期刊文献+
共找到61篇文章
< 1 2 4 >
每页显示 20 50 100
AQSIQ Sends Working Groups to Implement the Spirit of National Quality Working Conference
1
《China Standardization》 2007年第5期30-30,共1页
  On August 1st, the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) convened a conference to transmit the spirit of national quality work and study an important speech regarding sta...   On August 1st, the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) convened a conference to transmit the spirit of national quality work and study an important speech regarding standards from Wen Jiabao,Premier of the State Council.…… 展开更多
关键词 WORK AQSIQ sends Working Groups to Implement the Spirit of National Quality Working Conference
下载PDF
LM-4B Sends Tianhui 2 Satellite into Orbit
2
作者 YANG Cheng 《Aerospace China》 2019年第2期59-59,共1页
Two satellites were sent into space aboard a LM-4B launch vehicle from the Taiyuan Satellite Launch Center at 06:25 Beijing time on April 30.The Tianhui 2 satellite was placed to a SSO orbit.This was the 303rd launch ... Two satellites were sent into space aboard a LM-4B launch vehicle from the Taiyuan Satellite Launch Center at 06:25 Beijing time on April 30.The Tianhui 2 satellite was placed to a SSO orbit.This was the 303rd launch of the LM series launch vehicle and the first mission of the Shanghai Academy of Spaceflight Technology in 2019. 展开更多
关键词 SATELLITES Tianhui sends
下载PDF
Symbiosis Sends Fujian to the Bank
3
作者 WANG JUN 《Beijing Review》 2006年第38期32-34,共3页
After years of investing in better cross-strait relations, Fujian is cashing in In his mind,Gentle Fang leaped from place to place, envisioning his new factory in America...Canada...Australia. "But Xiamen is the ... After years of investing in better cross-strait relations, Fujian is cashing in In his mind,Gentle Fang leaped from place to place, envisioning his new factory in America...Canada...Australia. "But Xiamen is the most desirable place for me," Fang said. "I have been to many places, but only feel at home here." With his ancestors from Zhangzhou, Fujian, and born in Kaohsiung, Taiwan, Fang, now General Manager 展开更多
关键词 Symbiosis sends Fujian to the Bank
原文传递
Paralysed Man Sends E-mail by Thought
4
作者 Roxanne Khamsi 耿传金 《当代外语研究》 2005年第1期2-3,共2页
多少年来,制造出一种可以读懂人脑思维的机器一直是人们的梦想。现 在,人类所进行的试验正在使这一梦想不断走近现实。位于美国马萨诸塞州的 Cyberkinetics公司已经开始进行将微型芯片植入瘫痪病人脑内的临床试验。
关键词 MAN Paralysed Man sends E-mail by Thought
原文传递
Woman Sends Regards to Family and the Loess Plateau
5
作者 MA JUNYI ZHAO NING 《Women of China》 1995年第6期11-12,15,共3页
WITH a population of ouer 8 million, the Hui nationality liue ouer the largest area of any other minority nationality in China. The Hui reside in the Ningxia Hui Autonomous Region, Gansu, Shaanxi, Guizhou, Henan, Qing... WITH a population of ouer 8 million, the Hui nationality liue ouer the largest area of any other minority nationality in China. The Hui reside in the Ningxia Hui Autonomous Region, Gansu, Shaanxi, Guizhou, Henan, Qinghai, Yunnan, Hebei, and Shandong provinces, the Xinjiang Uygur Autonomous Region, and the Beijing and Tianjin municipalities.The origin of the Hui people can be traced back to the end of the seventh century, when Arabs and Persians often came to do trade in China along the ancient Silk Road. Some stayed on and started families. Their children have been traced to Guangzhou and Quanzhou. At the beginning of the 13th century, more Arabs, Persian and people from Central Asia came to China, where they married into the Han, the Uygur and the Mongolian nationalities. Gradually a new nationality—the Hui—was formed.With the founding of New China in 1949, the NingxJa Hui Autonomous Region was established. The industrial and agricultural output in the region in 1990 was 12 times that in 1957, when the autonomous region was not yet established. Now the Ningxia Hui Autonomous Region is one of China's four provinces (regions) with the fastest economic development.The Hui people believe in Islam and are noted for their intimacy with each other, their ability to adapt to their enuironment and their strong sense of clan. The Hui have their own special customs, rites and eating habits.Many famous people throughout Chinese history were of the Hui nationality, such as Zhamaluding, an astronomer who lived during the Yuan Dynasty (1271-1368), Zheng He, the famous navigator who lived during the same period, and Li Zhi, the famous thinker and man of letters of the Ming Dynasty (1368-1644). Today's celebrities of the Hui nationality are Ma Jian, the famous scholar on the Islamic religion, the Beijing opera artist Ma Lianliang, and Ma Yanhong, the gymnast who wins the world championships. 展开更多
关键词 In Woman sends Regards to Family and the Loess Plateau
原文传递
Foreign Teacher Sends Girl to School
6
作者 LI JIHONG 《Women of China》 1995年第5期20-21,共2页
WHEN we talk about "Teacher Du" at the Hebei Institute of Finance and Economics in Shijiazhuang, we cannot help but think of the large, smiling man who often carries an oversized camera bag. In fact, his nam... WHEN we talk about "Teacher Du" at the Hebei Institute of Finance and Economics in Shijiazhuang, we cannot help but think of the large, smiling man who often carries an oversized camera bag. In fact, his name is Norbert duBois, an English teacher from the east coast of the United States. DuBois is fond of photography and has a wide circle of acquaintances. He 展开更多
关键词 Foreign Teacher sends Girl to School
原文传递
基于逻辑回归模型的send类与格交替的多因素分析
7
作者 袁咏雪 李健雪 《外文研究》 2023年第1期46-54,107,共10页
本研究基于COCA语料库,采用语料库量化方法,通过逐步逻辑回归分析,建立语料库概率模型,探究口语语体中send类与格交替使用的制约因素及其影响效应,研究结果显示:在口语语体中,send类与格变体的使用受多种因素的影响;同时,在口语语体中,... 本研究基于COCA语料库,采用语料库量化方法,通过逐步逻辑回归分析,建立语料库概率模型,探究口语语体中send类与格交替使用的制约因素及其影响效应,研究结果显示:在口语语体中,send类与格变体的使用受多种因素的影响;同时,在口语语体中,受事可及性、与事可定性并不具备显著影响效应,与事可及性、受事可定性、与事代词性、受事代词性、与事有生性、受事有生性、受事具体性以及长度差异对send类与格变体的选择具有显著影响效应;影响大小排序为:与事代词性>受事代词性>受事有生性>受事可定性>与事有生性>长度差异>与事可及性>受事具体性。 展开更多
关键词 与格交替 send类与格动词 语料库概率模型 逻辑回归模型
下载PDF
Study on the Causes of Low-temperature Freezing Rain and Snow Disasters in Hunan Province in 2008
8
作者 WANG Qi1,LIAO Yu-fang2 1.Hunan Meteorological Service Center,Changsha 410007,China 2.Hunan Provincial Meteorological Center,Changsha 410007,China 《Meteorological and Environmental Research》 CAS 2011年第3期65-68,共4页
[Objective] The aim was to analyze the causes of low-temperature rain and snow disasters in 2008.[Method] Based on the basic meteorological observation data,a primary study was implemented about the severe cold air an... [Objective] The aim was to analyze the causes of low-temperature rain and snow disasters in 2008.[Method] Based on the basic meteorological observation data,a primary study was implemented about the severe cold air and frozen rain event.The importance of factors causing disaster,territory and human activity in the formation of low-temperature rain and snow disasters were expounded.[Result] The factors triggering the disasters were so strong that were rarely seen in previous (stronger than that in 1954);the specific terrain was beneficial to the occurrence of the frozen rain;the human being’s action amplified the impacts of disaster events while suffering it.Furthermore,a point of view to minimize the climate disaster damage like this severe frozen rain was proposed.Improvement of forecast capability and accuracy,implementation of the demonstration about climatic feasibility,and propagation to public about the natural disaster’s protection and mitigation and so on were functional aspects.[Conclusion] The study provided theoretical basis for the prediction and forecast of low-temperature rain and snow disasters. 展开更多
关键词 DISASTER CAUSE TERRAIN sends the disaster factor Human activity China
下载PDF
聚合通信模型的测试与分析 被引量:4
9
作者 刘洋 曹建文 李玉成 《计算机工程与应用》 CSCD 北大核心 2006年第9期30-33,共4页
聚合通信的性能影响着大规模并行数值计算软件的整体效率,它是基于点对点消息传递实现的。可以通过选择点对点通信模型来描述聚合通信。一个恰当的模型可以为聚合通信算法提供精确的定量分析,有助于算法的设计与研究。论文通过对若干聚... 聚合通信的性能影响着大规模并行数值计算软件的整体效率,它是基于点对点消息传递实现的。可以通过选择点对点通信模型来描述聚合通信。一个恰当的模型可以为聚合通信算法提供精确的定量分析,有助于算法的设计与研究。论文通过对若干聚合通信典型算法的测试与分析,尝试比较与定量分析两种点对点通信模型对聚合通信的描述精度。 展开更多
关键词 聚合通信 LogGP模型 Send/Recv 模型
下载PDF
基于西门子开放式工业以太网OPEN IE的数据通讯方案
10
作者 钟华 《可编程控制器与工厂自动化(PLC FA)》 2011年第7期72-77,43,共7页
针对工业网络系统数据通信的现状,提出一种基于西门子开放式工业以太网的解决方案来实现与第三方的TCP连接和ASCII数据交换。介绍了利用S7 PLC和以太网通信处理机CP所构建的系统方案,且给出了比较详细的实施流程,并已有数套成功案例应... 针对工业网络系统数据通信的现状,提出一种基于西门子开放式工业以太网的解决方案来实现与第三方的TCP连接和ASCII数据交换。介绍了利用S7 PLC和以太网通信处理机CP所构建的系统方案,且给出了比较详细的实施流程,并已有数套成功案例应用于实际生产现场,满足了现场设备层数据通信性能指标和要求,相比标准工业以太网和现场总线而言具有极大的互补性。 展开更多
关键词 开放式工业以太网 TCP连接 通信处理机 S5兼容通信 SEND/RECEIVE接第三方通信 S7通信
下载PDF
以吻封缄
11
作者 杨茜茜 《中国皮革制品》 2015年第4期78-83,共6页
"I'll send you all my dreams,Every day in a letter,Sealed with a kiss."在很久很久以前,想要治愈相思的方法只有两个,要么一早起床,爬过三座山穿过两座城跨过一条河去见那个人,要么将所有的相思与情愫写入一张素花薄纸之... "I'll send you all my dreams,Every day in a letter,Sealed with a kiss."在很久很久以前,想要治愈相思的方法只有两个,要么一早起床,爬过三座山穿过两座城跨过一条河去见那个人,要么将所有的相思与情愫写入一张素花薄纸之上,存入方正信封里以吻封缄,然后用漫长的时光去等待对方的回信。 展开更多
关键词 SEND 相思 方正
下载PDF
浅谈西门子开放式工业以太网OPEN IE通信及其应用
12
作者 钟华 《工业控制计算机》 2010年第2期15-16,18,共3页
针对工业网络系统数据通信的现状,提出一种基于西门子开放式工业以太网的解决方案来实现与第三方的TCP连接和数据交换。介绍了利用S7PNPLC和以太网CP所构建的系统方案,且给出了具体的实施流程,满足了现场设备层数据通信性能指标和要求,... 针对工业网络系统数据通信的现状,提出一种基于西门子开放式工业以太网的解决方案来实现与第三方的TCP连接和数据交换。介绍了利用S7PNPLC和以太网CP所构建的系统方案,且给出了具体的实施流程,满足了现场设备层数据通信性能指标和要求,相比标准工业以太网和现场总线而言具有极大的互补性。 展开更多
关键词 开放式工业以太网 TCP连接 SEND/RECEIVE接口 T功能块 第三方通信
下载PDF
关于IPv4及IPv6的安全讨论 被引量:1
13
作者 高嵩 贾卓生 《计算机与现代化》 2006年第6期97-100,109,共5页
主要探讨了现行IPv4体系结构下的安全缺陷以及IPv6针对这些缺陷提出的解决办法,介绍了新制定的安全邻居发现协议,并对IPv6潜在的安全威胁提出了笔者的看法以及一些解决方案。
关键词 IPV4 IPV6 IPSEC SEND
下载PDF
Influence of Error-prone Channel on the Performance of IEEE 802.11 WLAN Utilizing RTS/CTS Handshaking 被引量:1
14
作者 Haider M. AlSabbagh 陈建平 徐友云 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期799-804,共6页
A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802.... A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802.11b protocol. Results show that throughput does not change with the size of the network for wide range of bit error rates (BERs) and the channel bit rates play a significant role in the main characteristics of the network. A comprehensive explanation has given for the phenomenon of the packet delay suppression at relatively high level of BERs in view of the size of the networks and the BERs. The effect length of the transmitting packets is also investigated. 展开更多
关键词 IEEE802.11B REQUEST to send/clear to send(RTS/CTS) wireless local area network(WLAN) ERROR-PRONE channel
下载PDF
North-Channel Projects for Sending Power from West to East
15
作者 朱红光 《Electricity》 2003年第1期39-42,共4页
On August 20, 2002, the construction-starting ceremonies of the north-channel projects for sending power from west to east were solemnly held at one main meeting place and five sub-meeting places simultaneously. The n... On August 20, 2002, the construction-starting ceremonies of the north-channel projects for sending power from west to east were solemnly held at one main meeting place and five sub-meeting places simultaneously. The north-channel projects for sending power from west to east started to construct this time include three transmission and substation projects and four power source projects. This paper makes a brief introduction to the seven projects. 展开更多
关键词 power construction sending power from west to east north-channel transmission and substation power source
下载PDF
汉语中的“送”和英语中的“send”的动宾搭配及其在认知方面的差异
16
作者 路丽梅 《现代语文(下旬.语言研究)》 2009年第3期115-116,共2页
英语中的“Send”和汉语中的“送”都是使用频率较高的动词,而且它们都能带双宾语。本丈拟从语义分析及其搭配情况入手,比较汉英语言中“送”和“Send”的搭配的异同及其在使用中的实际情况。文章分三个部分,首先对“送”和“send”... 英语中的“Send”和汉语中的“送”都是使用频率较高的动词,而且它们都能带双宾语。本丈拟从语义分析及其搭配情况入手,比较汉英语言中“送”和“Send”的搭配的异同及其在使用中的实际情况。文章分三个部分,首先对“送”和“send”进行语义分析,然后对它们的搭配情况进行比较,以发现各自的语义走向,最后对两者的搭配情况进行比较并找出它们在认知方面的差异。 展开更多
关键词 “送” “send” 动宾搭配 认知
下载PDF
POPULATION MOVEMENTS AND THE ENVIRONMENTAL POTENTIAL POPULATION IN CHINA
17
作者 杨金星 贾秀嵩 《Chinese Geographical Science》 SCIE CSCD 1992年第4期32-38,共7页
This paper inquires firstly into the influence of environmental potential population on population movements in China. We think that there are intimate relationships between the changes of the environmental potential ... This paper inquires firstly into the influence of environmental potential population on population movements in China. We think that there are intimate relationships between the changes of the environmental potential population and the population movements: from southeast to northwest, from the coastland to the borderland in the early 30 years of the founding of the People’s Republic of China and the reversion of direction of population movements in recent ten years. Then we come to the conclusion that it has been inappropriate for a large-scale population movement of reclaiming and cultivating wasteland, because the actual population has universally surpassed the environmental potential population in most areas of China. But it is still appropriate and necessary for these movements, such as intelligence or science migration of population, limited population movement within the area of some provinces, population concentration on small towns and temporary fluidity of population. 展开更多
关键词 POPULATION MOVEMENT ENVIRONMENTAL POTENTIAL POPULATION receiving areas sending areas
下载PDF
Light Weight Cryptographic Address Generation(LW-CGA) Using System State Entropy Gathering for IPv6 Based MANETs
18
作者 Reshmi T.R Murugan K 《China Communications》 SCIE CSCD 2017年第9期114-126,共13页
In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration(SLAAC) has proven to face several sec... In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration(SLAAC) has proven to face several security issues. Even though the Secure Neighbor Discovery(SeND) uses Cryptographically Generated Addresses(CGA) to address these issues, it creates other concerns such as need for CA to authenticate hosts, exposure to CPU exhaustion attacks and high computational intensity. These issues are major concern for MANETs as it possesses limited bandwidth and processing power. The paper proposes empirically strong Light Weight Cryptographic Address Generation(LW-CGA) using entropy gathered from system states. Even the system users cannot monitor these system states; hence LW-CGA provides high security with minimal computational complexity and proves to be more suitable for MANETs. The LW-CGA and SeND are implemented and tested to study the performances. The evaluation shows that LW-CGA with good runtime throughput takes minimal address generation latency. 展开更多
关键词 IPV6 SLAAC EUI-64 CGA SEND SYSTEM states MANETS
下载PDF
THE APPLICATION OF THE CODE MESSAGES THEORY IN ACUPUNCTURE AND MOXIBUSTION
19
作者 Nabil H. N. Elmadi, International College of TCM, Tianjin, China 《World Journal of Acupuncture-Moxibustion》 1993年第1期57-60,共4页
The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kind... The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues. 展开更多
关键词 MESSAGE CODES sending TRANSMITTER accordingly specialized CODE TRANSPORTATION transmitting resemble
下载PDF
IPv6 Cryptographically Generated Address:Analysis,Optimization and Protection
20
作者 Amjed Sid Ahmed Rosilah Hassan +1 位作者 Faizan Qamar Mazhar Malik 《Computers, Materials & Continua》 SCIE EI 2021年第7期247-265,共19页
In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of sel... In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its performance.In this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.Fulfilling Hash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of CGA.Therefore,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious. 展开更多
关键词 IPV6 GCA SEND DoS attacks RSA SHA-1
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部