期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
培养“信息活用能力”──21世纪日本教育改革与发展的重要课题 被引量:1
1
作者 王文利 杨跃辉 《日本问题研究》 2000年第2期38-41,共4页
关键词 21世纪 日本 教育改革 教育 发展 信息活用能力
下载PDF
韩国《个人信息保护法》的最新修正及其对我国之启示 被引量:3
2
作者 杨智博 《华南理工大学学报(社会科学版)》 2022年第1期89-98,共10页
基于提升对核心资源数据的利用活性化,发展新产业等目的,韩国立法机关在2020年对《个人信息保护法》进行了幅度最大且最具有现实意义的一次修正。此次新增“假名信息”的概念并明确其具体的含义,否认需要耗费极多时间和费用、运用超前... 基于提升对核心资源数据的利用活性化,发展新产业等目的,韩国立法机关在2020年对《个人信息保护法》进行了幅度最大且最具有现实意义的一次修正。此次新增“假名信息”的概念并明确其具体的含义,否认需要耗费极多时间和费用、运用超前技术才能被识别的信息属于个人信息。与此同时,还扩大了“知情同意原则”的例外情形,认为只要与收集信息的目的合理关联,在满足一定条件的前提下可以不经信息主体的同意利用或者向第三者提供个人信息。若是出于统计、科学研究、公益记录保存等目的,亦可无须信息主体的同意对个人信息进行假名处理。这些修正内容为今后《中华人民共和国个人信息保护法》的进一步完善提供了诸多有价值的启发,可以积极地予以借鉴。具体而言,应当在《中华人民共和国个人信息保护法》中肯定匿名化信息的相对性,确立目的相关联原则以及合理框定不适用“知情同意原则”的情形。 展开更多
关键词 韩国 个人信息保护法 信息活用 假名信息 知情同意原则
下载PDF
信息素养与信息技术教育 被引量:3
3
作者 徐振忠 《福建教育学院学报》 2003年第3期74-75,共2页
在<中小学信息技术课程指导纲要(试行)>里,把"培养学生良好的信息素养,把信息技术作为支持学生终身学习和合作学习的手段,为适应信息化的学习、工作和生活打下必要的基础",写上这一段话,充分说明了培养学生信息素养的... 在<中小学信息技术课程指导纲要(试行)>里,把"培养学生良好的信息素养,把信息技术作为支持学生终身学习和合作学习的手段,为适应信息化的学习、工作和生活打下必要的基础",写上这一段话,充分说明了培养学生信息素养的重要性.作为一线的信息技术教师,我们必须正确理解"信息素养"的科学含义并在教育教学中紧紧抓住培养学生良好信息素养这一中心任务来制定教学策略. 展开更多
关键词 信息素养 培养学生 教学策略 信息技术教育 信息活用能力
下载PDF
Quantitative Seismicity Analysis for the Risk of Historical Large Earthquake Rupture Zone:Application to the Mid-North Segment of the North-South Seismic Belt
4
作者 Long Feng Jiang Changsheng +1 位作者 Feng Jiangang Tang Lanlan 《Earthquake Research in China》 2013年第3期331-343,共13页
Although seismic gap theory plays an important role in the med-and long-term earthquake prediction,the potential risk of the non-seismic gap in historical earthquake rupture areas will need to be simultaneously taken ... Although seismic gap theory plays an important role in the med-and long-term earthquake prediction,the potential risk of the non-seismic gap in historical earthquake rupture areas will need to be simultaneously taken into account in the study of med-and long-term earthquake prediction,due to the temporally clustering or non-linear behavior of large earthquake recurrence.In order to explore technical methods which can be based on observational data,and identify historical earthquake rupture zones( including the seismic gap in historical and prehistoric earthquake rupture zones),we select eight historical large earthquake rupture zones with different elapsed times on the mid-north segment of the North-South Seismic Belt to make quantitative analysis on the characteristics of modern seismicity of these zones and preliminarily explore the seismicity method for determining the urgency degree of potential earthquake hazards.The results mainly show that the pvalue,which reflects the attenuation of earthquake sequence,and the a-value,which reflects the seismicity rate,are strongly related to the elapsed time of the latest earthquake in the rupture zone.However,the corresponding relationships in some rupture areas are not clear perhaps due to the complex fault structure and faulting behavior.The b-value,which represents the state of tectonic stress accumulation,does not easily reflect the elapsed time information of different evolution stages.The b-value temporal scanning shows a steady evolution over time in most of the rupture zones,but in the rupture zone of the Wudu M8.0 earthquake of 1879,the b-value shows significant fluctuations with a decreasing trend for 20 years.By comparative analysis,we conclude that the rupture zones of the 1933 M7.5 Maoxian earthquake and the 1976 M7.2 Songpan-Pingwu earthquake are still in the decaying period of earthquake sequences,and thus do not have the background for recurrence of M7.0 earthquakes.The low b-value Maqu segment,which is located at the north margin of the rupture zone of the 842A.D.M7.0 Diebu earthquake,is more dangerous than the Diebu segment.The continuous decline of the b-value in the 1879 M8.0 Wudu earthquake rupture zone may also indicate a new round of seismogenic process. 展开更多
关键词 Historical earthquake rupture zone Large earthquake risk SEISMICITY Mid-north segment of North-South Seismic Belt
下载PDF
Application of ICT in Schools
5
《Sociology Study》 2012年第2期150-158,共9页
The rhythm and lifestyle of the twenty-first century are closely connected to information and communication technology (ICT) which is essential for further development of the economy and society. In the world of glo... The rhythm and lifestyle of the twenty-first century are closely connected to information and communication technology (ICT) which is essential for further development of the economy and society. In the world of globalization and rapid changes, the application of ICT in schools has become a significant factor of social development. Classic methods of teaching as well as managing a school interweave with the modern ones. Lifelong learning has become a necessity. The extent of ICT application is demonstrated in this paper. 展开更多
关键词 SCHOOL TEACHERS STUDENTS learning KNOWLEDGE ICT
下载PDF
Secure Mobile Crowdsensing Based on Deep Learning
6
作者 Liang Xiao Donghua Jiang +3 位作者 Dongjin Xu Wei Su Ning An Dongming Wang 《China Communications》 SCIE CSCD 2018年第10期1-11,共11页
To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats ... To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats such as jamming, spoofing and faked sensing attacks during both sensing and information exchange processes in large-scale dynamic and heterogeneous networks. In this article, we investigate secure mobile crowdsensing and present ways to use deep learning(DL) methods, such as stacked autoencoder, deep neural networks, convolutional neural networks, and deep reinforcement learning, to improve approaches to MCS security, including authentication, privacy protection, faked sensing countermeasures, intrusion detection and anti-jamming transmissions in MCS. We discuss the performance gain of these DLbased approaches compared to traditional security schemes and identify the challenges that must be addressed to implement these approaches in practical MCS systems. 展开更多
关键词 mobile crowdsensing SECURITY deep learning reinforcement learning faked sensing
下载PDF
Context-Aware Scheduling Algorithm in Smart Home System
7
作者 郑红 潘理 王靖虓 《China Communications》 SCIE CSCD 2013年第11期155-164,共10页
The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an in... The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience.The key technique used to realise this is context awareness.Contexts in the living space can provide large amounts of information regarding users’behaviours and habits.Together with an information system,it can automatically execute many common operations of applications,instead of users,and can make the applications"smart".However,since contexts in the environment are diverse and sensitive,it is difficult to choose the ones that are most useful to the users’current activity.A proper scheduling strategy should first consider the users’demand.This paper proposes a context-aware scheduling algorithm that is based on correlation,with the purpose of improving the utilization rate of context collections.Experiments show that with the priority based on correlation in low-level contexts,the scheduling of reasoning tasks can reduce the cost of transmission. 展开更多
关键词 pervasive computing smart-home reasoning scheduling correlation
下载PDF
The Application of GNSS to Fault Deformation Studies
8
作者 Bo Wanju Feng Shengtao +4 位作者 Su Jianfeng Zhou Haitao Du Xuesong Wan Wenni Liu Tianhai 《Earthquake Research in China》 2014年第4期510-519,共10页
Great earthquakes often occur along or near active fault belts. Thus,monitoring and research on fault deformation are quite important. Methods such as short-leveling,shortbaseline and integrated monitoring profile acr... Great earthquakes often occur along or near active fault belts. Thus,monitoring and research on fault deformation are quite important. Methods such as short-leveling,shortbaseline and integrated monitoring profile across fault belts have been used to monitor fault activities for many years. GNSS observations are mainly used to obtain the horizontal velocity field in large areas and to study the activities and deformation of major blocks.GNSS technology has been used to monitor and study the deformation of faults from a different aspects. In this paper,some applications and new explorations of GNSS are discussed. They are:( 1) Research and monitoring of strike-slip activities of faults with GNSS.( 2) Research and monitoring of vertical activities of faults with GNSS.( 3)Investigating the laws of deformation of blocks on the sides of fault zone and setting up strain models to deduce the activities and deformation of faults with respective models and compare the deduced results with the actual measurements across fault. It is concluded that a larger discrepancy between the deduced and the observed deformation indicates a stronger interaction between the blocks,which can be important for predicting the location of a strong earthquake and assessing seismic hazard,as well as the seismicity trend. 展开更多
关键词 GNSS Fault deformation BASELINE LEVELING SEISMICITY Crust block
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部