期刊文献+
共找到156篇文章
< 1 2 8 >
每页显示 20 50 100
社会学理论视域下的“二进”形象再思考
1
作者 伏涛 《江苏第二师范学院学报》 2024年第4期10-16,共7页
“二进”是《儒林外史》中被科举制度腐蚀了灵魂的士子典型,从科举、文人心态、文士治生,乃至经济学角度切入文本对其进行研究的较为常见。本文尝试用社会学理论观照文本,周进失馆源于角色不清,他撞号板赢得金有余及其商人朋友的同情与... “二进”是《儒林外史》中被科举制度腐蚀了灵魂的士子典型,从科举、文人心态、文士治生,乃至经济学角度切入文本对其进行研究的较为常见。本文尝试用社会学理论观照文本,周进失馆源于角色不清,他撞号板赢得金有余及其商人朋友的同情与帮助,从而改变人生命运,这得益于有效的互动与“弱关系”的建立。范进进学以及后来的一路顺畅得益于他和周进之间成功的互动,移情促进互动,互动积累其社会资本。范进中举后张静斋送银赠房意在互换资源与社会资本的延伸。 展开更多
关键词 社会学理论 《儒林外史》 “二进” 社会资本
下载PDF
退“二”进“三”:新形势下教育电视台资金筹措渠道创新浅谈
2
作者 周玲 《教育传媒研究》 2020年第2期69-69,共1页
本文对电视媒体产品第二次销售面临的困境及其原因做了分析,并提出了新形势下教育电视台资金筹措渠道创新的一些建议。
关键词 退“二“三” 前店后台 前店后厂
下载PDF
Modular solution of dynamic multiple-phased systems 被引量:3
3
作者 莫毓昌 杨全胜 《Journal of Southeast University(English Edition)》 EI CAS 2009年第3期316-319,共4页
A new modular solution to the state explosion problem caused by the Markov-based modular solution of dynamic multiple-phased systems is proposed. First, the solution makes full use of the static parts of dynamic multi... A new modular solution to the state explosion problem caused by the Markov-based modular solution of dynamic multiple-phased systems is proposed. First, the solution makes full use of the static parts of dynamic multiple-phased systems and constructs cross-phase dynamic modules by combining the dynamic modules of phase fault trees. Secondly, the system binary decision diagram (BDD) from a modularized multiple- phased system (MPS)is generated by using variable ordering and BDD operations. The computational formulations of the BDD node event probability are derived for various node links and the system reliability results are figured out. Finally, a hypothetical multiple-phased system is given to demonstrate the advantages of the dynamic modular solution when the Markov state space and the size of the system BDD are reduced. 展开更多
关键词 binary decision diagram (BDD) dynamic fault tree Markov chain modular solution
下载PDF
A 2GHz Low Power Differentially Tuned CMOS Monolithic LC-VCO 被引量:1
4
作者 张利 池保勇 +2 位作者 姚金科 王志华 陈弘毅 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2006年第9期1543-1547,共5页
A 2GHz differentially tuned CMOS monolithic LC-VCO is designed and fabricated in a 0.18μm CMOS process. The VCO has a 16.15% tuning range (from 1. 8998 to 2. 2335GHz) through a combination of analog and digital tun... A 2GHz differentially tuned CMOS monolithic LC-VCO is designed and fabricated in a 0.18μm CMOS process. The VCO has a 16.15% tuning range (from 1. 8998 to 2. 2335GHz) through a combination of analog and digital tuning techniques (4-bit binary switch-capacitor array). The measured phase noise is - 118.17dBc/Hz at a 1MHz offset from a 2. 158GHz carrier. With the presented improved switch,the phase noise varies no more than 3dB at different digital control bits. The phase noise changes only by about 2dB in the tuning range because of the pn-junctions as the varactors. The VCO draws a current of about 2. lmA from a 1.8V power supply and works normally with a 1.5V power supply. 展开更多
关键词 binary switchable-capacitor array CMOS differentially tuned phase noise VCO
下载PDF
加倍测度空间上的A_1权
5
作者 代玉霞 《数学物理学报(A辑)》 CSCD 北大核心 2011年第6期1619-1625,共7页
该文主要讨论了加倍测度空间上的A_1权的几个性质及其简单应用.
关键词 加倍测度空间 A1权 “二进”划分.
下载PDF
Linear Complexity of Some Binary Sequences Derived from Fermat Quotients 被引量:8
6
作者 Chen Zhixiong Hu Lei, Du Xiaoni 《China Communications》 SCIE CSCD 2012年第2期105-108,共4页
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotie... We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose. 展开更多
关键词 CRYPTOGRAPHY pseudorandom binary sequences fermat quotients finite fields linear complexity
下载PDF
Densities and surface tensions of ionic liquids/sulfuric acid binary mixtures 被引量:4
7
作者 Tao Zhang Jing Hu Shengwei Tang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第7期1513-1521,共9页
The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and ... The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure. 展开更多
关键词 Ionic liquid Sulfuric acid DENSITY Surface tension Excess property
下载PDF
THE 2-ERROR LINEAR COMPLEXITY OF 2~n-PERIODIC BINARY SEQUENCES WITH LINEAR COMPLEXITY 2~n-1 被引量:21
8
作者 Zhu Fengxiang Qi Wenfeng 《Journal of Electronics(China)》 2007年第3期390-395,共6页
Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = ... Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = 2,3,the number of sequences with given k-error linear complexity and the expected k-error linear complexity are provided. Moreover,the proportion of the sequences whose k-error linear complexity is bigger than the expected value is analyzed. 展开更多
关键词 Linear complexity k-error linear complexity Periodic binary sequences Chan-Games algorithm
下载PDF
BER Modified Decode-and-Forward Protocol for OFDM-Based Linear Multihop Networks 被引量:3
9
作者 MIAO Tingting WANG Ning YANG Hongwen YANG Dachcng 《China Communications》 SCIE CSCD 2014年第11期34-43,共10页
In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is seriou... In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is serious in multihop networks as errors made by any relay node may fail the decoder at the destination in great chance. In this paper, we propose a bit error rate (BER) modified DF protocol (BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used. By modeling all links except the last one as a binary symmetric channel (BSC), we derive a log likelihood ratio (LLR) modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper. Furthermore, to reduce the computational complexity and signaling overhead, the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER. In addition, for situations where the channel state information (CSI) of forward link is available, the proposed BMDF can be further enhanced by combining with subcarrier pairing (SP) and power allocation (PA), where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed. The simulation results verify thesignificant performance improvement to the conventional DF. 展开更多
关键词 wireless multihop networks DECODE-AND-FORWARD BER modified decode-and-forward (BMDF) OFDM M-arymodulation subcarrier pairing (SP) powerallocation (PA)
下载PDF
A Fully Homomorphic Encryption Scheme with Better Key Size 被引量:5
10
作者 CHEN Zhigang WANG Jian +1 位作者 ZHANG ZengNian SONG Xinxia 《China Communications》 SCIE CSCD 2014年第9期82-92,共11页
Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this pap... Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this paper, we propose a fully homomorphic encryption scheme based on LWE, which has better key size. Our main contributions are: (1) According to the binary-LWE recently, we choose secret key from binary set and modify the basic encryption scheme proposed in Linder and Peikert in 2010. We propose a fully homomorphic encryption scheme based on the new basic encryption scheme. We analyze the correctness and give the proof of the security of our scheme. The public key, evaluation keys and tensored ciphertext have better size in our scheme. (2) Estimating parameters for fully homomorphic encryption scheme is an important work. We estimate the concert parameters for our scheme. We compare these parameters between our scheme and Bral2 scheme. Our scheme have public key and private key that smaller by a factor of about logq than in Bral2 scheme. Tensored ciphertext in our scheme is smaller by a factor of about log2q than in Bral2 scheme. Key switching matrix in our scheme is smaller by a factor of about log3q than in Bra12 scheme. 展开更多
关键词 fully homomorphic encryption public key encryption learning with error concert parameters
下载PDF
On Coupled KdV Equations with Self-consistent Sources 被引量:2
11
作者 HUANG Ye-Hui WU Hong-Xia +1 位作者 XIE Xi ZENG Yun-Bo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第5期1091-1100,共10页
The coupled Korteweg-de Vries (CKdV) equation with self-consistent sources (CKdVESCS) and its Lax representation are derived. We present a generalized binary Darboux transformation (GBDT) with an arbitrary time-... The coupled Korteweg-de Vries (CKdV) equation with self-consistent sources (CKdVESCS) and its Lax representation are derived. We present a generalized binary Darboux transformation (GBDT) with an arbitrary time- dependent function for the CKdVESCS as well as the formula for the N-times repeated GBDT. This GBDT provides non-auto-Biicklund transformation between two CKdVESCSs with different degrees of sources and enables us to construct more generM solutions with N arbitrary t-dependent functions. We obtain positon, negaton, complexiton, and negaton- positon solutions of the CKdVESCS. 展开更多
关键词 coupled KdV equation with self-consistent sources generalized binary Darboux transformation POSITON NEGATON COMPLEXITON
下载PDF
STATISTICAL CLASSIFICATION AND CHARACTERISTICS ANALYSIS OF BINARY TROPICAL CYCLONES OVER THE WESTERN NORTH PACIFIC OCEAN 被引量:3
12
作者 吴限 费建芳 +2 位作者 黄小刚 程小平 任建奇 《Journal of Tropical Meteorology》 SCIE 2011年第4期335-344,共10页
Using the 1949-2007 western North Pacific tropical cyclones (TCs) best-track data archived at the Shanghai Typhoon Institute of China Meteorological Administration for the western North Pacific from 1949 to 2007,both ... Using the 1949-2007 western North Pacific tropical cyclones (TCs) best-track data archived at the Shanghai Typhoon Institute of China Meteorological Administration for the western North Pacific from 1949 to 2007,both the characteristics of binary and multiple TCs and samples of interactions among TCs and multi-TCs are identified and statistically analyzed.According to the various features of individual TC tracks and interacting tracks,seven distinct types are proposed to describe the binary system of TCs and their interaction samples.The mean trajectories of the west and east component of binary TCs in each type are obtained using a new cluster analysis technique.These types are then analyzed in terms of landfall process,occurrence seasonality,coexistent lifetime,especially the large-scale patterns of atmospheric circulation.Finally,typical steering flows and conceptual models of the binary TCs at different phases are established based on six-hourly flow maps of the binary system and the averages are determined of the mean steering flow of ten representative binary TCs.Then,typical steering flows and conceptual models at the beginning,middle and final phase in each type are established to describe the large-scale circulation patterns of the binary system interaction types. 展开更多
关键词 binary tropical cyclones LANDFALL statistical classification steering flow
下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
13
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
下载PDF
Modeling of segregation in magnetized fluidized bed with binary mixture of Geldart-B magnetizable and nonmagnetizable particles 被引量:2
14
作者 Quanhong Zhu Hongzhong Li +1 位作者 Qingshan Zhu Qingshan Huang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第6期1412-1422,共11页
For the magnetized fluidized bed(MFB)with the binary mixture of Geldart-B magnetizable and nonmagnetizable particles,the magnetically induced segregation between these two kinds of particles occurs at high magnetic fi... For the magnetized fluidized bed(MFB)with the binary mixture of Geldart-B magnetizable and nonmagnetizable particles,the magnetically induced segregation between these two kinds of particles occurs at high magnetic field intensities(H),leading to the deterioration of the fluidization quality.The critical intensity(H_(ms))above which such segregation commences varies with the gas velocity(U_g).This work focuses on establishing a segregation model to theoretically derive the H_(ms)–U_g relationship.In a magnetic field,the magnetizable particles form agglomerates.The magnetically induced segregation in essence refers to the size segregation of the binary mixture of agglomerates and nonmagnetizable particles.Consequently,the segregation model was established in two steps:first,the size of agglomerates(d_A)was calculated by the force balance model;then,the H_(ms)–U_g relationship was obtained by substituting the expression of d_Ainto the basic size segregation model for binary mixtures.As per the force balance model,the cohesive and collision forces were 1_2 orders of magnitude greater than the other forces exerted on the agglomerates.Therefore,the balance between these two forces largely determined d_A.The calculated d_A increased with increasing H and decreasing U_g,agreeing qualitatively with the experimental observation.The calculated H_(ms)–U_ g relationship agreed reasonably with the experimental data,indicating that the present segregation model could predict well the segregation behavior in the MFB with the binary mixture. 展开更多
关键词 Magnetized fluidized bed Binary mixture SEGREGATION Model AGGLOMERATE Force balance
下载PDF
Binary Bell Polynomials,Bilinear Approach to Exact Periodic Wave Solutions of(2+l)-Dimensional Nonlinear Evolution Equations 被引量:4
15
作者 王云虎 陈勇 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第10期672-678,共7页
In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada -Kotera equation in a ... In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada -Kotera equation in a quick and natural manner, namely by appling the binary Bell polynomials. Then the Hirota direct method and Riemann theta function are combined to construct the periodic wave solutions of the three types nonlinear evolution equations. And the corresponding figures of the periodic wave solutions are given. Furthermore, the asymptotic properties of the periodic wave solutions indicate that the soliton solutions can be derived from the periodic wave solutions. 展开更多
关键词 binary Bell polynomial Riemann theta function periodic wave solution asymptotic property
下载PDF
An all-optical scheme of signed digit binary addition based on optical non-linear material 被引量:2
16
作者 Kuladeep Roy Chowdhury Sourangshu Mukhopadhyay 《Optoelectronics Letters》 EI 2008年第6期447-451,共5页
We propose a new integrated method which covers addition of any two signed digit numbers in all-optical domain. To implement this scheme we have exploited some photo-refractive characters of optical non-linear materia... We propose a new integrated method which covers addition of any two signed digit numbers in all-optical domain. To implement this scheme we have exploited some photo-refractive characters of optical non-linear materials,which may experience 0.1-0.2dB attenuation loss as silica is used as non-linear medium. Moreover,the attenuation loss may be reduced to 0.001 dB/m if we consider the use of slow light at 1.56μm. 展开更多
关键词 制算法 计算机技术 光学非线性材料 光学应用
下载PDF
Frequent item sets mining from high-dimensional dataset based on a novel binary particle swarm optimization 被引量:2
17
作者 张中杰 黄健 卫莹 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第7期1700-1708,共9页
A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial partic... A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial particles was designed to ensure the reasonable initial fitness, and then, the dynamically dimensionality cutting of dataset was built to decrease the search space. Based on four high-dimensional datasets, BPSO-HD was compared with Apriori to test its reliability, and was compared with the ordinary BPSO and quantum swarm evolutionary(QSE) to prove its advantages. The experiments show that the results given by BPSO-HD is reliable and better than the results generated by BPSO and QSE. 展开更多
关键词 data mining frequent item sets particle swarm optimization
下载PDF
Fake Reviews Tell No Tales? Dissecting Click Farming in Content-Generated Social Networks 被引量:2
18
作者 Neng Li Suguo Du +2 位作者 Haizhong Zheng Minhui Xue Haojin Zhu 《China Communications》 SCIE CSCD 2018年第4期98-109,共12页
Recently, there has been a radial shift from traditional online social networks to content-generated social networks(CGSNs). Contemporary CGSNs, such as Dianping and Trip Advisor, are often the targets of click farmin... Recently, there has been a radial shift from traditional online social networks to content-generated social networks(CGSNs). Contemporary CGSNs, such as Dianping and Trip Advisor, are often the targets of click farming in which fake reviews are posted in order to boost or diminish the ratings of listed products and services simply through clicking. Click farming often emanates from a collection of multiple fake or compromised accounts, which we call click farmers. In this paper, we conduct a three-phase methodology to detect click farming. We begin by clustering communities based on newly-defined collusion networks. We then apply the Louvain community detection method to detecting communities. We finally perform a binary classification on detected-communities. Our results of over a year-long study show that(1) the prevalence of click farming is different across CGSNs;(2) most click farmers are lowly-rated;(3) click-farming communities have relatively tight relations between users;(4) more highly-ranked stores have a greater portion of fake reviews. 展开更多
关键词 click farming community detec-tion content-generated social networks
下载PDF
Decomposition behavior of CaSO_4 during potassium extraction from a potash feldspar-CaSO_4 binary system by calcination 被引量:7
19
作者 Li Lü Chun Li +2 位作者 Guoquan Zhang Xiaowei Hu Bin Liang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第4期838-844,共7页
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl... The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled. 展开更多
关键词 K-feldspar Calcium sulfate Potassium extraction Calcium sulfate decomposition Roasting
下载PDF
A formulation methodology for multicomponent distillation sequences based on stochastic optimization 被引量:5
20
作者 Fei Wang Yiqing Luo Xigang Yuan 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2016年第9期1229-1235,共7页
Based on stochastic optimization strategy, a formulation methodology is proposed for synthesizing distillation column sequences, allowing more than one middle component as the distributing components between a pair of... Based on stochastic optimization strategy, a formulation methodology is proposed for synthesizing distillation column sequences, allowing more than one middle component as the distributing components between a pair of key components in the non-sharp split. In order to represent and manipulate the distillation configuration structures, a new coding procedure is proposed in the form of one-dimensional array. Theoretically, an array can represent any kind of split(non-sharp and sharp). With the application of a binary sort tree approach, a robust flow sheet encoding and decoding procedure is developed so that the problem formulation and solution becomes tractable. In this paper,the synthesis problem is formulated as a mixed-integer nonlinear programming(MINLP) problem and an improved simulated annealing approach is adopted to solve the optimization problem. Besides, a shortcut method is applied to the evaluation of all required design parameters as well as the total function. 展开更多
关键词 Distillation sequences synthesis Non-sharp separation Simulated annealing MINLP Binary sort tree
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部