期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
试谈“加”字的本义和源流——同袁庆德先生商榷
1
作者 孙中运 《大连教育学院学报》 2004年第3期66-67,共2页
袁庆德在"古今字与古文字本义的考释"一文中对"加"字的解释不准确。"加"字的"力"旁不是"耒",也不是"犁";"加"字不是"驾"和"嘉"的右字。从... 袁庆德在"古今字与古文字本义的考释"一文中对"加"字的解释不准确。"加"字的"力"旁不是"耒",也不是"犁";"加"字不是"驾"和"嘉"的右字。从其源流进行考证,"加"字应是"歌"的初文。 展开更多
关键词 “加”字 本义 源流
下载PDF
Security of Application System 被引量:1
2
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
ATTITUDE MEASUREMENT ON HIGH-SPINNING PROJECTILE USING MAGNETIC SENSORS AND ACCELEROMETERS 被引量:5
3
作者 李玎 卜雄洙 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期106-112,共7页
In allusion to the limitations of the traditional attitude measurement system consisting of a three-axis magnetic sensor and two accelerometers on high-spinning projectile, a new scheme comprised of two magnetic senso... In allusion to the limitations of the traditional attitude measurement system consisting of a three-axis magnetic sensor and two accelerometers on high-spinning projectile, a new scheme comprised of two magnetic sensors and two accelerometers installed in a particular way is given. The configuration of the sensors is described. The calculation method and the mathematical model of the projectile attitude based on the sensor configuration are discussed. The basic calculation method including the Magsonde Window, the proof of the ratios of maximums and minimums and the calculation of the attitude angles are analyzed in theory. Finally, the system is simulated under the given conditions. The simulation result indicates that the estimated attitude angles are in agreement with the true attitude angles. 展开更多
关键词 PROJECTILE MAGNETOMETERS accelerometers attitude solution digital simulation
下载PDF
An Approach to Unsupervised Character Classification Based on Similarity Measure in Fuzzy Model
4
作者 卢达 钱忆平 +1 位作者 谢铭培 浦炜 《Journal of Southeast University(English Edition)》 EI CAS 2002年第4期370-376,共7页
This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first ... This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre... 展开更多
关键词 fuzzy model weighted fuzzy similarity measure unsupervised character classification matching algorithm classification hierarchy
下载PDF
Framework of Digital Machining Process Planning Platform for Cylinder Body Part 被引量:2
5
作者 马玉敏 樊留群 +1 位作者 朱志浩 张浩 《Journal of Donghua University(English Edition)》 EI CAS 2007年第5期627-632,共6页
Digital factory technology is an advanced manufacturing technology served as to establish a bridge between the process of product development and manufacturing.In terms of application for digital factory technology in... Digital factory technology is an advanced manufacturing technology served as to establish a bridge between the process of product development and manufacturing.In terms of application for digital factory technology in machining,especially in machining of a complicated part such as a cylinder body part,a concept of digital process planning and its framework are proposed.Its components including machining domain knowledge model,machining knowledge base,machining resource base and process planning system are studied.A machining knowledge model in tree form and an object-driven knowledge reasoning mechanism are used for machining knowledge base.The process planning system is a user interface that leads a planner to finish the planning process.A case about a cylinder head part is given to demonstrate how the platform works.The framework of digital process planning is the foundation of some intelligent CAPP systems and helps to production line planning. 展开更多
关键词 digital process planning plat form machining knowledge base digital factory cylinder body part
下载PDF
Shock resistance of supercharged boilers through integration with ship structure 被引量:1
6
作者 YAO Xiong-liang FENG Lin-han ZHANG A-man ZHOU Qi-xin 《Journal of Marine Science and Application》 2007年第4期18-26,共9页
The non-linear finite element software ABAQUS was used to simulate the dynamic response of a marine supercharged boiler when subjected to impact loading. Shock resistance was analyzed by the time-domain simulation met... The non-linear finite element software ABAQUS was used to simulate the dynamic response of a marine supercharged boiler when subjected to impact loading. Shock resistance was analyzed by the time-domain simulation method. After exhaustive simulations,the effect of air pressure induced by different working conditions on the shock response of a supercharged boiler was reviewed,leading to conclusions about the variability of structural response with different loading parameters. In order to simulate the real impulsive environments of supercharged boilers,the integration of equipment and ship structure was then primarily used to analyze shock response. These distinctly different equipment shock test methods,run under equivalent work conditions,were compared and the causes of discrepancy were analyzed. The main purpose of this paper is to present references for the anti-shock design of marine supercharged boilers. 展开更多
关键词 supercharged boiler numerical simulation dynamic response shock resistance integrationof equipment and ship structure
下载PDF
Influence of heating rate on reactivity and surface chemistry of chars derived from pyrolysis of two Chinese low rank coals 被引量:6
7
作者 Liang Dingcheng Xie Qiang +2 位作者 Li Guangsheng Cao Junya Zhang Jun 《International Journal of Mining Science and Technology》 EI CSCD 2018年第4期610-616,共7页
A series of char samples were derived from pyrolysis of two typical low-rank coals in China (Shengli lig- nite and Shenmu bituminous coal) at low, medium and fast heating rates, respectively, to the same pyrol- ysis... A series of char samples were derived from pyrolysis of two typical low-rank coals in China (Shengli lig- nite and Shenmu bituminous coal) at low, medium and fast heating rates, respectively, to the same pyrol- ysis temperature 750℃. Then these chars were characterized by means of thermogravimetric analysis and Fourier transform infrared spectrometer with the aim to investigate the influence of heating rate in pyrolysis process on gasification reactivity and surface chemistry of them. Besides, a homogeneous model was used to quantitatively analyze the activation energy of gasification reaction. The results reveal that Shengli lignite and its derived chars behave higher gasification reactivity and have less content of oxygen functional groups than Shenmu coal and chars. Meanwhile, chars derived from Shengli lignite at 50℃/min and Shenmu coal at 200℃/min have the greatest gasification reactivity, respectively. The oxygen functional groups in Shengli lignite are easily thermo-decomposed, and they are less affected by the heating rate, while that in Shenmu coal have a significant change with the variation of heating rate. In addition, there is no good correlation between the change of oxygen functional groups and that of the gasification reactivity of the derived chars from pyrolysis at different heating rates. 展开更多
关键词 PYROLYSIS Low rank coal Heating rateReactivity Kinetic parameter Surface chemistry
下载PDF
Spallation Mechanism of RC Slabs Under Contact Detonation 被引量:5
8
作者 袁林 龚顺风 金伟良 《Transactions of Tianjin University》 EI CAS 2008年第6期464-469,共6页
The spallation of the concrete slabs or walls resulting from contact detonation constitutes risk to the personnel and equipment inside the structures because of the high speed concrete fragments even though the overal... The spallation of the concrete slabs or walls resulting from contact detonation constitutes risk to the personnel and equipment inside the structures because of the high speed concrete fragments even though the overall structures or structural members are not destroyed completely. Correctly predicting the damage caused by any potential contact detonation can lead to better fortification design to withstand the blast Ioadings. It is therefore of great significance to study the mechanism involved in the spallation of concrete slabs and walls. Existing studies on this topic often employ simplified material models and 1D wave analysis, which cannot reproduce the realistic response in the spallation process. Numerical simulations are therefore carried out under different contact blast Ioadings in the free air using LS-DYNA. Sophisticated concrete and reinforcing bar material models are adopted, taking into account the strain rate effect on both tension and compression. The erosion technique is used to model the fracture and failure of materials under tensile stress. Full processes of the deformation and dynamic damage of reinforced concrete (RC) slabs and plain concrete slabs are thus observed realistically. It is noted that with the increase of quantity of explosive, the dimensions of damage crater increase and the slabs experience four different damage patterns, namely explosive crater, spalling, perforation, and punching. Comparison between the simulation results of plain concrete slabs and those of RC slabs show that reinforcing bars can enhance the integrity and shearing resistance of the slabs to a certain extent, and meanwhile attenuate the ejection velocity and decrease the size of the concrete fragments. Therefore, optimizing reinforcement arrangement can improve the anti-spallation capability of the slabs and walls to a certain extent. 展开更多
关键词 SPALLATION contact detonation reinforced concrete slab numerical simulation
下载PDF
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
9
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
10
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
Music Protection Based on Digital Watermarking and Encryption
11
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
Highly efficient class-F power amplifier with digital predistortion for WCDMA applications 被引量:1
12
作者 季连庆 徐志明 +1 位作者 周健义 翟建锋 《Journal of Southeast University(English Edition)》 EI CAS 2013年第2期125-128,共4页
A digital predistorted class-F power amplifier (PA) using Cree GaN HEMT CGH40010 operating at 2. 12 GHz is presented to obtain high efficiency and excellent linearity for wideband code-division multiple access ( WC... A digital predistorted class-F power amplifier (PA) using Cree GaN HEMT CGH40010 operating at 2. 12 GHz is presented to obtain high efficiency and excellent linearity for wideband code-division multiple access ( WCDMA ) applications. Measurement results with the continuous wave (CW) signals indicate that the designed class-F PA achieves a peak power-added efficiency (PAE) of 75. 2% with an output power of 39.4 dBm. The adjacent channel power ratio (ACPR) of the designed PA after digital predistortion (DPD) decreases from -28. 3 and -27. 5 dBc to -51.9 and -54. 0 dBc, respectively, for a 4-carrier 20 MHz WCDMA signal with 7. 1 dB peak to average power ratio (PAPR). The drain efficiency (DE) of the PA is 37. 8% at an average output power of 33. 3 dBm. The designed power amplifier can be aoolied in the WCDMA system. 展开更多
关键词 digital predistortion peak power-addedefficiency drain efficiency adjacent channel power ratio EFFICIENCY LINEARITY class-F power amplifier
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
13
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Research on new software compensation method of static and quasi-static errors for precision motion controller
14
作者 REN Kun FU Jian-zhong CHEN Zi-chen 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1938-1943,共6页
To reduce mechanical vibrations induced by big errors compensation, a new software compensation method based on an improved digital differential analyzer (DDA) interpolator for static and quasi-static errors of machin... To reduce mechanical vibrations induced by big errors compensation, a new software compensation method based on an improved digital differential analyzer (DDA) interpolator for static and quasi-static errors of machine tools is proposed. Based on principle of traditional DDA interpolator, a DDA interpolator is divided into command generator and command analyzer. There are three types of errors, considering the difference of positions between compensation points and interpolation segments. According to the classification, errors are distributed evenly in data processing and compensated to certain interpolation segments in machining. On-line implementation results show that the proposed approach greatly improves positioning accuracy of computer numerical control (CNC) machine tools. 展开更多
关键词 Static and quasi-static errors Positioning and machining accuracy Digital differential analyzer (DDA) interoolator
下载PDF
Mechanical properties and failure behavior of rock with different flaw inclinations under coupled static and dynamic loads 被引量:23
15
作者 XIAO Peng LI Di-yuan +3 位作者 ZHAO Guo-yan ZHU Quan-qi LIU Huan-xin ZHANG Chun-shun 《Journal of Central South University》 SCIE EI CAS CSCD 2020年第10期2945-2958,共14页
The deep fissured rock mass is affected by coupled effects of initial ground stress and external dynamic disturbance.In order to study the effect of internal flaw on pre-stressed rock mechanical responses and failure ... The deep fissured rock mass is affected by coupled effects of initial ground stress and external dynamic disturbance.In order to study the effect of internal flaw on pre-stressed rock mechanical responses and failure behavior under impact loading,intact granite specimens and specimens with different flaw inclinations are tested by a modified split Hopkinson pressure bar(SHPB)and digital image correlation(DIC)method.The results show that peak strain and dynamic strength of intact specimens and specimens with different flaw angles(α)decrease with the increase of axial static pressure.The 90°flaw has weak reduction effect on peak strain,dynamic strength and combined strength,while 45°and 0°flaws have remarkable reduction effect.Specimens with 90°flaw are suffered combined shear and tensile failure under middle and low axial static pre-stresses,and suffered shear failure under high axial static pre-stresses.Specimens with 45°and 0°flaws are suffered oblique shear failure caused by pre-existing flaw under different axial static pre-stresses.Besides,based on digital image correlation method,it is found that micro-cracks before formation of macro fractures(include shear and tensile fractures)belong to tensile cracks.Tensile and shear strain localizations at pre-existing flaw tip for specimen with 45°and 0°flaws are produced much earlier than that at other positions. 展开更多
关键词 split Hopkinson pressure bar(SHPB)system digital image correlation(DIC) coupled static and dynamic loads FLAW crack propagation
下载PDF
Cryptography with Elliptic Curve Using Tifinagh Characters
16
作者 Fatima Amounas El Hassan El Kinani 《Journal of Mathematics and System Science》 2012年第2期139-144,共6页
The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well ... The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12. 展开更多
关键词 CRYPTOGRAPHY elliptic curve elliptic curve cryptography UNICODE Tifinagh characters ENCRYPTION DECRYPTION implementation.
下载PDF
Model heat source using actual distribution of laser power density for simulation of laser processing 被引量:2
17
作者 WANG Gen-wang DING Ye +2 位作者 GUAN Yan-chao WANG Yang YANG Li-jun 《Journal of Central South University》 SCIE EI CAS CSCD 2022年第10期3277-3293,共17页
The model of heat source(MHS) which reflects the thermal interaction between materials and laser during processing determines the accuracy of simulation results. To acquire desirable simulations results, although vari... The model of heat source(MHS) which reflects the thermal interaction between materials and laser during processing determines the accuracy of simulation results. To acquire desirable simulations results, although various modifications of heat sources in the aspect of absorption process of laser by materials have been purposed, the distribution of laser power density(DLPD) in MHS is still modeled theoretically. However, in the actual situations of laser processing, the DLPD is definitely different from the ideal models. So, it is indispensable to build MHS using actual DLPD to improve the accuracy of simulation results. Besides, an automatic modeling method will be benefit to simplify the tedious pre-processing of simulations. This paper presents a modeling method and corresponding algorithm to model heat source using measured DLPD. This algorithm automatically processes original data to get modeling parameters and provides a step MHS combining with absorption models. Simulations and experiments of heat transfer in steel plates irradiated by laser prove the mothed and the step MHS. Moreover, the investigations of laser induced thermal-crack propagation in glass highlight the signification of modeling heat source based on actual DLPD and demonstrate the enormous application of this method in the simulation of laser processing. 展开更多
关键词 heat source laser processing distribution of power density digital images processing heat transfer
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
18
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
Research on General Permutation Encryption Module Based on Chaos Theory
19
作者 Sun Wenjie 《International Journal of Technology Management》 2014年第7期58-61,共4页
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp... Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system. 展开更多
关键词 chaos theory general substitution encryption.
下载PDF
Apocalypse and Body Transgression: On Picasso’s Crucifixion (1930)
20
作者 Zarko Paic 《Cultural and Religious Studies》 2018年第4期248-266,共19页
The article deals with the question of the possibility of a new interpretation of Picasso’s picture entitled Crucifixion, which was created in the context of the art paradigm shift in the 1930s when the master focuse... The article deals with the question of the possibility of a new interpretation of Picasso’s picture entitled Crucifixion, which was created in the context of the art paradigm shift in the 1930s when the master focused his attention to the return to painting as a reference framework of myth and religion. But this return was only a turning point towards a modern understanding of the world and art from other sources. It should be noted that the problem of pictorial turn nowadays has a strong impact on the postmodern theology, which encompasses various cultural traditions, and also quite opposite philosophical attitudes. The article shows, thus, the inner relationship and connection between painting art and the search for transgression in the language that was the idea of Bataille. In the first part of this article, author tries to show the consequences of Bataille’s thinking of transgression; the second part has attempted to articulate the problems of interpretation of Picasso’s canvas Crucifixion; and concluding remarks is an attempt to review the emphasis on relationship with pictorial turn and transformations in the notion of contemporary art concerning the body as a sovereign event of the freedom and sacrifice. 展开更多
关键词 APOCALYPSE body transgression PICASSO BATAILLE crucifixion pictorial turn
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部