期刊文献+
共找到20,679篇文章
< 1 2 250 >
每页显示 20 50 100
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
1
作者 Aiman Muhammad Arshad +2 位作者 Bilal Khan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization 被引量:1
2
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3801-3813,共13页
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen... Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme. 展开更多
关键词 CP-ABE geohash new time tree(NTT) multi authorization dynamic attribute
下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
3
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
下载PDF
NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:9
4
作者 徐小龙 张栖桐 周静岚 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru... The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. 展开更多
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority
下载PDF
Guide for Authors
5
《Water Science and Engineering》 EI CAS CSCD 2024年第1期I0003-I0007,共5页
Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate... Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list. 展开更多
关键词 authorS SUBMISSION contributing
下载PDF
Information for Authors
6
《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第3期I0001-I0001,共1页
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche... Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs. 展开更多
关键词 JOURNAL BREAKTHROUGH authorS
下载PDF
Information for Authors
7
《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期F0003-F0003,共1页
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat... General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China. REPUBLIC authorS
下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:15
8
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 系统初始化 计算成本 密文 访问控制 权威 属性 加密解密 安全访问
下载PDF
Beyond authorship: Analyzing contributions in PLOS ONE and the challenges of appropriate attribution
9
作者 Abdelghani Maddi Jaime A.Teixeira da Silva 《Journal of Data and Information Science》 CSCD 2024年第3期88-115,共28页
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa... Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing. 展开更多
关键词 authorship Funding acquisition Research integrity author contributions CREDIT Inappropriate authorship APC ring
下载PDF
Instructions for Authors
10
《中华老年多器官疾病杂志》 2024年第7期I0004-I0006,共3页
The Chinese Journal of Multiple Organ Diseases in the Elderly(Zhonghua Laonian Duoqiguan Jibing Zazhi)(ISSN 1671-5403)is launched in 2002 and published monthly by Chinese PLA General Hospital in Beijing,China.
关键词 China ISSN authorS
下载PDF
ABMRF:An Ensemble Model for Author Profiling Based on Stylistic Features Using Roman Urdu
11
作者 Aiman Muhammad Arshad +3 位作者 Bilal Khan Khalil Khan Ali Mustafa Qamar Rehan Ullah Khan 《Intelligent Automation & Soft Computing》 2024年第2期301-317,共17页
This study explores the area of Author Profiling(AP)and its importance in several industries,including forensics,security,marketing,and education.A key component of AP is the extraction of useful information from text... This study explores the area of Author Profiling(AP)and its importance in several industries,including forensics,security,marketing,and education.A key component of AP is the extraction of useful information from text,with an emphasis on the writers’ages and genders.To improve the accuracy of AP tasks,the study develops an ensemble model dubbed ABMRF that combines AdaBoostM1(ABM1)and Random Forest(RF).The work uses an extensive technique that involves textmessage dataset pretreatment,model training,and assessment.To evaluate the effectiveness of several machine learning(ML)algorithms in classifying age and gender,including Composite Hypercube on Random Projection(CHIRP),Decision Trees(J48),Na飗e Bayes(NB),K Nearest Neighbor,AdaboostM1,NB-Updatable,RF,andABMRF,they are compared.The findings demonstrate thatABMRFregularly beats the competition,with a gender classification accuracy of 71.14%and an age classification accuracy of 54.29%,respectively.Additional metrics like precision,recall,F-measure,Matthews Correlation Coefficient(MCC),and accuracy support ABMRF’s outstanding performance in age and gender profiling tasks.This study demonstrates the usefulness of ABMRF as an ensemble model for author profiling and highlights its possible uses in marketing,law enforcement,and education.The results emphasize the effectiveness of ensemble approaches in enhancing author profiling task accuracy,particularly when it comes to age and gender identification. 展开更多
关键词 Machine learning author profiling AdaBoostM1 random forest ensemble learning text classification
下载PDF
Information for Authors
12
《Journal of Polyphenols》 2024年第1期42-43,共2页
General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover ... General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover letter be included in submissions.A cover letter should explain why this topic is important,why these results are significant and what the novelty of this work is. 展开更多
关键词 authorS LETTER SHE
下载PDF
Information for Authors
13
《Journal of Polyphenols》 2024年第2期87-88,共2页
General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover ... General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover letter be included in submissions.A cover letter should explain why this topic is important,why these results are significant and what the novelty of this work is. 展开更多
关键词 authorS LETTER SHE
下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
14
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
下载PDF
Research on Construction of Pharmacovigilance System for Marketing Authorization Holders in China
15
作者 Zhao Jiai Tian Lijuan 《Asian Journal of Social Pharmacy》 2024年第2期106-116,共11页
Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m... Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage. 展开更多
关键词 marketing authorization holder(MAH) pharmacovigilance system good pharmacovigilance practice
下载PDF
The eligibility criteria,training content,and scope of practice for prescriptive authority for midwives:a modified Delphi study 被引量:3
16
作者 Shi-Fan Han Hong-Xia Ren +2 位作者 Xiu-Juan Wang Xiao-Ding Yue Si-Yu Dou 《Frontiers of Nursing》 CAS 2019年第3期191-201,共11页
Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of ... Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of practice of their prescriptive authority in certain circumstances.The results of this study could serve as a reference for the development of policies on prescriptive authority for midwives.Methods:Based on a literature search and semistructured interviews,a modified Delphi method was first used to conduct 2 rounds of expert consultation on eligibility criteria and training content for prescriptive authority for midwives.This stage included nursing experts(20)and medical experts(16)engaged in midwifery in many tertiary Grade A hospitals in China.Subsequently,consultation on the scope of practice of prescriptive authority for midwives was conducted with nursing experts(18)and medical experts(14)engaged in midwifery in many tertiary Grade A hospitals in China.The suggestions from the experts were analyzed using statistical methods to confirm the eligibility criteria for prescriptive authority,training content,circumstances,scope of practice for prescriptive authority,and the prescription forms.Results:Among the consulted experts,70.59%(the highest acceptance rate)considered an undergraduate degree to be the minimum educational requirement for midwives to be eligible for prescriptive authority,85.29%(the highest acceptance rate)considered the supervisor nurse to be the minimum technical position experience necessary for midwives to be eligible for having prescriptive authority,and 50%(the highest acceptance rate)considered 5 years to be the minimum number of years of experience in the specialty for midwives to be eligible for prescriptive authority.The applicants should at least be practicing at Grade C hospitals,which was the consensus among 91.18%of the consulted experts.Among the consulted experts,100%,100%,97.06%,94.12%,and 94.12%agreed that the applicants should have knowledge in pharmacology,laws and ethics,nursing,diagnostics,and midwifery,respectively.The consulted experts confirmed 22 related course topics and identified 6 specific circumstances in which the midwives could partially practice prescriptive authority,including uterine atony,excessive uterine contraction,postpartum hemorrhage,premature rupture of fetal membranes,normal labor,and neonatal asphyxia.Under these 6 circumstances,the consulted experts commonly agreed that there were 20 medication prescriptions and 13 auxiliary examination prescriptions that could be prescribed by midwives.Of these prescriptions,51.5%were independent prescriptions,30.3%were protocol prescriptions,and the remaining 18.2%were both independent and protocol prescriptions.Conclusions:Midwives who have an undergraduate degree,supervisor nurse position,and 5 years of practice in Grade C hospitals are considered eligible to apply for prescriptive authority.Partial prescriptive authority could be granted after regulated training in fundamental theories and practices,which could improve the independence and professionalism of midwifery. 展开更多
关键词 Delphi study MIDWIFE ELIGIBILITY criteria training content circumstances SCOPE of practice prescriptive authority PRESCRIPTION forms
下载PDF
移动通信企业双向收费Authority-hub客户排序算法
17
作者 金海燕 宫雨 武森 《计算机应用》 CSCD 北大核心 2005年第B12期190-192,共3页
电信移动通话与网页分级问题有相似之处,都是通过连通(通话或链接)加强双方联系的重要程度。由此,受网页分级问题搜索引擎算法HITS(Hyperlink-Induced Topic Search)算法的启发,针对目前移动通信企业双向收费的现实,本文提出了双向收费A... 电信移动通话与网页分级问题有相似之处,都是通过连通(通话或链接)加强双方联系的重要程度。由此,受网页分级问题搜索引擎算法HITS(Hyperlink-Induced Topic Search)算法的启发,针对目前移动通信企业双向收费的现实,本文提出了双向收费Authority-hub客户排序算法。与其他客户分析方法相比,该算法对客户按价值进行排序时,不仅考虑了客户自身,而且考虑了客户之间的相互影响。 展开更多
关键词 HITS 客户分析 authority—hub
下载PDF
Surface Temperature Anomalies in the River Niger Basin Development Authority Areas, Nigeria 被引量:1
18
作者 Joseph Sunday Babatolu Rufus Temidayo Akinnubi 《Atmospheric and Climate Sciences》 2013年第4期532-537,共6页
The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the dat... The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the data collected and analyzed, the mean annual temperature and mean annual maximum temperature demonstrated pronounced temporal increasing trend in the period 1951-2010 while the mean annual minimum temperature showed no trend. The rate of increase in mean annual temperature, mean annual maximum and minimum temperatures was 0.45°C, 0.40°C and 0.20°C respectively. The mean annual maximum temperature warmed faster than the mean annual minimum leading to increase in diurnal range of temperature. The annual temperature anomaly in the study area tracks the observed anomalies for the Northern Hemisphere in the 20th century. The decadal temperature increase is very small particularly as from 1980. 展开更多
关键词 Temperature ANOMALIES RIVER NIGER BASIN Development authority Area
下载PDF
The Authority Structure of Environmental Regulation under the Codification of Environmental Law 被引量:1
19
作者 Chen Demin Zhou Xian 《学术界》 CSSCI 北大核心 2020年第11期193-202,共10页
When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental con... When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental concerns can be achieved;the semantic expression of environmental regulation can be expounded.Additionally,through the codification of environmental law,a revolutionary path for the structure of authority can be found.Environmental codification dictates a method for clarification of the boundaries and relations of environmental management authority.Under the theory of Holistic Governance and in the codification process,the reform of environmental regulation authority should be concluded from both vertical and horizontal dimensions,through organizing,integrating,separating,classifying and finally,by establishing a synergy between the central and local governments and their departments.This can break down structural barriers to communication and cooperation of the ecological regulation and resource management authority and help establish uniformity of environmental regulation. 展开更多
关键词 COORDINATION UNIFORMITY Holistic Governance Environmental Code authority structure
下载PDF
The Resistance Under Man Authority:The Analysis of Meggie in the Thorn Birds
20
作者 张宪 温乃鹏 《海外英语》 2010年第10X期192-192,共1页
The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according... The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according to her behaviors,which reflects her resistance to man authority. 展开更多
关键词 MEGGIE MAN authority RESISTANCE
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部