期刊文献+
共找到76篇文章
< 1 2 4 >
每页显示 20 50 100
基于“法商融合”的法学本科人才培养路径新探索 被引量:1
1
作者 汪骏良 《教育信息化论坛》 2023年第21期75-77,共3页
“法商融合”是对法学本科人才培养路径的一种新探索,它回应了新文科,特别是新法科建设的要求,反映了法科与商科的学科特点与联系,满足了社会对复合型与应用型法科人才的要求。但是,在既往的“法商融合”人才培养实践中存在明显的“两... “法商融合”是对法学本科人才培养路径的一种新探索,它回应了新文科,特别是新法科建设的要求,反映了法科与商科的学科特点与联系,满足了社会对复合型与应用型法科人才的要求。但是,在既往的“法商融合”人才培养实践中存在明显的“两张皮”现象,具体表现为:课程设置的简单增减难以谓之“融合”,师资力量的分散教学难以实现“融合”,培养效果难以体现“融合”。因此,要从课程设置、师资团队以及效果评价三个方面探索基于“法商融合”的法科人才培养新路径,以实现真正的“法商融合”。 展开更多
关键词 “法商融合” 新文科 人才培养
下载PDF
SPC模式下高职院校大学生“法商”提升路径探析
2
作者 马洪全 严海霞 《学园》 2017年第14期179-179,共1页
互联网、新媒体的高速发展给大学生法制安全教育工作带来了新的机遇和挑战,部分学生'法商'意识不够,在这样的环境下如何提高大学生的'法商'意识是每一个高校教育者需要思考的问题。
关键词 大学生 法制安全教育 “法商”
原文传递
财经类院校“法商融合”人才培养的探索与实践
3
作者 董妍姝 时瑞 《中文科技期刊数据库(全文版)社会科学》 2022年第6期133-135,共3页
在现如今财经类院校发展中,要将“法商融合”人才培养作为重点与关键,实现学生未来更好发展的同时,实现社会进步。通过“法商融合”人才培养的落实,可以扩展毕业生就业渠道,推动相关企业朝着更好方向发展。基于此,在具体“法商融合”人... 在现如今财经类院校发展中,要将“法商融合”人才培养作为重点与关键,实现学生未来更好发展的同时,实现社会进步。通过“法商融合”人才培养的落实,可以扩展毕业生就业渠道,推动相关企业朝着更好方向发展。基于此,在具体“法商融合”人才培养中,要明确人才培养定位、创建完善人才培养方案,为人才培养提供正确引导,帮助人才掌握更多专业知识、提高其综合素质与思想道德素质,满足社会市场对人才的需求。 展开更多
关键词 财经类院校 “法商融合” 人才培养
下载PDF
ADAPTIVE GENETIC ALGORITHM BASED ON SIX FUZZY LOGIC CONTROLLERS 被引量:3
4
作者 朱力立 张焕春 经亚枝 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期230-235,共6页
The performance of genetic algorithm(GA) is determined by the capability of search and optimization for satisfactory solutions. The new adaptive genetic algorithm(AGA) is built for inducing suitable search and optimiz... The performance of genetic algorithm(GA) is determined by the capability of search and optimization for satisfactory solutions. The new adaptive genetic algorithm(AGA) is built for inducing suitable search and optimization relationship. The use of six fuzzy logic controllers(6FLCs) is proposed for dynamic control genetic operating parameters of a symbolic-coded GA. This paper uses AGA based on 6FLCs to deal with the travelling salesman problem (TSP). Experimental results show that AGA based on 6FLCs is more efficient than a standard GA in solving combinatorial optimization problems similar to TSP. 展开更多
关键词 adaptive genetic algorithm fuzzy controller dynamic parameters control TSP
下载PDF
C-means-based ant colony algorithm for TSP
5
作者 吴隽 李文锋 陈定方 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期156-160,共5页
To solve the traveling salesman problem with the characteristics of clustering,a novel hybrid algorithm,the ant colony algorithm combined with the C-means algorithm,is presented.In order to improve the speed of conver... To solve the traveling salesman problem with the characteristics of clustering,a novel hybrid algorithm,the ant colony algorithm combined with the C-means algorithm,is presented.In order to improve the speed of convergence,the traveling salesman problem(TSP)data is specially clustered by the C-means algorithm,then,the result is processed by the ant colony algorithm to solve the problem.The proposed algorithm treats the C-means algorithm as a new search operator and adopts a kind of local searching strategy—2-opt,so as to improve the searching performance.Given the cluster number,the algorithm can obtain the preferable solving result.Compared with the three other algorithms—the ant colony algorithm,the genetic algorithm and the simulated annealing algorithm,the proposed algorithm can make the results converge to the global optimum faster and it has higher accuracy.The algorithm can also be extended to solve other correlative clustering combination optimization problems.Experimental results indicate the validity of the proposed algorithm. 展开更多
关键词 traveling salesman problem ant colony optimization C-MEANS characteristics of clustering
下载PDF
Blind receiver for OFDM systems via sequential Monte Carlo in factor graphs 被引量:1
6
作者 CHEN Rong ZHANG Hai-bin +1 位作者 XU You-yun LIU Xin-zhao 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期1-9,共9页
Estimation and detection algorithms for orthogonal frequency division multiplexing (OFDM) systems can be de-veloped based on the sum-product algorithms, which operate by message passing in factor graphs. In this paper... Estimation and detection algorithms for orthogonal frequency division multiplexing (OFDM) systems can be de-veloped based on the sum-product algorithms, which operate by message passing in factor graphs. In this paper, we apply the sampling method (Monte Carlo) to factor graphs, and then the integrals in the sum-product algorithm can be approximated by sums, which results in complexity reduction. The blind receiver for OFDM systems can be derived via Sequential Monte Carlo (SMC) in factor graphs, the previous SMC blind receiver can be regarded as the special case of the sum-product algorithms using sampling methods. The previous SMC blind receiver for OFDM systems needs generating samples of the channel vector assuming the channel has an a priori Gaussian distribution. In the newly-built blind receiver, we generate samples of the virtual-pilots instead of the channel vector, with channel vector which can be easily computed based on virtual-pilots. As the size of the vir-tual-pilots space is much smaller than the channel vector space, only small number of samples are necessary, with the blind de-tection being much simpler. Furthermore, only one pilot tone is needed to resolve phase ambiguity and differential encoding is not used anymore. Finally, the results of computer simulations demonstrate that the proposal can perform well while providing sig-nificant complexity reduction. 展开更多
关键词 Orthogonal frequency division multiplexing (OFDM) Factor graphs Sequential Monte Carlo (SMC) Blind receiver Virtual-pilot
下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
7
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
The rough representation and measurement of quotient structure in algebraic quotient space model 被引量:5
8
作者 陈林书 Wang Jiayang 《High Technology Letters》 EI CAS 2017年第3期293-297,共5页
Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an... Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an equivalence relation. In this paper,definitions were given and formulas of the lower quotient congruence and upper quotient congruence were calculated to roughly represent the quotient structure. Then the accuracy and roughness were defined to measure the quotient structure in quantification. Finally,a numerical example was given to demonstrate that the rough representation and measuring methods are efficient and applicable. The work has greatly enriched the algebraic quotient space model and granular computing theory. 展开更多
关键词 granular computing algebraic quotient space model quotient structure upper(lower) congruence relation
下载PDF
Frontier Analysis of Nepalese Commercial Banks: DEA Approach 被引量:1
9
作者 Sunity Shrestha Hada Govinda Tamang 《Journal of Mathematics and System Science》 2014年第10期675-682,共8页
The efficiency of any organizations at manufacturing sector or service sector, profit making or non-profit making, is most important factor for survival and growth of the organization. The Data Envelopment Analysis (... The efficiency of any organizations at manufacturing sector or service sector, profit making or non-profit making, is most important factor for survival and growth of the organization. The Data Envelopment Analysis (DEA) technique is one of the most popular and effective tool to measure relative efficiency hence is appropriate to make comparison among similar organizations with multiple output and input. This study performs frontier analysis and measures the relative efficiency of Nepalese commercial banks using DEA approach with two output and two input variables. 展开更多
关键词 Data envelopment analysis frontier analysis commercial banks relative efficiency
下载PDF
ESP course design: An intensive, non-assessed, in-service oral business English course for intermediate business people
10
作者 CHI Gui-min 《Sino-US English Teaching》 2008年第8期13-17,共5页
With the great impact of WTO and the business globalization, professional internationalized business people are heavily demanding, which imposes pressure and necessity on practical and effective Business English progr... With the great impact of WTO and the business globalization, professional internationalized business people are heavily demanding, which imposes pressure and necessity on practical and effective Business English program. This essay intends to design an intensive, non-assessed, inservice oral business English course for intermediate business people. 展开更多
关键词 ESP(English for Specific Purposes) business English course design need analysis SYLLABUS
下载PDF
How to Deal with Revolutions in Train Control Systems
11
作者 Hideo Nakamura 《Engineering》 SCIE EI 2016年第3期380-386,共7页
Train control systems ensure the safety of railways. This paper begins with a summary of the typical train control systems in Japan and Europe. Based on this summary, the author then raises the following question rega... Train control systems ensure the safety of railways. This paper begins with a summary of the typical train control systems in Japan and Europe. Based on this summary, the author then raises the following question regarding current train control systems: What approach should be adopted in order to enhance the functionality, safety, and reliability of train control systems and assist in commercial operations on railways? Next, the author provides a desirable architecture that is likely to assist with the development of new train control systems based on current information and communication technologies. A new unified train control system (UTCS) is proposed that is effective in enhancing the robustness and com- petitiveness of a train control system. The ultimate architecture of the UTCS will be only composed of essential elements such as point machines and level crossing control devices in the field. Finally, a pro- cessing method of the UTCS is discussed. 展开更多
关键词 Train control system Railway signaling Communication-based train control system Automatic train protection and block system
下载PDF
Iterative Multiuser Receiver Based on Factor Graph for Asynchronous Coded CDMA Systems
12
作者 张爱萍 Luo +2 位作者 Hanwen Wang Haoxing 《High Technology Letters》 EI CAS 2003年第1期41-46,共6页
Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor... Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor graph for asynchronous coded CDMA system is proposed. In this paper, the a posteriori probability of users information bits conditioned on the noise-whitening filters output is represented by factor graphs, after numbers of iterations with the sum-product algorithm the information bits are estimated. The authors also propose a reduced complexity algorithm. Simulation results show that with this proposed receiver, near-single-user performance can be achieved, and small performance degradation for the reduced complexity algorithm with significant complexity reduction. 展开更多
关键词 multiuser detection iterative algorithm multiuser decoding
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
13
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Methodology of Fashion Merchandising by Modularization Operation Management
14
作者 李俊 吴海燕 张渭源 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期56-58,共3页
Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the ac... Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy. 展开更多
关键词 modularization operation management MERCHANDISING ideal model
下载PDF
DEA-based Empirical Research on the Performance Analysis of China's Commercial Bank Information Security System Application
15
作者 Xinghua LU 《International Journal of Technology Management》 2013年第6期35-38,共4页
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super... In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded. 展开更多
关键词 DEA Operating Performance Empirical Research
下载PDF
Legal Framework of Shari'ah Corporations in Malaysia: Special Reference to Waqf Corporation
16
作者 Zuhairah ArifAbd Ghadas Hartinie binti Abd Aziz 《Journal of Modern Accounting and Auditing》 2017年第3期121-127,共7页
In Malaysia, the Islamic commercial institutions were established under respective legislations which contain express term on their status as a body corporate. Examples of these institutions are Islamic banks, zakah i... In Malaysia, the Islamic commercial institutions were established under respective legislations which contain express term on their status as a body corporate. Examples of these institutions are Islamic banks, zakah institutions, Pilgrimage Board and Islamic insurance (takaful) companies. In 1998, Johor Corporation (JCorp) initiated a corporate waqf entity known as Waqaf An-Nur Corporation Berhad (WANCorp). In 2011, Majlis Agama Islam Wilayah Persekutuan (MAIWP) collaborated with Tabung Haji to develop a Class AWaqf building leased to Bank Islam Malaysia Berhad (BIMB). The developments in waqf involving corporate entities are worth to be analyzed in order to create a new framework of waqf practice. This paper deliberated the attributes of corporations under the Malaysian law and compares them with the principles of Islamic law (Shari'ah). For the purpose of discussion, this paper refers to WANCorp and Awqaf Holdings as examples ofwaqf corporations in Malaysia. 展开更多
关键词 body corporate waqf corporation COMPANY
下载PDF
On the E-Valuation of Certain E-Business Strategies on Firm Performance by Adaptive Algorithmic Modeling: An Alternative Strategic Managerial Approach
17
作者 Alexandra Lipitakis Evangelia A.E.C. Lipitakis 《Computer Technology and Application》 2012年第1期38-46,共9页
This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on ba... This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on basic ideas and concepts of four key-field interrelated sciences, i.e., computing science, applied mathematics, management sciences and economic sciences. Furthermore, the fundamental scientific concepts of adaptability and uncertainty are shown to play a critical role of major importance for a (near) optimum solution of a class of complex e-business/services and strategic management problems. Two characteristic case studies, namely measuring e-business performance under certain environmental pressures and organizational constraints and describing the relationships between technology, innovation and firm performance, are considered as effective applications of the proposed adaptive algorithmic modeling approach. A theoretical time-dependent model for the evaluation of firm e-business performances is also proposed. 展开更多
关键词 Adaptive algorithms algorithmic modeling e-business problems e-service strategy management methodologies hybrid algorithmic modeling strategy management (SM) methodologies time-dependent performance evaluation model.
下载PDF
Ranking Potential Reply-Providers in Community Question Answering System 被引量:4
18
作者 韩闻文 阙喜戎 +2 位作者 宋思奇 田野 王文东 《China Communications》 SCIE CSCD 2013年第10期125-136,共12页
Community Question Answering (CQA) websites have greatly facilitated users' lives, with an increasing number of people seeking help and exchanging ideas on the Internet. This newlymerged community features two char... Community Question Answering (CQA) websites have greatly facilitated users' lives, with an increasing number of people seeking help and exchanging ideas on the Internet. This newlymerged community features two characteristics: social relations and an ask-reply mechanism. As users' behaviours and social statuses play a more important role in CQA services than traditional answer retrieving websites, researchers' concerns have shifted from the need to passively find existing answers to actively seeking potential reply providers that may give answers in the near future. We analyse datasets derived from an online CQA system named "Quora", and observed that compared with traditional question answering services, users tend to contribute replies rather than questions for help in the CQA system. Inspired by the findings, we seek ways to evaluate the users' ability to offer prompt and reliable help, taking into account activity, authority and social reputation char- acteristics. We propose a hybrid method that is based on a Question-User network and social network using optimised PageRank algorithm. Experimental results show the efficiency of the proposed method for ranking potential answer-providers. 展开更多
关键词 CQA user behaviour analysis question-user network social network PAGERANK activity estimation authority estimation
下载PDF
Priority of Factors Affected on Customer's Satisfaction in the E-Banking by Using Kano Model and Analytical Hierarchy Process: A Case of Iranian Commercial Bank 被引量:3
19
作者 Younos Vakil Alroaia Mohammad Hemati Kambiz Abdi 《Journal of Modern Accounting and Auditing》 2011年第10期1097-1105,共9页
The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important se... The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important sectors that plays key role for grasping developed condition is banking sector. Banks like other institutions also look for augmenting their profits and increasing their strength by expansion. The designing of bank must involve selection of those that have sufficient success potential. Hence, from several factors of success, the following three criteria factors have been: selected-customer satisfied, one dimensional, and product fully functional. These factors offers three question multi criteria group extracted from a 16 norms. Also, three criteria factors have been studied over a period of five years and important criteria for evaluating the norms. The Analytical Hierarchy Process (AHP) has been employed to calculate the success potential of each norm. The empirical data comprises the longitudinal survey of the agricultural banking of the Semnan province. The paper, also, finds that product fully functional is placed as the first priority. 展开更多
关键词 customer's satisfaction E-BANKING AHP Iran
下载PDF
Determination of Energy Interchanged on the Tie Lines- Some Practical Issues 被引量:1
20
作者 Zeljko Modric Zoran Kovac Kresimir Fekete 《Journal of Energy and Power Engineering》 2014年第5期948-956,共9页
The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators... The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators). Existing law regulation is not enough precise regarding definition of methods for metering energy transits (energy interchanged between neighboring TSOs). This paper analyses disadvantages of method for line losses metering with electric meters and suggests introduction of the measured value corrections. 展开更多
关键词 Billing point metering set metering point metering error energy transit.
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部