摘要:The development of a unified national data market has been entrusted with the critical task of supporting and connecting the entire process of data value realization. Drawing on the framework of data value transition from resourceization to productization, assetization, and capitalization, and incorporating the data value network perspective, the key constraints on data value realization were systematically examined from the dimensions of value-creating actors and value activity mechanisms. The results showed that the current value transition of data was primarily constrained by an incomplete data industry chain, underdeveloped multi-modal data circulation forms, and insufficient coordination mechanisms between data and other production factors. To address these challenges, this paper proposes a practical pathway centered on building a full-process data industry chain, improving diversified data circulation mechanisms, and strengthening cross-factor market coordination. The study provides theoretical support and practical references for accelerating the development of a unified national data market and promoting the continuous value transition of data as a production factor.
关键词:integrated data market;data value;transition;logical reasoning;practical approach
摘要:With the widespread deployment of Segment Routing over IPv6 (SRv6) in next-generation networks, its programmability and flexibility have significantly improved network performance, but have also brought new security challenges. Traditional methods based on feature rules or thresholds often perform poorly when dealing with complex and diverse attack traffic, especially struggling to identify anomalous behavior targeting the SRH (Segment Routing Header). Therefore, how to achieve efficient and accurate anomaly traffic detection in the SRv6 environment has become an urgent problem to be solved. To this end, this paper proposes a deep learning-based method for anomaly detection of SRv6 network traffic. Experimental results show that the proposed method outperforms traditional machine learning algorithms and some mainstream deep learning models in terms of accuracy, recall, and F1-score, and can effectively identify multiple types of attack traffic. The main innovations of this paper can be summarized as follows: (1) A three-layer mapping mechanism of "anomaly type - observable features - detection index" is constructed to systematically characterize the perceptible features of the unique abnormal behavior of the SRv6 protocol; (2) A traffic image representation method for SRv6 scenarios is proposed, and adaptive extraction of high-dimensional features is achieved by combining residual networks; (3) In the absence of publicly available SRv6 anomaly datasets, a feature extension mechanism based on protocol specifications and threat models is designed to realize a verification experimental framework for SRv6 scenarios. In the SRv6 scenario, this method provides a scalable technical path for security protection of programmable networks.
WENG Sijun, YAN yu, YANG Xinguo, SONG Jian, JIANG Wenying, CHEN Weiqiang
DOI:10.11959/j.issn.1000-0801.DXKX260133
摘要:The evolution of the Internet toward the AI Agent Internet was driven by generative AI and large language models. As a key device for broadband user access to the network, the broadband network gateway (BNG) was difficult to adapt to the new requirements of ultra-large-scale management and edge computing power posed by massive heterogeneous AI Agents. The intelligent broadband network gateway (iBNG) was proposed as an intelligent upgrade of the traditional BNG, yet a series of challenges were still faced. As a forward-looking theoretical exploration, this paper proposes an innovative computing iBNG architecture for the AI Agent Internet, systematically elaborates its technical architecture and key technology system, and discusses its application paths in three typical scenarios: smart home, unmanned commerce, and small-scale industry. By deeply integrating the capabilities of ‘connection, computing, and intelligence,’ this architecture provides a systematic access gateway solution for the AI Agent Internet through the integrated design of endogenous computing power and intelligent management and control.
HAN Zhengxin, HE Tao, HAN Mengyao, PANG Ran, CAO Chang, TANG Xiongyan
DOI:10.11959/j.issn.1000-0801.DXKX260108
摘要:Artificial intelligence (AI) is evolving from a stage dominated by large language models (LLMs) towards autonomously collaborative AI agents. To address the core challenges of large-scale multi-agent collaboration in enterprise digital transformation, focusing on enterprise and park application scenarios, an AI agent private network architecture with "AI agent gateway" as the core hub was exploratorily proposed. The key technology system covering AI agent identification and registration, capability discovery, efficient communication, and secure collaboration was studied, and an AI agent identification and semantic routing mechanism based on IPv6 addresses was innovatively proposed. Relying on the AI agent gateway, the architecture realizes trusted access, capability discovery, and efficient collaboration of heterogeneous AI agents through the collaboration between network layer and application layer capabilities, providing technical reference and practical paths for enterprise-level multi-agent collaboration.
ZHENG Tongxing, WANG Kewei, LAN Lan, ZHAO Bingqing, WANG Xiang, WANG Wenjie
DOI:10.11959/j.issn.1000-0801.DXKX250755
摘要:Integrated sensing and communication (ISAC) technology breaks the limitation of traditional wireless networks in which communication and sensing operate independently, and can significantly improve network resource utilization efficiency and system flexibility. It has been widely applied in various civilian and military fields, such as smart cities and emergency rescue. However, due to the openness of wireless channels, ISAC systems inevitably introduce more severe information leakage when communication signals are exploited for target sensing, and thus face more stringent security challenges compared to conventional wireless communication systems. Fortunately, reconfigurable intelligent surface (RIS), which can flexibly reconfigure the wireless transmission environment by adjusting electromagnetic signal propagation parameters, have shown great potential in enhancing the security performance of ISAC systems. In this paper, a secure ISAC system with multiple communication users and multiple sensing targets was considered, and RIS-assisted secure ISAC transmission was investigated. A joint transmit and passive beamforming optimization algorithm for the base station and the RIS was proposed to satisfy sensing constraints while maximizing the sum secure rate of legitimate users. An alternating optimization framework was developed, in which fractional programming, successive convex approximation, and semidefinite relaxation techniques were embedded to effectively solve the original non-convex problem. Simulation results demonstrated the effectiveness of the proposed algorithm. Under the same parameter initialization in a single convergence test, the achievable sum secure rate of the proposed method was improved by 49.49% compared with the random RIS phase scheme, and the trade-off between sensing performance and secure communication was revealed.
关键词:integrated sensing and communication;physical layer security;reconfigurable intelligent surface;beamforming
摘要:The engineering deployment of large language models (LLMs) has given rise to agent systems with autonomous decision-making and tool-calling capabilities. However, transitioning from controlled prototypes to enterprise production still faces six structural challenges: execution isolation, identity governance, tool ecosystem governance, multi-agent coordination, observability, and ecosystem distribution. Existing research primarily focuses on agent reasoning architectures or individual platform capabilities, lacking a systematic infrastructure framework for full-lifecycle enterprise deployment. This paper proposes a six-layer reference framework covering agent runtime, identity and security, tool integration, multi-agent orchestration, observability and evaluation, and marketplace distribution. The design logic of each layer is validated through dual-path verification against both enterprise cloud platforms and open-source community projects. A systematic comparison with 3GPP SA2#173 research on KI#18 and KI#19 reveals an evolutionary convergence tendency across agent identity, tool invocation, multi-agent coordination, and governance security — subject to the caveat that all cited 3GPP contributions are discussion-stage proposals whose outcomes remain to be confirmed in subsequent standardization. The framework provides an analytical lens from cloud computing practice for understanding agent-native 6G network architecture evolution.
关键词:agent infrastructure;large language model;multi-agent collaboration;6G network architecture
Xiao Ninggui, Hu Yuqing, Zhang Hua, Xin Pujie, Pan Peng
DOI:10.11959/j.issn.1000-0801.DXKX250751
摘要:Aiming at the challenge of detecting low-altitude, slow-moving, and small unmanned aerial vehicles in complex urban environments, this study proposes a passive detection method based on higher-order statistical features of channel impulse responses. The method constructs a Hankel matrix from the received signals and utilizes singular value decomposition to analyze the distribution patterns of received signals under normal conditions versus those during UAV intrusion. By constructing a residual matrix, it achieves the separation of strong static background signals from weak dynamic target signals. On this basis, higher-order cumulant computation is introduced to mitigate the influence of noise on the signal, and the statistical non-stationarity induced by UAV motion is quantified through variance. Simulation results demonstrate that under uniform motion conditions, the higher-order cumulant variance in UAV-present scenarios exhibits a significant systematic elevation and fluctuation compared to that in normal environments. The study confirms that the joint detection framework integrating singular value decomposition and higher-order cumulant variance monitoring can effectively extract the higher-order statistical disturbances of the channel caused by UAVs under low signal-to-noise ratio conditions, providing a new technical pathway for UAV detection.
关键词:Drone Detection;Higher-Order Cumulants;channel state information
摘要:The boattail configuration is an effective measure for reducing the base drag of projectile and rocket aircraft. The tail fins of the aircraft are usually located at the tail end and interfere with the boattail flow, thereby affecting the drag characteristics. To investigate the interference effect of the tail fins on the boattail, numerical simulations are performed on the projectile and rocket aircraft equipped with tail fins and a boattail in the transonic regime. The influence of the tail-fin installation position on the drag characteristics is analyzed, and the flow-field characteristics near the boattail as well as the variations of pressure and pressure gradient are examined to reveal the causes of the drag changes. Furthermore, the variations of the boattail and base drag are studied when the boattail shape is altered under the interference of the tail fins. The results show that as the tail fins move rearward, the adverse pressure gradient in the boattail boundary layer increases, flow separation occurs, the pressures on the boattail and the base decrease, and the vehicle drag gradually increases. When the tail fins are shifted rearward, increasing the fillet radius at the boattail corner can reduce the vehicle drag; when the tail fins are shifted rearward, increasing the boattail angle causes the vehicle drag to first decrease and then increase.
摘要:The stall characteristics of distributed electric propulsion short takeoff and landing (DEP-STOL) aircraft directly influence their takeoff and landing safety. However, research on the stall behavior of this configuration under abnormal conditions, such as partial failure of the high-lift system, remains insufficient. This study investigates the NASA X-57 Maxwell Mod-Ⅳ landing configuration using a CFD method based on the actuator disk model. The propeller effects are represented as body force source terms and coupled with the RANS equations and the SST k-ω turbulence model. The influence of the high-lift propeller system on stall characteristics is systematically analyzed, and stall behaviors under different power levels and typical failure modes are examined. The results show that activating the high-lift system delays the stall angle of attack from 15° to 17° and increases the maximum lift coefficient from 2.87 to 4.52. As power level increases, the lift coefficient continuously rises and the stall angle is further delayed. Under partial failure conditions, the lift curve shifts downward and stall occurs earlier. Outboard motor failure leads to an earlier stall, but retains a higher maximum lift coefficient, while inboard motor failure causes premature wing-root separation and a greater reduction in maximum lift coefficient, indicating that wing-root propellers play a critical role in maintaining overall lift.
关键词:distributed electric propulsion;short takeoff and landing configuration;Propeller slipstream;stall characteristics;actuator disk model
摘要:The construction of a regulatory system is an important part of building the national integrated data market. The lawful and compliant operation of the data market, as well as the assurance of fairness, openness, and impartiality,all depend on the construction of the regulatory system. Based on an analysis of the morphological standards and production specifications for data products, the data market supervision content in the procurement of raw data materials and the production, circulation and use of data products was proposed. The framework of data market supervision and management was proposed and the construction path of the regulatory system was designed, including six components: regulatory standards, regulatory rules, regulatory approaches, regulatory participants, regulatory implementation, and regulatory disposal. This provides theoretical support and practical guidance for the development of the regulatory system in the construction of the national integrated data market.
摘要:To assess the development status and regional disparities of China's integrated data market, this study focuses on the core characteristics of "integration" and constructs an evaluation index system based on the "Five Unifications and One Opening" policy framework. The system encompasses five dimensions: unified market foundational institutions, unified physical infrastructure, unified government regulation and governance, unified factor resource market, and continuous expansion of opening-up to the outside world. Using the Analytic Hierarchy Process (AHP) for weighting, an empirical measurement was conducted on the development level of integrated data markets in 18 representative cities across nine major strategic regions, including Beijing-Tianjin-Hebei, in 2025. The results show that the market is in the initial transition stage from "administrative-driven" to "market-driven". It presents a three-layer structural characteristic of "leading market foundational institutions, insufficient endogenous market momentum, and differentiated layout of opening-up". Spatially, it exhibits a pattern of "high in the east, low in the west; fast in the south, slow in the north," with Shanghai, Beijing and Shenzhen forming the core leading poles, and several major urban agglomerations developing a synergistic "multi-polar heterogeneous and complementary advantages" model. Based on these findings, policy recommendations are proposed to promote the systematic transformation of the data market from aspects such as scenario-based pricing, categorized policy implementation, and institutionalization of rules and technologies.
关键词:Data Factors of Production;national integrated data market;Indicator System;Empirical Study;Five Unifications and One Opening
Huang Ziyi, Li Guoquan, Lin Jinzhao, Pang Yu, Wu Ruiheng
DOI:10.11959/j.issn.1000-436x.TXXB260143
摘要:Accurate channel estimation is critical for the reliable deployment of orthogonal time frequency space (OTFS) systems in 6G high-mobility scenarios. To further improve the channel estimation accuracy in OTFS systems, this paper proposes a channel estimation algorithm integrating the basis expansion model (BEM) and a bidirectional long short-term memory (LSTM) network. The proposed algorithm first uses BEM to reformulate the channel estimation problem in the delay-Doppler (DD) domain into a basis coefficient estimation problem. A bidirectional LSTM network is then introduced for offline training and online prediction of the basis coefficients, and a self-attention (SA) mechanism is incorporated to strengthen global perception of temporal features, enabling high-accuracy estimation and dynamic tracking of the basis coefficients. Building on this, a low-complexity two-stage equalizer is further designed. Channel information is reconstructed from the estimated basis coefficients, multipath effects are mitigated via a single-tap equalizer, and a log likelihood ratio based iterative interference cancellation (LLR-IIC) algorithm is employed in the DD domain to suppress residual interference induced by Doppler spread. Simulation results demonstrate that the proposed algorithm offers significant advantages in channel estimation accuracy, generalization capability, and complexity. When combined with the proposed equalizer, superior bit error rate (BER) performance is achieved while maintaining low complexity.
LIU Xiuzhi, GUO Yilin, LU Shaowei, MA Hongtu, ZHENG Shuang, LIU Xinhua, MA Qiang
摘要:As the highest level of BBA verification system, full-scale structure test is directly related to the success of aircraft composite structure airworthiness certification. In order to prove that the composite material airframe structure of a certain type of CCAR-23 normal category general aircraft complies with the relevant requirements of CCAR 23 and AC20-107B, firstly, this paper analyzes and discusses the planning and implementation techniques of full-scale static, fatigue and damage tolerance tests; Secondly, in order to solve the issue of wing root fractures failure during the first full-scale static test, a method combining computational analysis and experimental verification was used to propose a design modification and to design a wing root assembly test which was based on the BBA to verify the effectiveness of the improvement scheme. Finally, the optimized structure successfully passed the full-scale ultimate load test and the test results proved that the composite material airframe structure of this aircraft meets the relevant requirements of airworthiness regulations. The analysis, modification, test design and airworthiness certification process provide an important reference for the compliance verification of similar type aircrafts.
摘要:To address difficult ownership definition, easy circulation loss of control, and hard value evaluation challenges caused by data's high replicability and non-rivalry in data factorization, a new data capsule circulation paradigm was proposed. Based on the triangular model of "controlled environment, tangible data, and identified personnel", a four-layer theoretical system covering ontology, ownership, circulation, and pricing was constructed. Through in-depth binding of data with processing and usage strategies and support of trusted execution environments, it enables secure data circulation and value release. Multi-dimensional analysis shows that the paradigm outperforms traditional solutions in data factorization support and comprehensive performance. This paradigm is applicable to scenarios such as dataset delivery, controlled circulation of special files, compliant data sharing, and controllable circulation of personal privacy data, providing a vital technical supplement for Trusted Data Space to ensure ownership circulation and full-process controllability.
摘要:To address the challenges of multi-source heterogeneity, insufficient timeliness, inconsistent quality, and scattered security management in enterprise credit data under high-timeliness business scenarios, this paper proposes a full-link real-time data governance framework integrating data quality, timeliness, security, and AI empowerment. The framework adopts a priority-based incremental multi-source fusion engine to achieve precise entity alignment and conflict resolution. Based on a Kappa hybrid architecture, it coordinates real-time streaming and enhanced batch processing to meet graded timeliness requirements from minute level to hour level. A unified data service layer with embedded security capabilities ensures compliant data supply. Taking the enterprise credit data platform of China Economic Information Service as a validation scenario, the practice shows that the constructed high-quality enterprise credit dataset covers more than 100 core dimensions (industry, commerce, judiciary, operations, etc.). The data processing cycle is shortened from T+1 to within 3 hours, and the accuracy of key data exceeds 99%. The framework provides high-reliability, high-timeliness, and high-security data support for financial credit, industry supervision, and business decision-making, and offers a reusable engineering methodology for the governance of similar high-quality datasets.
关键词:high-quality dataset;enterprise credit;data governance;multi-source data fusion;AI empowerment;data standardization;entity alignment
XIAO Chuqiao, LIU Zhusen, XUE Lide, YANG Hao, GAO Li
DOI:10.11959/j.issn.2096-0271.BDR26070
摘要:Against the backdrop of the deepening development of the digital economy, blockchain has emerged as a critical infrastructure. However, traditional monolithic blockchain architectures face three major bottlenecks in large-scale adoption: difficulty in reusing common capabilities, limited architectural evolution, and poor integration with existing IT technology stacks. This study systematically reviews the technological evolution of both blockchain and microservices, and demonstrates the inherent rationale for their integration from three dimensions—architectural isomorphism, mechanistic synergy, and decoupling consistency—thereby clarifying the necessity and feasibility of transitioning from a “mode” to a “microservitized” architecture. On this basis, a four-layer architectural model is proposed, consisting of, from bottom to top: the Core Infrastructure Layer, the Blockchain Microservices Core Layer, the Microservices Gateway and Orchestration Layer, and the Typical Application Paradigm Layer. Using a cloud-native technology stack, the core capabilities of blockchain are decomposed into standardized microservice components, complemented by a full lifecycle management system for microservices to ensure system security and observability. Following the principles of Domain-Driven Design (DDD), bounded contexts are used to delineate core subdomains, supporting subdomains, and generic subdomains, resulting in the construction of three standardized application paradigms: trusted data certification and traceability, trusted data element circulation, and trusted intelligent cross-domain collaboration, each with clearly defined application scenarios. This technical system decouples and reuses the common capabilities of blockchain, effectively lowering the barriers to cross-industry application. It provides systematic theoretical support and a practical implementation path for blockchain to break away from closed monolithic architectures and move toward an open service ecosystem.
关键词:blockchain;Consortium Blockchain;Microservice;Cloud-Native;data element circulation;Intelligent Collaboration
摘要:To address the inadequate optimization of performance indicators, such as end-to-end delay, jitter, and bandwidth utilization, as well as the poor scalability in the joint routing and scheduling of Time-Sensitive Networking (TSN), a multi-objective joint scheduling optimization algorithm based on an improved Non-dominated Sorting Genetic Algorithm was proposed. Specifically, a multi-objective network architecture utilizing TSN performance indicators as optimization objectives was established, feasible traffic paths were comprehensively analyzed, and the global optimal multi-objective solution was identified. Furthermore, the effectiveness of the proposed algorithm was evaluated through extensive experiments. The proposed algorithm significantly improves the comprehensive traffic performance in terms of end-to-end delay, jitter, and bandwidth utilization in large-scale complex scenarios.
关键词:Time-Sensitive Networking, Non-dominated Sorting Genetic Algorithm;multi-objective optimization;joint routing and scheduling
LI Dali, WANG Hongdu, LIU Hao, LIANG Huiyue, ZHU Haitao, HAO Jingbin, ZHAO lala
当前状态:三校优先
DOI:10.20176/j.cnki.nxdz.20260407
摘要:To address the issue of surface interface failure under the coupling effect of high strain cyclic impact and abrasive wear in the central trough of deep long-wall coal mining scrapper conveyors, this study focuses on the laser cladding Al1.5 Co0.5 CrFeNi2(TiB)x (x=0, 0.25) high-entropy alloy (HEA) composite coating. Utilizing electropulsing-assisted ultrasonic surface rolling process (EP-USRP) technology, a surface strengthening structure with a gradient distributions of grain size, dislocation density, and residual stress was constructed. Through microhardness testing, nanoindentation experiments, EBSD characterization, and split Hopkinson pressure bar (SHPB) dynamic compression tests, the relationship between the microstructure and performance of coatings with different morphological forms, as well as their failure mechanisms, were analyzed. The results indicate that the M2B(M represents metal elements) reinforcing phase significantly enhances the hardness of the coating and improves indicators such as Hv/E and H/E2, thereby improving the coating’s deformation recovery capability. The EP-USRP did not change the phase composition of the coatings; however, the gradient work-hardened layer and compressed residual stress zone formed on the coating surface can inhibit crack propagation and coating delamination during dynamic compression, thereby enhancing the cooperative deformation capability of the coating-substrate interface. The dynamic failure of the coating primarily arises form the mismatch in the amount of compressive deformation between the substrate and the coating. The rigidity of the coating applies a reverse tensile stress to the coating-substrate interface, including cracks and tearing holes that extend into the coating; meanwhile, the surface gradient strengthened layer effectively suppresses the extension of cracks into the coating. The research results can provide references for the design and engineering application of alloy coatings.
摘要:This article proposes and implements a digital twin pipeline vibration prediction system that integrates physical mechanisms and data-driven approaches to address the problem of limited sensors being unable to achieve real-time monitoring of full field vibration in complex pipeline systems due to space constraints and structural complexity. A hybrid modeling framework for engineering applications was constructed with the core objective of reconstructing the full field vibration response. The efficient dimensionality reduction of the full field vibration response was achieved by introducing intrinsic orthogonal decomposition. Nonlinear mapping relationships between finite measurement point data and the global vibration modal coefficients were established using Kriging model and radial basis function surrogate model, respectively. On this basis, the reconstruction system integrates WebGL 3D visualization technology to achieve real-time dynamic display of the global vibration field of the pipeline. The experimental results show that the system can accurately predict the overall vibration distribution of the pipeline under the condition of transmission delay less than 10 ms, verifying the advantages of the proposed method in prediction accuracy, real-time performance, and engineering applicability.
ZENG Jielun, CHEN Jing, HE Kun, JIA Meng, LV Lanxi, DU Ruiying
DOI:10.11959/j.issn.1000-436x.TXXB260133
摘要:Electronic voting is an important approach for the digitalization of elections and voting procedures, in which cryptographic techniques are used to provide anonymity, verifiability, and tamper resistance. To address the low tally-verification efficiency and insufficient support for diverse voting modes identified in existing schemes, an anonymous and auditable aggregate ring signature scheme supporting multiple voting modes was proposed. The proposed construction was designed to preserve voter privacy while ensuring the legitimacy of voting operations. Ring signatures were employed to hide verifier identities and reduce the risk of tracing or manipulation during verification, while an aggregation mechanism was introduced to compress multiple ballots into compact verification objects to improve tally-verification efficiency. To regulate the number of votes cast by the same signer, a linking authority was introduced together with linkable tags, enabling support for both single-vote and multiple-vote settings. Security analysis and experimental results were conducted to validate the proposed scheme. The results demonstrate that the proposed scheme achieves a good balance between anonymous regulation and efficiency, and reduces the time overhead in the linking phase by about 98.29% on average compared with the k-LRS scheme.