期刊文献+
共找到38篇文章
< 1 2 >
每页显示 20 50 100
报关员在办理协议、合同备案过程中如何避免退单
1
作者 吴怀昌 《中国海关》 北大核心 1995年第8期35-35,共1页
“三资”“三来一补”企业在进口设备、生产材料及办公用品之前,必须先到海关办理备案手续(这一手续相对于海关来说叫审批),经海关审批录入电脑后方可进口。因此,备案是企业顺利投产的先决条件之一。然而,我们在审批工作中经常发现由于... “三资”“三来一补”企业在进口设备、生产材料及办公用品之前,必须先到海关办理备案手续(这一手续相对于海关来说叫审批),经海关审批录入电脑后方可进口。因此,备案是企业顺利投产的先决条件之一。然而,我们在审批工作中经常发现由于单证填报错漏而造成的退单。 展开更多
关键词 理协议 生产材料 进口设备 建筑材料 关员 海关备案 办公用品 海关编号 企业报 对外贸易经济合作部
原文传递
嵌入式TCP/IP协议栈LWIP的内部结构探索与研究 被引量:16
2
作者 孙乐鸣 江来 代鑫 《电子元器件应用》 2008年第3期79-82,共4页
分析了嵌入式TCP/IP协议栈主要对LWIP的基本结构,介绍了嵌入式TCP/IP协议栈LWIP的内存管理方式,同时给出了对UDP、TCP、IP等协议的处理方法,最后给出了LWIP的应用层接口及调用方法。
关键词 LWIP的基本结构 LWIP的内存管 LWIP的层片理协议 LWIP的应用层接口
下载PDF
郑州地区信用卡管理委员会管理模式的启示
3
作者 杨长红 《电脑与信用卡》 1997年第3期4-5,共2页
郑州地区信用卡管理委员会(以下简称管委会)是在郑州市人民政府的直接领导下,由郑州市人民银行牵头负责,有工、农、中、建、交五大银行参加的一个行业组织机构,成立于1995年。一年多来,他们一直把工作重点放在POS机的联网开发和推广普... 郑州地区信用卡管理委员会(以下简称管委会)是在郑州市人民政府的直接领导下,由郑州市人民银行牵头负责,有工、农、中、建、交五大银行参加的一个行业组织机构,成立于1995年。一年多来,他们一直把工作重点放在POS机的联网开发和推广普及方面,在全国范围内率先推出“同城POS网络” 展开更多
关键词 信用卡管 郑州地区 模式 管委会 POS机 信用卡业务 郑州市 理协议 启示 人民银行
下载PDF
如何加强对特约单位的管理
4
作者 朱峰 《电脑与信用卡》 1998年第7期28-28,共1页
特约单位是用卡消费的场所,持卡人和特约单位是互相联系、互为影响的关系,对特约单位管理的好坏将直接影响持卡人用卡,发展特约单位市场不能只停留于数量多少,更为重要的是质量上的提高。随着信用卡的普及,多数商店、宾馆、娱乐场所都... 特约单位是用卡消费的场所,持卡人和特约单位是互相联系、互为影响的关系,对特约单位管理的好坏将直接影响持卡人用卡,发展特约单位市场不能只停留于数量多少,更为重要的是质量上的提高。随着信用卡的普及,多数商店、宾馆、娱乐场所都将成为信用卡特约单位,持卡人对受理水平的高低也将越来越挑剔。所以我们必须从现在开始, 展开更多
关键词 信用卡业务 持卡人 单位划分 内部管 娱乐场所 特约商户 单位服务 工作 服务质量 理协议
下载PDF
Design and Research of Information Processing System Based on Mix Platform
5
作者 董宁 徐立新 +1 位作者 何超 张宇河 《Journal of Beijing Institute of Technology》 EI CAS 1999年第3期294-299,共6页
Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun... Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface. 展开更多
关键词 information processing real time data collection communicating protocols
下载PDF
Perfusion computed tomography in colorectal cancer:Protocols,clinical applications and emerging trends 被引量:1
6
作者 Prasanna Ghimire 《World Journal of Gastroenterology》 SCIE CAS CSCD 2009年第26期3228-3231,共4页
Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC).By providing the functional tumor microvasculatu... Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC).By providing the functional tumor microvasculature,it also helps the assessment of therapeutic response of anti-angiogenic drugs as it may reflect tumor angiogenesis.Perfusion CT has been applied in clinical practice to delineate inflammatory or neoplastic lymph nodes irrespective of their size,identify micro-metastases and to predict metastases in advance of their development.It is of increasing significance for preoperative adjuvant therapies and avoidance of unnecessary interventions.Despite controversies regarding the techniques employed,its validity and reproducibility,it can be advantageous in the management of CRCs in which the prognosis is dependent on preoperative staging.With recent advances in the perfusion CT techniques,and incorporation to other modalities like positron emission tomography,perfusion CT will be a novel tool in the overall management of CRCs.This article aims at reviewing the existing clinical applications and recent advances of perfusion CT with a reference to future development in the management of CRCs. 展开更多
关键词 Colorectal cancers Perfusion computed tomography ANGIOGENESIS NEOVASCULARIZATION MICROMETASTASES
下载PDF
Virtual and Dynamic Hierarchical Architecture: an overlay network topology for discovering grid services with high performance 被引量:1
7
作者 黄理灿 吴朝晖 潘云鹤 《Journal of Zhejiang University Science》 EI CSCD 2004年第5期539-549,共11页
This paper presents an overlay network topology called Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Service discovery based on VDHA has scalable, autonomous... This paper presents an overlay network topology called Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Service discovery based on VDHA has scalable, autonomous, efficient, reliable and quick responsive. We propose two service discovery algorithms. Full Search Query and Discovery Protocol (FSQDP) discovers the nodes that match the request message from all N nodes, which has time complexity O(logN), space complexity O(nvg) (nvg being node numbers of each virtual group), and message-cost O(N), and Domain-Specific Query and Discovery Protocol (DSQDP) searches nodes in only specific domains with time complexity O(nvg), space complexity O(nvg), and message-cost O(nvg). In this paper, we also describe VDHA, its formal definition, and Grid Group Management Protocol. 展开更多
关键词 VDHA GRID PROTOCOL PEER-TO-PEER Service discovery
下载PDF
A study on IEEE 802.11 WLAN implementation with embedded microprocessor 被引量:1
8
作者 杜义 楼喜中 +1 位作者 钟伟 毛志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第4期365-369,共5页
Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs... Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs has been done,including converting the MAC functions from SDL to C to ASM with tow RISC targts. The study shows that implementing MAC. functions should consider real-time protocol re3quirements by dividing MAC functions into sets. We enhance the set of time-critical functions implemented to dedicated hardwere and the set of non-time-critical functions implemented to software run with embedded processor. This heterogeneous system is proposed in consideration of our study results to reduce popwer consumption. 展开更多
关键词 WLAN IEEE802.11 MAC SDL low-pwoer
下载PDF
A comparative study of the therapeutic effect in two protocols: video-assisted thoracic surgery combined with laparoscopy versus right open transthoracic esophagectomy for esophageal cancer management 被引量:3
9
作者 Ming Guo Baiyi Xie +3 位作者 Xiaoyan Sun Meng Hu Qingjie Yang Yunhong Lei 《The Chinese-German Journal of Clinical Oncology》 CAS 2013年第2期68-71,共4页
Objective: The aim was to evaluate the best intra-thoracoscopic surgery technique between video-assisted thoracic surgery (VATS) combined with laparoscopy and right open transthoracic esophagectomy, in patients with e... Objective: The aim was to evaluate the best intra-thoracoscopic surgery technique between video-assisted thoracic surgery (VATS) combined with laparoscopy and right open transthoracic esophagectomy, in patients with esophageal cancer. Methods: From November 2006 to May 2008, 221 patients with esophageal cancer were enrolled in this study, prospective randomized in two groups. 111 patients were performed the VATS technique (Experimental group), whereas in the other 110 patients esophagectomy was adopted by thoracotomy (Control group). Results: The time consuming of Experimental group was 272.3 min in average with a standard deviation(std) of 57.9, and it was 218.7 min in average with std of 91.0 in the control group (P=0.000). The operative blood loss was 219.7±194.4 mL in the Experimental group, compared with 590.0±324.4 mL in the control group, with significant difference (P=0.000). Postoperative hospital stay of Experimental group was 9.6±1.7d, and it was 11.4±2.3d in the control group (P=0.000). There was no-delayed union of incision in the Experimental group, but 6.36% in the control group (P=0.007). The disorder of gastric emptying occurred 0.9% in the Experimental group, whereas 6.4% in the Control group. There was no significant difference in survival curves and rates (P=0.555). Conclusion: There were several advantages of VATS technique, such as reduced hemorrhage, better recovery, few complications, and great number of lymph node dissection, although there was no significant difference in long-term survival rate. Thus the VATS combined with laparoscopy technique was worthy of generalization in esophageal surgery with good prospects. 展开更多
关键词 video-assisted thoracic surgery (VATS) LAPAROSCOPY esophageal cancer
下载PDF
Quantum Dialogue Protocol Using a Class of Three-Photon W States 被引量:5
10
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第11期853-856,共4页
A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmitti... A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information. 展开更多
关键词 quantum communication quantum dialogue W state
下载PDF
Co-design for an SoC embedded network controller 被引量:4
11
作者 ZOU Lian-ying ZOU Xue-cheng 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期591-596,共6页
With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardwa... With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance. 展开更多
关键词 System-on-Chip (SoC) EMBEDDED MICROPROCESSOR Network controller TCP/IP CO-DESIGN
下载PDF
Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer Network
12
作者 Zhang Guoyin Fu Xiaojing Ma Chunguang 《China Communications》 SCIE CSCD 2012年第10期68-77,共10页
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2... The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication. 展开更多
关键词 MP2PN group key tmnagement attribute-based signature anonymous conmmnica tion
下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
13
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 Wireless Sensor Networks (WSNs) Function nodes Key management Energy consumption
下载PDF
Enhancement of GAO's Multiparty Quantum Secret Sharing 被引量:2
14
作者 Cheng-Chieh Hwang Tzonelih Hwang Chuan-Ming Li 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第7期79-82,共4页
A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao... A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao's protocol can be much improved by using the technique of decoy single photons and carefully modifying the protocol to remove some unnecessary unitary operations, devices, and transmissions. 展开更多
关键词 quantum secret sharing Greenberger-Horne-Zeilinger state
下载PDF
Intelligent Server Management Framework over Extensible Messaging and Presence Protocol
15
作者 斯佩峰 宋川 周翔 《China Communications》 SCIE CSCD 2013年第5期128-136,共9页
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m... With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era. 展开更多
关键词 cloud computing server management XMPP federation mobile push intelligent
下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
16
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
下载PDF
Design of iris recognition system based on DSP and ZigBee
17
作者 LI Jin-ming MA Lin +2 位作者 ZHANG Shao-hua CHENG Ya-li CHENG Nai-peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2018年第2期169-173,共5页
Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering... Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering on image,and the k-nearest neighbor algorithm is combined to complete iris recognition function.The recognition reduces the recognition time and improves the recognition accuracy.At the same time,identification result is transmitted to the cloud server through ZigBee network to solve diffcult wiring problem.The experiment shows the system runs stably and has fast recognition speed.It has been applied to a security system. 展开更多
关键词 iris recognition digital signal processor(DSP) ZIGBEE image block
下载PDF
Consensus tracking protocol and formation control of multi-agent systems with switching topology 被引量:13
18
作者 年晓红 苏赛军 潘欢 《Journal of Central South University》 SCIE EI CAS 2011年第4期1178-1183,共6页
Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of... Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of networks, which are aimed at ensuring that the concerned states of agents converge to a constant or time-varying reference state, new consensus tracking protocols with a constant and time-varying reference state are proposed, respectively. Particularly, by contrast with spanning tree, an improved condition of switching interaction topology is presented. And then, convergence analysis of two consensus tracking protocols is provided by Lyapunov stability theory. Moreover, consensus tracking protocol with a time-varying reference state is extended to achieve the fbrmation control. By introducing formation structure set, each agent can gain its individual desired trajectory. Finally, several simulations are worked out to illustrate the effectiveness of theoretical results. The test results show that the states of agents can converge to a desired constant or time-varying reference state. In addition, by selecting appropriate structure set, agents can maintain the expected formation under random switching interaction topologies. 展开更多
关键词 multi-agent system consensus protocols formation control switching topology
下载PDF
Development of practical postprocessor for 5-axis machine tool with non-orthogonal rotary axes 被引量:13
19
作者 JUNG Hyoun-Chul HWANG Jong-Dae +1 位作者 PARK Ki-Beom JUNG Yoon-Gyo 《Journal of Central South University》 SCIE EI CAS 2011年第1期159-164,共6页
In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the in... In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed. 展开更多
关键词 post-processor 5-axis machining non-orthogonal rotary axes numerically controlled (NC) data CL data
下载PDF
Protocol Based Approach for Tacit to Explicit Knowledge Conversion
20
作者 David Kulandaisamy t Balasubramanian Ramanuj am 《Computer Technology and Application》 2011年第1期75-79,共5页
In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organiza... In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization's knowledge network. Although codified knowledge and its capture is commonplace, tacit knowledge has up until recent years proved elusive in its inclusion within the organization's knowledge base. In this paper, the conversion process has been dealt with the help of protocols. It is learned that while structure may significantly improve the tacit to explicit conversion process, it also may matter how the structure is employed. It is anticipated that eventual successful modeling of such knowledge will ultimately be undertaken in several organizations with a view to improving information capture and transference. 展开更多
关键词 Tacit knowledge explicit knowledge knowledge transfer knowledge management.
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部