期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
《安次县四种旧志丛书》评介
1
作者 董文武 《廊坊师范学院学报(社会科学版)》 2020年第1期121-123,共3页
《安次县四种旧志丛书》以《(天启)东安县志》《(康熙)东安县志》《(乾隆)东安县志》和《(民国)安次县志》的初刊本为底本,以《安次县旧志四种合刊》本为对校本,对四部珍稀旧志进行了系统的整理校注。该整理历时六年方始告成,现已由天... 《安次县四种旧志丛书》以《(天启)东安县志》《(康熙)东安县志》《(乾隆)东安县志》和《(民国)安次县志》的初刊本为底本,以《安次县旧志四种合刊》本为对校本,对四部珍稀旧志进行了系统的整理校注。该整理历时六年方始告成,现已由天津古籍出版社出版。这项工作,无论是对安次县志本身的文本存传,还是对当地历史文化的挖掘、传承与弘扬,或是对地方区域历史文化的研究,都具有非常重要的价值和意义。 展开更多
关键词 安次县四种旧志丛书》 《(天启)东安县志》 《(康熙)东安县志》 《(乾隆)东安县志》 《(民国)安次县志》
下载PDF
从安次县治所屡迁看永定河水患及其清代治理
2
作者 金久红 王玉亮 《河北学刊》 CSSCI 北大核心 2021年第6期66-71,共6页
安次县治所的多次迁徙,展现了永定河河道的“无定”以及对京南平原所造成的灾害。结合文献和实地考察,可以分析、归纳辽金元以来永定河水患加剧的原因与特点,从反面视角审视清代治理永定河的失当之处,亦可窥知其对时下京津廊(坊)平原水... 安次县治所的多次迁徙,展现了永定河河道的“无定”以及对京南平原所造成的灾害。结合文献和实地考察,可以分析、归纳辽金元以来永定河水患加剧的原因与特点,从反面视角审视清代治理永定河的失当之处,亦可窥知其对时下京津廊(坊)平原水资源的负面影响。由永定河水患成因及清代治河之得失,可以看出人类活动和自然生态环境之间的双向影响。 展开更多
关键词 永定河 安次 清代 京津冀 生态环境
下载PDF
廊坊市安次区东沽港中幡的历史传承与当代价值 被引量:1
3
作者 杨士泰 张峰硕 《廊坊师范学院学报(社会科学版)》 2021年第2期116-121,共6页
廊坊市安次区东沽港中幡是河北省省级非物质文化遗产项目。该花会在清朝早期曾受过皇封,于清末1895年从静海县转入东沽港,已有120余年历史。在传承过程中,东沽港中幡经历了八代传人,六个阶段。有着深厚底蕴的东沽港中幡,在当前乡村振兴... 廊坊市安次区东沽港中幡是河北省省级非物质文化遗产项目。该花会在清朝早期曾受过皇封,于清末1895年从静海县转入东沽港,已有120余年历史。在传承过程中,东沽港中幡经历了八代传人,六个阶段。有着深厚底蕴的东沽港中幡,在当前乡村振兴和社会主义现代化建设中,作为地方民俗文化项目,有着鲜明的特色和传承发展价值,应加大力度进行保护和开发。 展开更多
关键词 中幡 东沽港 非物质文化遗产 安次
下载PDF
河北省安次县施用毒饵防治蝗虫
4
《中国农业科学》 CAS 1953年第2期2-2,共1页
1.准备药剂、麦麸——施用毒饵防治蝗虫,必须事先有计划地准备好六六六粉和麦麸。防治蝗虫最有利的时期是在麦收以前,这时在当地一般很难购到大量麦麸。图为安次县向天津购买麦麸运到蝗区的情形。
关键词 蝗虫 安次 毒饵 农药施用 河北省
下载PDF
代擬河北安次县高辛荘改进办法大纲
5
《教育与职业》 1931年第4期549-550,共2页
李云章先生於改进乡村,向抱熱诚;自参观本社所办徐公桥乡村改进区後,兴趣尤见浓厚,深願就其原籍河北,择地仿办,并慨允每年担任经费一千五百元,嘱本社代为计划。爱拟办法大纲如左,其详,则本社之乡村改进实施办法可资参阅。惟以未明该地... 李云章先生於改进乡村,向抱熱诚;自参观本社所办徐公桥乡村改进区後,兴趣尤见浓厚,深願就其原籍河北,择地仿办,并慨允每年担任经费一千五百元,嘱本社代为计划。爱拟办法大纲如左,其详,则本社之乡村改进实施办法可资参阅。惟以未明该地实际情形,闭门造车,是否合辙,未敢自信耳。编者志。 展开更多
关键词 徐公桥乡村改进区 安次 李云章 大纲 河北 高辛
下载PDF
历代安次地区方志述论 被引量:2
6
作者 王通 白丽萍 《中国地方志》 2017年第12期37-41,共5页
安次县志的编纂始于元代,现存最早者为明代天启年间郑之城编纂天启《东安县志》,至清有康熙《东安县志》、乾隆《东安县志》,民国间有《安次县志》。通过述论历代安次地区方志的编纂情况、现存状况以及史料价值,同时,从历史沿革、河流... 安次县志的编纂始于元代,现存最早者为明代天启年间郑之城编纂天启《东安县志》,至清有康熙《东安县志》、乾隆《东安县志》,民国间有《安次县志》。通过述论历代安次地区方志的编纂情况、现存状况以及史料价值,同时,从历史沿革、河流变迁、土地流转及白银使用等方面对安次现存方志(《安次县旧志四种合刊》)进行研究,希望为区域方志的进一步挖掘与研究提供有益的启示。 展开更多
关键词 安次方志 编纂情况 现存状况 史料价值
原文传递
Some Remarks on Cocks'Identity-Based Encryption Scheme
7
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme
下载PDF
回味深作欣二:用针挑土将你埋葬
8
作者 洁尘 《电影文学》 北大核心 2003年第8期63-63,共1页
1958年,日本政府开始全面执行禁妓行动。但是,也就在这个时候,富吉艺妓院的杂佣凉子姑娘决意要当一个艺妓了。她在这里已经呆了四年,从一个小姑娘长成了一个清丽可人的少女。四年来,她努力学艺,勤奋劳作,深得艺妓院老板和众位艺妓的喜... 1958年,日本政府开始全面执行禁妓行动。但是,也就在这个时候,富吉艺妓院的杂佣凉子姑娘决意要当一个艺妓了。她在这里已经呆了四年,从一个小姑娘长成了一个清丽可人的少女。四年来,她努力学艺,勤奋劳作,深得艺妓院老板和众位艺妓的喜爱。而在四年里,凉子看多了男女纠葛,也渐渐习得风月场上的奥秘和甘苦。她对艺妓生活不反感,这是前提,但更关键的是,她要为她贫穷苦难的家人挣钱。要成为一个初级艺妓是要花很多钱包装的,所以,初级艺妓必须将处女之身献给她的投资人,这是行规。凉子要献身的对象是一个78岁的富翁。 展开更多
关键词 深作欣二 艺妓 安次 针挑
下载PDF
村党支部书记:要做建设新农村的表率
9
作者 刘志久 《农村农业农民(下半月)》 2006年第6期23-23,共1页
关键词 支部书记 革命年代 电力部门 老三届 廊坊市 河北省 村干部 文化 退伍 入党 家庭 工人 城镇 参军 部队 安次
下载PDF
Multi-level access control model for tree-like hierarchical organizations
10
作者 於光灿 李瑞轩 +3 位作者 卢正鼎 Mudar Sarem 宋伟 苏永红 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期393-396,共4页
An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning secur... An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible. 展开更多
关键词 multi-level access control hierarchical organization multiple security tags
下载PDF
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s 被引量:1
11
作者 Yao Shan Xia Chunhe +2 位作者 Hu Junshun Jiao Jian Li Xiaojian 《China Communications》 SCIE CSCD 2012年第7期22-35,共14页
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given 展开更多
关键词 policy refinement network security policy semantic similarity ontology
下载PDF
考虑输电线路安全的机械除冰次序优化 被引量:6
12
作者 程松 郁琛 +3 位作者 吴琛 黄琳雁 褚云龙 崔伟 《中国电力》 CSCD 北大核心 2018年第1期71-77,共7页
机械除冰是应对输电线路覆冰灾害的重要手段,现有研究主要集中在除冰方法的改进,而对机械除冰实施过程的影响研究较少。研究发现在机械除冰过程中,如果按照从输电线路一端开始顺序除冰的策略,杆塔承受的最大不平衡力可能超过设计标准,... 机械除冰是应对输电线路覆冰灾害的重要手段,现有研究主要集中在除冰方法的改进,而对机械除冰实施过程的影响研究较少。研究发现在机械除冰过程中,如果按照从输电线路一端开始顺序除冰的策略,杆塔承受的最大不平衡力可能超过设计标准,影响输电线路安全,而不同的除冰次序会产生不同的最大不平衡力。为此,有必要对机械除冰的除冰次序进行优化,提高机械除冰的安全性。首先分析了机械除冰过程中除冰次序对杆塔平衡力的影响,然后建立了输电线路机械除冰次序优化模型。由于该模型为非线性、多约束模型,采用遗传算法对不同档导线覆冰清除的次序进行优化。仿真分析表明,优化后的除冰次序能够有效地降低杆塔承受不平衡力,提高机械除冰过程中输电线路的安全性。 展开更多
关键词 输电线路 覆冰灾害 机械除冰 遗传算法 次序优化
下载PDF
Use of new once-daily 5-aminosalicylic acid preparations in the treatment of ulcerative colitis:Is there anything new under the sun? 被引量:3
13
作者 Peter Laszlo Lakatos 《World Journal of Gastroenterology》 SCIE CAS CSCD 2009年第15期1799-1804,共6页
5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease form... 5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease forms of mesalazine.However,poor adherence due to frequent daily dosing and a large number of tablets has been shown to be an important barrier to successful management of patients with UC.Recently, new,once-daily formulations of mesalazine,including the unique multi-matrix delivery system and mesalazine granules,were proven to be efficacious in inducing and maintaining remission in mild-to-moderate UC,with a good safety profile comparable to that of other oral mesalazine formulations.In addition,they offer the advantage of a low pill burden and might contribute to increased long-term compliance and treatment success in clinical practice.This editorial summarizes the available literature on the short-and medium-term efficacy and safety of the new once-daily mesalazine formulations. 展开更多
关键词 Ulcerative colitis 5-aminosalicylate MESALAZINE Multi matrix system Therapy ONCE-DAILY Compliance
下载PDF
Generational Gap: Intrinsic (Non-monetary) Versus Extrinsic (Monetary) Rewards in the Workforce
14
作者 Charles Chekwa Mmutakaego Chukwuanu Daisey Richardson 《Chinese Business Review》 2013年第6期414-424,共11页
Traditionally, organizations assume that compensation/pay and monetary benefits are what all employees need to work harder, be productive, or remain with the company. According to Abraham Maslow, within every person i... Traditionally, organizations assume that compensation/pay and monetary benefits are what all employees need to work harder, be productive, or remain with the company. According to Abraham Maslow, within every person is a hierarchy of five needs: physiological needs, safety needs, social needs, esteem needs, and self-actualization needs Organizations must be able to identify what employees desire to secure optimum performance and to meet the needs of both employees and employers. This research focuses on the generational gap and the significance of intrinsic and extrinsic rewards in the workforce. The purpose and objective of this research are to test the significance of monetary versus non-monetary rewards among the different generations in the organization. A self-designed questionnaire distributed to a multi-generational group of employees of selected organizations was used to collect the analyzed data. Sixty-five (65%) responses were obtained. Secondary data were used to elucidate the needs in this area of study. Because the workforce is predicted to become more diverse in terms of age, organizations will be unlikely to implement one set of rewards for the multiple generations. This is due to the differing expectations and requirements among the generations. However, the results indicate no significant difference in monetary versus non-monetary rewards among the different generations in the workforce. 展开更多
关键词 monetary benefits intrinsic reward extrinsic reward MOTIVATION multi-generational workforce monetary and non-monetary rewards
下载PDF
Upper bound solutions of stability factor of shallow tunnels in saturated soil based on strength reduction technique 被引量:8
15
作者 黄阜 张道兵 +1 位作者 孙志彬 金启云 《Journal of Central South University》 SCIE EI CAS 2012年第7期2008-2015,共8页
Based on the upper bound theorem of limit analysis,the factor of safety for shallow tunnel in saturated soil is calculated in conjunction with the strength reduction technique.To analyze the influence of the pore pres... Based on the upper bound theorem of limit analysis,the factor of safety for shallow tunnel in saturated soil is calculated in conjunction with the strength reduction technique.To analyze the influence of the pore pressure on the factor of safety for shallow tunnel,the power of pore pressure is regarded as a power of external force in the energy calculation.Using the rigid multiple-block failure mechanism,the objective function for the factor of safety is constructed and the optimal solutions are derived by employing the sequential quadratic programming.According to the results of optimization calculation,the factor of safety of shallow tunnel for different pore pressure coefficients and variational groundwater tables are obtained.The parameter analysis shows that the pore pressure coefficient and the location of the groundwater table have significant influence on the factor of safety for shallow tunnel. 展开更多
关键词 strength reduction technique upper bound theorem pore pressure shallow tunnel factor of safety
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
16
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
Hamatophyton from the Late Devonian of Anhui Province,South China and Evolution of Sphenophyllales 被引量:5
17
作者 WANG Deming GUO Yun 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2009年第3期492-503,共12页
Well-preserved specimens of Hamatophyton verticillatum collected from the Upper Devonian (Famennian) Wutong Formation of Chaohu district, Anhui Province, South China, display more complete fertile axes in three orde... Well-preserved specimens of Hamatophyton verticillatum collected from the Upper Devonian (Famennian) Wutong Formation of Chaohu district, Anhui Province, South China, display more complete fertile axes in three orders and multiple divisions. Comparisons indicate that Hamatophyton possibly does not have palmate planate sterile leaves but hook-like linear ones with rare divisions. We propose seven definitive characters of Sphenophyllales: (1) completely whorled lateral organs; (2) sterile leaves; (3) strobili; (4) "sporangiophores" or stalks with reflexed tips bearing sporangia; (5) three- or four-ribbed primary xylem; (6) exarch maturation of primary xylem; and (7) secondary xylem. The Sphenophyllales probably originated from the Iridopteridales based on similarities in whorled lateral organs, ribbed primary xylem and peripheral protoxylem strands. In transition from Iridopteridales to Sphenophyllales, morphological changes involve partially whorled to completely whorled lateral organs, sterile ultimate appendages to leaves, and fertile ultimate appendages to "sporangiophores"/stalks with bracts; anatomical modifications include configuration and maturation of primary xylem, and presence of secondary xylem. 展开更多
关键词 Hamatophyton Sphenophyllales Iridopteridales Sphenopsida Late Devonian WutongFormation Anhui Province
下载PDF
A network security situation awareness method based on layered attack graph
18
作者 ZHU Yu-hui SONG Li-peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第2期182-190,共9页
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div... The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods. 展开更多
关键词 network security situation awareness(NSSA) layered attack graph(LAG) state explosion community detection
下载PDF
An Overview of General Theory of Security
19
作者 Min Lei Yixian Yang +2 位作者 Xinxin Niu Yu Yang Jie Hao 《China Communications》 SCIE CSCD 2017年第7期1-10,共10页
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented. 展开更多
关键词 cyber security network attack and defense meridian-collateral theory
下载PDF
A Key Management Scheme Based on Hypergraph for Fog Computing
20
作者 Zhi Li Yanzhu Liu +3 位作者 Di Liu Chunyang Li Wei Cui Guanglin Hu 《China Communications》 SCIE CSCD 2018年第11期158-170,共13页
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s... Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme. 展开更多
关键词 fog computing fog security keymanagement HYPERGRAPH
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部