期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
“骗子”之我见——与顾英老师商榷
1
作者 张广峰 《语文学习》 2006年第3期63-63,共1页
《语文学习》2005年第3期顾英老师的《浅谈语文课堂提问艺术》一文给人以耳目一新的感觉,让人很受启发。在受到启发的同时,我也有些不同意的地方。该文中有这样一段:“我在讲授《皇帝的新装》时,提问‘如何评价课文中的两个骗子?... 《语文学习》2005年第3期顾英老师的《浅谈语文课堂提问艺术》一文给人以耳目一新的感觉,让人很受启发。在受到启发的同时,我也有些不同意的地方。该文中有这样一段:“我在讲授《皇帝的新装》时,提问‘如何评价课文中的两个骗子?’学生一时难以回答。我就将这一问题分解为:‘骗子针对皇帝的贪图安逸,不理朝政,设下骗局,其出发点是什么’?” 展开更多
关键词 《皇帝的新装》 课堂提问 中学 语文 顾英 “骗子” 人物评价
原文传递
我在淘宝遇到了骗子
2
作者 川川 《中国质量万里行》 2011年第6期73-73,共1页
现如今,网上购物已逐渐成为一种时尚。在网购快捷、实惠、方便等优势的感召下,我经过四年的努力,成为了淘宝一名货真价实的蓝钻买家。然而几天前的一次购物经历,却差点让我这个网购老手掉进圈套。
关键词 网上购物 网购 电子商务 淘宝网 “骗子”
下载PDF
为一元钱,成了“骗子”
3
作者 林颐 《社区》 2008年第33期58-58,共1页
糟糕!站在街边,我终于回过神来。我把包落在车上了,这可咋办? 我家在郊区,工作在城区,每天乘坐公司班车上下班。刚才在车上我迷迷糊糊地睡着了,下车就忘记了拿包,现在我口袋里一分钱也没有,手机也在包里。倒不担心丢东西,问... 糟糕!站在街边,我终于回过神来。我把包落在车上了,这可咋办? 我家在郊区,工作在城区,每天乘坐公司班车上下班。刚才在车上我迷迷糊糊地睡着了,下车就忘记了拿包,现在我口袋里一分钱也没有,手机也在包里。倒不担心丢东西,问题是,这个下车点离我家还有好几里,我得转乘公交车呀! 展开更多
关键词 《为一元钱 成了“骗子” 中国 当代文学 杂文
原文传递
Revised quantum direct communication scheme with mutual authentication 被引量:2
4
作者 刘文杰 陈汉武 +1 位作者 许娟 刘志昊 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期532-536,共5页
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati... Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states. 展开更多
关键词 quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent's attack
下载PDF
Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size 被引量:1
5
作者 唐少杰 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期443-446,共4页
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca... Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment. 展开更多
关键词 quantum key distribution finite data-set size statistical fluctuation
下载PDF
北京海淀消协提醒:购买红豆杉种子提防骗子公司
6
《农产品市场》 2005年第27期26-26,共1页
日前,北京海淀区消协发布消费警示提醒市民,邮购红豆杉种予需谨慎。
关键词 红豆杉种子 北京 消费者协会 中国 “骗子公司”
原文传递
Evolution of deceit by worthless donations in a nuptial gift-giving spider 被引量:1
7
作者 Paolo Giovanni GHISLANDI Mafia J. ALBO +1 位作者 Cristina TUNI Trine BILDE 《Current Zoology》 SCIE CAS CSCD 2014年第1期43-51,共9页
Males of the nursery web spider Pisaura mirabil usually offer an insect prey wrapped in white silk as a nuptial gift to facilitate copulation. Males exploit female foraging preferences in a sexual context as females f... Males of the nursery web spider Pisaura mirabil usually offer an insect prey wrapped in white silk as a nuptial gift to facilitate copulation. Males exploit female foraging preferences in a sexual context as females feed on the gift during copula- tion. It is possible for males to copulate without a gift, however strong female preference for the gift leads to dramatically higher mating success for gift-giving males. Females are polyandrous, and gift-giving males achieve higher mating success, longer copulations, and increased sperm transfer that confer advantages in sperm competition. Intriguingly, field studies show that ap- proximately one third of males carry a worthless gift consisting of dry and empty insect exoskeletons or plant fragments wrapped in white silk. Silk wrapping disguises gift content and females are able to disclose gift content only after accepting and feeding on the gift, meanwhile males succeed in transferring sperm. The evolution of deceit by worthless gift donation may be favoured by strong intra-sexual competition and costs of gift-construction including prey capture, lost foraging opportunities and investment in silk wrapping. Females that receive empty worthless gifts terminate copulation sooner, which reduces sperm transfer and likely disadvantages males in sperm competition. The gift-giving trait may thus become a target of sexually antagonistic co-evolution, where deceit by worthless gifts leads to female resistance to the trait. We discuss factors such as female mating rate and intensity of sperm competition that may shape the evolution of male deception, and how ecological factors may influence the evolution and maintenance of worthless gifts as an evolutionarily stable alternative mating strategy by frequency dependent selection 展开更多
关键词 Sexual selection Sexual conflict Nuptial gift Worthless gift POLYANDRY Polymorphic trait Sperm competition
原文传递
Practical decoy-state quantum key distribution method considering dark count rate fluctuation 被引量:1
8
作者 周媛媛 江华 王瑛剑 《Optoelectronics Letters》 EI 2012年第5期384-388,共5页
Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSP... Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation. 展开更多
关键词 Magnetic materials Optoelectronic devices
原文传递
SARG04 decoy-state quantum key distribution based on an unstable source 被引量:2
9
作者 周媛媛 周学军 《Optoelectronics Letters》 EI 2011年第5期389-393,共5页
A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis ... A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key. 展开更多
关键词 Network security Quantum chemistry Quantum theory
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部