期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
重组竹方销对正交胶合木力学与声学特性的影响
1
作者 吴玥 王雨桐 +4 位作者 黄紫蓝 林杨帆 李宏敏 王志强 朱一辛 《林业工程学报》 CSCD 北大核心 2024年第2期152-159,共8页
为提升正交胶合木(CLT)的中低频隔声性能,设计了一种以重组竹方销为声散射体的二维声子晶体结构的CLT,探究对嵌入重组竹方销的杉木CLT力学和声学特性的影响。采用短梁剪切法,研究了跨中面外开孔的CLT短梁和嵌入重组竹方销的CLT短梁层间... 为提升正交胶合木(CLT)的中低频隔声性能,设计了一种以重组竹方销为声散射体的二维声子晶体结构的CLT,探究对嵌入重组竹方销的杉木CLT力学和声学特性的影响。采用短梁剪切法,研究了跨中面外开孔的CLT短梁和嵌入重组竹方销的CLT短梁层间剪切强度、最大正应力和静态韧性系数;采用阻抗管测试法,研究了周期性排布的重组竹方销对CLT隔声量的影响规律。短梁剪切试验表明:与未开孔CLT相比,开孔使CLT的层间剪切强度下降了13.0%~16.5%;与开孔CLT相比,方孔中嵌入重组竹方销可使开孔CLT的层间剪切强度提升8.5%~12.7%,从而与未开孔CLT的层间剪切强度差异不显著,其最大正应力分别与开孔和未开孔的CLT最大正应力差异不显著,为24.52~29.45 MPa;方孔中嵌入重组竹方销的CLT在静态韧性系数上相比未开孔的CLT上升了13.9%~19.1%。隔声量测试结果表明:嵌入重组竹方销的CLT属局域共振型声子晶体结构,在1 400 Hz出现吻合效应的隔声量谷值约33.41 dB;以重组竹方销为声散射体的二维声子晶体结构随重组竹方销边长的增加,提高了CLT的密度和中低频的隔声量,其中,600 Hz以下的隔声量可提升约20.22%。在不改变CLT厚度、密度增量小于20%且力学性能差异不显著的前提下,以重组竹方销增强CLT隔声性能是可行的。 展开更多
关键词 声子晶体 重组竹方销 正交胶合木 层间剪切强度 静态韧性系数
下载PDF
改造495HR电铲铲斗开门斗栓方销插孔及焊接工艺 被引量:1
2
作者 焦瑞军 布特格勒其 《露天采矿技术》 CAS 2012年第5期56-57,59,共3页
简要叙述495HR电铲开门斗栓方销插孔的损坏情况及原因,重点论述改造方案、实施焊接的焊接工艺和措施、焊接过程等内容,为大型电铲铲斗方销插孔等重要结构件的制造或维修提供可借鉴的宝贵经验。
关键词 方销插孔 填充焊接 圆弧过渡 预热 焊接
下载PDF
方销衬套扁槽磨削简易夹具
3
作者 耿耿 《机械制造》 北大核心 2000年第8期52-52,共1页
关键词 方销衬套扁槽 磨削夹具 操作 定位夹具
下载PDF
南北方销区木材市场价格均有上升
4
《中国人造板》 1995年第5期11-11,共1页
——1995年5月中旬全国木材市场价格行情分析 1.
关键词 木材市场 木材流通协会 方销 进口材 人造板市场 落叶松 二季度 国产胶 内陆地区 木材生产
下载PDF
抗菌药物凭处方销售 监管部门任重道远
5
作者 陈西锁 《中国食品药品监管》 2005年第5期43-43,共1页
关键词 抗菌药物滥用 监管部门 药品零售企业 企业经营行为 方销 用药安全 强制性规定 困难和问题 人民群众 流通秩序
下载PDF
国际合作简讯
6
《中国.城乡桥》 1997年第4期40-41,共2页
(1)项目来源:香港;(2)项目投资:40万美元;流动资金:40万美元;(3)投资比例:港方60~70%;合作方40~30%;(4)合作年限:15年;(5)年产量:10万套,全部由港方销售;(6)年产值:2500万元(人民币);(7)
关键词 合营 作年 股价 国际合作 骨粉 投资比例 方销 涨停板
下载PDF
6月全国木材市场呈供大于求格局
7
《中国人造板》 1998年第7期18-18,共1页
北京7月9日消息,6月中旬,全国木材市场继续处于供大于求的格局,木材资源充裕,需求相对不足,木材价格又出现回落。 一、销区木材市场。北方销区优质白松、落松原木行情看好,销势不减。而红松原木依然滞销,在山东、北京、天津等市场甚至... 北京7月9日消息,6月中旬,全国木材市场继续处于供大于求的格局,木材资源充裕,需求相对不足,木材价格又出现回落。 一、销区木材市场。北方销区优质白松、落松原木行情看好,销势不减。而红松原木依然滞销,在山东、北京、天津等市场甚至有价无市。 南方销区木材销路不畅。 展开更多
关键词 木材市场 供大于求 木材价格 贴面板 木材资源 市场价格 增长缓慢 首次出现 原木 方销
下载PDF
后期国内小麦市场走势
8
作者 周鹏 《农村百事通》 2003年第24期11-11,共1页
关键词 小麦市场 小麦价格 季节性需求 粮油信息 市场走势 相对紧 中心行 监测 方销 续走
下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
9
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
下载PDF
Effect of Initial Stress Conditions on the Threshold Shear Strain of Nanjing's Saturated Fine Sand 被引量:4
10
作者 Chen Guoxing Pan Hua 《Earthquake Research in China》 2010年第1期128-136,共9页
By using GDS dynamic hollow cylinder torsional apparatus, a series of cyclic torsional triaxial tests under complex initial consolidation condition are performed on Nanjing saturated fine sand. The effects of the init... By using GDS dynamic hollow cylinder torsional apparatus, a series of cyclic torsional triaxial tests under complex initial consolidation condition are performed on Nanjing saturated fine sand. The effects of the initial principal stress direction αo, the initial ratio of deviatoric stress η0, the initial average effective principal stress Po and the initial intermediate principal stress parameter b0 on the threshold shear strain γt of Nanjing saturated fine sand are then systematically investigated. The results show that γt increases as η0,p0 and b0 increase respectively, while the other three parameters remain constant. ao has a great influence on γt, which is reduced when ao increases from 0° to 45°and increased when α0 increases from 45° to 90°. The effect of α0 on γt, plays a leading role and the effect of η0 will weaken when ao is approximately 45°. 展开更多
关键词 Nanjing saturated fine sand Initial stress condition Threshold shear strain Hollow cylinder torsional apparatus Cyclic torsional triaxial
下载PDF
Analysis on the Application of Traditional Culture Elements to Poster Design
11
作者 Ma Liyin 《International Journal of Technology Management》 2013年第9期4-6,共3页
Along with the continuous development of the society, there are increasingly more marketing tools, but the role of posters in advertisement should be never ignored in any marketing methods. Regardless of all marketing... Along with the continuous development of the society, there are increasingly more marketing tools, but the role of posters in advertisement should be never ignored in any marketing methods. Regardless of all marketing methods changes, the role of posters has been contained in all sorts of marketing ideas, an also posters play a very important role in marketing ideas. Along with the progress of the times, the forms and contents of posters are in constant changes. In this paper, the application of traditional culture elements to poster design is mainly discussed. 展开更多
关键词 Traditional Culture POSTER the Application to Design
下载PDF
Study on the influence of network marketing to the development of SME under the context of big data
12
作者 Weijun DING 《International Journal of Technology Management》 2015年第4期12-14,共3页
With the rapid development of information networks and the overall development of e-commerce, online marketing has continued to assault the traditional business marketing model and methods of operation, and it makes g... With the rapid development of information networks and the overall development of e-commerce, online marketing has continued to assault the traditional business marketing model and methods of operation, and it makes great effects on existing business concepts and ideas from different angles and levels. For these weaker small and medium-sized enterprises, network marketing with its low cost, wide range of applications, the effect of strong natural advantages becomes marketing approach of small and medium-sized enterprises which they can hold up and afford, which also provides unprecedented opportunity for small and medium-sized enterprises to have the opportunity to compete with large-scale enterprises on the same stage. 展开更多
关键词 big data MARKETING SME EFFECTS
下载PDF
The 2.0 Marketing Strategies for Wine Tourism Destinations of Excellence
13
作者 Paola Scorrano 《Chinese Business Review》 2011年第10期948-960,共13页
The aim of this paper is to empirically research the use of Web 2.0 applications in the communication strategies of wine tourism destinations of excellence; main attention will be focused on the integration of these t... The aim of this paper is to empirically research the use of Web 2.0 applications in the communication strategies of wine tourism destinations of excellence; main attention will be focused on the integration of these tools within the "official" destination websites. The main research questions are: (1) Do wine tourism destinations of excellence worldwide make use of Web 2.0 tools in their official websites? (2) Is it possible to estimate the degree of intensity of use of such tools? The method used for the purpose of this research is inductive: starting from the observation of some specific cases we wanted to implement a scoring model that, taking into account the presence and intensity of the use of Web 2.0 tools selected by the wine tourism destinations of excellence, could be replicated in different contexts from the one analyzed here. The study reveals the interest in the tools of Web 2.0 by the institutional bodies responsible for management of destinations; however it also shows that there is not a full awareness of the scope of strategic and organizational development in the web 2.0 applications resulting in the relationship with potential visitors and those who have already experienced a tourist territory. 展开更多
关键词 wine tourism Web 2.0 social network destination management
下载PDF
Marketing Communications in Global Society
14
作者 Sunarto Prayitno Irwansyah 《Journalism and Mass Communication》 2012年第12期1149-1157,共9页
As a result of computer invention, especially the internet, changes have occurred in all walks of life in the global era including the marketing communication strategies which are inseparable parts of marketing and bu... As a result of computer invention, especially the internet, changes have occurred in all walks of life in the global era including the marketing communication strategies which are inseparable parts of marketing and business. This intensifies the role of marketing communication in achieving business goals. Furthermore, the established and successful philosophy, strategy, technique, and theories of marketing communication in the past are now outdated and unfit for achieving wanted business goals in this information technology era. Besides, information technology inventions have changed people's lifestyle especially the global consumer attitude which is responsible for the commotion in today's implementation of global marketing communications strategies. This paper examines the implementation of ideas that are considered responsive to the changes of conditions in the past three decades and the future which are completely different with the past development and implementations. This paper illustrates the changes that have occurred in the implementation of integrated marketing communications studies. This paper supports the assumption that integrated marketing communications is considered the business strategy that is able to overcome the present and future global market era challenges 展开更多
关键词 global consumer global future market global marketing communications strategy
下载PDF
Methodology of Fashion Merchandising by Modularization Operation Management
15
作者 李俊 吴海燕 张渭源 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期56-58,共3页
Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the ac... Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy. 展开更多
关键词 modularization operation management MERCHANDISING ideal model
下载PDF
The Research of Marketing Strategy about China' s Cruise Tourism
16
作者 WU XiYan WU MingYuan 《International English Education Research》 2016年第4期69-71,共3页
With the rapid development of Chinese economy and improvement of people's living standard, cruise tourism, as a new way of leisure tourism is gradually into the Chinese market. This paper firstly describes the curren... With the rapid development of Chinese economy and improvement of people's living standard, cruise tourism, as a new way of leisure tourism is gradually into the Chinese market. This paper firstly describes the current situation of the cruise tourism in China. Then it studies the problems of cruise tourism marketing. Finally, it gives the solution to the problem. It is great significance to improve the market penetration rate and promote the rapid development of cruise tourism in China. 展开更多
关键词 Cruise tourism Strategy Publicity
下载PDF
Green Marketing and Renewable Energy: Evidence on Motivations and Behaviour in the Aquacultural Market
17
作者 Rodolfo Ballestrazzi Michela C. Mason Federico Nassivera 《Chinese Business Review》 2011年第12期1111-1130,共20页
The purpose of this paper falls within the theoretical framework of green marketing. It investigates the relationships that exist between the motives relating to aquacultural products marketed under the private label ... The purpose of this paper falls within the theoretical framework of green marketing. It investigates the relationships that exist between the motives relating to aquacultural products marketed under the private label of a traditional retailer (Coop), the attitude towards their purchase, the perception of their quality, their reliability and the willingness to pay for them. Particular importance is given to the green motives, those that lead to a preference for a product made with specific renewable energies such as biogas. The structural equation models (SEM) technique is used to develop propositions representing a theoretical approach to the integration of green marketing, in the context of the process for purchasing Coop brand fish. With regard to distinguishing between the motives, we referred to the approach that sets out three different types of motive: clean, green and ethical. The resulting managerial implications make it possible to assess how much the different types of motive influence the choices of the consumers. Managers will benefit from the results of this paper by understanding better the benefits for consumers of aquacultural products from renewable energy such as biogas. The originality of the paper lies in its focusing on green purchase behaviour in a poorly investigated sector such as that of fish breeding. The paper contributes to an understanding of the factors that influence environmentally responsible purchase behaviour and their exact relationships, that are still unclear in literature. The fact that environmental issues and concerns are constantly changing implies that ongoing research into their influence on consumer behaviour is essential 展开更多
关键词 green marketing renewable energy aquacultural market BIOGAS SEM
下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
18
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme Multi-secret sharing scheme Hermite interpolation
下载PDF
Additional Overloading Assessment for Future Low Voltage Networks Based on Smart Metering
19
作者 Petr Kadurek Sjef Cobben Wil Kling 《Journal of Energy and Power Engineering》 2013年第5期917-927,共11页
The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network as... The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network assets. As higher penetration of distributed generators is envisioned among distribution networks, the network operators will have an challenging task in the future to maintain the reliability and quality of supply. The distribution networks are going to be challenged simultaneously by increasing penetration of distributed generators and by increasing loading (inter alia heat pumps, air conditioners or electric vehicles), which will change the operational perspective of the future distribution networks. Presented simulation results show that the increasing penetration of those appliances can jeopardize the functionality of current protection scheme in distribution networks. Therefore, an additional scheme for assessment of network overloading applicable at low voltage distribution networks is proposed and the application of this scheme, supported by smart metering infrastructure, is demonstrated in a case study. The proposed overloading assessment scheme should help the network operators to increase the flexibility of distribution networks, their hosting capacity, safety and reliability. 展开更多
关键词 Smart grids power system protection power system reliability power distribution.
下载PDF
Ad-Hoc Broadcast Encryption wit Dynamic Revocation
20
作者 王晓明 廖志委 《China Communications》 SCIE CSCD 2012年第5期129-140,共12页
In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based struct... In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks. 展开更多
关键词 mobile ad hoc network broadcast en-cryption added and revoked members
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部