期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
IM反馈及时性对消费者态度和购买意愿影响的研究——产品类型和价格可议性的调节作用 被引量:2
1
作者 王媛 吴剑琳 古继宝 《上海管理科学》 CSSCI 2013年第4期31-36,共6页
即时通讯(Instant Messaging,IM)在网络购物中起着不可忽视的作用。本文通过对277名网络消费者进行情境模拟实验,探究了IM反馈及时性、产品类型和价格可议性三个变量对消费者态度及购买意愿的影响。结果表明:(1)IM反馈及时性对消费者态... 即时通讯(Instant Messaging,IM)在网络购物中起着不可忽视的作用。本文通过对277名网络消费者进行情境模拟实验,探究了IM反馈及时性、产品类型和价格可议性三个变量对消费者态度及购买意愿的影响。结果表明:(1)IM反馈及时性对消费者态度和购买意愿具有显著正向影响:及时反馈比不反馈有更高的消费者态度和购买意愿;(2)产品类型在上述关系中有一定调节作用:体验型产品受IM反馈及时性的影响更大;(3)价格可议性并无显著调节作用。根据研究结果,从网络商家角度提出相应管理建议。 展开更多
关键词 IM反馈及时性 产品类型 价格可议 消费者态度 购买意愿
下载PDF
可议可读的紫砂壶文化
2
作者 张婧 《美与时代(创意)(上)》 2006年第5期75-77,共3页
中国,乃陶瓷之国。但人们对瓷的了解远远大于对陶的了解。其实陶的历史远远早于瓷,只是后来瓷器的出现,慢慢发展到了陶的前面。而在明清两代出现的紫砂陶器,终于为陶器争得了一席之地。现今,紫砂文化已经普及于广大市民家庭,为其增添了... 中国,乃陶瓷之国。但人们对瓷的了解远远大于对陶的了解。其实陶的历史远远早于瓷,只是后来瓷器的出现,慢慢发展到了陶的前面。而在明清两代出现的紫砂陶器,终于为陶器争得了一席之地。现今,紫砂文化已经普及于广大市民家庭,为其增添了丰富的艺术情趣。 展开更多
关键词 紫砂壶 造型 可议 紫砂茶壶 紫砂陶器
下载PDF
课堂议起来 培育真素养——以"活出生命的精彩"为例
3
作者 李红瑞 《中学政治教学参考》 2024年第2期42-43,共2页
加快教育强国建设,必须提升义务教育育人质量。思政课是落实立德树人根本任务的关键课程,道德与法治课程是义务教育阶段的思政课。道德与法治教师要积极落实新课标精神,探索议题式教学,通过议题活动推进教学,培育学生核心素养。
关键词 题式教学 可议
下载PDF
“教材内外结合的群文阅读”议题确定策略 被引量:4
4
作者 胥光茂 郭传金 《教育科学论坛》 2018年第14期39-41,共3页
群文阅读议题是一组选文中所蕴含的可以供师生展开议论的话题。文本的选取、阅读的展开,都应在群文阅读议题的统领下进行。在确定教材内外结合的群文阅读议题时,需要考虑:议题要突出能力,议题要指向语用,议题要扣"标"务"... 群文阅读议题是一组选文中所蕴含的可以供师生展开议论的话题。文本的选取、阅读的展开,都应在群文阅读议题的统领下进行。在确定教材内外结合的群文阅读议题时,需要考虑:议题要突出能力,议题要指向语用,议题要扣"标"务"本",议题要有可议性。 展开更多
关键词 群文阅读 突出能力 指向语用 扣“标”务“本” 可议
下载PDF
“不可思议”考辨 被引量:2
5
作者 肖同姓 《西南交通大学学报(社会科学版)》 CSSCI 2011年第1期61-65,共5页
"不可思议"是佛家语,指思维和言语所不能达到的微妙境界,也可形容事物无法想象或难以理解。大部分辞书认为此词来自《维摩诘经》。查考相关语料可知,这一习见的成语最早出自东汉安世高《佛说大安般守意经卷》,历史上还出现过&... "不可思议"是佛家语,指思维和言语所不能达到的微妙境界,也可形容事物无法想象或难以理解。大部分辞书认为此词来自《维摩诘经》。查考相关语料可知,这一习见的成语最早出自东汉安世高《佛说大安般守意经卷》,历史上还出现过"难思议"、"不能思议"、"其不思议"、"可不思议"、"岂不思议"等众多形式,但"不可思议"这一形式因易于口头传诵而被广泛使用。它在表示"思维和语言所不能达到的境界"义时,在佛经文献中比较常见;其"不可想象或难以理解"义在现代口语里多用。在词义演变的发展过程中,它由名词性词语转化为形容词性词语,这是由其语义基础和人们的认知心理所决定的。 展开更多
关键词 不可思 成语 佛家语 佛经文献 安世高 《佛说大安般守意经》
下载PDF
Accelerated transmission in peer-to-peer network
6
作者 庄艳艳 刘业 钮麟 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期226-231,共6页
The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network... The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory. 展开更多
关键词 peer to peer network transfer control protocol (TCP) available bandwidth
下载PDF
浅谈数学复习课选题的基本原则
7
作者 曹得贵 《固原师专学报》 2000年第6期96-97,共2页
数学复习课在数学教学中占有重要的地位,在复习教学中,设题,选题应遵循实际性代表性、典型性、目的性、可议性、计划性和层次性原则。
关键词 复习课 选题原则 数学教学 实际性 代表性 典型性 目的性 可议 计划性 层次性
下载PDF
浅谈群文阅读的组文形式
8
作者 陈慧 《新作文(教研)》 2018年第10期0094-0094,共1页
最近几年来,在小学语文的舞台上有很多关于群文阅读的声音,让我们一次又一次的感受着新课程理念下,阅读课堂形式的变革与进步。推行“群文阅读”的最大价值就是探索实施好泛读教学,培养学生的快速阅读力、发现能力、思辨力和将发现、思... 最近几年来,在小学语文的舞台上有很多关于群文阅读的声音,让我们一次又一次的感受着新课程理念下,阅读课堂形式的变革与进步。推行“群文阅读”的最大价值就是探索实施好泛读教学,培养学生的快速阅读力、发现能力、思辨力和将发现、思辨结果呈现出来的表达、表现力,以提高学生适应现代信息社会的能力。 展开更多
关键词 群文阅读 组文形式 题选取 开放性可议
下载PDF
Scalable and Identifier/Locator-Splitting Routing Protocol for Mobile Ad Hoc Networks 被引量:3
9
作者 Wang Haiquan Chen Meng +1 位作者 Hu Junshun Xia Chunhe 《China Communications》 SCIE CSCD 2012年第1期102-110,共9页
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ... In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words: 展开更多
关键词 MANETS multi-hop routing identifi- er/locator split distributed hash tables
下载PDF
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
10
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
下载PDF
Attitudes towards acceptance of an innovative home-based and remote sensing rehabilitation protocol among cardiovascular patients in Shantou, China 被引量:3
11
作者 Jia-Ying FANG Ji-Linm LI +5 位作者 Zhong-Han LI Duan-Min XU Chang CHEN Bin XIE Helen CHEN William W AU 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2016年第4期326-332,共7页
Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based ca... Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based cardiac tele-rehabilitation, it is necessary to assess cardiac patients' attitudes towards acceptance of such e-health technology, especially in China where knowledge of such technology is deficient. Methods Interviews were conducted in the First Affiliated Hospital of Shantou University Medical College, Shantou, China. After percutaneous coronary interventional (PCI) surgery, patients completed the survey. Results Among the 150 patients, only 13% had ever heard of HBCTR. After an introduction of our HBCTR program, 60% of patients were willing to participate in the program. From our multivariate analysis of questionnaire data, age (OR: 0.92, 95% CI: 0.864).98; P = 0.007), average family monthly income (OR: 0.13, 95% CI: 0.05-0.341 P 〈 0.001), education level (OR: 0.24, 95% CI: 0.10-0.59; P = 0.002) and physical exercise time (OR: 0.19, 95% CI: 0.06-0.56; P = 0.003) were independent predictors for acceptance of HBCTR. From the reasons for participation, patients selected: enhanced safety and independ ence (28.3%), ability to self-monitor physical conditions daily (25 A%), and having automatic and emergency alert (23.1%). Reasons for refusal were: too cumbersome operation (34.3%) and unnecessary protocol (19.4%). Conclusions Most patients lacked knowledge about HBCTR but volunteered to participate after they have learned about the program. Several personal and life-style factors influenced their acceptance of the program. These indicate that both improvement of technology and better understanding of the program will enhance active participation. 展开更多
关键词 Cardiac rehabilitation Mobile health REMOTE-SENSING Tele-rehabilitation
下载PDF
Quality control of ultrasonic measurement of carotid artery intima-media thickness 被引量:2
12
作者 Ying Yang Feng Zhao +4 位作者 Li-Tong Qi Bao-Wei Zhang Feng Chen Sai-Nan Zhu Yong Huo 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2009年第4期222-226,共5页
Background To report quality control methods and baseline reproducibility data of the ultrasound measurements of carotid artery intima-media thickness in the project of Establishment of an Integrated System for Corona... Background To report quality control methods and baseline reproducibility data of the ultrasound measurements of carotid artery intima-media thickness in the project of Establishment of an Integrated System for Coronary Heart Disease Prevention and Treatment. Methods Standard ultrasound scanning and measuring protocols were established by the study group. All sonographers and readers were trained by the carotid ultrasound core lab and all digital ultrasound images were centrally read. Ten subjects were scanned twice (with 1 week interval) by 2 sonographers independently and images were read by a single reader to evaluate the sonographer variability. Twenty subjects' images were read twice (with 1 week interval) by a single reader to assess the reader variability and the reproducibility of IMT measured at different carotid segments. Results The intraclass correlation (ICC) of intra- and inter-sonographer and intra- reader for mean IMT measurements was 0.99, 0.98 and 0.97 respectively; while for max IMT, it was 0.97, 0.99 and 0.95 respectively. Among different carotid segments and sites, ICC for mean 1MT measurements of common carotid (CCA), carotid artery bulb (Bulb), internal carotid artery (ICA), overall near wall and overall far wall was 0.97, 0.99, 0.89, 0.93 and 0.98 respectively. Conclusion The reproducibility of IMT measurements according to our protocol is acceptable, although better reproducibility is found when measuring the mean IMT than max IMT, CCA and Bulb IMT than ICA IMT, and far wall IMT than near wall IMT. 展开更多
关键词 ATHEROSCLEROSIS carotid arteries ULTRASOUND REPRODUCIBILITY intima-media thickness
下载PDF
On Generality of the Data Plane and Scalability of the Control Plane in Software-Defined Networking 被引量:2
13
作者 ZUO Qingyun CHEN Ming DING Ke XU Bo 《China Communications》 SCIE CSCD 2014年第2期55-64,共10页
The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid imple... The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane. 展开更多
关键词 OpenFlow SDN architecture control functionalities control message
下载PDF
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers 被引量:1
14
作者 杨宇光 王园 +2 位作者 腾义伟 柴海平 温巧燕 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期84-88,共5页
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. 展开更多
关键词 arbitrated signature quantum signature quantum cryptography
下载PDF
Enhancing Social Capital Through Networking for Sustainable Tourism Development: An Application to Khon Kaen Province, Thailand
15
作者 Attama Nilnoppkun 《Sociology Study》 2012年第10期767-778,共12页
Social capital has been recognised as a factor affecting sustainable development in every discipline. A network or a partnership is identified as a "structural" form of social capital and a tool to empower participa... Social capital has been recognised as a factor affecting sustainable development in every discipline. A network or a partnership is identified as a "structural" form of social capital and a tool to empower participants in the networks. There is a belief that social networks can be initiated or created at every level of social capital, from micro to macro. However, the concept of community is the key component of social capital, creating both physical ties (geographical locality) and normative behaviours (sense of belonging). Therefore, this study is intended to enhance social capital at the community or micro-level, in order to sustain tourism development in those areas, and networking is initiated to enhance social capital. Participatory Action Research (PAR) was applied to tourism development in Kon Kaen Province. Tools and techniques used during this study included: observations, preliminary meetings, community meetings, tourism audits, workshops, and network meetings. Eleven districts in Khon Kaen were actively involved in the planning process. 展开更多
关键词 Social capital social network NETWORKING sustainable development
下载PDF
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
16
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
Intelligent Server Management Framework over Extensible Messaging and Presence Protocol
17
作者 斯佩峰 宋川 周翔 《China Communications》 SCIE CSCD 2013年第5期128-136,共9页
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m... With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era. 展开更多
关键词 cloud computing server management XMPP federation mobile push intelligent
下载PDF
The progress and prospect on China-EU Blue Partnership 被引量:1
18
作者 YU Ting YIN Yue LIU Jiayi 《Marine Science Bulletin》 CAS 2020年第1期54-64,共11页
By reviewing the current status and progress made by China and EU in ocean related fields in the changing world,this paper tries to identify the needs,characteristics and strategic importance of the China-EU Blue Part... By reviewing the current status and progress made by China and EU in ocean related fields in the changing world,this paper tries to identify the needs,characteristics and strategic importance of the China-EU Blue Partnership.The Blue Partnership proposed by the Chinese government is open and inclusive.It values mutual beneficial,and calls for broader cooperation.China-EU Blue Partnership is not only related to the development of both China and EU,but also will significantly contribute to the implementation of the UN 2030 Agenda for Sustainable Development.Some suggestions on the further development of the Partnership are proposed to facilitate the implementation. 展开更多
关键词 China-EU Blue Partnership sustainable development Belt and Road Initiative marine cooperation
下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
19
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
下载PDF
Deterministic Quantum Secure Direct Communication with Dense Coding and Continuous Variable Operations
20
作者 HAN Lian-Fang CHEN Yue-Ming YUAN Hao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第4期648-652,共5页
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive... We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment. 展开更多
关键词 ping-pong protocol continuous variable operations quantum secure direct communication SECURITY capacity
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部