期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
“先保温,后保利”——保利物业之“保”字的N种解读
1
作者 廖月华 姜军 《中国物业管理》 2017年第4期54-61,共8页
自1984年始,保利这两个字就被赋予了全新的含义。从最初的保卫胜利,到之后的"保其国,利其民;保其念,利其志",神秘的史说和真实的传奇由此开启然而,这些史说和传奇,更多的还是围绕整个保利集团。那么,作为其麾下的保利物业,对... 自1984年始,保利这两个字就被赋予了全新的含义。从最初的保卫胜利,到之后的"保其国,利其民;保其念,利其志",神秘的史说和真实的传奇由此开启然而,这些史说和传奇,更多的还是围绕整个保利集团。那么,作为其麾下的保利物业,对于"保利"这两个字又是如何诠释的?本文从一个"保"字入手,为大家展示一个多样化的保利物业。 展开更多
关键词 利集团 “保”字 物业 解读 多样化 传奇
下载PDF
念准“保”字经
2
《陕西综合经济》 2009年第3期1-1,共1页
面对当前经济发展中出现的困难局面。各地区、各部门围绕保增长的大局要求.各显其能.纷纷大念“保”字经:保出口、保产业、保企业,保民生、保就业、保稳定,保项目、保市场、保信心,等等。其中反映出的积极进取态度值得肯定.但对... 面对当前经济发展中出现的困难局面。各地区、各部门围绕保增长的大局要求.各显其能.纷纷大念“保”字经:保出口、保产业、保企业,保民生、保就业、保稳定,保项目、保市场、保信心,等等。其中反映出的积极进取态度值得肯定.但对各类“保”中存在的一些不科学的苗头与倾向需要引起警觉。 展开更多
关键词 “保”字 经济发展 积极进取 出口 企业 就业 市场
下载PDF
3
作者 刘钊 《辞书研究》 2023年第6期117-120,共4页
上引古文字“保”字诸形,1—8像大人负抱婴儿的形象,其中4—8大人反手环抱婴儿的样子至为明显。5—8为早期金文的写法,更为象形。《尚书·召诰》有“夫知保抱携持厥妇子以哀吁天”句,其中“保抱”连言,或认为就是指背着和抱着婴儿... 上引古文字“保”字诸形,1—8像大人负抱婴儿的形象,其中4—8大人反手环抱婴儿的样子至为明显。5—8为早期金文的写法,更为象形。《尚书·召诰》有“夫知保抱携持厥妇子以哀吁天”句,其中“保抱”连言,或认为就是指背着和抱着婴儿的意思。出土文献中“保”可用为“抱”,所以也有可能最初“保”“抱”不分。 展开更多
关键词 召诰 出土文献 古文 金文 婴儿 大人 “保”字
下载PDF
有趣的汉字
4
《课堂内外(小学版)》 2015年第3期75-75,共1页
甲骨文和金文的“保”字都是一个大人怀抱婴儿的形状。本义是“养育”、“抚养”。《荀子·王霸》:“上之于下,如保赤子。”后引申为“保护”、“保佑”等义。
关键词 “保”字 甲骨文 本义
下载PDF
说“保”
5
作者 苏昊 《百家作文指导(小学中高版)》 2009年第3期40-40,共1页
“保”字最早的字形写作 或者 ,像是大人把婴儿背在后背,并伸出一只手在后面加以保护的样子。后来简化为左边一个“亻”,右边一个“子”:但这就和“仔细”的“仔”一样了,为了区分,在“子”的右下角加一撇,
关键词 “保”字 “子” 写作
下载PDF
民之安生 我之使命
6
作者 刘畅 《中国人力资源社会保障》 2014年第3期54-55,共2页
从黑龙江省齐齐哈尔市向东10公里便是农垦齐齐哈尔种畜场,短短几年时间,齐齐哈尔种畜场从参差不齐到整齐划一,从‘断漏少’到‘全覆盖’,构建起以“保”字为中心的社会保障体系。民之安生,我之使命,齐齐哈尔种畜场一步一个脚印地... 从黑龙江省齐齐哈尔市向东10公里便是农垦齐齐哈尔种畜场,短短几年时间,齐齐哈尔种畜场从参差不齐到整齐划一,从‘断漏少’到‘全覆盖’,构建起以“保”字为中心的社会保障体系。民之安生,我之使命,齐齐哈尔种畜场一步一个脚印地践行着。老有所养、病有所医,不再只是一句口号。 展开更多
关键词 齐齐哈尔市 社会障体系 种畜场 黑龙江省 “保”字 老有所养 病有所医 全覆盖
下载PDF
全力优化资源配置 统筹使用事业编制资源
7
作者 冷伟青 《中国机构改革与管理》 2020年第12期12-13,共2页
统筹使用事业编制资源,是深化事业单位改革的重要组成部分。2020年上海市部署启动事业编制资源统筹工作,着眼一个“保”字、坚持一个“简”字、抓住一个“改”字、把握一个“调”字、突出一个“活”字、强调一个“控”字,取得积极成效,... 统筹使用事业编制资源,是深化事业单位改革的重要组成部分。2020年上海市部署启动事业编制资源统筹工作,着眼一个“保”字、坚持一个“简”字、抓住一个“改”字、把握一个“调”字、突出一个“活”字、强调一个“控”字,取得积极成效,全力服务保障上海经济社会发展。 展开更多
关键词 事业编制 优化资源配置 事业单位改革 资源统筹 统筹使用 积极成效 经济社会发展 “保”字
下载PDF
STUDY OF MICRO PROCESSOR BASED DISTRIBUTED BUS PROTECTION
8
作者 罗姗姗 贺家李 +1 位作者 周孝信 周孝信 《Transactions of Tianjin University》 EI CAS 1999年第2期3-8,共6页
A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments ... A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle. 展开更多
关键词 bus protection data communication digital relaying
下载PDF
Digital reconstruction of ancient Egyptian tombs
9
作者 艾比塔 龚恺 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期250-254,共5页
From the pyramids of Giza to the tombs of Thebes at Luxor, the glorious ancient Egyptian history has produced remarkable architecture. Sadly, tourists, numbering nearly four million per year, have taken a heavy toll o... From the pyramids of Giza to the tombs of Thebes at Luxor, the glorious ancient Egyptian history has produced remarkable architecture. Sadly, tourists, numbering nearly four million per year, have taken a heavy toll on many of these ancient structures. Of particular concern are many of tombs located opposite Luxor on the western bank of the Nile. Digital reconstruction of these tombs has the potential of helping to document and preserve these important historical structures. Issues concernng new and unique problems involving the photographing and digital reconstruction of these tombs are addressed. Techniques for removing image distortions, recovering 3-D shapes and correcting for lighting imbalances are discussed. A complete reconstruction of the tomb of Sennediem is shown. 展开更多
关键词 tomb conservation digital reconstruction photographing
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
10
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Dynamics and circuit implementation of three simplified chaotic systems 被引量:1
11
作者 孙克辉 王艳丽 朱从旭 《Journal of Central South University》 SCIE EI CAS 2013年第3期663-669,共7页
To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s... To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication. 展开更多
关键词 CHAOS single-parameter system circuit realization secure communication chaos shift keying
下载PDF
Fatigue life prediction of gas metal arc welded crucifrom joints of AA7075 aluminium alloy failing from root region 被引量:2
12
作者 B. RAVINDRA T. SENTHIL KUMAR V. BALASUBRAMANIAN 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2011年第6期1210-1217,共8页
Empirical relationship was developed to predict the fatigue life of gas metal arc welded (GMAW) cruciform joints failing from root region. High strength, age hardenable aluminium alloy of AA7075-T6 grade was used as... Empirical relationship was developed to predict the fatigue life of gas metal arc welded (GMAW) cruciform joints failing from root region. High strength, age hardenable aluminium alloy of AA7075-T6 grade was used as the base material. The design of experiments concept was used to optimize the required number of fatigue testing experiments. Fatigue experiment was conducted in a servo hydraulic controlled fatigue testing machine under constant amplitude loading. The empirical relationship was developed. By using the developed empirical relationship, the fatigue life of GMAW cruciform joints failing from root region was predicted at 95% confidence level. The effect of cruciform joint dimensions on fatigue life was discussed in detail. 展开更多
关键词 aluminium alloy gas metal arc welding cruciform joint fatigue life
下载PDF
A Debris-flow Simulation Model for the Evaluation of Protection Structures 被引量:1
13
作者 TSAI Yuanfan 《Journal of Mountain Science》 SCIE CSCD 2007年第3期193-202,共10页
Debris flow is the flow of a solid-fluid mixture and in this investigation it is treated as the flow of a continuum in routing. A numerical model is proposed describing debris flow including erosion and deposition pro... Debris flow is the flow of a solid-fluid mixture and in this investigation it is treated as the flow of a continuum in routing. A numerical model is proposed describing debris flow including erosion and deposition processes with suitable boundary con-ditions. The numerical model is applied to evaluate the effects of protection structures against debris flow caused by heavy rainfall on the Shen-Mu Stream of Nantou County located in central Taiwan. Simulation results indicated that the proposed model can offer useful pre-planning guidelines for engineers. 展开更多
关键词 Debris flow numerical simulation
下载PDF
Quality 4.0 technologies to enhance traditional Chinese medicine for overcoming healthcare challenges during COVID-19 被引量:3
14
作者 Abid Haleem Mohd Javaid +1 位作者 Ravi Pratap Singh Rajiv Suman 《Digital Chinese Medicine》 2021年第2期71-80,共10页
The Quality 4.0 concept is derived from the industrial fourth revolution,i.e.,Industry 4.0.Quality 4.0 is the future of quality,where new digital and disruptive technologies are used to maintain quality in organizatio... The Quality 4.0 concept is derived from the industrial fourth revolution,i.e.,Industry 4.0.Quality 4.0 is the future of quality,where new digital and disruptive technologies are used to maintain quality in organizations.It is also suitable for traditional Chinese medicine(TCM)to maintain quality.This quality revolution aims to improve industrial and service sectors’quality by incorporating emerging technologies to connect physical systems with the natural world.The proposed digital philosophy can update and enhance the entire TCM treatment methodology to become more effective and attractive in the current competitive structure of the pharmaceutical and clinical industries.Thus,in healthcare,this revolution empowers quality treatment during the COVID-19 pandemic.There is a major requirement in healthcare to maintain the quality of medical tools,equipment,and treatment processes during a pandemic.Digital technologies can widely be used to provide innovative products and services with excellent quality for TCM.In this paper,we discuss the significant role of Quality 4.0 and how it can be used to maintain healthcare quality and fulfill challenges during the pandemic.Additionally,we discuss 10 significant applications of Quality 4.0 in healthcare during the COVID-19 pandemic.These technologies will provide unique benefits to maintain the quality of TCM throughout the treatment process.With Quality 4.0,quality can be maintained using innovative and advanced digital technologies. 展开更多
关键词 Quality 4.0 COVID-19 Digital healthcare Traditional Chinese medicine(TCM) Industry 4.0 Quality revolution
下载PDF
Digital Rights Management:Model,Technology and Application 被引量:7
15
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
16
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 Digital library Digital watermarking NONLINEAR Copyright protection
下载PDF
Hidden Side of the Work: Culture War in the Movie Forrest Gump
17
作者 LAN Liang-ping 《Sino-US English Teaching》 2014年第3期196-201,共6页
The current study explores how the ideological struggle is unfolded in the movie Forrest Gump (1994). Through a critical examination of the text structure of the plot and the language used by four main characters, i... The current study explores how the ideological struggle is unfolded in the movie Forrest Gump (1994). Through a critical examination of the text structure of the plot and the language used by four main characters, it demonstrates that conservatism has gained great victory over liberalism in the following way: Those with conservative values are highlighted repeatedly in a favorable way, while those who preach liberal values are frequently associated with tragic events, and ultimately, the latter all converted into conservatives in one way or another, which indicates a reconciliation between the two opposing ideologies. This study might shed light on how visual media can be geared towards political justifications, and bring audience to the level of conscious awareness of that effect 展开更多
关键词 ideological work discourse analysis culture war
下载PDF
Groundwater protection from cadmium contamination by permeable reactive barrier in Qian'an of Jilin,China 被引量:2
18
作者 Alkali Mohammed 《Global Geology》 2008年第4期197-202,共6页
This research studies the reliability of an activated carbon permeable reactive barrier in removing cadmium from a contaminated shallow aquifer.Laboratory tests have been performed to characterize the equilibrium and ... This research studies the reliability of an activated carbon permeable reactive barrier in removing cadmium from a contaminated shallow aquifer.Laboratory tests have been performed to characterize the equilibrium and kinetic adsorption properties of the activated carbon in cadmium-containing aqueous solutions.A 2D numerical model has been used to describe pollutant transport within a groundwater and the pollutant adsorption on the permeable reactive barrier(PRB).In particular,it has been considered the case of a PAB used to protect a lake or downstream from Cd(II)contaminated groundwater.Numerical results show that the PAB can achieve a long-term efficiency by preventing lake or downstream pollution for several months. 展开更多
关键词 Qian'an County CADMIUM ADSORPTION PRB GROUNDWATER numerical simulation
下载PDF
Numerical Simulations of Pile Supported Protective System Subjected to Ship Impact 被引量:1
19
作者 SUN Zhen WANG Junjie 《Transactions of Tianjin University》 EI CAS 2006年第B09期243-247,共5页
The head-on collision process between ship and concrete pile supported protective system is simulated by software LS-DYNA. The influences of pile non-linearity and soil non-linearity on impact force, ship crush depth ... The head-on collision process between ship and concrete pile supported protective system is simulated by software LS-DYNA. The influences of pile non-linearity and soil non-linearity on impact force, ship crush depth and the cap displacement of pile supported protective system are discussed. It's shown that for both severe impact case and non-severe impact case, the non-linearity of pile material influence the impact force history, ship crush depth. The non-linearity of pile material and soil has remarkable influence on the cap displacement especially for severe impact case. These issues should not be ignored in the analysis of pile supported protective system subjected to ship impact. 展开更多
关键词 pile supported protective system numerical simulation ship impact non-linearity soilpile interaction
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
20
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部