期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
说“商”
1
作者 杜金鹏 《殷都学刊》 2023年第1期31-40,共10页
商族自称其国族为“商”,称都邑为“大邑商”。商字从■、■,是其基本构形。■为铜凿类工具的象形,■乃二石叠合之形表多石。则“商”字本义会以凿采石加工石器之意,用指擅长石器制造业的族群。商族使用的青铜工具恰以凿类为主,是殷商... 商族自称其国族为“商”,称都邑为“大邑商”。商字从■、■,是其基本构形。■为铜凿类工具的象形,■乃二石叠合之形表多石。则“商”字本义会以凿采石加工石器之意,用指擅长石器制造业的族群。商族使用的青铜工具恰以凿类为主,是殷商文化的一个特征。商族特别喜欢各种大理石制品,是殷商文化与夏、周文化的不同之处。商族擅长玉石加工业,在殷墟分布着众多玉石手工业作坊遗存和玉石手工业者墓葬。甚至在王族居住地,也有大量玉石手工业遗迹遗物,表明玉石加工业是商族的主要生业。 展开更多
关键词 商字 铜凿 治石
下载PDF
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce 被引量:1
2
作者 XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen 《Journal of China University of Mining and Technology》 EI 2006年第4期470-474,共5页
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. 展开更多
关键词 digital signature nominative signature proxy signature
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
3
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
Making Business of a Revolutionary New Technology The Eckert-Mauchly Company, 1945-1951
4
作者 Lars Heide 《History Research》 2012年第8期477-489,共13页
The paper analyzes John Presper Eckert and John William Mauchly's endeavours to design, sell, and build the revolutionary new technology of the first-large and commercial computers. It discusses how Eckert and Mauchl... The paper analyzes John Presper Eckert and John William Mauchly's endeavours to design, sell, and build the revolutionary new technology of the first-large and commercial computers. It discusses how Eckert and Mauchly's conceptualization of the computer grew out of their Electronic Numerical Integrator and Calculator (ENIAC) and Electronic Discrete Variable Automatic Computer (EDVAC) projects at University of Pennsylvania. They incorporated their own business to gain profit from production and attain the freedom needed to develop their revolutionary new computer technology through a series of small and separate computer projects with private and government customers. The paper approaches innovation as a chaotic process and uses uncertainty to conceptualize the basic relations between actors and organizations. 展开更多
关键词 INNOVATION uncertainty John W. Mauchly John Presper Eckert UNIVAC mainframe computer
下载PDF
Research on Online Reviews Impact on Commodity Sales in B2C E-commerce
5
作者 Wu Guodong Song Fugen 《Review of Global Academics》 2015年第1期484-487,共4页
The objective of this paper was to analyze the impact of online reviews on sales. Based on dual path model of commodity sales, an online reviews impact on the relationship between various factors, and then the theoret... The objective of this paper was to analyze the impact of online reviews on sales. Based on dual path model of commodity sales, an online reviews impact on the relationship between various factors, and then the theoretical hypothesis of each factor has been put forward in the model. As it is intuitive and strongly supported empirically, data including Chinese texts captured from Tmall. com was utilized, and then analyzed by SPSS and ROST CM6. Our empirical study on the reviews of TmalLcom indicated that the hypotheses are verified. 展开更多
关键词 Online Review Commodity Sales B2C E-commerce Influencing Factor Statistical Analysis
下载PDF
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree 被引量:1
6
作者 Ding Liping Gu jian +1 位作者 Wang Yongji Wu Jingzheng 《China Communications》 SCIE CSCD 2010年第6期120-127,共8页
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di... Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising. 展开更多
关键词 FORENSICS digital evidence telephonecall records fuzzy decision tree
下载PDF
Hybrid TV Scripts and Streamings: A Project Strategy for the Design of Connected and Convergent Interfaces to T-Commerce Applications
7
作者 Marcelo Falco Rachel Zuanon 《Computer Technology and Application》 2016年第3期129-138,共10页
Interactive digital television is at early stage as regards the interface design, especially in business transactions (t-commerce). Current attempts to transpose the problem related to linearity of narrative and tem... Interactive digital television is at early stage as regards the interface design, especially in business transactions (t-commerce). Current attempts to transpose the problem related to linearity of narrative and temporal flows and audiovisual content obstruction by the interactive layer, although pointing out design perspectives--in addition to the structural and visual web patterns--are still insufficient as regards the design of interfaces connected and converged for t-commerce applications. This article considers that these problems arise from the structural basis that support television scripts and streamings. In this sense, this article proposes the hybridization between the linear model, inherited from analogue condition, and nonlinear model, intrinsic to digital media, as a methodological strategy aiming to strength the creation of interactive audiovisual content connected and convergent for this context. 展开更多
关键词 Interface design IDTV t-commerce second screen connectivity convergence.
下载PDF
Lossless Digital Watermarking Scheme for Image Maps 被引量:2
8
作者 SUN Jianguo ZHENG Chonghui GAO Di 《China Communications》 SCIE CSCD 2014年第8期125-130,共6页
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti... A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 展开更多
关键词 information hiding digitalwatermarking copyright protection digitalmaps
下载PDF
String Equations of the q-KP Hierarchy 被引量:1
9
作者 Kelei TIAN Jingsong HE +1 位作者 Yucai SU Yi CHENG 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2011年第6期895-904,共10页
Based on the Lax operator L and Orlov-Shulman's M operator,the string equations of the q-KP hierarchy are established from the special additional symmetry flows,and the negative Virasoro constraint generators {L-n... Based on the Lax operator L and Orlov-Shulman's M operator,the string equations of the q-KP hierarchy are established from the special additional symmetry flows,and the negative Virasoro constraint generators {L-n,n ≥ 1} of the 2-reduced q-KP hierarchy are also obtained. 展开更多
关键词 q-KP hierarchy Additional symmetry String equations Virasoro constraints
原文传递
Digital output compensation for precise frequency transfer over commercial fiber link
10
作者 慈骋 吴虹 +5 位作者 唐然 刘波 陈星 章学松 张瑜 赵迎新 《Optoelectronics Letters》 EI 2018年第2期109-113,共5页
An ultra-highly precise and long-term stable frequency transmission system over 120 km commercial fiber link has been proposed and experimentally demonstrated. This system is based on digital output compensation techn... An ultra-highly precise and long-term stable frequency transmission system over 120 km commercial fiber link has been proposed and experimentally demonstrated. This system is based on digital output compensation technique to suppress phase fluctuations during the frequency transmission process. A mode-locked erbium-doped fiber laser driven by a hydrogen maser serves as an optical transmitter. Moreover, a dense wavelength division multiplexing system is able to separate forward and backward signals with reflection effect excluded. The ultimate fractional frequency instabilities for the long-distance frequency distributed system are up to 3.14×10^(-15) at 1 s and 2.96×10^(-19) at 10 000 s, respectively. 展开更多
关键词 Digital output compensation for precise frequency transfer over commercial fiber link
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部