期刊文献+
共找到1,246篇文章
< 1 2 63 >
每页显示 20 50 100
An Exploration of the Economic Significance of Social Security
1
作者 Shengrun Na Xinghua Kang 《Chinese Business Review》 2005年第8期22-26,共5页
The modem social security carries some elements of humanitarianism or social stability, but it is more an economic means. It can reduce overproduction, increase effective demand and facilitate the balance between the... The modem social security carries some elements of humanitarianism or social stability, but it is more an economic means. It can reduce overproduction, increase effective demand and facilitate the balance between the demand and supply, and prevent the frequent occurrence of economic crisis. All the creatures of the God are there for a reason. The amount of production is based on the amount of currency. But some parts of currency are transformed into savings, and savings cannot be turned into investment immediately. The entailing overproduction breaks the balance between the demand and supply, and results in economic crisis. In modem society, it is the social security or those "lazy bones" that represses and eliminates the overproduction, which can be expressed by the equation: Savings = Investment + Social security (consumption). In this way, the balance between the demand and supply is realized.and the social production and life can continue in a normal way. 展开更多
关键词 social security economics significance exploration
下载PDF
胶东大尹格庄金矿成矿流体时空演化及矿床成因:来自流体包裹体、成矿元素和H-O-S-Pb同位素证据 被引量:2
2
作者 严子清 石文杰 +6 位作者 张鹏涛 王勇军 邵玉宝 黄鑫 宋宇 谭俊 王治华 《地质科技通报》 CAS CSCD 北大核心 2024年第2期156-174,共19页
大尹格庄金矿位于招平成矿带中段,是胶东地区典型的构造蚀变岩型金矿床,储量达到超大型规模,但关于该矿床的成因类型尚存在较大争议。在详细野外地质调查的基础上开展了该矿床成因和成矿流体纵向变化特征研究。流体包裹体研究表明,成矿... 大尹格庄金矿位于招平成矿带中段,是胶东地区典型的构造蚀变岩型金矿床,储量达到超大型规模,但关于该矿床的成因类型尚存在较大争议。在详细野外地质调查的基础上开展了该矿床成因和成矿流体纵向变化特征研究。流体包裹体研究表明,成矿流体为中温、低盐度、中低密度的H_(2)O-CO_(2)-NaCl±CH_(4)体系。从成矿早期到晚期各阶段(Ⅰ~Ⅳ阶段)均一温度和盐度逐渐降低,密度逐渐增加。氢氧同位素组成显示成矿流体早期以岩浆水为主,后期有大气降水的混入,主成矿阶段可能存在流体沸腾作用;黄铁矿硫铅同位素组成表明成矿物质来源于深源壳幔混合岩浆。成矿过程和背景总体与胶东其他金矿床类似,形成于克拉通破坏环境。浅部与深部流体和物质组成的对比研究表明,在垂向纵深范围内成矿流体性质、金银成矿强度和金成色稳定一致,金沉淀具有宽泛而稳定的环境,指示大尹格庄金矿床深部仍然具有很大的成矿潜力和找矿空间。 展开更多
关键词 流体包裹体 H-O-s-Pb同位素 金成色 矿床成因 深部找矿 成矿流体 大尹格庄
下载PDF
基于Spring Security安全框架的联通资源管理系统安全分析
3
作者 董一璠 李宝林 何先波 《电子设计工程》 2013年第8期61-64,共4页
基于为联通资源管系统提供一个方便可靠的安全框架的目的,采用"面向切面编程"(AOP)的Spring Security安全框架,结合了Spring框架提供的"控制反转"技术,最终创建了一个功能强大、安全可靠的权限控制安全框架。
关键词 软件工程 J2EE sPRING security 过滤器 B s
下载PDF
U. S. -Iraq War and China's National Security 被引量:1
4
作者 Gu Dexin 《Contemporary International Relations》 2003年第6期18-24,共7页
Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w... Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common. 展开更多
关键词 of on IT into Iraq War and China’s National security that HAVE been for
下载PDF
基于WinCC Explorer与S7-300的船舶电站监控系统仿真设计 被引量:3
5
作者 张蒙蒙 胡彩霞 《黑龙江科学》 2019年第14期35-37,共3页
根据船舶电气设备及相关参数要求,设计了基于西门子WinCC Explorer与PLC控制的船舶电站监控系统。船舶电力系统一般由发电机组、配电装置、电网和负载四部分组成。该仿真系统设计成分布式系统,提高了电力系统故障诊断准确性。该监控系... 根据船舶电气设备及相关参数要求,设计了基于西门子WinCC Explorer与PLC控制的船舶电站监控系统。船舶电力系统一般由发电机组、配电装置、电网和负载四部分组成。该仿真系统设计成分布式系统,提高了电力系统故障诊断准确性。该监控系统采用的是PROFIBUS-DP和工业以太网TCP/IP通信方式,设计了主从站控制系统,并分别对船舶电站的电气设备进行监控,使从船舶电气设备采集到的数据及设备运行状态能够准确地、尽快地得到有效反馈,提高了船舶电站系统的实时性、可靠性与准确性,实现了对船舶电站远程监控的功能。 展开更多
关键词 WINCC explorer s7-300 船舶电站 监控系统 仿真设计
下载PDF
Security transmission and recognition of F-knowledge 被引量:7
6
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 s-rough sets F-knowledge security of knowledge RsA algorithm recognition criterion application.
下载PDF
A Corpus-Based Analytical Study on Military and Security Developments Involving People's Republic of China 被引量:2
7
作者 MEI Zhao-yang YANG Min 《Sino-US English Teaching》 2015年第7期510-518,共9页
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ... This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war. 展开更多
关键词 corpus Military Power of the People's Republic of China and Military security Developments Involving People's Republic of China sino-America relation
下载PDF
Ecological Security Assessment in County Area Based on P-S-R Model——A Case Study of Ningwu County,Shanxi Province 被引量:3
8
作者 Feng Xufang Liu Jingmei Zhao Lijuan 《Meteorological and Environmental Research》 CAS 2014年第8期13-15,19,共4页
To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and cons... To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable. 展开更多
关键词 Ecological security P-s-R model Es/ Ningwu County China
下载PDF
Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory 被引量:7
9
作者 Qian-jin DONG Xia LIU 《Water Science and Engineering》 EI CAS CSCD 2014年第2期119-132,共14页
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d... The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies. 展开更多
关键词 risk assessment water security drought periods entropy D-s evidence theory "evidential reasoning algorithm Haihe River Basin
下载PDF
Security Research on Engineering Database System
10
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMs) s ecurity agent security level
下载PDF
Tourism Destination Eco-Security and Its Dynamic Evaluation Method 被引量:1
11
作者 SU Qiaolan 《Journal of Landscape Research》 2013年第Z1期35-37,40,共4页
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand... Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed. 展开更多
关键词 TOURIsM DEsTINATION Eco-security P-s-R MODE DYNAMIC EVALUATION
下载PDF
Geology and mineralization of the Hongqiling large magmatic nickel-copper-cobalt deposit(22×10^(4)t)in Jilin Province,China:A review
12
作者 Cong Chen Yu-chao Gu +14 位作者 Di Zhang Tao-tao Wu Ai Li Yun-sheng Ren Qing-qing Shang Jian Zhang Xiong-fei Bian Fei Su Jia-lin Yang Qiu-shi Sun Xiao-hai Li Wan-zhen Liu Zhen-ming Sun Sen Zhang Yu-hui Feng 《China Geology》 CAS CSCD 2024年第4期762-796,共35页
The Hongqiling large nickel-copper-cobalt deposit(hereafter referred to as the Hongqiling deposit),a typical mafic-ultramafic copper-nickel deposit in China,boasts proven Ni(Ni)resources of approximately 22×10^(4... The Hongqiling large nickel-copper-cobalt deposit(hereafter referred to as the Hongqiling deposit),a typical mafic-ultramafic copper-nickel deposit in China,boasts proven Ni(Ni)resources of approximately 22×10^(4)t,associated copper resources of 2×10^(4)t,and associated cobalt(Co)resources of 0.5×10^(4)t,with Ni reserves ranking 10th among China's magmatic nickel deposits.Geotectonically,the Hongqiling deposit is situated in the superimposed zone between the Xing'an-Mongolian orogenic belt and the circum-Western Pacific's active continental margin belt.Its ore-bearing plutons occur within the metamorphic rocks of the Ordovician Hulan Group,with the emplacement of plutons and the locations of orebodies governed by the deep-seated Huifahe fault and its secondary NW-trending Fujia-Hejiagou-Beixinglong-Changsheng fault zone.In the deposit,the rock assemblages of ore-bearing plutons predominantly encompass gabbro-pyroxenite-olivine pyroxenite-pyroxene peridotite(pluton No.1)and norite-orthopyroxenite-harzburgite(pluton No.7),with ore-bearing lithofacies consisting primarily of olivine pyroxenite and pyroxenite facies.The Hongqiling deposit hosts stratoid,overhanging lentoid,veined,and pure-sulfide veined orebodies.Its ores principally contain metallic minerals including pyrrhotite,pentlandite,chalcopyrite,violarite,and pyrite.Despite unidentified magma sources of ore-bearing mafic-ultramafic rocks,it is roughly accepted that the magmatic evolution in the Hongqiling deposit primarily involved fractional crystallization and crustal contamination.The ore-forming materials were primarily derived from the upper mantle,mixed with minor crustal materials.The ore-bearing mafic-ultramafic rocks in the deposit,primarily emplaced during the Indosinian(208-239 Ma),were formed in an intense extension setting followed by the collisional orogeny between the North China Plate and the Songnen-Zhangguangcai Range Block during the Middle-Late Triassic.From the perspective of the metallogenic geological setting,surrounding rocks,ore-controlling structures,and rock assemblages,this study identified one favorable condition and seven significant indicators for prospecting for Hongqiling-type nickel deposits and developed a prospecting model of the Hongqiling deposit.These serve as valuable references for exploring similar nickel deposits in the region,as well as the deep parts and margins of the Hongqiling deposit. 展开更多
关键词 Nickel-copper-cobalt deposit Fractional crystallization Crustal contamination MAGMATIC MINERALIZATION Re-Os isotopic age sulfur isotopic Metallogenic mode Prospecting model Western Pacific’s active continental margin Mineral exploration engineering Hongqiling Jilin
下载PDF
China's Labor and Social Security Protection under the Globle Financial Crisis 被引量:1
13
作者 SHI MEIXIA Professor of School of Economics and Management of Beijing Jiaotong University 《The Journal of Human Rights》 2011年第1期14-16,共3页
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati... Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis. 展开更多
关键词 security China’s Labor and social security Protection under the Globle Financial Crisis
下载PDF
GDI and GSI: China’s New Propositions for Global Governance
14
作者 Ouyang Xiangying 《China Economist》 2024年第5期107-116,共10页
In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to sub... In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance. 展开更多
关键词 Global Development Initiative(GDI) Global security Initiative(GsI) China’s approach to global governance Ukraine crisis China-Russia relationship
下载PDF
Scientific and Technological Innovation Is an Important Approach to Ensuring China’s Oil Security
15
作者 Liu Qianru Wang Jianyong 《Petroleum Science》 SCIE CAS CSCD 2006年第4期74-77,共4页
With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resou... With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security. 展开更多
关键词 China's economy oil security scientific and technological innovation energy conservation energy intensity
下载PDF
Assessment of Ecosystems Damages Caused by Russian War against Ukraine
16
作者 Yevhen Bezsonov 《Open Journal of Ecology》 2024年第10期754-788,共35页
The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetar... The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetary terms, the values of ecosystem damages obtained in the work, which are a consequence of the impact of hostilities on the environment, correspond to the annual budgets of the largest countries in the world or exceed them. The presented calculations significantly exceed the known normative methods, the use of which in the conditions of war is limited in space and time. Objective difficulties associated with the uncertainty of many processes of the development of ecological systems and their reaction to the multifactorial impact of war are also significant limitations. Therefore, as part of the study, a method of assessing the impact of war on the environment is proposed, which is based on the patterns of energy flows in ecosystems from the moment it is binding by producers. This made it possible to take into account in the calculations the principle of functional integrity of the ecological system, according to which the destruction or damage of the components of a functionally whole environment will necessarily cause negative phenomena in the development of ecological systems. The results are presented in the form of real values of ecological losses in energy and monetary equivalents, as consequences of the loss of ecosystem services. As the results of the research show, the minimum amount of damage to ecosystems from Russian tanks is 43,500 USD per day. Environmental damage from Russian fighter jets has been estimated at $1.5 billion per week since the start of the war. Noise from military operations causes losses of at least 2.3 billion US dollars per year. The obtained results create prerequisites for improving the system of ensuring environmental safety at the local, state, and international levels and transferring the obtained solutions into safety-shaping practice. 展开更多
关键词 Ecosystem services Damage Assessment Environmental security Russia’s War against Ukraine
下载PDF
Check Point新安全加速模块整合Security Core技术
17
《电信科学》 北大核心 2012年第6期124-124,共1页
全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技... 全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技术,帮助客户防火墙实现高达110Gbit/s的吞吐量和不到5μs的时延,从而实现业界性能最高的双架单元防火墙。 展开更多
关键词 security 互联网安全 CHECK Point 软件技术 模块 10GBIT/s 客户防火墙
下载PDF
Reflections on China's Neighboring Security Environment
18
作者 Dao Shulin 《Contemporary International Relations》 2002年第12期27-32,共6页
There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It ha... There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It has become the important factor that influences world future trend. In the meanwhile, changes in international situation also exerted increasing influence on China. Therefore it is of special significance to discuss and assess the international environment that China faces. 展开更多
关键词 security Reflections on China’s Neighboring security Environment
下载PDF
Hydrocarbon reserves of the South China Sea:Implications for regional energy security
19
作者 Mu Ramkumar M.Santosh +3 位作者 Manoj J.Mathew David Menier R.Nagarajan Benjamin Sautter 《Energy Geoscience》 2020年第1期1-7,共7页
The countries such as China,Vietnam,Philippines,Malaysia,Indonesia and Brunei that border South China Sea region have immense stakes in exploring and exploiting the natural resources of the region including hydrocarbo... The countries such as China,Vietnam,Philippines,Malaysia,Indonesia and Brunei that border South China Sea region have immense stakes in exploring and exploiting the natural resources of the region including hydrocarbon.More than the hydrocarbon reserves,the South China Sea is home to World’s high-networth trade route that brings the interests of non-geographic entities to this region.Further,the purported reserves of hydrocarbon in the region are in the orders of Persian Gulf but are not yet properly explored and the reserves recovered owing to territorial and non-claimant stakeholder’s influences/interventions.This paper is a synopsis of information on the hydrocarbon reserves of the South China Sea region,and evaluates the territorial and extra-territorial interests in the light of energy security and equitable development and utilization of natural resources from a geological perspective.We also suggest several measures for future consideration and implementation. 展开更多
关键词 Energy security south China sea Hydrocarbon-flashpoint exploration Marine resources
下载PDF
International Security & China's New Security Concept
20
《International Understanding》 2002年第1期4-6,共3页
关键词 security International security MORE China’s New security Concept
下载PDF
上一页 1 2 63 下一页 到第
使用帮助 返回顶部