期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
基于不确定因素的食品安全问题频发的伦理分析
1
作者 谢芳 王学锋 《昆明理工大学学报(社会科学版)》 2014年第6期1-6,共6页
不良食品生产行为给社会带来的危害应由食品生产者及相关的政府职能部门负担起相应的伦理及法律责任。政府职能部门责任伦理意识缺失、消费者生命健康意识淡薄及社会道德监督机制缺失,造成了政府监管、公众安全认知、食品生产行业的道... 不良食品生产行为给社会带来的危害应由食品生产者及相关的政府职能部门负担起相应的伦理及法律责任。政府职能部门责任伦理意识缺失、消费者生命健康意识淡薄及社会道德监督机制缺失,造成了政府监管、公众安全认知、食品生产行业的道德与法律风险等方面的不确定性,成为食品安全事故频发的深层根源。只有通过健全食品安全监管制度、建构政府信用问责机制,提高政府监管者的责任伦理素养,培养公众的生命健康意识和食品安全问题防范意识,建立食品供应链道德信用跟踪系统,才能真正解决食品安全问题。 展开更多
关键词 食品安全 不确定性 道德缺失 信用问 道德信用跟踪
下载PDF
企业文化和企业核心竞争力的思考 被引量:6
2
作者 王勇 连永安 《管理观察》 2004年第5期20-22,共3页
关键词 企业文化 企业特性 文化管理模式 组织管理实践 商业道德 信用经济 麦肯锡公司 企业综合实力 信用问
下载PDF
An application-layer based centralized information access control for VPN 被引量:2
3
作者 欧阳凯 周敬利 +1 位作者 夏涛 余胜生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期240-249,共10页
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality... With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper. 展开更多
关键词 Virtual private network Access control TUNNELING Centralized management STREAM
下载PDF
Neighboring AP discovery and information exchange methods in Plug-and-Play WLAN system
4
作者 梁立涛 Wang Lei +4 位作者 Zhang Qixun Feng Zhiyong Yu Yifan Bai Yong Chen Lan 《High Technology Letters》 EI CAS 2008年第3期225-231,共7页
To overcome the problem of existing neighboring access point (AP) discovery methods in WLAN, for example they (PnP) of mul proposed. Us can not provide the accurate neighboring APs information needed for the Plug-... To overcome the problem of existing neighboring access point (AP) discovery methods in WLAN, for example they (PnP) of mul proposed. Us can not provide the accurate neighboring APs information needed for the Plug-and-Play ti-mode APs, three kinds of neighboring AP discovery and information exchange methods are ing these three neighboring AP discovery methods, passive discovery method, active discovery method and station assistant discovery method, the multi-mode AP can discover all neighboring APs and obtain needed information. We further propose two whole process flows, which combine three discovery methods in different manner, to achieve different goals. One process flow is to discover the neighboring AP as fast as possible, called fast discovery process flow. The other is to discover the neighboring AP with minimal interference to neighboring and accuracy of the method is confirmed APs, called the minimal interference process flow. The validity by the simulation. 展开更多
关键词 Plug-and-Play access point auto-configuration neighboring AP discovery WLAN
下载PDF
Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1
5
作者 LI Hongning PEI Qingqi MA Lichuan 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha... For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. 展开更多
关键词 HANDOFF tracking user attack attack tree
下载PDF
Hash-area-based data dissemination protocol in wireless sensor networks 被引量:1
6
作者 王田 王国军 +1 位作者 过敏意 贾维嘉 《Journal of Central South University of Technology》 EI 2008年第3期392-398,共7页
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se... HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks. 展开更多
关键词 wireless sensor networks Hash function data dissemination query processing mobile sinks
下载PDF
Bar in SILL Questionnaire for Multiple Results Processing: Users' Frequency and Confidence 被引量:1
7
作者 Penelope Kambakis-Vougiouklis 《Sino-US English Teaching》 2013年第3期184-199,共16页
One hundred and fifteen first-year students of Greek took the SILL (Strategy Inventory for Language Learning) questionnaire in an attempt to reveal and activate potential a successful and widely used questionnaire l... One hundred and fifteen first-year students of Greek took the SILL (Strategy Inventory for Language Learning) questionnaire in an attempt to reveal and activate potential a successful and widely used questionnaire like SILL might have but not identified and investigated so far. The first original point to be investigated, tackled in a previous experiment (Kambakis-Vougiouklis, 2012), concerns users' confidence whether their choice of a specific strategy is effective while the second point concerns the use of the bar as an alternative statistical tool. More specifically, in this particular experiment the bar is not divided only into five equal length spaces as in the first experiment but also into five equal area spaces according to Gauss distribution, giving the researcher the chance to investigate possible differences between two ways of data processing--an advantage only the use of the bar could provide in the analysis stage. Additionally, there are advantages concerning results collection, as subjects and researcher will have a completely free choice among infinite points on a line rather than a limited 3, 4, 5, and 6 of a Likert scale, avoiding at the same time fine verbal differences between different subdivisions. Although the two different methods of processing performed homogeneous behaviour with not statistically considerable differences, it needs further applications in order to reach safe conclusions 展开更多
关键词 SILL (Strategy Inventory for Language Learning) BAR CONFIDENCE Gauss distribution
下载PDF
Application of Recent Technologies in the Concept of Modem Business
8
作者 Danica Tadic 《Chinese Business Review》 2013年第1期70-76,共7页
In the era of over communications and hyper concurrency, people are overloaded with the offer of information, ideas, products, and services. Information is easy and unbelievable prompt available all over the world. Cu... In the era of over communications and hyper concurrency, people are overloaded with the offer of information, ideas, products, and services. Information is easy and unbelievable prompt available all over the world. Customers, concurrency, and innovators have immediate access to each other changes in technology, especially those in informatics and technology of communication are transforming the era of informatics to the era of knowledge. The aim of this paper is to make an overview of the most up-to-date novelties in technology, especially those that were enabled by ICT, as well as to direct to some of the potential of the future evolution in business process that is open to the innovations. 展开更多
关键词 ICT economy of knowledge internet economy virtual company
下载PDF
Torture Museums: What Has Changed Today?
9
作者 Ruchan Gokdag 《Journalism and Mass Communication》 2016年第2期79-90,共12页
Torture has always been regarded as a tool for confession and applied throughout history. In cases when requesting and convincing do not work, threatening or torturing has been considered to be a "right" to do. Tort... Torture has always been regarded as a tool for confession and applied throughout history. In cases when requesting and convincing do not work, threatening or torturing has been considered to be a "right" to do. Torture was used in Ancient Rome, in Europe in Medieval Age, and in England even though it was against unwritten law, and applied in USA secretly today. Since ancient times, people have been used to torturing for similar purposes. Today, torture is put into practice again for similar purposes such as forcing people to live according to religious beliefs and looking after the benefits of the government. Torture museums found in many European countries make visitors confused as these museums display terrifying tools applied to the Christian community in Medieval Age and then used by Christians to torture "Deviants". 展开更多
关键词 TORTURE torture museums torture tools torture in Monotheistic Religions
下载PDF
Online Shopping A Block to E-commerce
10
作者 Zhang Jianfang 《International English Education Research》 2015年第3期131-132,共2页
The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasin... The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce. 展开更多
关键词 online shopping E-COMMERCE disadvantages online payment
下载PDF
The Remote Monitoring System Research Based on Embedded Web Server
11
作者 Ying ZHOU 《International Journal of Technology Management》 2015年第6期101-103,共3页
The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server regi... The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment. 展开更多
关键词 Remote Control Embedded system SOCKET Communication protocol
下载PDF
Actual implementation of spectrum-sharing systems in rayleigh fading channels~
12
作者 裴二荣 Wang Sheng Zhang Zhizhong 《High Technology Letters》 EI CAS 2012年第2期145-150,共6页
In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary ... In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results. 展开更多
关键词 cognitive radio spectrum sharing power allocation seller's market trading mechanism CONVEXOPTIMIZATION
下载PDF
Development of a Cooling System for Geothermal Borehole Probes
13
作者 Benedict Holbein Joerg Isele 《Journal of Earth Science and Engineering》 2014年第2期73-79,共7页
The high potential of geothermal energy in quantity and availability can be a great option, facing the huge problem of growing energy use linked with the climatic problems. Therefore, it is necessary to reduce costs a... The high potential of geothermal energy in quantity and availability can be a great option, facing the huge problem of growing energy use linked with the climatic problems. Therefore, it is necessary to reduce costs and risks for the use of geothermal energy sources. Because most of the problems have to do with insufficient knowledge about the conditions in the earth crust, the key to take root of geothermal energy is widespread research. The cooling system allows the use of all needed devices in deep boreholes without strict time or temperature limitations, which promotes the achieving of comprehensive information. To develop the purpose-built components among conducting experiments about the thermodynamic processes, a prototype is provided step by step. 展开更多
关键词 MONITORING heat protection borehole tools engineering.
下载PDF
SMOOTH ESTIMATION OF ROC CURVE IN THE PRESENCE OF AUXILIARY INFORMATION 被引量:1
14
作者 Yong ZHOU Haibo ZHOU Yunbei MA 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第5期919-944,共26页
Receiver operating characteristic (ROC) curve is often used to study and compare two- sample problems in medicine. When more information may be available on one treatment than the other, one can improve estimator of... Receiver operating characteristic (ROC) curve is often used to study and compare two- sample problems in medicine. When more information may be available on one treatment than the other, one can improve estimator of ROC curve if the auxiliary population information is taken into account. The authors show that the empirical likelihood method can be naturally adapted to make efficient use of the auxiliary information to such problems. The authors propose a smoothed empirical likelihood estimator for ROC curve with some auxiliary information in medical studies. The proposed estimates are more efficient than those ROC estimators without any auxiliary information, in the sense of comparing asymptotic variances and mean squared error (MSE). Some asymptotic properties for the empirical likelihood estimation of ROC curve are established. A simulation study is presented to demonstrate the performance of the proposed estimators. 展开更多
关键词 Auxiliary information empirical likelihood ROC curve smooth estimation.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部