《1 Engineering research fronts》

1 Engineering research fronts

《1.1 Trends in Top 10 engineering research fronts》

1.1 Trends in Top 10 engineering research fronts

In the field of engineering management, the global Top 10 engineering research frontiers this year are “research on industrial digital transformation empowered by industrial internet platform”, “research on global supply chain security risk management in the digital age”, “research on big data governance methods in artificial intelligence scenarios”, “research on the theory and method of accurate construction and evolution of digital twin model”, “research on sustainable transportation system under carbon peaking and carbon neutrality strategy”, “formation mechanism, evolutionary law and governance policy of global public health crisis”, “medium- and long-term sustainable supply paths and policies for basic and typical strategic resources”, “group consensus mechanism under social network”, “big data-based financial risk assessment”, and “research on intelligent operation and maintenance management of infrastructures from the perspective of socio-technical system theory”. The core papers published are listed in Table 1.1.1 and Table 1.1.2. Among them, “research on industrial digital transformation empowered by industrial internet platform”, “research on global supply chain security risk management in the digital age”, “research on big data governance methods in artificial intelligence scenarios”, and “research on the theory and method of accurate construction and evolution of digital twin model” are the key fronts for interpretation, and their current development trends and future trends will be explained in detail later.

(1)  Research on industrial digital transformation empowered by industrial internet platform

The industrial Internet platform is the carrier of scenario- driven deep integration of new generation information technology and manufacturing industry and is the key infrastructure for digital technology and data elements to collaboratively drive the digitalized, networked and

《Table 1.1.1》

Table 1.1.1 Top 10 engineering research fronts in engineering management

No. Engineering research front Core papers Citations Citations per paper Mean year
1 Research on industrial digital transformation empowered by industrial internet platform 115 10561 91.83 2018.3
2 Research on global supply chain security risk management in the digital age 12 710 59.17 2017.9
3 Research on big data governance methods in artificial intelligence scenarios 33 2789 84.52 2018.3
4 Research on the theory and method of accurate construction and evolution of digital twin model 199 17231 86.59 2019.2
5 Research on sustainable transportation system under carbon peaking and carbon neutrality strategy 96 7830 81.56 2017.9
6 Formation mechanism, evolutionary law and governance policy of global public health crisis 6 668 111.33 2017.3
7 Medium- and long-term sustainable supply paths and policies for basic and typical strategic resources 14 1039 74.21 2018.3
8 Group consensus mechanism under social network 14 1835 131.07 2017.8
9 Big data-based financial risk assessment 238 18885 79.35 2018.4
10 Research on intelligent operation and maintenance management of infrastructures from the perspective of socio-technical system theory 29 713 24.59 2018

《Table 1.1.2》

Table 1.1.2 Annual number of core papers published for the Top 10 engineering research fronts in engineering management

No. Engineering research front 2016 2017 2018 2019 2020 2021
1 Research on industrial digital transformation empowered by industrial internet platform 13 20 26 27 22 5
2 Research on global supply chain security risk management in the digital age 3 2 3 2 1 1
3 Research on big data governance methods in artificial intelligence scenarios 5 5 8 6 9 0
4 Research on the theory and method of accurate construction and evolution of digital twin model 10 20 19 56 56 38
5 Research on sustainable transportation system under carbon peaking and carbon neutrality strategy 21 21 21 14 18 1
6 Formation mechanism, evolutionary law and governance policy of global public health crisis 1 3 1 1 0 0
7 Medium- and long-term sustainable supply paths and policies for basic and typical strategic resources 2 1 6 1 4 0
8 Group consensus mechanism under social network 2 5 3 2 2 0
9 Big data-based financial risk assessment 37 35 36 48 55 21
10 Research on intelligent operation and maintenance management of infrastructures from the perspective of socio-technical system theory 5 3 8 4 5 2

intelligent transformation and upgrading of the industry. As the digital economy and a new round of technological revolution are evolving in depth on a global scale, industrial Internet platforms such as Amazon AWS, GE Predix, Siemens MindSphere, Haier COSMOPlat, Ali supET, Sany ROOTCLOUD, yonyou ERP, Huawei FusionPlant, etc. have become the key engines, important ways and new carriers dynamic capability and accelerating the digital transformation of industry. The industrial Internet platform, through a comprehensive digital empowerment platform, realizes the comprehensive interconnection of humans, machines, and things and the comprehensive linkage of the whole industrial chain, the whole value chain, the whole innovation chain, and the whole staff and the whole elements, and promotes the deep integration of the digital economy and the real economy. It can meet the complex comprehensive and personalized demands of multiple industrial scenarios with higher efficiency, lower cost, and dynamism, and promote the formation of a new industrial manufacturing and digital and intelligent service system. The research on industrial digital transformation empowered by industrial internet platform mainly focuses on the technical architecture of industrial Internet platform, the process mechanism of empowering industrial digital transformation, the dynamic capability of industrial digitalization, the ecological construction of integration and innovation of large, medium and small enterprises, and the governance of industrial Internet platform. The development of new generation digital technologies, such as satellite internet, federal learning, privacy-enhanced computing, Web 3.0, and Metaverse, and the demand trend of green and low carbon development make industry cloud-native platform, industrial Metaverse, scenario-driven innovation and so on become the future trend of the research on industrial digital transformation empowered by industrial internet platform.

(2)  Research on global supply chain security risk management in the digital age

In the new round of technological revolution and industrial transformation, digital technology is driving great changes in the global supply chain industry, and the supply chain has ushered in a digital, networked, and intelligent “digital change”. Although digital technology innovation is gradually pushing the expectation of global industrial services to its peak, the ensuing global supply chain security issue has also become increasingly prominent. On the one hand, in the critical period of intensifying international trade friction, increasing uncertainties, and high-quality transformation of industries, the supply chain risk problems brought by weak key technologies are gradually exposed. From the root, the problem of key technology “bottleneck” comes from the imperfect layout of the key industrial chain. Especially under the current trend of reverse globalization and active decoupling of supply chains in developed countries, how to ensure the supply chain security of global high-tech industries has become an increasingly urgent issue. On the other hand, although the emergence of the digital economy has effectively promoted the development of supply chain transparency and wisdom, the information leakage problem brought by data integration has been frequent, the digital divide between countries has been expanding, and the struggle for digital sovereignty has entered into a white heat, which has affected the rapid development of global smart supply chain. In recent academic research, the key research directions are the industrial chain layout method of key technologies in the supply chain, supply chain security issues in high- tech industries under the intensified economic competition of reverse globalization, and supply chain data leakage and information security threats caused by data integration.

(3)   Research on big data governance methods in artificial intelligence scenarios

Big data governance is a set of management behaviors involving the use of big data in an organization. It contains two definitions, one is “governance of big data”, that is, to use a certain method or form for continuous governance of big data itself, such as data source import, cleaning, and processing, data normalization, data storage, data computing, data service application and so on to improve the quality and value of data, which is conducive to the subsequent use of big data. The other is “relying on big data for governance”, that is, to use big data, cloud computing, artificial intelligence (AI), and other advanced technologies to achieve intelligence of process regulation, efficiency improvement, and social governance means. Firstly, the key technologies of big data governance under artificial intelligence scenarios mainly include structured data processing, data quality assessment and data cleaning, data normalization, data fusion and extraction, data organization, and data sharing, and other whole process service links. Secondly, by constructing big data mapping knowledge domain, it realizes understanding data, explaining phenomena and knowledge reasoning, discovering deep relationships, and realizing intelligent search and intelligent interaction. Thirdly, big data governance under the AI scenario faces the problem of security controllability. There is a need to solve data security and algorithm security problems such as privacy leakage, data rights validation, algorithm bias, and technology abuse, to promote social wisdom governance and intelligent industrial transformation. Finally, the typical AI application scenarios of big data governance are applied to more complex and high-value scenarios such as finance, healthcare, urban management, public opinion monitoring and so on for solving management needs such as business decision-making, resource allocation, process optimization, operation and maintenance assurance, and risk prevention and control.

(4)    Research on the theory and method of accurate construction and evolution of digital twin model

Digital twin models are digital representations of real-world entities or systems that can be used to understand, predict, optimize, and control physical-world entities or systems. Therefore, the construction of the digital twin model is the basis for model-driven implementation. The construction of the digital twin model is the digital modeling of the properties, methods, and behaviors of physical entities and processes in digital space. The model construction can be multidimensional in “geometry-physics-behavior-rules”, or multi-domain in mechanical, electrical, hydraulic, and other fields. The digital twin model should cover multi-dimensional and multi-domain models to achieve a comprehensive and realistic characterization and description of physical objects. For building models of relatively complex objects, it is necessary to solve the problem of how to assemble and fuse simple models to form complex models. To ensure the correctness and validity of the digital twin model, the model needs to be validated and evolved to ensure that the model describes and characterizes the state or characteristics of the physical object correctly, i.e., to ensure the virtual-real consistency of the model. Therefore, the main research direction can focus on the six stages of the digital twin model, i.e., “construction-assembly-fusion-validation-correction- management”, for carrying out the accurate construction of the multi-dimensional/multi-domain digital twin model, the assembly and fusion of all-elements/multi-scale twin digital model, the validation and correction of virtual-real consistency of digital twin model, and the interactive iteration and dynamic evolution of digital twin model. The digital twin must accurately represent the physical system in its current state, which requires the digital twin model to reflect the changes and updates of the physical system through fast and reliable accuracy. In the future, the construction and evolution of digital twin models will definitely develop in the direction of improving modeling efficiency and accuracy.

(5)   Research on sustainable transportation system under carbon peaking and carbon neutrality strategy

The process of promoting sustainable transportation systems is a search for more scientific energy structures and energy use mechanisms, lower emissions, and easier ways and technologies for system emissions management or self- absorption and solidification, including the development and implementation of policies, standards and laws, and regulations.

In 1992, China became one of the first parties to sign the United Nations Framework Convention on Climate Change, and in 2002, the Chinese government ratified the Kyoto Protocol. With active promotion by China, the world reached the Paris Agreement to address climate change in 2015. In 2016, China took the lead in signing the Agreement. In September 2020, President Xi Jinping announced at the 75th UN General Assembly that China strives to peak its CO2 emissions by 2030 and work towards carbon neutrality by 2060. This carbon peaking and carbon neutrality strategy proposes a new direction for the research and advancement of sustainable transportation systems.

Concerning sustainable transportation systems, research at the environmental level has focused on three main areas, including the reduction of pollution emissions, the shifting of emissions, and the management of emissions. From the perspective of emission reduction, from land transportation to aviation, to water transportation, cleaner energy is promoted and how to overcome technical or cost constraints is studied, allowing cleaner energy more widely available than traditional energy. Another path to emission reduction is to continuously optimize the use of vehicles and equipment, the construction, maintenance, and use of facilities, and the allocation of time, space, and related resources. Thirdly, reduce energy consumption through technological upgrading. In the context of the carbon peaking and carbon neutrality strategy, the research has gradually shifted from regional air quality issues to global climate change issues, and the focus is increasingly put on carbon emissions. From the perspective of shifting emissions, both the promotion of new energy vehicles and the setting up of marine pollution emission control zones fall within the scope of the research. The research in this field often does not start with reducing carbon emissions but focuses on reducing the emission of harmful gases in high-density population areas. At present, the research on pollutant management mainly covers harmful gases, and the research on carbon neutrality is still emerging.

(6)  Formation mechanism, evolutionary law and governance policy of global public health crisis

A global public health crisis is an event induced by a public health emergency, which brings a serious impact (or even causes a shutdown) on the normal operation of social systems in most countries around the world, and has a serious impact on international economic and trade exchanges, national security, etc. The main research directions include:

1)   Research on the mechanism of formation and evolution of global public health crises. This direction focuses on the evolutionary mechanism of local health events into global public health crises, the mechanism of the coupling of complex systems such as economy, transportation, and information on the evolutionary process, and the failure mechanism of existing monitoring and warning and risk governance systems, and the vulnerability analysis of different populations in crises.

2)   Research on the governance strategy of global public health crises. This direction focuses on scarcity management, capacity expansion, supply chain failure, and other optimized resource allocation and institutional mechanism design issues of catastrophic peak demand scenarios, international participation, and international cooperation and coordination mechanisms in the governance of global public health crisis, the laws, and mechanisms of research and decision making of multiple subjects in typical scenarios, and the analysis of the impact of the implementation of typical policy tools on the interventions with the mentality and behavior of multiple subjects.

3)  Research on learning, change, and resilience enhancement after the global public health crisis. This direction can focus on the recovery and learning mechanisms of public and private organizations, institutions, and societies after crises, the impact mechanisms of the combination of fiscal and taxation policy tools on the recovery of individuals, enterprises, and industrial chains, the laws of change and adaptation of multiple subjects after crises, the top-level design, and model reconstruction of the response system, and the strategies of resilient governance enhancement.

The probability of global public health crises is low, and governments and other subjects lack long-term attention to system building and capacity reserve. How to use the COVID-19 epidemic crisis as an opportunity to promote research, system building and capacity reserve will be a topic worthy of attention in the future.

(7)   Medium- and long-term sustainable supply paths and policies for basic and typical strategic resources

Basic and typical strategic resources generally refer to resources that are related to global livelihoods and dominate the resource system, and their sustainable supply depends on factors such as resource endowment, supply and demand, economic development, reserve effectiveness, and international material availability. Traditionally, resources such as energy, minerals, water, and land are the most typical basic and strategic resources. However, with the progress of science and technology and global economic development, data resources, highly skilled professional labor, and carbon emission rights are also included in the category of basic and typical strategic resources. At present, systematic research has been conducted on the medium- and long-term sustainable supply paths and policies for basic and typical strategic resources, and an analysis framework of sustainable supply paths and policies has been constructed from both production and consumption sides, focusing on the life cycle measurement and management of basic and typical strategic resources, improvement of resource utilization efficiency, environmental health and waste recycling, supply chain security risk assessment, government regulation and optimal allocation of resources, and sustainable supply performance evaluation. Based on technical methods such as systems thinking and artificial intelligence, exploring a set of thinking paradigms, practice paradigms, and research paradigms for sustainable supply and management policies of basic and typical strategic resources from a medium- and long- term perspective will become the focus of future research breakthroughs.Key scientific issues such as the lifecycle benefits and cost optimization of basic and typical strategic resources, sustainable supply chain modeling and governance paths, green technology innovation and circular economy, global climate change mitigation and sustainable resource supply, optimal allocation of resources from a blockchain perspective, resource security and policy simulation analysis, artificial intelligence and sustainable management decision system are frontier research hotspots at the intersection of multiple disciplines.

(8) Group consensus mechanism under social network

Group consensus seeks to reconcile the conflicting views of decision makers and to find a group decision solution that unifies the majority opinion. Traditional group consensus models assume that decision-makers are independent of each other, but in fact, decision-makers are in a social network, and their mutual relationship with each other and the structural characteristics of the corresponding network are important factors that affect group consensus.

In recent years, the widespread popularity of social media has accelerated the interaction and information transfer among decision-making individuals, and group consensus is facing more and more conflicts and challenges, such as the expansion of decision-making group size, diversity of interest groups, differences in individual preferences, and complexity of decision problems. Social networks are used to accurately characterize the interrelationships among decision makers (interest relations, trust relations, conflict relations, emotional relations, etc.), providing a new research perspective for the development of group consensus mechanisms. In the context of big data, the introduction of social network analysis methods into group decision-making scenarios can be widely used in scenarios such as emergency decision-making of major public opinion events and automatic discovery of social hotspots and exceptional events.

Currently, the main research directions of group consensus mechanisms under social networks include the research on group consensus models in dynamic social network environments, consensus compensation and non-cooperative behaviors in social network environments, and malicious manipulation behaviors in social network environments. In addition, with the development of artificial intelligence and Metaverse technologies, there are social robots as well as online virtual humans in addition to real humans on social networks. How these new social relationships (e.g., human– machine interaction and machine–machine interaction) affect the group consensus process urgently needs to be studied in depth.

(9) Big data-based financial risk assessment

Data are numerical characteristics or information obtained through observation. With the development of digital technology and its wide application in the financial field, financial data with diverse types, massive heterogeneity, complex relationships, low-value density, high noise, and non-normal characteristics continue to emerge at a high speed, forming a wave of financial big data. In this context, the research and application of financial technology in financial risk monitoring, assessment, and early warning are becoming more and more in-depth, which enables and enhances efficiency and also leads to the emergence of new and potentially harmful financial risk problems. Financial risks are characterized by complexity, concealment, cross- domain, transmission, and dynamics, which make them difficult to characterize, cognize, identify, track, model, reason, and evaluate. The current monitoring, evaluation, and early warning of financial risks are based on the analysis and processing of massive financial data, and the identification and prediction of risks by establishing algorithmic models. The research mainly focuses on the security protection, safe storage, safe transmission, real-time processing and analysis and sharing circulation of massive financial data, the rapid identification methods of financial risks based on graph data, text data, stream data and other non-structural data, research on the prevention and early warning of systemic financial risks using graphical models and statistical models, research on the use of data science for financial credit risk assessment, etc. Future research trends include the research on financial data sharing and traceability methods under the division of management system, research on autonomous and controlled financial data intelligent twin and sensitive feature masking technology, research on financial twin data privacy risk and data quality assessment technology, research on financial data twin security environment construction and data deposition technology, research on financial data twin-based approximate query processing and next-generation financial database test benchmark building technology, research on financial risk behavior characterization, cognition and financial network risk transmission, modeling and evaluation, research on big data-driven technology for rapid risk identification and analysis of fintech products, construction of a large-scale financial risk awareness mapping system through financial big data, etc.

(10)   Research on intelligent operation and maintenance management of infrastructures from the perspective of socio- technical system theory

Modern infrastructure systems, with engineering facilities as carriers, rely on complex technologies and equipment to perform their functions and provide important support for social production and residents’ lives. On the other hand, its operation and maintenance management involves many aspects such as operation, maintenance, and consumer services, and is influenced by the decisions and behaviors of various stakeholders such as technicians, management teams, and end users, as well as the constraints of external conditions such as economic, social and environmental conditions. Therefore, infrastructure has typical socio- technical system characteristics. With the continuous development of infrastructure, the interactive coupling between its social and technical components becomes more and more frequent and complex, which has an increasingly critical impact on the effectiveness and safety of infrastructure. In recent years, domestic and foreign scholars have made significant progress in such hot research directions as socio- technical system modeling and simulation of infrastructure, operation and maintenance scenario construction and derivation of infrastructure and stakeholder interaction, infrastructure operation and maintenance optimization based on human factors engineering and behavioral decision theory, infrastructure security and resilience management based on information-physical-social convergence system, the pathways and management strategies for the role of infrastructure in socio-economic development and security, and policies and institutional mechanisms for green and low- carbon infrastructure development. In the context of the rapid development of information technology such as the Internet of Things, cloud computing, and artificial intelligence, how to further promote the paradigm, methods, and technological innovation of infrastructure operation and maintenance management based on the multi-dimensional integration of physical-social-information, optimize the interaction mode and efficiency of the technical components and social components of infrastructure, and realize the transformation of intelligent and low-carbon infrastructure and the continuous improvement of efficiency and security level, is expected to become an important research hotspot in the future.

《1.2 Interpretations for four key engineering research fronts》

1.2 Interpretations for four key engineering research fronts

1.2.1 Research on industrial digital transformation empowered by industrial internet platform

The focus of the industrial digital transformation empowered by the industrial Internet platform is to study how the

industrial Internet platform can accelerate the process mechanism of industrial digitalization, networking, and intelligent transformation and the ecological construction of integration and innovation of large and medium-sized enterprises and their effective governance by creating a comprehensive service platform of digital technology, data elements and intelligent manufacturing with deep collaboration, targeting the needs of multiple industrial application scenarios. After GE proposed the concept of the Industrial Internet in 2012, domestic and foreign policies and academic fields gradually reached a consensus that the Industrial Internet is the key new engine to drive the transformation of the manufacturing industry from the supply-side perspective after the consumer Internet. Since then, GE, together with IBM, Cisco, Intel, and other leading international enterprises, has established the Industrial Internet Consortium (IIC), and the industrial Internet platform has shown a global trend of spurt. In China, based on “Made in China 2025”, more and more attention has been paid to the traction role of the industrial Internet in further promoting the integration of informatization and industrialization and the digital transformation of industry. In 2021, the national industrial Internet platform exceeded 600, with more than 100 with certain industry and regional influence. In 2021 and 2022, China’s Ministry of Industry and Information Technology issued The 14th Five-Year Plan for Deeply Integrated Development of Informatization and Industrialization and Industrial Internet Innovation and Development Action Plan (2021–2023), both of which focus on the industrial Internet platform as a key direction. Especially under the trend that the risk of blockage and breakage in the global industrial chain and supply chain intensifies and the digital transformation of the manufacturing industry enters deep water, the industrial digital transformation and upgrading empowered by the industrial Internet platform become a more important and urgent issue.

In recent years, scholars at home and abroad have focused on topics such as the technical architecture of industrial Internet platforms, the process mechanism of empowering industrial digital transformation, the dynamic capability of industrial digitalization, the ecological construction of integration and innovation of large, medium and small enterprises, and the governance of industrial Internet platform. Among them, the research on the technical architecture of industrial Internet platforms focuses on different technical architectures such as IaaS, PaaS, SaaS, and the emerging AIaaS, breakthroughs in key common digital core technologies, localization of platform software and its differentiated business model to empower industrial digitalization. The research on the process mechanism of empowering industrial digital transformation focuses on the mechanism of organic integration of digital technologies, data elements, and platform modules and the application of multiple industrial scenarios. The research on the dynamic capability of industrial digitalization focuses on how the leading enterprises can realize their transformation and empower the all-around transformation of the industrial chain and value chain through the construction of a digital technology capability system, digital management capability system, and digital scenario application capability system. The research on the ecological construction of integration and innovation of large, medium, and small enterprises focuses on how to support small and medium enterprises lacking data elements and key digital technologies to participate in the ecological construction of industrial Internet platforms and accelerate digital transformation, to ensure the safe and resilient development of the industrial chain and supply chain. The research on the governance of industrial Internet platforms focuses on data privacy, platform monopoly, platform interconnection, and governance standard system.

Looking ahead, with the emergence of a new generation of digital technologies and the acceleration of the co-evolution of industrial Internet platforms and industrial digital transformation, industry cloud-native platforms, industrial Metaverse, and scenario-driven innovation become research directions worthy of attention and forward-looking layout.

(1) Industry cloud-native platform

Industry cloud-native is an emerging concept in the field of cloud computing and industrial Internet, a new thinking and innovative model for industrial Internet platform construction and service application, and a key infrastructure for platform services. It can realize agile application development, iterative efficiency improvement, and delivery speed of industrial Internet platform for industry personalized needs. Industry cloud-native platform is still in the rapid emergence and exploration stage, and further attention needs to be paid to the as-a-service delivery model, continuous software-defined delivery, distributed enterprises based on industry cloud- native platform, and the construction of standardized and highly automated cloud services and intelligent decision- making systems.

(2)  Industrial Metaverse

Industrial Metaverse is the application of Metaverse-related technology and software in the industrial field led by a new generation of artificial intelligence technology. It can realize the virtual-real mapping of physical space, virtual space, and cyberspace in the industrial field as well as the interactive integration, thus realizing the new digital industrial economic system of industrial whole industrial chain, whole value chain, whole element wisdom collaboration based open interconnection and scenario integration characterized by virtual promoting real and virtual enhancing real. Industrial Metaverse is one of the typical forms of intelligent manufacturing in the future, which is the advancement and ascension of the digital twin. The current research on industrial Metaverse is in the stage of proof of concept, infrastructure construction, and model exploration, and is in urgent need of a further breakthrough.

(3)  Scenario-driven innovation

Scenario-driven innovation is not only the process of applying existing digital technologies and industrial Internet platform services to specific scenarios to create greater value, but also the process of driving the integration and co-integration of innovation elements and contextual elements such as strategy, technology, platform, and market demand based on future trends and vision needs, breaking through the technical bottlenecks of existing industrial Internet platforms, developing new technologies, new products, new channels, new business models, and even opening up new markets and fields. The scenario-driven innovation provides a breakthrough direction for the industrial digital transformation empowered by the industrial Internet platform. In the future, there should be more focus on the opportunities and mechanisms for carbon peaking, carbon neutrality, common prosperity, military, and civilian integration, and rural revitalization empowered by industrial Internet platforms.

The top three countries in the quantity of core papers in the engineering research front of “research on industrial digital transformation empowered by industrial internet platform” are China, the USA, and the UK (Table 1.2.1). The main output organizations of core papers are Aalto University, South China University of Technology, Beihang University, etc. (Table 1.2.2). From the perspective of the cooperation network among main countries (Figure 1.2.1), there is more cooperation among the USA, China, and other countries. From the perspective of the cooperation network among main institutions (Figure 1.2.2), there is more cooperation among South China University of Technology, King Saud University, and University of Messina.

The quantity of citing papers in China ranks first, as shown in Table 1.2.3. The top-ranked institutions are the Chinese Academy of Sciences, Beijing University of Posts and Telecommunications, and Beihang University, as shown in Table 1.2.4. Figure 1.2.3 shows the roadmap of the engineering research

《Table 1.2.1》

Table 1.2.1 Countries with the greatest output of core papers on “research on industrial digital transformation empowered by industrial internet platform”

No. Country Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 China 32 27.83 2 553 79.78 2018.6
2 USA 24 20.87 2 360 98.33 2017.9
3 UK 16 13.91 1 794 112.12 2018.3
4 Germany 10 8.7 577 57.7 2018
5 Canada 9 7.83 1 269 141 2018.8
6 Finland 9 7.83 866 96.22 2018.7
7 India 8 6.96 606 75.75 2018.8
8 Spain 8 6.96 471 58.88 2018.1
9 South Korea 7 6.09 785 112.14 2017.3
10 Italy 7 6.09 429 61.29 2018.9

《Table 1.2.2》

Table 1.2.2 Institutions with the greatest output of core papers on “research on industrial digital transformation empowered by industrial internet platform”

No. Institution Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 Aalto University 5 4.35 446 89.2 2019.6
2 South China University of Technology 5 4.35 404 80.8 2018.4
3 Beihang University 4 3.48 445 111.25 2019
4 University of Vaasa 4 3.48 420 105 2017.5
5 The University of Auckland 3 2.61 565 188.33 2017.7
6 King Saud University 3 2.61 232 77.33 2018.7
7 University of Messina 3 2.61 214 71.33 2018.7
8 KTH Royal Institute of Technology 3 2.61 207 69 2017
9 Arts et Metiers Institute of Technology 2 1.74 466 233 2019
10 Polytech Montreal 2 1.74 466 233 2019

《Figure 1.2.1》

Figure 1.2.1 Collaboration network among major countries in the engineering research front of “research on industrial digital transformation empowered by industrial internet platform”

《Figure 1.2.2》

Figure 1.2.2 Collaboration network among major institutions in the engineering research front of “research on industrial digital transformation empowered by industrial internet platform”

《Table 1.2.3》

Table 1.2.3 Countries with the greatest output of citing papers on “research on industrial digital transformation empowered by industrial internet platform”

No. Country Citing papers Percentage of citing papers/% Mean year
1 China 2 705 31.44 2020.2
2 USA 1 091 12.68 2020
3 India 942 10.95 2020.2
4 UK 777 9.03 2020.1
5 Italy 624 7.25 2020.1
6 South Korea 460 5.35 2020.1
7 Germany 430 5 2020.1
8 Canada 419 4.87 2020.1
9 Spain 402 4.67 2020
10 Australia 401 4.66 2020.1

《Table 1.2.4》

Table 1.2.4 Institutions with the greatest output of citing papers on “research on industrial digital transformation empowered by industrial internet platform”

No. Institution Citing papers Percentage of citing papers/% Mean year
1 Chinese Academy of Sciences 126 12.32 2020.2
2 Beijing University of Posts and Telecommunications 120 11.73 2020.1
3 Beihang University 113 11.05 2019.6
4 Shanghai Jiao Tong University 108 10.56 2019.7
5 Nanyang Technological University 93 9.09 2020.1
6 The Hong Kong Polytechnic University 93 9.09 2020.2
7  King Saud University 92 8.99 2020.2
8 Tsinghua University 74 7.23 2020.1
9 Zhejiang University 73 7.14 2020.4
10 Huazhong University of Science and Technology 66 6.45 2019.9

front of “research on industrial digital transformation empowered by industrial internet platform”.

1.2.2 Research on global supply chain security risk management in digital age

The supply chain management refers to business flow, logistics and information flow, including production, transportation, warehousing and many other processes, and any problems in any process can affect supply chain security and cause supply chain risk. In the digital era, digital analysis methods and tools provide the technical guarantee to resist supply chain risks. However, the technology itself is vulnerable to external complex systems, especially under the trend of reverse globalization and active disconnection of supply chains in developed countries. How to ensure supply chain security in global high-tech industries has become an increasingly urgent issue.

Currently, scholars from various countries around the world have provided a quantity of solutions to deal with the global supply chain risks in the digital era. In terms of the main output countries of core papers, the top three countries are the UK, China, and Canada (Table 1.2.5). The main output institutions of core papers are University of British Columbia, University of Guelph, and the Ohio State

《Figure 1.2.3》

Figure 1.2.3 Roadmap of the engineering research front of “research on industrial digital transformation empowered by industrial internet platform”

University (Table 1.2.6), with these three institutions having more than 90 citations.

In terms of the cooperation network among main countries (Figure 1.2.4), there is cooperation between France and Germany, China and Belgium, and the UK and Iran. In terms of the cooperation network among main institutions (Figure 1.2.5), only University of East Anglia and the Ohio State University have not collaborated with other organizations. It can be seen from Table 1.2.7 that the top three countries in terms of the quantity of the citing papers are China, the UK, and the USA, with more than 100 citing core papers each. In particular, the percentage of citing papers in China is as high as more than 20%. Meanwhile, according to Table 1.2.8, the top organizations are Hamad Bin Khalifa University, University of Bordeaux, and Chinese Academy of Sciences.

Based on the review of the existing literature, a more in- depth analysis on how to identify, assess and prevent the risks of global supply chain in the digital era is conducted, and insights are provided on the future development trend. The specific research trends are as follows.

(1)  Risk identification method of global supply chain based on digital technology in complex situations

In the identification of supply chain risks, the more intuitive representation of the digital technology is the big data algorithm, which analyzes the risk characteristics of the supply

《Table 1.2.5》

Table 1.2.5 Countries with the greatest output of core papers on “research on global supply chain security risk management in digital age”

No. Country Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 UK 4 33.33 213 53.25 2017.5
2 China 2 16.67 82 41 2019
3 Canada 1 8.33 99 99 2019
4 USA 1 8.33 98 98 2020
5 Spain 1 8.33 70 70 2017
6 France 1 8.33 60 60 2016
7 Germany 1 8.33 60 60 2016
8 Poland 1 8.33 48 48 2016
9 Iran 1 8.33 41 41 2016
10 Belgium 1 8.33 40 40 2021

《Table 1.2.6》

Table 1.2.6 Institutions with the greatest output of core papers on “research on global supply chain security risk management in digital age”

No. Institution Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 University of British Columbia 1 8.33 99 99 2019
2 University of Guelph 1 8.33 99 99 2019
3 The Ohio State University 1 8.33 98 98 2020
4 University of East Anglia 1 8.33 73 73 2018
5 IE University 1 8.33 70 70 2017
6 Zaragoza Logistics Center 1 8.33 70 70 2017
7 Queen’s University Belfast 1 8.33 60 60 2018
8 Youngs Seafood 1 8.33 60 60 2018
9 The French National Centre for Scientific Research 1 8.33 60 60 2016
10 Universitat Augsburg 1 8.33 60 60 2016

《Figure 1.2.4》

Figure 1.2.4 Collaboration network among major countries in the engineering research front of “research on global supply chain security risk management in digital age”

《Figure 1.2.5》

Figure 1.2.5 Collaboration network among major institutions in the engineering research front of “research on global supply chain security risk management in digital age”

《Table 1.2.7》

Table 1.2.7 Countries with the greatest output of citing papers on “research on global supply chain security risk management in digital age”

No. Country Citing papers Percentage of citing papers/% Mean year
1 China 144 20.2 2020.3
2 UK 107 15.01 2019.9
3 USA 106 14.87 2020.2
4 India 56 7.85 2020.2
5 Germany 56 7.85 2019.8
6 Australia 46 6.45 2020.2
7 France 45 6.31 2019.7
8 Italy 45 6.31 2020.4
9 Poland 42 5.89 2019.7
10 Canada 39 5.47 2020.3

《Table 1.2.8》

Table 1.2.8 Institutions with the greatest output of citing papers on “research on global supply chain security risk management in digital age”

No. Institution Citing papers Percentage of citing papers/% Mean year
1 Hamad Bin Khalifa University 17 12.14 2020.5
2 University of Bordeaux 16 11.43 2019.4
3 Chinese Academy of Sciences 16 11.43 2019.8
4 University of Waterloo 13 9.29 2019.2
5 Shahid Beheshti University 13 9.29 2020.1
6 Polish Academy of Sciences 13 9.29 2019.5
7 Technical University of Berlin 13 9.29 2019.5
8 Cranfield University 10 7.14 2020.1
9 The French National Centre for Scientific Research 10 7.14 2019.6
10 Ghent University 10 7.14 2020.1

chain based on the collection of information flow in the supply chain network, establishes a risk prediction system, and predetermines whether there is a security risk in the supply chain. The commonly used supply chain risk identification algorithms include fuzzy comprehensive evaluation method, neural network, etc. The field of application tends to be credit risk, liquidity risk identification and enterprise operation risk prediction in supply chain finance. In the context of the current COVID-19 pandemic, the mainstream of research is to use multiple methods and technologies to identify the risks of manufacturing capacity, production level and other aspects of the supply chain, and to optimize different methods and compare the results.

(2)  Risk impact assessment of global supply chain based on digital technology

Digital technology can be adopted to virtualize and visualize the whole process of the supply chain, and evaluate all potential risks in the supply chain through big data, simulation and other technologies. Recently, the digital technology for assessing the impact of supply chain risks has become more systematic, such as the application of smart devices such as RFID and sensors to collect real-time data. In combination with historical maintenance data and derived data, the above digital technology simulates the operation process of the supply chain in real time and comprehensively evaluates the unknown risks and impacts in the supply chain. The evaluation of supply chain risk through decision support system, tracking system and digital twin technology has become a research hotspot. How to assess the supply chain security risks of global high-tech industries in the current critical period of intensified international trade friction, increased uncertainty and high-quality transformation of various industries has become an increasingly urgent issue under the current trend of reverse globalization and active decoupling of supply chains in developed countries, which deserves further research.

(3)  Interruption and security prevention of global supply chain under digital background

The application of digital technology has led to data co- construction and sharing, promoted multi-chain cooperation, and improved the integrated decision-making ability of the supply chain, which is crucial to risk prevention of supply chain. During the spread of COVID-19, 3D printing, cloud logistics, and contactless distribution technologies and equipment such as automated guided vehicles (AGV) and radio frequency identification (RFID) provide important support for preventing supply chain disruptions. Research hotspots in this field focus on methods to prevent supply chain disruption, and to design and practice supply chain architecture based on blockchain, cloud platform and other technologies. Therefore, the key research directions in academic research recently are layout methods of key technology industrial chain and supply chain, supply chain security problem of high-tech industry under the intensification of reverse globalization economic competition, and supply chain data leakage and information security threat caused by data integration.

(4)  Global supply chain risk impact law and control mechanism driven by data

As an important tool for identifying, evaluating and preventing supply chain risks, the digital technology has been widely studied by scholars for managing supply chain risks, but there remain some aspects to be considered. From the micro level, there are still loopholes in digital technology, with data leakage and information security threats. From the macro level, the impact and the solution mechanism of smart supply chain innovation and government industrial layout on global supply chain risks remain unclear, and it is necessary to prepare a supply chain risk management standard suitable for the digital age. Future research driven by data should focus on solving the problems of weak digital key technologies, specifically, the basic theory and method of supply chain resilience in the digital age, the impact law and Simulation of Sino-US trade friction on global supply chain, the supply chain security assessment and early warning mechanism of key industries in China, the risk of global supply chain disruption, system prediction and security governance system, etc. For the above problems, further study is deserved.

To further improve the global supply chain risk security management in the digital age, this paper further plans the development path of applying digital technology to deal with supply chain risks in the future (Figure 1.2.6).

1.2.3 Research on big data governance methods in artificial intelligence scenarios

By reviewing the existing literature and analyzing the current development situation and future trends, the research on big data governance methods in artificial intelligence scenarios focuses on the following aspects.

(1)   Key technologies for big data governance in artificial intelligence scenarios

The whole process data service includes structured data processing, data quality assessment and data cleaning, data normalization, data storage, and data sharing. Structured data processing starts with parsing multi-source heterogeneous data sources, extracting the required information using information extraction techniques, and further converting them into structured data. The key technology for data quality assessment is data visualization technology. The user defines some data cleaning rules to deal with the quality problems in the data in batches and improve the efficiency of data cleaning. In the field of database research, there are also studies to improve the efficiency of data cleaning with the help of crowdsourcing ideas. In the process of data cleaning, multiple rounds of human-computer interaction are required, and the interaction interface and interaction mode of the system is particularly important for the effectiveness of data cleaning algorithms. The data normalization processing determines the data granularity and expression according to the demand characteristics of the application. It is necessary to consider the balance of big data preservation time and storage space and identify the data elements that have a critical impact on business. It is also desirable to establish a data governance standard system to solve the institutional and technical problems that make data difficult to share.

(2)   Construction of big data mapping knowledge domain in artificial intelligence scenarios

By constructing big data mapping knowledge domain, it realizes understanding data, explaining phenomena and knowledge reasoning, discovering deep relationships, and realizing intelligent search and intelligent interaction. Firstly, based on metadata information such as enterprise and social, algorithms such as natural language processing, machine learning, pattern recognition, and business rule filtering are used to improve processing efficiency and enhance the accuracy of knowledge extraction. Secondly, knowledge is represented and stored in the form of ontology and automatically constructed into mapping knowledge domains.

Finally, through mapping knowledge domain relations, knowledge discovery, knowledge reasoning, and mining are carried out through mapping computing, and intelligent search and correlation query means are used to provide more accurate data to end users.

(3)    Big data security controllability issues in artificial intelligence scenarios

There is a need to solve data security and algorithm security problems such as privacy leakage, data rights validation, algorithm bias, and technology abuse. Firstly, cryptography technology, smart contracts, and privacy computing are the key technologies for achieving data security. Encryption of data using technologies such as public key cryptography can define the identity of data subjects and effectively support data rights validation. Privacy computing technologies, such as multi-party security computing, can realize the exploitation

《Figure 1.2.6》

Figure 1.2.6 Roadmap of the engineering research front of “research on global supply chain security risk management in digital age”

of data without transferring the original data and promote the separation of data ownership and use rights. By integrating privacy computing and trustworthy privacy computing technologies, it can effectively solve the problem of re- identification of personal information after anonymization, and realize the “computable but not identifiable”. Using contract theory and incentive mechanism, it can balance security protection and benefit sharing to realize “data available but not visible”. Secondly, algorithmic models are difficult to explain, difficult to control, and difficult to account for, leading to discrimination, vulnerability, exploitation, information cocoon, and other security risks. By using the four elements including knowledge, data, algorithms, and computing capabilities, it can establish new interpretable and robust AI theories and methods to further develop safe, trustworthy, reliable, and scalable AI technologies.

(4)  Typical artificial intelligence application scenarios of big data governance

Big data governance has been applied in more complex and high-value artificial intelligence scenarios such as finance, healthcare, retail, urban management, public opinion monitoring and so on for solving management needs such as business decision-making, resource allocation, process optimization, operation and maintenance assurance, and risk prevention and control. In the field of business decision- making, big data visualization technology is applied to realize the effective transmission of complex analysis processes and analysis elements. In the field of resource allocation, the dynamic management of resource allocation is realized by relying on big data collection and computing capabilities. In the field of process optimization, bottlenecks in business processes are discovered to improve operational efficiency and customer experience. In the field of operation and maintenance, instant monitoring of operation is realized based on stream data processing technology. In the field of risk prevention and control, risk clues are identified through visualization technology to enhance risk warning capability.

In the above typical AI application scenarios of big data governance, on the one hand, a systematic big data governance framework has not yet been formed, and key technologies such as open sharing, security and privacy protection, quality assessment, and value prediction are far from mature. On the other hand, there are problems including monopoly regulation of Internet companies, regulation of financial digital business, regulation and guidance of online public opinion, data security and privacy protection, and other AI application problems.

The top three countries in the engineering research front of “research on big data governance methods in artificial intelligence scenarios” regarding the quantity of core papers are the USA, the UK, and China (Table 1.2.9), and the top three countries in terms of citations per paper are France, South Korea, and Sweden. Among the main output countries, the USA, the UK, the Netherlands, Australia, and other countries have more collaborations (Figure 1.2.7). The top organizations in terms of the quantity of core papers are Zhejiang University,

《Table 1.2.9》

Table 1.2.9 Countries with the greatest output of core papers on “research on big data governance methods in artificial intelligence scenarios”

No. Country Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 USA 13 39.39 1 178 90.62 2018.7
2 UK 10 30.3 685 68.5 2017.9
3 China 8 24.24 561 70.12 2019
4 Netherlands 7 21.21 380 54.29 2018.6
5 France 5 15.15 542 108.4 2017
6 Australia 5 15.15 326 65.2 2018.2
7 South Korea 3 9.09 302 100.67 2018.7
8 Germany 3 9.09 178 59.33 2018
9 Austria 3 9.09 177 59 2018.3
10 Sweden 2 6.06 187 93.5 2018.5

Imperial College London, and the London School of Hygiene & Tropical Medicine (Table 1.2.10). Among the main output institutions, Imperial College London and the London School of Hygiene & Tropical Medicine have very close collaborations with other organizations, while University of North Carolina and University of California, San Francisco also have many collaborations (Figure 1.2.8). As can be seen from Table 1.2.11, the USA ranked first in the quantity of citing core papers. As can be seen from Table 1.2.12, the top-ranked institutions are Chinese Academy of Sciences, Harvard University, and the University of Melbourne. Figure 1.2.9 shows the roadmap of the engineering research front of “research on big data governance methods in artificial intelligence scenarios”

1.2.4 Research on the theory and method of accurate construction and evolution of digital twin model

The digital twin is driven by multi-dimensional models and fused data to achieve monitoring, simulation, prediction, optimization, and other services and application requirements, where the construction of the digital twin model is a prerequisite for achieving digital twin practice and landing application. The digital twin model can evolve in real-time by receiving data from physical objects, thus maintaining consistency with physical objects throughout their lifecycle. Based on the digital twin model, analysis, prediction, diagnosis, training and so on can be performed and the simulation results can be fed back to the physical object, thus helping to optimize and

《Figure 1.2.7》

Figure 1.2.7 Collaboration network among major countries in the engineering research front of “research on big data governance

《Table 1.2.10》

Table 1.2.10 Institutions with the greatest output of core papers on “research on big data governance methods in artificial intelligence

No. Institution Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 Zhejiang University 3 9.09 288 96 2019
2  Imperial College London 3 9.09 258 86 2018.7
3  The London School of Hygiene & Tropical 3 9.09 210 70 2017
4  University of Amsterdam 3 9.09 164 54.67 2018.7
5  University of Oxford 2 6.06 136 68 2017.5
6  University College London 2 6.06 131 65.5 2018
7  University of Michigan 2 6.06 116 58 2019
8 University of California, San Francisco 2 6.06 111 55.5 2017.5
9 University of North Carolina 2 6.06 111 55.5 2017.5
10 Zhengzhou University 2 6.06 110 55 2019

《Figure 1.2.8》

Figure 1.2.8 Collaboration network among major institutions in the engineering research front of “research on big data governance methods in artificial intelligence scenarios”

《Table 1.2.11》

Table 1.2.11 Countries with the greatest output of citing papers on “research on big data governance methods in artificial intelligence

No. Country Citing papers Percentage of citing papers/% Mean year
1 USA 686 22.96 2020.1
2 China 595 19.91 2020.4
3 UK 361 12.08 2020
4 Italy 237 7.93 2020
5 Australia 219 7.33 2020.3
6 Germany 174 5.82 2020
7 India 171 5.72 2020.4
8 Canada 163 5.46 2020.2
9 France 141 4.72 2019.7
10 Spain 124 4.15 2020

《Table 1.2.12》

Table 1.2.12 Institutions with the greatest output of citing papers on “research on big data governance methods in artificial intelligence

No. Institution Citing papers Percentage of citing papers/% Mean year
1 Chinese Academy of Sciences 49 11.32 2020.4
2 Harvard University 47 10.85 2019.9
3 The University of Melbourne 45 10.39 2020.1
4 University College London 44 10.16 2019.8
5 The University of Sydney 44 10.16 2020.1
6 Sorbonne University 39 9.01 2019.3
7 Imperial College London 39 9.01 2020.1
8 Huazhong University of Science and Technology 36 8.31 2019.9
9 Johns Hopkins University 31 7.16 2019.6
10 University of Oxford 30 6.93 2019.4

《Figure 1.2.9》

Figure 1.2.9 Roadmap of the engineering research front of “research on big data governance methods in artificial intelligence scenarios”

make decisions on the physical object. Models are the core foundation of the digital twin, but modeling technology has emerged since the 1950s and has developed over the decades into more than a dozen new modeling models, technologies, and industries, such as model engineering, data-driven modeling, high-performance modeling, and complex system modeling. The emergence of the digital twin has further promoted the development of modeling technology.

The purpose of digital twin modeling is to eliminate the uncertainty of various physical entities, especially complex systems.

The construction of the digital twin model is the digital modeling of the properties, methods, and behaviors of physical entities and processes in digital space. The model construction can be multidimensional in “geometry-physics-behavior-rules”, or multi-domain in mechanical, electrical, hydraulic, and other fields. The modeling of complex entities is often cross-domain, cross-type, and cross-scale, involving multiple dimensions, and the effect of modeling through a single dimension is not good. It is also necessary to achieve the construction of more complex object models through model assembly and fusion at multiple levels and granularities to achieve a comprehensive characterization of the characteristics of each domain of complex physical objects. To ensure the correctness and validity of the digital twin model, the constructed and assembled or fused models should be validated to check whether the model describes and characterizes the state or features of the physical object correctly. If the model validation results do not meet the requirements, model correction is needed to make the model closer to the actual operation or use of the physical object to ensure the accuracy of the model. Therefore, the main research direction can focus on the six stages of the digital twin model, i.e., “construction-assembly-fusion-validation-correction- management”, for carrying out the accurate construction of the multi-dimensional/multi-domain digital twin model, the assembly and fusion of all-elements/multi-scale twin digital model, the validation and correction of virtual-real consistency of digital twin model, and the interactive iteration and dynamic evolution of digital twin model.

Building digital twin models is not the final purpose, but a means to improve the performance and operational efficiency of their corresponding real objects through the analysis of digital twin models. Important future development directions include multidimensional deep fusion modeling of complex entities, continuous improvement of modeling efficiency and accuracy, interoperability and interactive evolution of models, mutual iteration and dynamic evolution of models and physical entities, and unified model semantics and syntax. The digital twin is in the rising stage of development, the technical system is improving, the industrial integration continues to accelerate, and the industry application is accelerating penetration. Application scenarios include various fields such as aerospace, intelligent manufacturing, health care, smart cities, energy and power, and integrated transportation.

The top three countries for the quantity of core papers in the engineering research front of “research on the theory and method of accurate construction and evolution of digital twin model” are China, the USA, and Germany (Table 1.2.13), and the main output institutions of core papers are Guangdong University of Technology, Beihang University, and the University of Auckland (Table 1.2.14). From the cooperation network of the main countries (Figure 1.2.10), there is very close cooperation between China and other countries, and from the main institutions, Guangdong University of Technology and City University of Hong Kong, National University of Singapore and Beihang University cooperate more closely (Figure 1.2.11). As can be seen from Table 1.2.15, China ranks first in the quantity of citing core papers. As can be seen from Table 1.2.16, the top three institutions are Northwestern Polytechnic University, Beihang University,

《Table 1.2.13》

Table 1.2.13 Countries with the greatest output of core papers on “research on the theory and method of accurate construction and evolution of digital twin model”

No. Country Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 China 72 36.18 6 501 90.29 2019.8
2 USA 33 16.58 2 526 76.55 2019
3 Germany 25 12.56 3 209 128.36 2018.1
4 UK 19 9.55 1 699 89.42 2019
5 Sweden 13 6.53 980 75.38 2019.4
6 Singapore 10 5.03 1 359 135.9 2020
7 Australia 10 5.03 1 262 126.2 2019.9
8 Italy 9 4.52 448 49.78 2018.9
9 France 8 4.02 1 178 147.25 2019.5
10 South Korea 8 4.02 358 44.75 2018.9

and Shanghai Jiao Tong University. Figure 1.2.12 shows the roadmap of the engineering research front of “research on the theory and method of accurate construction and evolution of digital twin model”

《Table 1.2.14》

Table 1.2.14 Institutions with the greatest output of core papers on “research on the theory and method of accurate construction and evolution of digital twin model”

No. Institution Core papers Percentage of core papers/% Citations Citations per paper Mean year
1 Guangdong University of Technology 10 5.03 1 041 104.1 2019.5
2 Beihang University 9 4.52 2 094 232.67 2019.4
3 The University of Auckland 7 3.52 743 106.14 2019.7
4 National University of Singapore 6 3.02 1 077 179.5 2020.2
5 City University of Hong Kong 6 3.02 475 79.17 2020
6 Berlin School of Economics and Law 5 2.51 1 097 219.4 2020.2
7 The Hong Kong Polytechnic University 5 2.51 363 72.6 2019.6
8 University of Patras 5 2.51 270 54 2019.2
9 The University of Hong Kong 5 2.51 230 46 2020.4
10 University of Michigan 5 2.51 221 44.2 2020.2

《Figure 1.2.10》

Figure 1.2.10 Collaboration network among major countries in the engineering research front of “research on the theory and method of accurate construction and evolution of digital twin model”

《Figure 1.2.11》

Figure 1.2.11 Collaboration network among major institutions in the engineering research front of “research on the theory and method of accurate construction and evolution of digital twin model”

《Table 1.2.15》

Table 1.2.15 Countries with the greatest output of citing papers on “research on the theory and method of accurate construction and evolution of digital twin model”

No. Country Citing papers Percentage of citing papers/% Mean year
1 China 2 720 32.12 2020.5
2 USA 1 281 15.13 2020.3
3 Germany 900 10.63 2020.2
4 UK 811 9.58 2020.4
5 Italy 550 6.5 2020.4
6 India 481 5.68 2020.4
7 France 411 4.85 2020.3
8 Australia 384 4.53 2020.4
9 Spain 336 3.97 2020.3
10 South Korea 307 3.63 2020.4

《Table 1.2.16》

Table 1.2.16 Institutions with the greatest output of citing papers on “research on the theory and method of accurate construction and evolution of digital twin model”

No. Institution Citing papers Percentage of citing papers/% Mean year
1 Northwestern Polytechnic University 115 11.09 2020.3
2 Beihang University 113 10.9 2020.1
3 Shanghai Jiao Tong University 111 10.7 2020.5
4 Chinese Academy of Sciences 104 10.03 2020.5
5 The Hong Kong Polytechnic University 97 9.35 2020.4
6 Polytechnic University of Milan 95 9.16 2020.3
7 Tsinghua University 87 8.39 2020.4
8 The University of Hong Kong 87 8.39 2020.4
9 Huazhong University of Science and Technology 80 7.71 2020.6
10 RWTH Aachen University 76 7.33 2020.4

《Figure 1.2.12》

Figure 1.2.12 Roadmap of the engineering research front of “research on the theory and method of accurate construction and evolution  of digital twin model”

《2 Engineering development fronts》

2 Engineering development fronts

《2.1 Trends in Top 10 engineering development fronts》

2.1 Trends in Top 10 engineering development fronts

In the field of engineering management, the top 10 global engineering development frontiers this year are “product and service recommendation system based on the mapping knowledge domain”, “construction of autonomous transportation system of ‘mobility as a service’ ”, “network security situation awareness technology in high threat environment”, “development of human–machine co-driving system with self-evolution and self-learning”, “medical-networking management and control system for major contagious diseases”, “research and development of human–cyber– physical system in healthy building environment”, “factory early warning system based on digital twin”, “industrial internet production management system based on cloud platform”, “immersive building environment modeling and intelligent evaluation system”, and “smart contract for specific application and automatic generation method”. The core patents are listed in Tables 2.1.1 and 2.1.2. Besides, the Top 10 engineering development fronts include many disciplines such as medicine, architecture, transportation, and computer. Among them, “product and service recommendation system based on the mapping knowledge domain”, “construction of autonomous transportation system of ‘mobility as a service’ ”, “network security situation awareness technology in high threat environment”, and “development of human–machine co-driving system with self-evolution and self-learning” are the key fronts for interpretation, and their current development trends and future trends will be explained in detail later.

(1)  Product and service recommendation system based on the mapping knowledge domain

Mapping knowledge domains can organize and represent complex semantic associations accurately. The “product and ser vice recommendation system based on the mapping knowledge domain” is an intelligent system that uses mapping knowledge domains to establish complex knowledge associations among users, products, and services, understand the personalized preferences and needs of users, and help users filter out interesting products and services. It collects multi-source heterogeneous data and extracts and fuses the knowledge of users, products, and services and their associations to build a mapping knowledge domain. Through the analysis of the mapping knowledge domain, it

《Table 2.1.1》

Table 2.1.1 Top 10 engineering development fronts in engineering management

No. Engineering research front Published patents Citations Citations per paper Mean year
1 Product and service recommendation system based on the mapping knowledge domain 56 239 4.27 2020.3
2 Construction of autonomous transportation system of “mobility as a service” 40 527 13.18 2019.7
3 Network security situation awareness technology in high threat environment 158 2162 13.68 2019.2
4 Development of human–machine co-driving system with self-evolution and self-learning 68 434 6.38 2019.8
5 Medical-networking management and control system for major contagious diseases 39 176 4.51 2018.9
6 Research and development of human–cyber–physical system in healthy building environment 37 191 5.16 2019
7 Factory early warning system based on digital twin 120 302 2.52 2019.6
8 Industrial internet production management system based on cloud platform 134 1332 9.94 2020
9 Immersive building environment modeling and intelligent evaluation system 139 1672 12.03 2019
10 Smart contract for specific application and automatic generation method 119 892 7.5 2019.8

《Table 2.1.2》

Table 2.1.2 Annual number of core patents published for the Top 10 engineering development fronts in engineering management

No. Engineering research front 2016 2017 2018 2019 2020 2021
1 Product and service recommendation system based on the mapping knowledge domain 1 1 1 5 20 28
2 Construction of autonomous transportation system of “mobility as a service” 2 4 3 4 11 16
3  Network security situation awareness technology in high threat environment 8 11 28 37 40 34
4  Development of human–machine co-driving system with self-evolution and self-learning 0 0 6 16 33 13
5 Medical-networking management and control system for major contagious diseases 5 5 7 5 7 10
6 Research and development of human–cyber–physical system in healthy building environment 1 5 11 6 5 9
7 Factory early warning system based on digital twin 2 7 16 23 41 31
8 Industrial internet production management system based on cloud platform 3 6 11 22 26 66
9 Immersive building environment modeling and intelligent evaluation system 7 21 25 30 26 30
10  Smart contract for specific application and automatic generation method 7 7 9 9 12 11

accurately recommends personalized products and services for users and improves the accuracy and interpretability of recommendations. The “product and service recommendation system based on the mapping knowledge domain” faces problems such as heterogeneous data from multiple sources, sparse value density, difficult user security and privacy protection, and complex application scenarios, which make the system development face many challenges. Therefore, the innovation and optimization of multi-source data acquisition and integration, cross-domain recommendation with data migration and interaction, text information understanding and processing, intelligent data analysis of mapping knowledge domain, dynamic recommendation technology, multi-task learning model development, user information acquisition and processing mediated by smart devices, and user privacy security and protection are important directions for future development.

(2)   Construction of autonomous transportation system of “mobility as a service”

In recent years, with the acceleration of global urbanization, travel services have gradually presented significant features such as decentralization, refinement, lightweight, and heterogeneity. “Mobility as a service” (MaaS) is a user- centered intelligent travel management and distribution system that integrates multiple travel services and provides them to end users through a data interface, enabling them to seamlessly plan their trips and make payments. Autonomous transportation system (ATS) is based on the business logic of autonomous perception, learning, decision-making, and response, and accomplishes transportation through self- organized operation and autonomous services to achieve the goals of safety, efficiency, convenience, green, and economy. Compared with the existing transportation system, the MaaS ATS system is designed with the functions of one- stop travel, reservation-based travel, autonomous decision- making, autonomous service, instant demand response, dynamic matching of supply and demand, etc. It integrates various transportation modes through the information service platform, encourages green, low-carbon, and slow-moving travel modes, and quickly and accurately matches travel demand and transportation supply. It reduces the human passive intervention of the transportation system, improves the autonomy of the transportation system, eases the contradiction between the scattered travel demand for the traditional transportation system and intensive transportation supply, and the contradiction between flexible travel demand and planned transportation service, and improves the effect of the intelligent travel experience of users, which is of great significance to realize the intelligent transformation of transportation. Two major research hotspots have emerged in MaaS ATS system construction technology, including the optimized design of demand-oriented “individual-specific” personalized travel solutions in the multi-dimensional decision-making variable environment of individual travel, based on the heterogeneous user profile, and the independent construction of dynamic supply and demand matching and collaboration system for reservation-based travel in the mobile Internet environment, based on the user reservation-based travel information, real-time transportation network situation judgment, vehicle supply status and other multi-source transportation information, relying on real- time dynamic simulation technology and mathematical optimization algorithms.

(3)  Network security situation awareness technology in high threat environment

Under the background of increasingly fierce global cyberspace games and interweaving of real conflicts and network conflicts, the network security is facing a high threat environment with the coexistence of multi-level attack actors from hacker groups to national advanced persistent threat (APT) organizations. Network security situation awareness is an ability to master the security risks dynamically. Through continuous monitoring of network system status and security events, combined with threat intelligence, international relations, geopolitics and other information, the technology can understand the threat attack intent and evaluate the impact scope, so as to make forecast and early warning for follow-up actions and impacts, and assist the decision-making and action. Besides, the network security situation awareness mainly includes the collection of security data, security data processing, analysis of security data and visualization technology. The collection of security data is to obtain massive basic data closely related to security, such as traffic, logs, vulnerabilities, samples, etc.; security data processing is to carry out operations such as cleaning, classification and standardization for the collected massive security data; the analysis of security data is to extract network threat characteristics and indicators and comprehensively evaluate network security risks through technologies such as data mining, intelligent analysis and so on; the visualization technology is to visually display the security risks. Due to the limitation of factors such as data source, processing capacity and deployment environment, the ability of traditional network security situation awareness for situation awareness and prediction is insufficient. Furthermore, with relaying on the data collection and acquisition, massive data storage and calculation platform, evaluation and prediction of intelligent situation, the network security situation awareness in high threat environment establishes the system architecture. Regarding technical methods, it is provided with methods of combination of the active discovery and passive collection, static analysis and dynamic analysis, distributed deployment and centralized processing, with taking into account both the macro and meso levels. It also combines the collection of real- time monitoring data with the accumulation of intelligence, experience and knowledge, so as to realize automatic and intelligent action response and strategy adjustment.

(4)  Development of human–machine co-driving system with self-evolution and self-learning

In a narrow sense, human–machine co-driving means that both the driver and the intelligent drive system have partial or total control of the vehicle and jointly determine the movement of the vehicle through an appropriate coordination mechanism. Besides, broadly speaking, human–machine co- driving also means that vehicles only driven by human beings, vehicles of human–machine co-driving in a narrow sense and vehicles only driven by intelligent systems drive together on the road.

It is widely expected that the rapid development of technologies such as new generation artificial intelligence, vehicle wireless communication and vehicle infrastructure cooperation can accelerate the realization of human–machine co-driving and reduce the physiological/psychological burden of drivers. The traditional driver assistant systems only help drivers simplify the actions of exercising specific control, namely, control enhancement. However, since the advanced driver assistant systems (ADAS) is proposed by researchers, intelligent vehicles have begun to be provided with development in aspects including the awareness enhancement, assistance of decision-making, specific function replacement, even complete replacement of human driving, etc. Unlike pure unmanned driving, the main target of human–machine co-driving is to integrate the advantages of drivers and the machines under the current condition of indispensable human driving, so as to achieve the hybrid enhancement of human–machine intelligence and the driving effect of “1+1>2”.

Considering that many drivers hope to keep the full-time or part-time self-driving, and the current development of artificial intelligence is still difficult to achieve complete unmanned driving in complex traffic environment, besides, since related laws and regulations are still in the process of further development and improvement, the human–machine co-driving in the narrow and broad sense will become the main operation mode of ground vehicles such as private cars, taxis and logistics trucks in the future. Therefore, the related research has important scientific value and application prospects.

(5)  Medical-networking management and control system for major contagious diseases

The medical-networking management and control system for major contagious diseases refers to an intelligent management system for epidemic which is distributed in space including different medical and healthcare institutions, communities and families and based on elements including personnel, finance, objects and information related to “prevention-control-treatment” of major contagious diseases, implementing accurate risk evaluation, monitoring & alarming, coordinated deployment of supplies and collaborative optimization of prevention, control and treatment for the outbreak of major contagious diseases.

Scholars involved blend medical-networking, a brand new academic concept, into management and control system for major contagious diseases. Thus, facing with the prevention and control of major contagious diseases, the technological direction including a multi-agent data-based approach to governance for outbreak control, cross-regional treatment collaboration and prevention and control regulation during the entire process is gradually formed, which facilities the transformation of management and control mode for major contagious diseases. For instance, in 2020, at the beginning of the outbreak of COVID-19 epidemic, Hefei University of Technology together with relevant enterprises set up the Wuhan Big Data Governance Platform for Epidemic Prevention and Control, which helped to rapidly complete the data analysis and data access for 70 hospitals including Huoshenshan Hospital and Leishenshan Hospital, public security bureau and civil affair bureau, markedly improving the management and control efficiency of epidemic.

As the medical-networking management and control system for major contagious diseases gradually progresses, the “high- coverage, high-response, and high-collaboration” medical service system will be established step by step in the future; the prevention-control ability of management and control system will be constantly enhanced in terms of intelligent and accurate non-contact monitoring technology and up- down-collaboration prevention-control system of contagious diseases; the medical service system will be transformed from “human adapt to systems” into “systems serve human”; the information barrier of hospitals of various levels will be broken; the medical and healthcare resources of all levels can be effectively mobilized and shared; the normalized management and control of medical networking for major contagious diseases featured by “sentinel alarm at grass- roots level, driven by monitoring data and full-spectrum joint prevention and control” will come into being.

(6)   Research and development of human–cyber–physical system in healthy building environment

Building is the micro-environment which is established to meet the requirements generated from life and production process, including the safety and health of residents. As science and technology develop and progress, people begin to positively renovate the architectural environment that is subject to control by means of devices. Currently, the architectural environment mainly refers to the indoor physical environment, namely the physical factors which act and influence on human’s physiology through sensory organs of human, including indoor thermal and humid environment, air quality, airflow environment, light environment and acoustic environment, etc. Human interact and interplay with indoor physical environment mainly through information technologies. The subject of information technologies include sensing technologies, communication technologies, computer technologies and control technologies. Among others, the sensing technologies obtain information, enabling Building to function as sensory organs; communication technologies convey information, enabling Building to function as nervous system; computer technologies process information, enabling Building to function as organs of thought; control technologies apply information, enabling Building to function as effector organs and generate actual effectiveness. Consequently, human–cyber–physical system in healthy building environment is an intellectualized system for building with health as its goal, with intelligent technologies as approaches, possessing comprehensive intelligent ability integrated sensory, inferential, judging and decision-making abilities and coordinating human and indoor physical environment. The fundamental theories include the building environment theory, control theory, information theory and system theory, etc. The iteration of computer networking technology facilitates the development from human–cyber– physical system in healthy building environment to control network and information network integration technology, so as to realize the intelligentized system monitoring, information sharing and intensive management. In addition, the Internet of Things-based intelligent grid is greatly influencing the application and development of human– cyber–physical system.

(7)  Factory early warning system based on digital twin

Factory hazards include the possibility of damage to people and the environment from equipment and sound, light, fire, electricity, and poison, as well as the possibility of damage to materials, equipment, and production from people. Unlike traditional methods that rely on the feelings and experiences of people in the field, the factory early warning system based on digital twin enables remote, accurate, and fast factory early warning of hazards through a five-dimensional model of physical entities, virtual entities, early warning services, twin data, and connectivity. The current main research includes but is not limited to ① remote diagnosis of workshop equipment based on digital twin, ② rapid construction of modular factory digital twin low-code platform, ③ health monitoring and management of factory building environment based on BIM technology, ④ intelligent identification and early warning of uncertain objects in the factory environment, ⑤ identification and early warning of multiple disaster- inducing digital twin sensing, ⑥ data-driven life prediction and health management of critical parts, ⑦ design and rehearsal of digital twin-based evacuation plan, ⑧ cloud platform for factory operation and maintenance monitoring and simulation, ⑨ early warning and control of human– machine interaction safety, and ⑩ simulation and dynamic real-time scheduling of factory logistics. With the construction of globalized smart factories, the demand for “factory early warning system based on digital twin” has surged. It is an inevitable development trend to reflect hazards more comprehensively, predict them more quickly and accurately, and design hazard plans more scientifically based on digital twin technology.

To achieve this, there is an urgent need to absorb the achievements in the fields of sensing technology, perception technology, communication technology, artificial intelligence technology, simulation technology, and big data technology to provide support for early warning of smart factory hazards based on enhanced cognition of various industrial production laws.

(8)  Industrial internet production management system based on cloud platform

Industrial Internet refers to the connection and fusion between global industrial systems and advanced computing, analysis, sensing technologies as well as internet. The nature of industrial internet is to closely link and fuse the equipment, production lines, factories, suppliers, products and clients through open and global industry-class network platforms, effectively sharing various elements and resources of industrial economy. Cloud platforms are highly-shared platforms in which the resources are manufactured based on cloud computing information technologies, linking different the tremendous manufacturing resources through industrial internet; the open collaboration of manufacturing resources and services can be achieved, with highly-shared social resources. The production management system specializes in comprehensive management integrating production plans, organization, coordination and control, achieving estimated production goals by means of reasonably organizing the production process, effectively utilizing production resources and economically and reasonably conducting production activities

Currently, most of production management systems manage closed and static domains based on expertise and heuristic rules, which is difficult to adapt to complicated and changeable custom-tailed manufacturing tasks and lacks the effective application of potential knowledge of big data of manufacturing resources. The new generation information technologies featured by cloud computing, big data and artificial intelligence integrate with manufacturing industry; for industrial internet, based on the interconnection of various underlying industrial systems and upper cloud manufacturing platforms, the originally closed manufacturing system become open and interconnected, so the open and sharing manufacturing resources of the entire industry chain and the production management of the entire process are obtained, which provides supporting technologies for production management which requires high collaboration, including the manufacture of high-end equipment. As the core of industrial internet cloud platforms, the production management system is the core support engine for intelligent configuration of large-scale distributed manufacturing resources and cost reduction and efficiency improvement of enterprises under the open environment of industrial internet, so as to achieve the adaption to dynamic changes in different domains and the scalability to complicated constraints; from the perspective of new technologies in which data and artificial intelligence develop in a coordinated way, core issues including high timeliness, high complexity and high dynamics in the face of modern manufacturing scheduling can be comprehensively and effectively addressed.

The development tendency indicates the researches on effective, transferable and self-adaption production management system based on manufacturing big data and driven by artificial intelligence, including edge & cloud computing-collaboration distributed artificial intelligence processing framework to realize the intelligent dynamic cooperative scheduling which balances the cloud manufacturing and manufacturing resources of isomerism on the side of edge, seamless integration of application among collaboration organizations and management through sharing business data and collaboration, so as to further achieve cross-organization business process collaboration and realize effective, low-cost, quality modeling approaches combined with multiple requirements based on deep reinforcement learning for the entire cross-organization work, as well as man- machine coordination production management technologies blending internal scheduling models of enterprises, data of production factors and manual production scheduling experience.

(9)  Immersive building environment modeling and intelligent evaluation system

“Immersive” is based on virtual reality (VR) technology, so that the user’s visual and other sensory channels are immersed in the computer-generated content and can interact with it, thus creating a sensory experience of being in a virtual world. Compared with the presentation of 2D drawings or desktop computers, VR enables project stakeholders to experience and evaluate architectural design solutions on a real spatial scale before the design is implemented, thus better meeting users’ functional, aesthetic, and comfort requirements for buildings and promoting the improvement of design management.

For immersive architectural review, it is desirable to solve three levels of technical problems including modeling, interaction, and knowledge extraction. Firstly, it is needed to complete the rapid construction of 3D models of buildings and environments, and realize the data interoperability between mainstream modeling software and virtual reality-related software. Secondly, it is required to solve the problem of natural interaction between people and the virtual building environment in the immersive environment. Through various external interactive devices, it is possible to observe the size, layout, material, and other attributes of the building and components from the first-person perspective, and to interact naturally with the building model and other users based on signals such as movement and voice. Finally, in the process of immersive experience, a large amount of data will be generated during the interaction between users and the building, environment, and other users. Storing, integrating, expressing, and reusing these interaction data and forming design knowledge will support the research of intelligent review algorithms and systems.

With the continuous development of virtual reality technology, the portability, comfort, and fluency of VR devices will be further improved in the future, and the immersive design experience system will become more popular, forming a powerful supplement to the existing engineering design work methods. The immersive workspace provided by VR technology will also make distributed multi-party collaborative design more convenient.

(10)   Smart contract for specific application and automatic generation method

Smart contract refers to a program with status, which operates on blockchain platform and driven by events. The data assets on blockchain ledger may be stored and processed by smart contract, and smart contract is widely used in engineering management, medical treatment, finance and other fields. The smart contract on blockchain has many characteristics such as decentration, de-trust, programmable and tamper-resistant, which enable the realization of efficient information exchange, value transfer and asset management. In terms of technology, the smart contracts on different blockchain platform vary in used programming language. For example, bitcoin is developed by using special bitcoin script, Ethereum is developed by using Solidity and Hyperledger is developed by using multiple programming languages to develop smart contract. The automatic generation of smart contract can greatly reduce the difficulty of developing smart contract code to a large extent and improve the friendliness of smart contract programming. However, smart contract has many development languages and the smart contract in different fields greatly varies in application design, which makes it very difficult to generate smart contract automatically and is not conducive to the standardized design in large-scale engineering projects and the collaborative use of multiple blockchain platforms. For the automatic generation of smart contract, smart contract can be classified on the basis of domain characteristics. For the data in different contract classification, big data and artificial intelligence analysis can be carried out. At the same time, the special programming language can be selected according to analysis results to generate the unified and domain specific smart contract template. In application field, smart contract is widely used in engineering management, medical treatment, finance and other fields, which enables possible to develop the smart contract with special functions for specific application scenarios. For example, compared with traditional financial field, smart contract can realize lower legal and transaction expenses and meanwhile, reduce the threshold for users to use. While in the application field of large-scale engineering construction, engineering developer can solve the accident accountability and anti-corruption during engineering supervision by using smart contract. In the future development, there are mainly two problems: privacy supervision and performance for smart contract. Generally, the data processed by smart contract is fully open and transparent. Everyone can acquire account balance, transaction information and contract contents through public query. These open operations and data may result in user data leakage and the de-anonymous attacks from attackers to blockchain or smart contract in some specific application scenarios. In addition to privacy security, currently in terms of performance, the majority of blockchain has low throughput on the infrastructure. But the design of smart contract can be optimized according to specific application scenarios to reduce contract execution cost and improve system efficiency.

《2.2 Interpretations for four key engineering development fronts》

2.2 Interpretations for four key engineering development fronts

2.2.1 Product and service recommendation system based on the mapping knowledge domain

The product and service recommendation system based on the mapping knowledge domain is a knowledge-driven recommendation platform, which makes product and service recommendations more intelligent, accurate, personalized, and interpretable by deeply mining the value of data. From the patent analysis, the main research areas are as follows.

(1)  Intelligent Q&A and data analysis technology based on the mapping knowledge domain

The intelligent Q&A technology based on the mapping knowledge domain gets user requirements through natural interaction, retrieves facts stored in the mapping knowledge domain, and gets answers to questions. The data analysis technology based on the mapping knowledge domain connects data silos to provide a complete view of data analysis, gain data insight, improve decision-making, and improve recommendation quality. Existing technologies include database storage, data mining, and heterogeneous data processing. Therefore, the development of massive mapping knowledge domain storage, multi-source heterogeneous data collection, and processing analysis technologies become the focus.

(2)  Intelligent recommendation technology for products and services based on the mapping knowledge domain

Intelligent recommendation for products and services based on the mapping knowledge domain finds potential connections between users and products and services by analyzing the massive knowledge associations in the mapping knowledge domain and provides users with high-quality recommendations. The development hotspots cover key technologies such as big data, cloud computing, machine learning, and deep learning.

(3)   Development of product and service recommendation system for different business scenarios

System development is mainly distributed in the fields of intelligent medical care, e-commerce, and smart life. Although the development in the field of intelligent medical care covers medical information provision, medical material distribution, disease prediction, and medical assistance, there is less technology development for user privacy and security protection. The field of e-commerce is more complete in terms of intelligent customer service and recommendation systems but is constrained by static recommendations and the influence of complex user environments. Emphasis should be placed on the development of voice, video, image, emotional information acquisition and processing technology, and dynamic update technology of mapping knowledge domain for media devices. The technology development in the field of smart life involves the recommendation of household items, which is mostly complemented by intelligent robots and electronic devices. How to collect information through media devices, analyze user needs, accurately recommend products and services, and terminal server development have become the focus of development.

In terms of the quantity of published patents, the top country is China (Table 2.2.1). The country with the highest citations per patent is the USA (Table 2.2.1). The top three institutions in terms of the quantity of published patents are China Ping’an Property Insurance Co., Ltd., Tencent Technology (Shenzhen) Co., Ltd., and Peking University (Table 2.2.2). There is no cooperation relationship among all countries and institutions.

China focuses on the mapping knowledge domain, big data, and medical integration and development of smart medical care, such as medical and health service recommendation methods, systems, electronic devices and storage media R&D, clinical test results analysis methods, and systems based on medical mapping knowledge domain, etc. Korea focuses on smart home and smart tourism product and service recommendation systems, such as decoration, TV, pet, social, AI Reminder for food and health and other products and service system, personalized recommendation and service in various aspects such as transportation, accommodation, scenic spots, etc. The USA is more concerned about applications related to smart devices and e-commerce, such as systems and methods used to integrate third-party services with digital assistants, automated assistance systems for computing devices, precision marketing for e-shopping recommendations, etc.

Figure 2.2.1 further maps out the future development path of the “product and service recommendation system based on the mapping knowledge domain”.

2.2.2 Construction of autonomous transportation system of “mobility as a service”

The technology for the construction of autonomous transpor- tation system of “mobility as a service” (MaaS) aims to meet the public requirements for intelligent, comfortable,

《Table 2.2.1》

Table 2.2.1 Countries with the greatest output of core patents on “product and service recommendation system based on the mapping knowledge domain”

No. Country Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 China 52 92.86 75 31.38 1.44
2 South Korea 3 5.36 2 0.84 0.67
3 USA 1 1.79 162 67.78 162

《Table 2.2.2》

Table 2.2.2 Institutions with the greatest output of core patents on “product and service recommendation system based on the mapping knowledge domain”

No. Institution Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 China Ping’an Property Insurance Co., Ltd. 4 7.14 3 1.26 0.75
2  Tencent Technology (Shenzhen) Co., Ltd. 4 7.14 3 1.26 0.75
3  Peking University 3 5.36 1 0.42 0.33
4 Gree Electric Appliances Incorporation of Zhuhai 2 3.57 0 0 0
5  Viasat Incorporation 1 1.79 162 67.78 162
6  Guilin University of Electronic Technology 1 1.79 13 5.44 13
7  Shaanxi Normal University 1 1.79 13 5.44 13
8 Nanjing Silicon Intelligence Technology 1 1.79 8 3.35 8
9 Shandong Shunnet Media Co., Ltd. 1 1.79 6 2.51 6
10  Alibaba Group Holding Limited 1 1.79 5 2.09 5

《Figure 2.2.1》

Figure 2.2.1 Roadmap of the engineering development front of “product and service recommendation system based on the mapping knowledge domain”

personalized, and 3D travel is characterized by multi-modal, full-chain, and reservation-based travel services, guiding individual intensive travel, regulating multi-modal travel and optimizing service supply through economic incentives such as joint ticketing packages, to achieve sustainable urban transportation. On the management side, a fast optimization decision model is established for multi-modal and multi- objective combined travel optimization. On the supply side, the optimal allocation of travel resources in time and space is studied. On the user side, real-time information and personalization are improved to meet personalized travel needs. The following is a more in-depth analysis from three perspectives, including the collaborative optimization of multi-modal supply resources for MaaS, personalized and integrated intelligent travel services, and multi-resolution simulation of the ATS system.

(1)    Collaborative optimization of multi-modal supply resources for MaaS

An important feature of MaaS is the integration of various transportation modes and service systems with efficiently operated public transportation as the backbone. Unlike traditional transportation networks, the multi-layer composite network can realize the separation of the physical layer (road network, rail network, etc.) and mode layer (mini car, bus, subway). Collaborative optimization of cross-modal supply resources is based on comprehensive travel cost measurement of mode chains to resolve the mode transfer mechanism, estimate the transfer matrix, reconfigure the traffic flow distribution model by integrating the composite network, and optimize the supply resource allocation based on the spatial and temporal distribution of network traffic flows. In recent years, with the increasing popularity of shared travel, the research concept has changed from a static single mode of transportation space-time resource allocation to a shared resource allocation based on reservation and real-time response.

(2)  Personalized and integrated intelligent travel services

Based on the real-time perception information of the transportation network, it can accurately control the matching relationship between travel demand and multi-modal transportation supply and realize online iteration and update of the dynamic supply and demand matching optimization algorithm. It can also analyze the impact of the supply- demand matching optimization scheme on the travel time, waiting time, transfer times, and vehicle congestion of each travel mode, the impact on other related travel modes, and the impact on road conditions.

It can further establish a prediction model for travel mode selection by travelers, develop a dynamic demand prediction technology for urban multi-modal transportation based on big data, deduce the flow distribution of all passengers, and evaluate the operation service level and global optimization effect of each travel mode based on this, thus realizing personalized and integrated intelligent travel services based on real-time transportation information in the mobile Internet environment.

(3)  Multi-resolution simulation of ATS system

The digital twin city is currently being used to promote the construction of smart cities, providing a multi- resolution digital twin platform with high fidelity for ATS systems, from the multi-source data access layer, to the computational simulation layer, to the decision- making application layer. Based on the holographic perception of static and dynamic data, it realizes the reproduction of scenarios based on twin data, derives and generalizes twin scenarios, accelerates the realization of shared autonomous driving technology, and helps the construction of ATS systems. Using the macro, meso, and micro multi-resolution simulation system driven by digital twin technology, and with the help of high-efficiency simulation optimization technology, it can optimize the design of a one-stop and reservation-based service capacity organization and operation plan.

The top three countries in the quantity of published patents are the USA, South Korea, and Japan (Table 2.2.3). For the quantity of organizational patents, the top three are Mobileye Vision Technologies Limited, Sony Group Corporation, and Toyota Motor Company (Table 2.2.4). Seen from the cooperation network among main countries (Figure 2.2.2), cooperation only exists between the UK and Japan, while there has been no cooperation between individual institutions.

Looking ahead, the construction of the MaaS autonomous traffic system will be significant technical changes in the innovative mobile Internet environment. In particular, with the rapid development of mobile sensors, communication networks, artificial intelligence, big data analysis, cloud computing, deep learning, reinforcement learning, and other

《Table 2.2.3》

Table 2.2.3 Countries with the greatest output of core patents on “construction of autonomous transportation system of ‘mobility as a service’”

No. Country Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 USA 20 50 75 14.23 3.75
2 South Korea 6 15 3 0.57 0.5
3 Japan 5 12.5 1 0.19 0.2
4 Germany 4 10 115 21.82 28.75
5 China 3 7.5 301 57.12 100.33
6 Cyprus 1 2.5 32 6.07 32
7 UK 1 2.5 0 0 0
8 Israel 1 2.5 0 0 0

《Table 2.2.4》

Table 2.2.4 Institutions with the greatest output of core patents on “construction of autonomous transportation system of ‘mobility as a service’”

No. Institution Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 Mobileye Vision Technologies Limited 7 17.5 4 0.76 0.57
2 Sony Group Corporation 4 10 1 0.19 0.25
3 Toyota Motor Company 4 10 0 0 0
4 LG Electronics Incorporation 3 7.5 2 0.38 0.67
5 Didi Chuxing Technology Company 2 5 58 11.01 29
6 Google Incorporation 2 5 43 8.16 21.5
7 Xerox Corporation 2 5 14 2.66 7
8 Uber Technologies Incorporation Limited 2 5 9 1.71 4.5
9 Shanghai Zhaoxin Semiconductor Co., Ltd. 1 2.5 243 46.11 243
10 Siemens Corporation 1 2.5 112 21.25 112

《Figure 2.2.2》

Figure 2.2.2 Collaboration network among major countries in the engineering development front of “construction of autonomous transportation system of ‘mobility as a service’”

technologies, the ability to accurately obtain and intelligently analyze dynamic travel information has been greatly improved. Based on these emerging technologies, digital and intelligent supervision of MaaS autonomous transportation systems, personalized travel demand management, and platform online decision optimization will be realized, which will effectively promote one-stop smart travel services for future urban transportation. In order to form a MaaS system for future autonomous transportation systems, it is necessary to research the one-stop travel and reservation- based traffic travel optimization methods driven by big data and artificial intelligence, and to establish adaptive sensing multi-task dynamic learning methods and decentralized multi-intelligence. On the other hand, it needs to propose a variety of strategic dynamic optimization methods such as efficient matching, optimal scheduling, mode combination, and dynamic pricing of smart travel service platforms, and build a personalized travel demand management and online decision-making optimization platform. Figure 2.2.3 shows the roadmap of the engineering development front of “construction of autonomous transportation system of ‘mobility as a service’”.

2.2.3 Network security situation awareness technology in high threat environment

Secretary General Xi Jinping pointed out that it is necessary to “perceive the network security situation in an all-weather and all-round way and enhance the network security defense and deterrence capabilities”. Network security situation awareness is an important condition for realizing network security guarantee by acquiring, understanding, displaying the elements that cause the change of network security status and predicting the development trend to assist decision- making and action. In the high threat environment where multi-level attack actors coexist, there are many challenges in perceiving threats and preventing and controlling risks, and forward-looking technical exploration and engineering practice are required.

Network security situation awareness in high threat environment focuses on data collection, threat detection, comprehensive assessment, prediction and early warning, intelligent response and other technologies in specific scenarios. Relatively mature solutions include network threat analysis/network detection response, endpoint detection response, extended detection and response, security orchestration and automatic response, APT detection based on techniques, tactics and procedures, etc. Typical data collection includes deep flow inspection, deep packet inspection, honeypot/honeyfarm/honeynet, internet asset detection, etc. Massive security information and event management are carried out based on big data technology, intelligent analysis and other technologies are used to realize comprehensive assessment and early warning with threat intelligence as the support, and the situation awareness capability of threat detection, security analysis and sharing and cooperation is formed.

From the perspective of patent analysis, network security situation awareness involves data acquisition and processing, situation assessment and prediction, and network security situation awareness of specific industries.

(1)  Data acquisition and processing

The network and system status information and equipment log information are received, and the big data platform is used for preprocessing, aggregation and association analysis to realize the extraction of situation awareness elements, and provide a data basis for situation assessment and prediction.

(2)  Situation assessment and prediction

The assessment and prediction of the security situation are realized by constructing the analysis model, which mainly includes: methods based on neural network, such as back propagation (BP) neural network, radial basis function (RBF) neural network, etc.; methods based on expert knowledge, such as mapping knowledge domain and game theory; methods based on pattern recognition, such as grey correlation method and rough set theory.

(3)    Network security situational awareness of specific industries

With the power industry as an example, there are the security situation awareness and assessment methods such as electric power communication network, power supervisory system network, Internet of things in power systems, power wireless private network and power mobile terminal network.

In terms of the quantity of patents (Table 2.2.5), the top countries are China and the USA. China is mainly involved in the network security situation assessment and prediction model, and the USA is mainly involved in the situation

《Figure 2.2.3》

Figure 2.2.3 Roadmap of the engineering development front of “construction of autonomous transportation system of ‘mobility as a service’”

awareness system architecture and implementation. In terms of patent output, there has been no relevant cooperation among countries. The top institutions in the quantity of patents (Table 2.2.6) are State Grid E-commerce Co., Ltd. and Guangxi Power Grid Co., Ltd. In terms of cooperation network among main institutions (Figure 2.2.4), State Grid E-commerce Co., Ltd. of China, Beijing University of Posts and Telecommunications, and North China Electric Power University are closely connected.

Looking forward to the future, the network security situation awareness platform in the high threat environment covers such as data acquisition, massive data storage and calculation platform, intelligent situation assessment and prediction in

《Table 2.2.5》

Table 2.2.5 Countries with the greatest output of core patents on “network security situation awareness technology in high threat environment”

No. Country Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 China 130 82.28 738 34.14 5.68
2 USA 22 13.92 1 301 60.18 59.14
3 UK 2 1.27 100 4.63 50
4 Israel 1 0.63 13 0.6 13
5 Ireland 1 0.63 7 0.32 7
6 Switzerland 1 0.63 3 0.14 3
7 Poland 1 0.63 0 0 0

《Table 2.2.6》

Table 2.2.6 Institutions with the greatest output of core patents on “network security situation awareness technology in high threat environment”

No. Institution Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 State Grid E-commerce Co., Ltd. 12 7.59 121 5.6 10.08
2 Guangxi Power Grid Co., Ltd. 8 5.06 46 2.13 5.75
3 Hubei Yangzhong Jushi Information Technology Co., Ltd. 4 2.53 36 1.67 9
4 Beijing Institute of Technology 4 2.53 19 0.88 4.75
5 Splunk Incorporation 3 1.9 76 3.52 25.33
6 Beijing University of Posts and Telecommunications 3 1.9 29 1.34 9.67
7 Civil Aviation University of China 3 1.9 15 0.69 5
8 Hangzhou DBAPP Security Co., Ltd. 3 1.9 12 0.56 4
9 University of California 3 1.9 8 0.37 2.67
10 North China Electric Power University 3 1.9 5 0.23 1.67

《Figure 2.2.4》

Figure 2.2.4 Collaboration network among major institutions in the engineering development front of “network security situation awareness technology in high threat environment”

structure (Figure 2.2.5). The combination of active discovery and passive acquisition, static analysis and dynamic analysis, distributed deployment and centralized processing will be comprehensively adopted to explore the application of artificial intelligence, edge computing, privacy computing and other technologies in technology and methods. Taking both macro and medium perspectives into account, it combines real-time data with intelligence, experience and knowledge accumulation to support automatic and intelligent action response and strategy adjustment, and form full coverage of the Internet and the Internet of things.

2.2.4 Development of human–machine co-driving system with self-evolution and self-learning

(1) Human–machine co-driving and the autonomy classification of intelligent vehicles of the narrow sense

Society of Automotive Engineers (SAE) released the six-level classification principle of intelligent vehicle autonomy in 2016. In 2022, China’s Ministry of Industry and Information Technology also issued a recommended national standard of Taxonomy of Driving Automation for Vehicles with division of six levels, among which Level 0 is emergency assistance; Level 1 is part of the driving assistance and the driving automation system can continuously control the lateral or longitudinal motion of the vehicle under its designed operating conditions; Level 2 is combined driving assistance. Besides the above functions, it is equipped with functions such as detection and response to some targets and events. In automatic driving of Level 0 to Level 2, the task of monitoring road conditions and responding is completed by the driver and the system. It is needed to take over the dynamic driving task for the driver. Level 3 is conditional automatic driving. The driving automation system continuously performs all dynamic driving tasks under its designed operating conditions so that users can take over the dynamic driving tasks in an appropriate way. Level 4 is

《Figure 2.2.5》

Figure 2.2.5 Roadmap of the engineering development front of “network security situation awareness technology in high threat environment”

highly automatic driving where the system can continuously perform and take over all dynamic driving tasks under its designed operating conditions. When the system sends a takeover request, the system is able to reach the minimum risk state automatically if the passengers do not respond. Level 5 is fully automatic driving. In automatic driving of Level 4 and Level 5, the driver completely changes into the role of passenger without steering wheel and pedal brake in vehicles. Human–machine co-driving research of narrow sense mainly focuses on the above-mentioned intelligent driving in Level 2 to Level 4 (some scholars believe that intelligent driving in level 4 is no longer man-machine co- driving of narrow sense). Because human driving behavior is easily influenced by psychological and physiological state, the research focus of human–machine co-driving in Level 2 is to take over the vehicle in an emergency by combining the characteristics of intelligent system such as no distraction, standardized decision-making and precise control, so as to realize the complementary advantages of human intelligence and machine intelligence to reduce man- made traffic accidents. Therefore, it is also called standby human–machine co-driving. With the improvement of intelligent system, the human–machine co-driving research in Level 3 focuses on the switching of human–machine dominance. Under reasonable conditions, intelligent systems can take over some driving tasks and reduce the driving burden of human beings. Therefore, it is also called human–machine driving based on division of labor. With the further improvement of intelligent system, the human– machine co-driving research in Level 4 focus on realizing the scene perception and decision-making ability beyond human driving through various technologies such as vehicle wireless communication and vehicle-road coordination. In most cases, long-term replacement of human driving vehicles significantly improves the safety, comfort and other performance of automobiles. Therefore, it is also called human–machine co-driving with time-share.

(2)  State monitoring and intention understanding for human drivers

The driving behavior of human driver is determined by his physiological condition and psychological activity with the corresponding vehicle driving behavior produced at the same time.

Early research focuses on real-time monitoring and intelligent evaluation of human driver’s driving behavior and state to find possible operational errors as soon as possible and avoid traffic accidents. With difficulty in observing directly and describing quantitatively the driver’s driving behavior, the related research mainly focuses on a simple longitudinal driving behavior analysis to evaluate whether the driver keeps a safe and reasonable driving distance. The driver’s turning characteristics shall be monitored to avoid the lateral driving behavior analysis of rushing out of the lane; It is needed to detect physiological and psychological state whether the driver is tired driving, drunk driving, and distracted while driving (such as dialing/receiving a mobile phone while driving).

With the development of artificial intelligence technology, researchers deeply analyze the psychophysiological cognitive process of human drivers’ perception in the surrounding driving environment and rational driving behavior in complex road condition. The major smart car manufacturers and research institutes have collected a large quantity of real driving data of human drivers for analysis and study, hoping that smart cars can “learn” more driving skills and experience in judging and making decisions on driving situations from the driving behaviors of human drivers. The correct driving intention understanding model obtained by this imitation learning is worth application greatly not only for human– machine co-driving, but also for completely unmanned driving.

With the complicated scenes and tasks of autonomous driving, most of the human–machine co-driving systems combine regular setting with data-driven learning currently to improve the human–machine co-driving ability gradually by constantly testing the system in new scenes and tasks. However, closed- loop self-evolutionary learning, exploring new scenes and tasks independently and improving itself, is successful in the field of human–machine driving and unmanned driving with breakthrough in many other fields.

(3)  Human–machine switching and mutual-trust

Human–machine co-driving also involves the “research on man–machine trust and cooperation mechanism in man– machine collaborative decision-making” mentioned in the Top 10 engineering research frontiers in engineering management field selected by Chinese Academy of Engineering in 2021. Judging from the accident data of man–machine co-driving vehicles in mass production at present, many human drivers cannot take over the control of vehicles in time of crisis with trust in the intelligence and autonomy level of vehicles, resulting in accidents. With the continuous popularization and application of artificial intelligence system in production and life, the over-trust in automation system will be one of the research focuses in the future.

The top three countries in terms of the quantity of published patents in the engineering development front of “development of human–machine co-driving system with self-evolution and self-learning” are South Korea, the USA, and China (Table 2.2.7). In terms of the quantity of organizational patents, the top three are StradVision Incorporation, Baidu Online Network Technology (Beijing) Co., Ltd., and Toyota Motor Company (Table 2.2.8). There was no relevant cooperation among various countries. In terms of institutions, only Hyundai Motor Company and Kia Motor Company have ever cooperated (Figure 2.2.6).

According to the literature and survey of patents, the current research of human–machine co-driving focuses on the following four points: correct understanding of driving scenarios and driving tasks, which is also a difficulty in the research of fully-unmanned autonomous driving; driver’s state detection and intention understanding, requiring timely detection of abnormal driver’s state for intervention and rapid identification of changeable driving intentions for assistance in driving; research on handover timing and mechanism of dominance in driving, which reduces cognitive conflicts and mental/psychological burdens of

《Table 2.2.7》

Table 2.2.7 Countries with the greatest output of core patents on “development of human–machine co-driving system with self-evolution and self-learning”

No. Country Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1 South Korea 23 33.82 73 16.82 3.17
2 USA 19 27.94 271 62.44 14.26
3 China 11 16.18 49 11.29 4.45
4 Japan 11 16.18 32 7.37 2.91
5 Germany 2 2.94 7 1.61 3.5
6 Israel 2 2.94 2 0.46 1

《Table 2.2.8》

Table 2.2.8 Institutions with the greatest output of core patents on “development of human–machine co-driving system with self-evolution and self-learning”

No. Institution Published patents Percentage of published patents/% Citations Percentage of citations/% Citations
per patent
1  StradVision Incorporation 12 17.65 45 10.37 3.75
2  Baidu Online Network Technology (Beijing) Co., Ltd. 7 10.29 72 16.59 10.29
3 Toyota Motor Company 5 7.35 14 3.23 2.8
4  Hyundai Motor Company 4 5.88 9 2.07 2.25
5  Kia Motor Company 4 5.88 9 2.07 2.25
6  Mobileye Vision Technologies Limited 3 4.41 9 2.07 3
7 NVIDIA Corporation 2 2.94 102 23.5 51
8  Mazda Motor Corporation 2 2.94 11 2.53 5.5
9  Nissan Motor Company 2 2.94 11 2.53 5.5
10  Huawei Technologies Co., Ltd. 2 2.94 7 1.61 3.5

human drivers in emergency; and trust issues in human– machine co-driving for figuring out how to make human drivers aware of when they should manipulate their vehicles by themselves. Figure 2.2.7 shows the roadmap of this front.

《Figure 2.2.6》

Figure 2.2.6 Collaboration network among major institutions in the engineering development front of “development of human–machine co-driving system with self-evolution and self-learning”

《Figure 2.2.7》

Figure 2.2.7 Roadmap of the engineering development front of “development of human–machine co-driving system with self-evolution and self-learning”

 

 

 

Participants of the Field Group

Leaders

DING Lieyun, HE Jishan, HU Wenrui, XIANG Qiao

Members

CHEN Xiaohong, CHAI Hongfeng, CHEN Qingquan, FU Zhihuan, LIU Renhuai, LU Youmei, LUAN Enjie,

LING Wen, SUN Yongfu,SHAO Anlin, WANG Jiming, WANG Liheng, WANG Longde, WANG Yingluo,

WANG Zhongtuo, XUE Lan, XU Qingrui, XU Shoubo, YANG Shanlin, YIN Ruiyu, YUAN Qingtang,

ZHU Gaofeng, ZHENG Jingchen, ZHAO Xiaozhe, Miroslaw Skibniewski, Peter E. D. Love, BI Jun,

CAI Li, CHEN Jin, CHENG Zhe,DING Jinliang, DU Wenli, FANG Dongping, FENG Bo, GAO Ziyou,

HU Xiangpei, HUA Zhongsheng, HUANG Jikun, HUANG Wei, Huang Sihan,JIANG Zhibin, KANG Jian,

LUO Hanbin, LI Heng, LI Yongkui, LI Zheng, LI Huimin, LI Guo,LI Xiaodong,LI Yulong, LIU Xiaojun,

LIU Bingsheng,LIU Dehai, LUO Xiaochun, LV Xin, LIN Han, MA Ling, OU Yangmin, PEI Jun, REN Hong,

SI Shubin, TANG Jiafu, TANG Lixin, TANG Pingbo, WANG Hongwei, WANG Huimin, WANG Mengjun,

WANG Xianjia, WANG Yaowu, WANG Zongrun, WEI Yiming, WU Desheng, WU Jianjun, WU Qidi,

WU Zezhou, WU Jie, XU Lida, YANG Hai, YANG Hongming, YANG Jianbo, YE Qiang, YANG Yang,

YU Shiwei, YUAN Jingfeng, ZENG Saixing, ZHOU Jianping, ZHANG Yuejun, ZHEN Lv, ZHOU Peng,

ZHU Wenbin

Working Group

ZHONG Botao, WANG Hongwei, LUO Hanbin, NIE Shuqin, CHANG Junqian, ZHENG Wenjiang,

MU Zhirui, ZHANG Linan, LI Yong, DONG Huiwen, SUN Jun,CHEN Ke,PAN Xing, YANG Jing,

GUO Jiadong, HU Xiaowei

Report Writers

Research Frontier

YIN Ximing, CHEN Jin, LIU Weihua, LIU Dehai, QI Qinglin, CHAI Hongfeng, SHUI Yuan,

GE Yingen, LI Nan, LV Xiaoli, LIU Jianguo, JIN Gui

Development Frontier

HUANG Dianzhong, CUI Jia, HONG Liang, WU Jianjun, CHEN Xiqun, LI Li, ZHANG Yingwei,

CHEN Weiya, CHEN Jiageng, DING Shuai ,LUO Xi ,ZHAO Ning