阅读 下载PDF
Contribution to Enterprise Intelligent Systems Architecture: Assumptions, Expectations and a Proposal
8
作者 Abdessamad Mouzoune 《Intelligent Information Management》 2012年第6期311-318,共8页
Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are b... Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are built. In the present paper we propose three base assumptions for an enterprise intelligent system architecture as related to 1) Cognitive Enterprise, 2) Embodied Cognition and 3) Agent Paradigm. The aim is to open up possibility to deal with intelligence at the early stages of enterprise architecture and related disciplines such as system engineering and software development. In addi-tion, we suggest possible expectations from Enterprise Intelligent Systems Architecture and propose an architectural frame based on the cognitive architecture CogAff. Compared with similar works, we noted differences in the fact that our work takes into consideration the cognitive aspect of the firm and the general aspect of intelligence. 展开更多
关键词 ENTERPRISE Intelligent systems architecture COGNITIVE ENTERPRISE EMBODIED COGNITION Agent PARADIGM CogAff
在线阅读 下载PDF
Special Section on Energy-Efficient Technologies:NoC Circuits, Architectures, and Systems
9
作者 Xiao-Hang Wang 《Journal of Electronic Science and Technology》 CAS 2014年第4期345-345,共1页
Energy consumption has been one of the major challenges and concerns for the electronic devices design, especially in high-performance multi- and many-core systems. A highly integrated many-core chip is prone to be ex... Energy consumption has been one of the major challenges and concerns for the electronic devices design, especially in high-performance multi- and many-core systems. A highly integrated many-core chip is prone to be extremely high-power consumption that exceeds the chip's power budget set leaded by cooling, packaging and/or the capacity of the power supply. When this situation happens, various parts of the many-core chip will have to be deliberately switched off (darkened) so that the chip is still in compliance with its power budget, which is referred as "dark silicon". Therefore, the research on energy efficient computing is a current trend and will continue to be an active area in the coming years. 展开更多
关键词 and systems architectureS Special Section on Energy-Efficient Technologies
在线阅读 下载PDF
Distributed MPC for Reconfigurable Architecture Systems via Alternating Direction Method of Multipliers
10
作者 Ting Bai Shaoyuan Li Yuanyuan Zou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第7期1336-1344,共9页
This paper investigates the distributed model predictive control(MPC)problem of linear systems where the network topology is changeable by the way of inserting new subsystems,disconnecting existing subsystems,or merel... This paper investigates the distributed model predictive control(MPC)problem of linear systems where the network topology is changeable by the way of inserting new subsystems,disconnecting existing subsystems,or merely modifying the couplings between different subsystems.To equip live systems with a quick response ability when modifying network topology,while keeping a satisfactory dynamic performance,a novel reconfiguration control scheme based on the alternating direction method of multipliers(ADMM)is presented.In this scheme,the local controllers directly influenced by the structure realignment are redesigned in the reconfiguration control.Meanwhile,by employing the powerful ADMM algorithm,the iterative formulas for solving the reconfigured optimization problem are obtained,which significantly accelerate the computation speed and ensure a timely output of the reconfigured optimal control response.Ultimately,the presented reconfiguration scheme is applied to the level control of a benchmark four-tank plant to illustrate its effectiveness and main characteristics. 展开更多
关键词 Alternating direction method of multipliers(ADMM)algorithm distributed control model predictive control(MPC) reconfigurable architecture systems.
在线阅读 下载PDF
A Quarter Century of Work to Revolutionize Architecture, Engineering and Construction Enterprise Information Systems
11
作者 Alain Zarli Patrice Poyet 《Journal of Civil Engineering and Architecture》 2017年第8期715-735,共21页
More than two decades ago, object-oriented representation of AEC (architecture engineering and construction) projects started to offer the promise of seamless communication of semantic data models between computer-b... More than two decades ago, object-oriented representation of AEC (architecture engineering and construction) projects started to offer the promise of seamless communication of semantic data models between computer-based systems used from the design stage to the operation of the facilities. BIM (building information modelling) emerged and appeared as a means to store all relevant data generated during the life-cycle of the facilities. But this upstream view of the built environment, arising from the design and construction stages, extended to the downstream operations where building and industrial facilities appeared more and more as huge dynamic data producers and concentrators while being operated. This created new challenges leading to what is referred to as ISCs (intelligent and smart constructions). The current state of the art is that final constructions still contain various and increasingly versatile control and service systems, which are hardly standardised, and not interconnected among themselves. Monitoring, maintenance and services are done by specialised companies, each responsible of different systems, which are relying on customised software and techniques to meet specific user needs and are based on monolithic applications that require manual configuration for specific uses, maintenance and support. We demonstrate in this paper that the early promises of integration across the actors and along the life-time of facilities have gone a long way but will only be delivered through enhanced standardisation of computerized models, representations, services and operations still not yet fully accomplished 25 years after work started. 展开更多
关键词 architecture engineering and construction building information models semantic interoperability intelligent and smart built environment information systems and sensors for new services.
在线阅读 下载PDF
New Design and Architecture of a Smart Tracker: Flexible and Scalable for PV and CSP Systems
12
作者 Kamal Anoune Mohsine Bouya Abdellatif Ben Abdellah 《Journal of Energy and Power Engineering》 2015年第3期252-258,共7页
This work proposes a new design and architecture of a flexible biaxial solar tracker. A new approach was adopted with the use of a two separated cards, the smart and power card in a scalable concept. This module allow... This work proposes a new design and architecture of a flexible biaxial solar tracker. A new approach was adopted with the use of a two separated cards, the smart and power card in a scalable concept. This module allows a more saving of energy in comparison with the fixed systems for PV (photovoltaic) application and allows hire performances for CSP (concentrated solar power) systems. It provides a significant added value for higher power applications in comparison with the existing system. The developed sun tracking system is autonomous, flexible, scalable and low cost system. 展开更多
关键词 Smart sun tracker flexible architecture PV systems CSP systems energy saving.
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
13
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
Architecture Design for Internet-Based Control Systems
14
作者 Shuanghua Yang Department of Computer Science, Loughborough University, Loughborough, Leicestershire, LE11 3TU UK Liansheng Tan Department of Computer Science, Central China Normal University, Wuhan, PRC Guo-Ping Liu School of Electronics, University of Glamorgan, Prontypridd CF 371DL, UK 《International Journal of Automation and computing》 EI 2004年第1期1-9,共9页
The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control ... The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control systems, from which architectures can be derived. The requirements specifications developed are described in terms of a functional model, which is then extended to form an information architecture. Distinct from the functional model, the information architecture provides an indication as to the architectural structure of subsequently developed Internet-based control systems. Three general control structures are generated from the analysis of an information architecture. An integrated-distributed architecture is derived as an ideal implementation, in which a control system is linked to the Internet at all levels of a control system hierarchy. 展开更多
关键词 Internet based control control system architectures requirements specification functional model information architectures
在线阅读 下载PDF
Advancing Deepfake Detection Using Xception Architecture:A Robust Approach for Safeguarding against Fabricated News on Social Media
15
作者 Dunya Ahmed Alkurdi Mesut Cevik Abdurrahim Akgundogdu 《Computers, Materials & Continua》 SCIE EI 2024年第12期4285-4305,共21页
Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of ... Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of frames and diverse video clips;accuracy levels as high as 99.65%are reported.These are the main reasons for such high efficacy:superior feature extraction capabilities and stable training mechanisms,such as early stopping,characterizing the Xception model.The methodology applied is also more advanced when it comes to data preprocessing steps,making use of state-of-the-art techniques applied to ensure constant performance.With an ever-rising threat from fake media,this piece of research puts great emphasis on stringent memory testing to keep at bay the spread of manipulated content.It also justifies better explanation methods to justify the reasoning done by the model for those decisions that build more trust and reliability.The ensemble models being more accurate have been studied and examined for establishing a possibility of combining various detection frameworks that could together produce superior results.Further,the study underlines the need for real-time detection tools that can be effective on different social media sites and digital environments.Ethics,protecting privacy,and public awareness in the fight against the proliferation of deepfakes are important considerations.By significantly contributing to the advancements made in the technology that has actually advanced detection,it strengthens the safety and integrity of the cyber world with a robust defense against ever-evolving deepfake threats in technology.Overall,the findings generally go a long way to prove themselves as the crucial step forward to ensuring information authenticity and the trustworthiness of society in this digital world. 展开更多
关键词 Deepfake Detection Xception architecture data processing image processing intelligent information systems social media security
在线阅读 下载PDF
CORBA Architecture for the Integration of Add-on Software in Automotive Systems
16
作者 Rajeshwari Hegde Kargal Satyanarayana Gurumurthy 《通讯和计算机(中英文版)》 2010年第10期45-51,共7页
关键词 CORBA体系结构 汽车系统 软件 一体化 自适应巡航控制系统 嵌入式系统 电子稳定程序 电子控制单元
在线阅读 下载PDF
Seismic Imaging and Reservoir Architecture of Sub-Marine Channel Systems Offshore West Nile Delta of Egypt
17
作者 Essam Sharaf Ibrahim Korrat +1 位作者 Hamdy Seisa Eslam Esmaiel 《Open Journal of Geology》 2014年第12期718-735,共18页
Offshore Nile Delta gas reservoirs are dominated by slope-channel systems of Plio-Pleistocene age. High-quality, three-dimensional seismic imaging has significantly helped in defining the geomorphology and architectur... Offshore Nile Delta gas reservoirs are dominated by slope-channel systems of Plio-Pleistocene age. High-quality, three-dimensional seismic imaging has significantly helped in defining the geomorphology and architectures of these channels. Integrating seismic, logs and core data from four wells resulted in understanding of different stages of channel development and reservoir quality. The studied reservoirs that are largely controlled by episodes of transgressive-regressive events resulted in deposition of fine grained sediment and shale. Sienna channel complex consists of unconfined channel system with clearly defined development stages. The stages include amalgamated or stacked channels followed by channel abandonment phases and local flooding events. The depositional pattern continued through the Late Pliocene-Pleistocene. SimSat-P1 and SimSat-P2 reservoirs are characterized by isolated sand bodies, most probably relics of fan depositional setting. The depositional scenario that is largely controlled by successive transgression and flooding events resulted in deposition of interbedded, sheet-like, fine grained sediment and shale. 展开更多
关键词 OFFSHORE NILE DELTA Western NILE DELTA SEISMIC Reservoir architecture SUBMARINE Channel System
在线阅读 下载PDF
对“C^(4)KISR”的再思考
18
作者 王洪迅 王洪雷 +2 位作者 邓靖 向新 王嵘森 《指挥控制与仿真》 2025年第2期1-9,共9页
对“C^(4)KISR/C4ISR”主体要素的传统认知无法体现计算机、通信与其他五项军事要素的关联。为此从体系架构、动态信息流两个视角对C^(4)KISR进行辨析,构建了基本和多C^(4)KISR体系架构,分析了信息流的动态过程,并且着重分析计算机、通... 对“C^(4)KISR/C4ISR”主体要素的传统认知无法体现计算机、通信与其他五项军事要素的关联。为此从体系架构、动态信息流两个视角对C^(4)KISR进行辨析,构建了基本和多C^(4)KISR体系架构,分析了信息流的动态过程,并且着重分析计算机、通信效能对体系的影响。从整个架构的视角,不能仅仅将“C^(4)KISR”视为指挥控制体系,体系效能的增强需要各要素协同增强,否则可能形成体系的短板或堵点。上述研究对“C^(4)KISR”体系合理构建有重要的参考价值。 展开更多
关键词 C^(4)KISR 体系要素 体系架构 动态信息流 体系能力
在线阅读 下载PDF
基于PBL的创新创业课程体系建设:逻辑、困境与路径——以建筑设计类专业为例
19
作者 王林祥 章佳萍 《建筑与文化》 2025年第3期268-271,共4页
创新创业课程体系建设是高校创新创业教育教学的重要内容,也是培养创新创业型人才的重要途径。文章基于问题式学习(PBL)视角,从教师角色的转换、学生地位的凸显、教学资源的整合、实践平台的搭建等角度,提出了创新创业课程体系建设的逻... 创新创业课程体系建设是高校创新创业教育教学的重要内容,也是培养创新创业型人才的重要途径。文章基于问题式学习(PBL)视角,从教师角色的转换、学生地位的凸显、教学资源的整合、实践平台的搭建等角度,提出了创新创业课程体系建设的逻辑理路。在此基础上,从课程内容、教学方法、师资力量、评价机制等层面分析了创新创业课程体系建设存在的现实困境。最后,以建筑设计类专业为例,构建了基于PBL的高校创新创业课程体系建设的路径。 展开更多
关键词 PBL 创新创业 课程体系 建筑设计类专业
在线阅读 下载PDF
未来产业:指标体系与生态架构
20
作者 王珏 《新疆师范大学学报(哲学社会科学版)》 北大核心 2025年第3期81-92,共12页
作为新质生产力最集中的体现,未来产业已成为全球产业布局和竞争的焦点。未来产业具有科技前沿性、战略引领性、高度关联性、长期成长性和不确定性等特征,对经济体系演进和人类社会进步产生深度影响。发展未来产业要形成适应产业发展的... 作为新质生产力最集中的体现,未来产业已成为全球产业布局和竞争的焦点。未来产业具有科技前沿性、战略引领性、高度关联性、长期成长性和不确定性等特征,对经济体系演进和人类社会进步产生深度影响。发展未来产业要形成适应产业发展的无限容纳从传统体系到未来网络的纵向延展、涵盖要素间融合到产业间融合的横向嵌套的创新生态系统。这一创新生态系统包括与新质生产力一脉相承的科技创新生态、具有梯度特征的产业生态、多层次协同的创新生态和面向未来的场景生态,需要从要素投入、产业布局、发展路径和体制机制等方面进行系统谋划。 展开更多
关键词 未来产业 新兴产业 新质生产力 指标体系 生态架构
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部