期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
文击:从无败绩的神炮将军
1
作者 罗永乾 《党史博采(上)》 2023年第6期42-44,52,共4页
一个伟大民族的背后,必然有无数伟大的英雄!中华民族历经苦难仍坚韧不屈,复兴崛起,是因为有无数仁人志士为之抛头颅洒热血,他们的杰出代表,就有新中国1614名开国将帅。然而时间距,开国将帅的绝大部分都已故去,健在的仅有3人,文击将军便... 一个伟大民族的背后,必然有无数伟大的英雄!中华民族历经苦难仍坚韧不屈,复兴崛起,是因为有无数仁人志士为之抛头颅洒热血,他们的杰出代表,就有新中国1614名开国将帅。然而时间距,开国将帅的绝大部分都已故去,健在的仅有3人,文击将军便是其中之一。 展开更多
关键词 将军 文击 将帅 开国 仁人志士 中华民族
下载PDF
文击将军:最是难忘云山之战
2
作者 刘剑新 《雷锋》 2023年第4期42-43,共2页
至今全国健在的4位开国将军中,有一位河北籍的文击将军。2020年,在纪念抗美援朝出国作战70周年活动中,央视一套播出大型纪录片《英雄儿女》,里边就有文击老将军的镜头。“大大小小打了几十场仗,最难忘的还是在云山的战斗。”
关键词 大型纪录片 央视一套 开国将军 抗美援朝 文击 云山之战
原文传递
Cross-cultural Communication: Culture Shock and How to Deal with It 被引量:2
3
作者 江丽容 《Sino-US English Teaching》 2007年第3期61-65,共5页
Now the world has entered into an era of cross-cultural communication. Cultures influence and infiltrate one another. Willing or not, people must first encounter culture shock when they migrate from a familiar cultura... Now the world has entered into an era of cross-cultural communication. Cultures influence and infiltrate one another. Willing or not, people must first encounter culture shock when they migrate from a familiar cultural background to a strange one. This thesis analyzes what causes culture shock and puts forward some suggestions to deal with it. Those who are about to go into a new culture environment may have some mental preparation. 展开更多
关键词 cross-cultural communication culture shock deal with
下载PDF
多天线频谱共享CR-NOMA系统安全中断性能分析
4
作者 吕铄 嵇建波 《电子测量技术》 北大核心 2023年第17期71-78,共8页
认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线... 认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线选择(OAS)方案的安全中断概率(SOP),并推导了其精确的闭合表达式。其次,分析了空时传输(STT)方案的SOP,并推导了其精确的闭合表达式。最后,对次用户两种方案的SOP渐近性能进行了分析,揭示了系统参数对SOP的影响。最后,采用Monte Carlo仿真验证了理论分析的正确性。研究发现,两种方案基站分别存在一个最优峰值发射功率,使得远距离次用户的安全中断性能最佳。仿真结果表明增大基站峰值发射功率,OAS方案的近距离次用户的SOP会始终优于STT方案,远距离次用户的SOP会劣于STT方案。 展开更多
关键词 认知无线电 非正交多址接入 安全中断性能 安全中断概率
下载PDF
病毒分析三例
5
《电脑采购》 2002年第4期27-27,共1页
分清捣乱的真假病毒现在使用者要预防的“真病毒”已经够多了,经由转寄的恶作剧“假病毒”却仍然相当猖狂,这些都是恶作剧病毒制造者蓄意产生的结果,有些恶作剧病毒甚至已经流传好几年,具有“不可考”的历史,但仍然有网友上当,而这许许... 分清捣乱的真假病毒现在使用者要预防的“真病毒”已经够多了,经由转寄的恶作剧“假病毒”却仍然相当猖狂,这些都是恶作剧病毒制造者蓄意产生的结果,有些恶作剧病毒甚至已经流传好几年,具有“不可考”的历史,但仍然有网友上当,而这许许多多的恶作剧病毒,网友可以从防毒公司的网站里——查询,避免恶作剧病毒的充斥,让使用者难以分辨病毒的真假。假病毒喜爱装成真病毒欺骗网友,在邮件里描述的煞有其事,网友对于真假病毒的诡计简直就是无可奈何,这些恶作剧病毒邮件制造者的动机不外乎好玩。 展开更多
关键词 病毒邮件 病毒制造者 红色代码 信息安全性 于真 转寄 防毒软件 反病毒软件 经父 文击
下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
6
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
7
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified Logistic map
下载PDF
Culture shock: Indirect communication A foreign teacher's teaching experience in a Chinese university located in a Hakka region
8
作者 WANG Liu-mei 《Sino-US English Teaching》 2010年第6期57-64,共8页
Culture shock is unavoidable for foreign teachers in China. Using qualitative method, this paper reports a case study of culture shock--a foreign teacher's teaching experience in a Chinese university located in an ar... Culture shock is unavoidable for foreign teachers in China. Using qualitative method, this paper reports a case study of culture shock--a foreign teacher's teaching experience in a Chinese university located in an area with a unique local population. The city involved in this study is Meizhou, located in Guangdong Province, which is considered "the capital of Hakka". The study found that indirect communication is a big shock for foreign teachers who teach in this area. The paper explores the reasons from the perspectives of Hakka culture and points out that culture shock can be an important aspect of foreign teachers' professional development, cultural learning and personal growth. Finally, the study provides implications for language teaching and learning in a similar area, such as Meizhou. 展开更多
关键词 culture shock foreign teachers STUDENTS HAKKA indirect communication
下载PDF
Treatment of aggressive pancreatic solid pseudo-papillary neoplasms with apatinib plus S-1 chemotherapy:A case report and literature review
9
作者 Yang Tang Li Yang Xianglin Yuan 《Oncology and Translational Medicine》 2018年第5期219-221,共3页
Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead t... Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead to inferior prognosis for male patients. In this case report, we present a special case of a male patient with SPN who experienced an aggressive tumor expansion after two surgical resections. For further treatment, we decided to administer chemotherapy with apatinib and S-1, and subsequent CT/MRI tumor monitoring indicated satisfactory control of tumor expansion. The effectiveness of apatinib plus the S-1 regimen should be tested for more patients with SPN in the future. 展开更多
关键词 solid pseudopapillary neoplasm apatinib S1 CHEMOTHERAPY
下载PDF
Adaptive image encryption scheme based on chaotic map
10
作者 邱劲 Liao Xiaofeng +1 位作者 Xiao Di Xiang Tao 《High Technology Letters》 EI CAS 2013年第1期76-81,共6页
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo... Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is proposed, where a simple post-processing by compressing is employed. A new adaptive image encryption scheme with the substitution-diffusion architecture is designed using the new pseu- do-random bit generator. In the scheme, the session key for the pseudo-random bit generator is dependent on the content of the image which ensures that the scheme can effectively resist knownplaintext and chosen-plaintext attacks. Theoretical analysis and computer simulation indicate that the proposed algorithm is efficient and highly secure. 展开更多
关键词 image encryption chaotic map substitution-diffusion chaotic key stream
下载PDF
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
11
作者 Ding Ning Gu Dawu Liu Zhiqiang 《China Communications》 SCIE CSCD 2010年第6期56-63,共8页
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ... In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes. 展开更多
关键词 symmetric encryption OBFUSCATION ANTI-FORENSICS
下载PDF
CAPT:Context-Aware Provenance Tracing for Attack Investigation
12
作者 Cheng Tan Lei Zhao +2 位作者 Weijie Liu Lai Xu Lina Wang 《China Communications》 SCIE CSCD 2018年第2期153-169,共17页
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ... APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%. 展开更多
关键词 attack investigation provenance tracing CONTEXT-AWARE virtualization technol-ogies APT attacks panoramic view
下载PDF
Aggressive Behaviour During Breaks as a Manifestation of Different Types of Culture at School
13
作者 Marzanna Farnicka 《Sociology Study》 2014年第1期18-26,共9页
The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of ... The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds. 展开更多
关键词 AGGRESSION social behaviour SCHOOL school culture values in education
下载PDF
The Babysitter: A Feminist Interpretation
14
作者 LIU Ke-dong LI Shuang-shuang 《Journal of Literature and Art Studies》 2014年第7期521-526,共6页
Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and... Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes. 展开更多
关键词 Robert Coover The Babysitter OBJECTIFICATION
下载PDF
Spanish National Monuments with Traditional Timber Roofs: Restoration versus Reconstruction
15
作者 Javier Garabito Jose Carlos Garabito +3 位作者 Victor Echarri Angel Rodriguez Jesus Gadea Veronica Calderon 《Journal of Civil Engineering and Architecture》 2011年第9期828-834,共7页
We prioritize interventions in the roof structure in order to prevent subsequent deterioration of the monument. This presentation refers to interventions in two Spanish National Monuments: the Collegiate Church of Ro... We prioritize interventions in the roof structure in order to prevent subsequent deterioration of the monument. This presentation refers to interventions in two Spanish National Monuments: the Collegiate Church of Roa de Duero and San Esteban's church of Los Balbases. The Collegiate Church was built during the 16th century. It is considered the jewel of the villa. It is a "hallenkirche" model with three big naves of the same height covered by beautiful starry vaults. The intervention consisted of restoring the wooden roof structure, preserving the original 16th centary structure, by replacing the damaged elements. It was restored according to archaeological criteria. San Esteban's church is a 13 century Gothic style church with a Latin cross plan. It has three naves with a transept of great slenderness. It preserves Romanesque remains. Opposite to the previous intervention we decided to rebuild the roof because the former roof was totally distorted due to bad executed works during the past Century. In this way we regain the original shape of the church. These interventions aim to improve constructive and structural conditions as well as retrieve the image of both monuments. We have studied the visual impact of interventions through virtual recreations. The intervention criteria are very different, restoration versus structttral reconstruction. 展开更多
关键词 RESTORATION ROOF timber structure HERITAGE laminated wood.
下载PDF
丙烯酸-2,4,6-三硝基苯乙酯的合成及热分解 被引量:2
16
作者 刘强强 金波 +3 位作者 彭汝芳 舒远杰 楚士晋 董海山 《含能材料》 EI CAS CSCD 北大核心 2012年第5期579-582,共4页
以TNT、甲醛为原料,在弱碱性条件下反应合成得到2,4,6-三硝基苯乙醇(PicCH2CH2OH);PicCH2CH2OH在浓硫酸催化下和丙烯酸在甲苯中回流反应24h,合成得到丙烯酸-2,4,6-三硝基苯乙酯,产率为62%。采用紫外可见光谱(UV-Vis)、核磁共振氢谱(1HN... 以TNT、甲醛为原料,在弱碱性条件下反应合成得到2,4,6-三硝基苯乙醇(PicCH2CH2OH);PicCH2CH2OH在浓硫酸催化下和丙烯酸在甲苯中回流反应24h,合成得到丙烯酸-2,4,6-三硝基苯乙酯,产率为62%。采用紫外可见光谱(UV-Vis)、核磁共振氢谱(1HNMR)、红外光谱(FTIR)、质谱(MS)以及元素分析等对产物结构进行了表征。利用热重分析(TG)对产物热稳定性进行了研究,采用Kissinger方法和Ozawa方法计算其热分解活化能Ea分别为99.78,102.96kJ·mol-1。 展开更多
关键词 有机化学 2 4 6-三硝基苯乙醇 丙烯酸-2 4 6-三硝基苯乙酯 热稳定性 活化能
下载PDF
退避三舍
17
作者 吴明 施大畏 《连环画报》 2015年第1期60-63,共4页
关键词 宋国 楚军 成王 直力 第二年 文击 左冲 备军 卫君 上虎
原文传递
男人也防晒
18
《航空港》 2011年第8期30-31,共2页
在所有与皮肤癌有关的死亡病例中,因黑素瘤而引起的死亡高达75%。可见防晒不仅是一道护肤步骤,更是对健康的养护。男人们,你们听到了吗?办公室一族、驾车一族,还有烈日底下的运动族,你们都要有不同的防晒策略。
关键词 防晒 黑素瘤 刺痛感 清透 佰草集 防水性 自山 君衡 要集 文击
原文传递
谨以此文纪念中国人民解放军走过93周年的风雨历程——10位健在的开国将军今何在(续)
19
作者 卜金宝(文/图) 《雷锋》 2020年第9期76-80,共5页
文击:率部打响抗击美军第一炮人物小传:文击,河北霸县人,1918年生,原名刘树堂。1937年参加八路军,曾任炮兵师长、宣化炮兵学院训练部部长、副院长兼训练部部长、济南军区炮兵司令员、军委炮兵副司令员兼参谋长、总参谋部炮兵部部长(副... 文击:率部打响抗击美军第一炮人物小传:文击,河北霸县人,1918年生,原名刘树堂。1937年参加八路军,曾任炮兵师长、宣化炮兵学院训练部部长、副院长兼训练部部长、济南军区炮兵司令员、军委炮兵副司令员兼参谋长、总参谋部炮兵部部长(副大区职)等职。 展开更多
关键词 济南军区 炮兵师 开国将军 训练部 副司令员 第一炮 今何在 文击
原文传递
Efficient hierarchical identity based encryption scheme in the standard model over lattices 被引量:2
20
作者 Feng-he WANG Chun-xiao WANG Zhen-hua LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第8期781-791,共11页
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b... Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks. 展开更多
关键词 Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with errors problem GAUSSIAN
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部