期刊文献+

二次检索

题名
关键词
文摘
作者
第一作者
机构
刊名
分类号
参考文献
作者简介
基金资助
栏目信息
共找到7篇文章
< 1 >
每页显示 20 50 100
地域文化元素在永靖IP形象设计中的应用 被引量:1
1
作者 郑诗慧 《丝网印刷》 2023年第15期54-57,共4页
概述了IP形象的研究现状,通过研究代表性的地域IP形象设计案例,剖析其创意的切入点和地域元素的提取方式,梳理出地域IP形象的设计逻辑,最后以黄河永靖县IP形象设计为实践案例,验证设计逻辑的可行性。
关键词 IP形象 地域元素 黄河文化
下载PDF
中国竹资源培育现状与增产潜力 被引量:15
2
作者 郑世慧 刘广路 +5 位作者 岳祥华 杨明 余林 赵建诚 农珺清 李佳芮 《世界竹藤通讯》 2022年第5期75-80,共6页
应用文献研究、重要竹产区问卷调查等方法研究了中国竹资源培育现状与增产潜力。结果表明,中国竹种研究利用不充分,有文献报道的竹种约60种,不足竹种总数的10%,且主要为毛竹;在竹林资源中低产、低效林占竹林总面积的比例较大,为45.8%,... 应用文献研究、重要竹产区问卷调查等方法研究了中国竹资源培育现状与增产潜力。结果表明,中国竹种研究利用不充分,有文献报道的竹种约60种,不足竹种总数的10%,且主要为毛竹;在竹林资源中低产、低效林占竹林总面积的比例较大,为45.8%,加强竹林经营能明显提高竹林的生产力;竹林经营成本较高,占竹林经营收益的40%~78%,是制约竹林经营的主要因素;自1973年以来竹林面积每年以约2.7%的速度增加,竹林面积的增加带来了巨大的增产潜力。文章建议,应拓展特色竹种质的研究与利用,提高竹林经营管理水平,降低经营成本,同时增强竹资源供给能力,以便更好地支撑竹产业的健康发展。 展开更多
关键词 竹资源 竹林经营 开发与利用 增产潜力 中国
下载PDF
基于多元化理念的农贸市场服务设计研究——以卧龙南里小菜场为例 被引量:3
3
作者 陈雨佳 郑诗慧 高凯乐 《设计》 2022年第9期44-47,共4页
本文通过对卧龙南里小菜场服务进行更新与升级,设计出满足人们需求的舒适性、创新性、便捷性的多元化农贸市场环境与服务,进一步强调以人为本在服务设计中的重要性与必要性。以卧龙南里小菜市场为研究对象,以更新设计项目背景、人群调... 本文通过对卧龙南里小菜场服务进行更新与升级,设计出满足人们需求的舒适性、创新性、便捷性的多元化农贸市场环境与服务,进一步强调以人为本在服务设计中的重要性与必要性。以卧龙南里小菜市场为研究对象,以更新设计项目背景、人群调研、实施方案的策划及相关专项研究为主线,以国内外成功的农贸市场服务设计案例为参考,对卧龙南里小菜市场服务平台进行更新与改造。系统而全面地解决了满足当地居民需求的多元化农贸市场服务。该设计方案可为其他平台服务更新设计提供参考思路。 展开更多
关键词 多元化 农贸市场 卧龙南里 更新设计 服务设计
下载PDF
“天河水”穴位形态的演变与意义
4
作者 郑世辉 罗松松 +3 位作者 谢颖 郇梦婷 唐琦 吴云川 《中华中医药杂志》 CAS CSCD 北大核心 2024年第3期1456-1459,共4页
通过回顾明清相关文献,梳理该时期“天河水”穴位形态由点到线的演变过程。提示在该过程中存在操作手法的影响,且其穴位的最终形态与功效相关。表明该穴位形态的演变参与构建了手法、功效及治疗部位三者之间的关系。其为理解其穴位来源... 通过回顾明清相关文献,梳理该时期“天河水”穴位形态由点到线的演变过程。提示在该过程中存在操作手法的影响,且其穴位的最终形态与功效相关。表明该穴位形态的演变参与构建了手法、功效及治疗部位三者之间的关系。其为理解其穴位来源、同穴异名等现象提供线索,并对今后建立相关理论、规范相关穴位以及指导临床操作中手法的选择有一定的参考意义。 展开更多
关键词 小儿推拿 天河水 穴位形态 穴位考 文献研究
原文传递
Trusted GPSR protocol without reputation faking in VANET 被引量:2
5
作者 Xiao Ya zheng shihui Sun Bin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第5期22-31 55,55,共11页
In vehicular ad hoc network(VANET), misbehaviors of internal nodes, such as discarding packets, may lead to a rapid decline in packet delivery ratio. To solve this problem, an improvement of greedy perimeter stateless... In vehicular ad hoc network(VANET), misbehaviors of internal nodes, such as discarding packets, may lead to a rapid decline in packet delivery ratio. To solve this problem, an improvement of greedy perimeter stateless routing(GPSR) protocol is presented. In the new protocol, trustworthiness is considered in the route selection process. The trustworthiness is measured by an objective trust model based on the subjective trust model Dy Trust. And the reputation value which reflects the trustworthiness of each node is calculated and broadcasted by the intersection nodes. Specially, besides resisting the packet-discarding behavior of selfish nodes, this protocol also includes a location detection process to resist the location-faking behavior of malicious nodes. As a result, the selfish nodes and the malicious nodes can be excluded from the network. In addition, compared with improved GPSR protocol, the presented one is able to resist one kind of reputation-faking attack and has better performance in simulation. 展开更多
关键词 trusted routing protocol reputation model vehicula
原文传递
A dynamic,secure,and efficient group key agreement protocol 被引量:1
6
作者 zheng shihui WANG Shaohui ZHANG Guoyan 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期182-185,共4页
The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which ... The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks. 展开更多
关键词 group key agreement protocol dynamic peer group ElGamal encryption ElGamal signature
原文传递
Cryptanalysis on ‘an arbitrated quantum signature protocol based on the chained CNOT operations encryption’
7
作者 Wen Kai zheng shihui Sun Bin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第3期73-80,共8页
Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is d... Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is discovered that an AQS protocol based on chained controlled-NOT(CNOT) algorithm is vulnerable to a novel attack because a transformation from binary keys into permutations and the chained CNOT algorithm have special properties, which enables a malicious receiver to forge signatures with probability 1/2. Moreover, a malicious signer can also deny his signatures with probability 1/4. Then, two possible improved methods are presented to resist these attacks: one is padding constants to reduce probability of the successful attacks, and the other is a circular chained CNOT algorithm to make the attack strategy invalid. And the security analysis shows that both the two improve methods could well resist these attacks. 展开更多
关键词 arbitrated QUANTUM SIGNATURE chained CNOT FORGERY disavowal
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部