Current Issue

  • 2025 Volume 7 Issue 3
    Published: 01 July 2025
      

  • Select all
    |
  • LI Hui, CHEN Shu, TAN Xiao
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]The unique form and systematic characteristics of great power competition, such as system-establishment and whole of society confrontation, multi-domain and multi-depth high-tech containment and counter-containment, and multi-means and multi-element mixed deterrence, determine that national scientific and technological intelligence must have considerable systemic capabilities to match and follow up. [Method/process]This article focuses on scientific and technological intelligence institutions within the traditional system, defines the connotation of national scientific and technological intelligence system capabilities, constructs a six-dimensional capability cognition model of "institutional improvement capability-system coordination capability-resource guarantee capability-technological innovation capability-intelligence shaping capability-safe operation capability", and expounds its main contents. [Result/conclusion]Based on the six-dimensional capability cognition model, this article proposes the main tasks for the development of national scientific and technological intelligence system capabilities, with a view to providing reference for achieving optimal overall emergence of the national scientific and technological intelligence system.
  • YU Chuanming, DENG Bin, ZHANG Zhengang
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]This study addresses the issue of inadequate perception of entity boundaries in traditional character-level modeling-based named entity recognition models by integrating syntax information containing entity boundary features into the task using a multi-head graph attention network with dense connections. This integration enhances the effectiveness of named entity recognition. [Method/process]This study proposes a Syntax-enhanced Boundary-aware Named Entity Recognition Model (SynBNER), which utilizes BERT for text semantic representation and integrates syntax information using a dense-connected graph attention network. This integration incorporates implicit entity boundary information from syntax information into word representations, thereby enhancing the model's entity boundary perception capability. [Result/conclusion]Empirical studies are conducted on the ACE2005, MSRA, and People's Daily datasets, the F1 scores of the SynBNER model are respectively 86.11%, 96.03%, and 95.81%. The experimental results demonstrate that the method of enhancing entity boundary awareness with syntax information can significantly improve the effectiveness of named entity recognition.
  • LIU Jing, JI Jingyu, LIU Chengzhi, CHANG Liyan
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]Under the perspective of privacy protection, exploring the sharing of users' digital reading traces is of great significance for creating a healthy and orderly digital reading environment and promoting the high-quality development of national reading. [Method/process]A tripartite evolutionary game model of users, digital reading platforms and the government is constructed to reveal the dynamic evolution process and stable strategy of each subject's strategy selection through mathematical derivation, and numerical simulation is used to verify the accuracy of the model. [Result/conclusion]The study shows that the strategy choices of users, digital reading platforms and the government are highly coupled, and the users' benefits after sharing reading traces, the loss caused by privacy leakage and the coding cost affect their strategy choices; for the platforms, the extra cost of choosing active protection, the incentive from the government, the fine from the government after privacy leakage and the expected loss are the main factors; the government's strategy is affected by the extra cost and benefits of strict regulation of additional costs and benefits. Based on this, recommendations are made to enhance the benefits for those who read and leave traces and increase the incentives for data sharing; to focus on user privacy protection and enhance the ability to apply data; and to improve data privacy protection laws and optimize the data security regulatory system.
  • WANG Xuefen, GUO LEI, CHANG Liyan, JIANG Zejiao
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]To explore the internal formation mechanism of unplanned irrational online comments is of great significance to promote the governance of cyberspace and the control of user behavior. [Method/process]Based on the dual-system theory, the study constructed a model for the formation mechanism of irrational online comments, and revealed how online disinhibition and the spiral of silence affect individual internal states to stimulate irrational comments through empirical analysis. [Result/conclusion]Research reveals that:compared to mild irrational comments, aggressive irrational comments are more likely to be unplanned behaviors; the cognitive-emotional preoccupation with online comments is the main driving factor for irrational online comments, while the cognitive-behavioral control over online comments plays a partial inhibitory role; online disinhibition intensifies cognitive-emotional preoccupation and weakens cognitive-behavioral control, while the spiral of silence simultaneously strengthens cognitive-emotional preoccupation and cognitive-behavioral control; online disinhibition and the spiral of silence positively affect irrational online comments through the mediating role of cognitive-emotional preoccupation; cognitive-behavioral control serves as a mediating factor in the impact of online disinhibition on aggressive irrational comments.
  • GAO Daobin
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]Placing technology opportunity identification in the perspective of technology attribute analysis and competitive environment scanning provides intelligence support for enterprises to select technology opportunities and formulate technology competitive strategies in complex and changing market competition environments. [Method/process]Using patents as the data source, first, the BERTopic model is used to explore potential technical topics; Secondly, starting from the technical attributes, and from both global and local perspectives, we propose indicators of technical importance and technical attention, and use their cross screening to select candidate sets of technical opportunities; Finally, a market competition intensity index that takes into account market monopoly and market selectivity is proposed, along with a subject competition intensity index that includes the number and distance of competing entities.A two-dimensional technology opportunity competition environment scanning strategic framework is further constructed to identify candidate technology opportunities as medium and low-risk technology opportunities.Take the domestic industrial robot field as an example to conduct empirical research. [Result/conclusion]Based on the technology opportunity identification method presented in this article, a total of 14 candidate technology opportunities in the domestic industrial robot field were screened. Ultimately, 9 potential medium risk technology opportunities and 4 potential low-risk technology opportunities were identified, and the effectiveness of this method was further validated by combining enterprise product information.
  • ZHOU Jie, AN Peijun, XIAO Xiantao
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]Starting from the related concepts of disciplinary topic evolution, this study comprehensively examines the forms and methods of disciplinary topic evolution. It identifies problems with existing concepts and shortcomings in current methods, and suggests directions for improvement, providing a reference for future research in this area. [Method/process]Using a systematic review method, the literature on disciplinary topic evolution from the CNKI and Web of Science, as well as other academic platforms, was analyzed. The study defines related concepts, summarizes the forms of disciplinary topic evolution, and systematically reviews the current state of research on methods for disciplinary topic evolution. It analyzes existing methods from different perspectives: word frequency-based methods, co-word-based methods, citation-based methods, and topic model-based methods, summarizing their respective advantages and disadvantages. [Result/conclusion]This study defines the concept of disciplinary topic evolution, clarifies the forms of disciplinary topic evolution, and summarizes the gaps in existing research, such as the unclear definition of the concept, non-standard evolution forms, single data sources and the limited diversity of analytical methods. Finally, it proposes future directions, including clarifying the connotation and extension of disciplinary topic evolution, standardizing its forms, utilizing multi-source data as data sources, and actively integrating different methods for topic evolution analysis.
  • MAO Taitian, PENG Yihe
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]This article conducts an in-depth exploration of international artificial intelligence (AI) regulatory policies and gains insights into the regulatory focuses and trends of various countries, with the aim of providing valuable references for global AI governance strategies. [Method/process]This paper applies the LDA topic clustering analysis method to conduct an in-depth study of twenty-seven international policy documents. The aim is to accurately identify the topics, analyze the key theme words, and further reveal the regulatory hotspots in the field of artificial intelligence. [Results/conclusion]The study reveals six core regulatory themes: systemic risk assessment, ethical and legal regulation, social impact governance, transparency and trust, innovation and risk control, and global regulatory strategies, and accordingly makes four policy recommendations.
  • LI Qingwei, XU Yan, ZHAO Xueqin
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]To evaluate the information ecological environment quality of online health communities, reveal the problems existing in the information ecological environment quality of online health communities, and put forward specific suggestions, in order to provide reference for the healthy development of online health communities. [Method/process]Firstly, the evaluation index system of online health community information ecological environment quality was constructed through literature investigation and expert investigation. Secondly, AHP is used to construct the evaluation index hierarchy model of online health community information ecological environment quality and calculate the weight of each index. Finally, the fuzzy comprehensive evaluation method is used to conduct an empirical study on the information ecological environment quality of medical and health apps. [Result/conclusion]The final evaluation index system for the information ecological environment quality of online health communities included 8 first-level indicators and 25 second-level indicators, among which the highest weight in the criterion layer was the information ontology environmental factor, and the top three weights in the first-level indicators were health information quality, information policies and regulations, and information security technology. The results of empirical analysis show that the comprehensive score of information ecological environment quality of medical and health apps is not good, which needs to be further improved and promoted.
  • LIU Jiangfeng, WANG Zihui, HU Zhiwei, PEI Lei
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]Clarifying the influencing factors of young scholars' willingness to use AIGC and its path of action,then making effective enhancement strategies,would help to further expand the application of AIGC in academic writing. [Method/process]This paper combs through the studies on AIGC information behavior, and identifys TOE(Technology-Organization-Envifonment,TOE) theory and research life cycle theory as the base theory. Semi-structured interviews were conducted for procedural grounded theory coding. Then, a questionnaire survey and qualitative comparative analysis using fuzzy sets were conducted to obtain the influencing factors grouping path. [Result/conclusion]Five factors, induding content quality, system quality, perceived risk, expectation confirmation, and group norms, together constitute an influential model of willingness to use AIGC in young scholars' academic writing. The group norms analysis produces three paths of high-level willingness to use: system-dominant, expectation-group double-dominant, and content-expectation double-dominant paths. Strategies are proposed to improve the willingness to use AIGC in young scholars' academic paper writing, including improving the quality of content and optimizing the platform system at the technical level, improving the literacy of AI-use and managing expectations at the individual level, and accelerating the formation of norms and encouraging publicity and guidance at the environmental level.
  • LOU Qifeng, MU Dongmei, WANG Shutong, HUANG Lili, JIA Kaikai
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]To propose a link prediction model for completing the knowledge graph of Chinese medicine cases, aiming to fill in the missing information in the knowledge graph,reveal the potential unknown associations,and promote the construction of a more comprehensive and detailed knowledge graph of Chinese medicine cases. [Method/process]Medical cases in the field of TCM asthma were collected and integrated to construct a knowledge graph of TCM asthma diagnosis and treatment. By introducing Dropout regularization and Batch Normalization techniques into the RotatE model, an improved ERDBN model is proposed and applied to the task of refining the asthma diagnosis and treatment knowledge graph. [Result/conclusion]The ERDBN model performance is first tested on four knowledge graph public datasets FB15K,FB15K-237, WN18 and WN18RR to verify the effectiveness of the model in the knowledge graph complementation domain, and the experimental results of the metrics Hits@1 are improved by 1.0%, 2.0%, 0.5% and 2.3%, respectively. In the task of complementing the knowledge graph of asthma diagnosis and treatment based on the construction of TCM medical cases, the ERDBN model successfully predicted the tongue information related to the lung solid and kidney deficiency syndrome and the lung and kidney both deficiency syndrome,which verified the validity and practicality of the model. This study provides a strong support for completing the knowledge graph of TCM medical cases and promoting the construction and application of TCM diagnosis and treatment knowledge graph.
  • CHEN Qiaoling, WANG Hao, LI Xiaomin
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]This research conducts in-depth exploration and knowledge discovery of ancestral hall couplets, a critical carrier of traditional family ethics, to facilitate their adaptive inheritance in contemporary society while introducing innovative perspectives and methodologies to the field. [Method/process]We constructed a hierarchical classification system for traditional family values by synthesizing academic consensus, then developed the Annotation Keyword Data Enhancement(AK-DA-SKB-TC) model using idiomatic allusions with annotated keywords as source data and couplets as target data. Leveraging transfer learning, we achieved automated family tradition classification for couplets, followed by rigorous reliability validation. Multi-dimensional analysis of classification results uncovered evolutionary patterns and contextual determinants. [Result/conclusion]Empirical validation demonstrated the AK-DA-SKB-TC model's efficacy with 0.81 overall accuracy, revealing dynamic trajectories of family tradition evolution, inter-familial variations, and influential factors through integrated macro-micro analysis.This systematic investigation into traditional family ethics through couplets provides a scientific foundation for their adaptive modernization, contributing to the advancement of family education, social morality, and holistic societal development.
  • YANG Guoli
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]The security intelligence process is the fundamental path for intelligence to support security governance and decision-making. The incompleteness and even deceptive nature of the information relied upon in security intelligence activities, as well as the concealment and adversarial nature of security issues, determine significant differences in the scientific perspective and methodology of constructing security intelligence processes compared to other intelligence processes. [Method/process]Starting from the analysis of existing problems in the security intelligence process and optimization suggestions, this article constructs a security intelligence process model based on the conceptual model of the intelligence process, based on the information chain theory. [Result/conclusion]The constructed security intelligence process model emphasizes intelligence requirement management based on security event systems, strategic intelligence research oriented towards conceptualization of security event systems, and operational mechanisms such as the integration of intelligence business flow and security information flow. In addition, this article provides strategies for identifying intelligence requirements, evaluating the reliability of information sources, iterating and upgrading information collection, understanding the meaning of information, protecting intelligence activities, and identifying proactive defense and opportunity creation, among other key questions of the security intelligence process.
  • LI Xiaoyu, GU Lei, MENG Haohan
    Download PDF ( )   Knowledge map   Save
    [Purpose/significance]Analyzing the perceptions of mainstream U.S. think tanks towards the China-U.S. competition in quantum science and technology contributes to examining their thinking frameworks and strategic judgments, providing strategic insights for China to effectively respond to U.S. containment and blockade in this field. [Method/process]By selecting 13 research reports from 8 mainstream U.S. think tanks and utilizing the literature analysis method, this study systematically reviews the multidimensional perceptions of U.S. think tanks on the China-U.S. competition in quantum science and technology, thus revealing the underlying logic behind their perceptions. [Result/conclusion]U.S. think tanks generally advocate for competition with China in quantum science and technology in the name of safeguarding national security. Their perceptions clearly reflect an underlying logic of right-wing political tendencies, techno-nationalism, and national policy orientations. In light of this, China should incorporate elements such as independent innovation, international cooperation, and supply chain security into policy considerations.