期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
Misinterpreted Figure in Hemingway’s“Indian Camp”-Doctor Adams
1
作者 HUANG Li-hua 《Journal of Literature and Art Studies》 2023年第10期780-784,共5页
Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulou... Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulous and strenuous close reading together with extensive reviewing and analyzing of relevant references,the author of this paper finds that Uncle George has always been misinterpreted over the time.This paper aims to point out the misunderstanding,misinterpretation or even distortion in the previous researches,in an attempt to defend for Doctor Adams and put the record straight. 展开更多
关键词 HEMINGWAY “Indian Camp” Doctor Adams misinterpreted DEFEND
下载PDF
基于Shadow Defender的高校电子阅览室系统安全架构 被引量:1
2
作者 张曾昱 孙睿阳 《图书馆学研究》 CSSCI 北大核心 2009年第2期35-36,98,共3页
介绍了Shadow Defender在维护电子阅览室计算机系统方面的优势,以及Shadow Defender的使用方法。
关键词 SHADOW Defender高校电子阅览室 影子系统 系统维护
下载PDF
基于双软件层面的电子阅览室系统安全架构
3
作者 张曾昱 于秀芬 《中华医学图书情报杂志》 CAS 2009年第2期70-71,共2页
介绍了Shadow Defender与AntiArpSniffer结合在维护电子阅览室计算机系统方面的优势及各自的使用方法。
关键词 SHADOW DEFENDER AntiArpSniffer 电子阅览室 计算机安全 网络安全
下载PDF
服务器隐藏用户的建立与查看
4
作者 陈晨 《长江大学学报(自科版)(上旬)》 CAS 2012年第5期145-146,共2页
通过操作注册表以及工具Hacker Defender可在服务器中建立一个隐藏用户,管理员无法通过命令"net user"或计算机管理对话框中的"本地用户和组"或注册表来查看,借助工具XueTr便可查看服务器中的隐藏用户。
关键词 隐藏用户 建立 查看 HACKER DEFENDER XueTr
下载PDF
基于Shadow Defender的高校电子阅览室安全体系研究
5
作者 刘美珍 《职业时空》 2013年第1期121-124,共4页
论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面&... 论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面"系统状态"、"模式设置"、"排除列表"、"立即储存"以及"管理配置"的主要功能。 展开更多
关键词 SHADOW DEFENDER 高校电子阅览室 影子系统 系统维护
下载PDF
浅谈路虎Defender2020款最新品牌精神及技术亮点
6
作者 韩荧 郭紫威 《内燃机与配件》 2021年第6期38-39,共2页
路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也... 路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也彰显了路虎的品牌精神。本文将分析Defender2020款最新品牌精神和Defender2020款最新的技术亮点和创新点。 展开更多
关键词 路虎Defender 品牌精神 技术亮点
下载PDF
保健品Mega Defends X致急性肝损伤1例
7
作者 张毛 贾胜男 +2 位作者 张传辉 张倩 金珍婧 《中南药学》 CAS 2021年第2期367-368,共2页
1病例介绍患者,女,55岁,因“尿色加深10 d,目黄1周”于2020年3月4日就诊于本院。该患者于20 d前自行口服“Mega Defends X(MDX)”保健品,1粒/次,qd po。10 d前出现尿色加深及目黄,伴皮肤瘙痒。
关键词 Mega Defends X 保健品 黄芩 肝损伤 不良反应
下载PDF
AN APPROACH OF DEFENDING AGAINST DDOS ATTACK 被引量:1
8
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第1期148-153,共6页
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to pro... An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200. 展开更多
关键词 Distributed Denial of Service (DDoS) DEFENDING Flow model Flow detection IXP1200 Dfighter
下载PDF
IBM硬盘的保护神——Smart Defender
9
作者 石笋 《软件》 2002年第4期53-53,共1页
蓝色巨人IBM一向给人稳重可靠,值得信赖的印象,可是前些日子它的腾龙二代和腾龙三代玻璃硬盘的质量问题确实闹得满城风雨.
关键词 硬盘安全检测工具 IBM硬盘 SMART DEFENDER
下载PDF
原始之美 全新2007款路虎Defender
10
作者 赵迪 《车时代》 2007年第2期32-35,共4页
Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置... Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置似乎显得有些过时,但正是这种纯粹的机械之感使Defender散发着最为诱人的原始之美! 展开更多
关键词 越野性 2007款 路虎Defender 底盘 轴距 动力性 灵敏性
下载PDF
打击“流氓”软件
11
作者 孤舟 《网管员世界》 2007年第17期107-110,共4页
流氓软件肆虐,我们该如何应对?面对众多的查删软件,我们该选择谁?本期为您介绍一组简单实用的查删流氓软件工具。
关键词 流氓软件 查删软件 WINDOWS DEFENDER Upiea 超级兔子
下载PDF
强身健体——给Shadow Defender吃味补药
12
作者 丁小光 《电脑知识与技术(经验技巧)》 2009年第6X期26-26,共1页
Shadow Defender(影子卫士)是一款小巧却功能强大的系统防护软件,程序不仅支持自定义多分区保护,程序自身还能有效预防机器狗病毒,和Powershadow(影子系统)齐驱并驾(图1)。
关键词 注册表编辑器 安全模式 软件 Shadow Defender
下载PDF
IDS面临的核心问题
13
作者 林平 《中国计算机用户》 2003年第44期34-34,共1页
当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前... 当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前,有必要谈谈IDS和IPS之间的关系,IDS和IPS在入侵检测技术方面是一样的,因此他们面临的问题也是一样的。 展开更多
关键词 IDS 入侵检测技术 安氏互联网安全系统公司 “Linktrust NETWORK Defender”
下载PDF
Defending the Frontier
14
作者 Hou Weili 《ChinAfrica》 2017年第12期14-16,共3页
LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was... LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was the biggest hurdle, but the difficulty in effectively delivering the treatment drugs and services. 展开更多
关键词 HIV Defending the Frontier
下载PDF
The Great Irish Rebellion of 1798:History and Memory
15
作者 Harry T.Dickinson 《World History Studies》 2020年第1期1-27,共27页
The Irish rebellion of 1798 resulted in many casualties and much damage to property.All historians have agreed that Irish society in the eighteenth century was bitterly divided between a governing minority of English ... The Irish rebellion of 1798 resulted in many casualties and much damage to property.All historians have agreed that Irish society in the eighteenth century was bitterly divided between a governing minority of English Protestant settlers,a similar number of Scottish Presbyterian immigrants,who dominated the province of Ulster,and an oppressed majority of poor Catholics who were the original Celtic settlers of the country,but who had lost their lands and their political influence to these later immigrants.Some historians,however,believe that the principal cause of the rebellion was the economic distress of the Catholic majority.More recently,many scholars have claimed that the leaders of the rebellion were educated Protestant English and Scottish settlers,who resented Britain’s political control of Ireland were greatly influenced by the political principles of the French Revolution of 1789.Some of these historians have also studied how the memory of the 1798 rebellion among Catholic Irishmen across the world eventually enabled the Catholic majority to create an Irish republic in the 1920s that was able to govern two-thirds of the country. 展开更多
关键词 CATHOLICS Protestants United Irishmen defenders French Revolution
原文传递
A tri-level programming model for attack-resilient control of power grids 被引量:4
16
作者 Hamzeh DAVARIKIA Masoud BARATI 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期918-929,共12页
The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate ha... The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender's behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats. 展开更多
关键词 CYBER ATTACK DEFENDER HARDENING Protection RESILIENCE VULNERABILITY
原文传递
Defending Home 被引量:2
17
作者 LI LI 《Beijing Review》 2010年第1期24-25,共2页
A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two f... A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two families violently fighting lawenforcement officials who were evicting them from their homes. 展开更多
关键词 Defending Home
原文传递
Methods and Effectiveness of the Training of "Defending the Many with the Few" in Basketball
18
作者 MA Zhenhong 《北京体育大学学报》 CSSCI 1995年第S2期82-82,共1页
Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and f... Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and four -on-five and intensified training, players could impove themselves in a short period in collective abilitys and consciousness, such as choosing position, adjusting position, coordinating defence and shifting defence. And team ability and style could thus be trained. 展开更多
关键词 TRAINING method of "defending the MANY with the few" EFFECTIVENESS coordinating DEFENCE shifting DEFENCE consciousness ability
原文传递
The Application of Pareto's 80/20 Rule to Law: A Quantitative Analysis Based upon Trials Involving a Plea of Guilty
19
作者 Li Bensen 《Social Sciences in China》 2013年第4期100-117,共18页
In the field of law, particularly in the area of legal proceedings and other types of dispute settlement, judicial organs can achieve the best allocation of judicial resources by summary handling of the simple cases, ... In the field of law, particularly in the area of legal proceedings and other types of dispute settlement, judicial organs can achieve the best allocation of judicial resources by summary handling of the simple cases, which are in the majority, and optimizing the complex ones, which are in the minority. Summary handling of the simple majority means reducing the marginal cost of judicial activities in accord with the principle of simplifying procedures but not rights while improving judicial effectiveness and promoting judicial justice in a way predicated on protecting the fundamental rights of legal actors. According to quantitative analysis based on trials in which the defendant entered a plea of guilty, there is still plenty of room to optimize the resource allocation mechanism in the field of criminal justice. Implementing the summary procedure confirmed in the 2012 Criminal Procedure Law requires that the judicial organs guarantee defendants who have pleaded guilty the right to a lawyer. It also requires the improvement of judicial efficiency at the stages of investigation, bringing a case, and trial. Only by doing so can we scientifically allocate criminal justice resources overall and effectively promote judicial justice. 展开更多
关键词 Pareto's 80/20 rule cases in which the defendant pleads guilty summary procedure allocation of judicial resources quantitative analysis
原文传递
Open-loop solution of a defender–attacker–target game:penalty function approach
20
作者 Vladimir Turetsky Valery Y.Glizer 《Journal of Control and Decision》 EI 2019年第3期166-190,共25页
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu... A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders. 展开更多
关键词 Defender–attacker–target problem pursuit-evasion differential game zero-sum linear-quadratic game terminal state inequality constraint
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部