期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
略议老子思想中的不争之德 被引量:1
1
作者 高长峰 《南方论刊》 2014年第5期86-87,共2页
自古以来社会是充满竞争的,物竞天择,适者生存。老子却反其道而行之,提出不争之德,是说不与人争名利荣华,知足、知止、寡欲、为善自赏,常怀济世利人之心,反而达到以其不争,故天下莫能与之争的境界。
关键词 略议 老子 不争
下载PDF
略议新时期农村少先队文化建设
2
作者 柯意祥 《读与写(下旬)》 2021年第4期234-234,共1页
少先队独特的风貌和精神重点体现在少先队文化上,因此搞好少先队文化建设并有所创新,对于新农村建设时期,现实意义非常重大。现实农村少先队文化建设存在着一定的问题。因此充分挖掘乡土文化和历史资源,不断更新先进的思想来启迪少年儿... 少先队独特的风貌和精神重点体现在少先队文化上,因此搞好少先队文化建设并有所创新,对于新农村建设时期,现实意义非常重大。现实农村少先队文化建设存在着一定的问题。因此充分挖掘乡土文化和历史资源,不断更新先进的思想来启迪少年儿童;开展丰富多彩的队活动,大胆放手,让队员积极参与,与时俱进扎扎实实地搞好少先队文化建设并有所创新,是不容忽视的。 展开更多
关键词 略议 新时期 农村 少先队文化
下载PDF
略议国有文物商店的现状及发展方向
3
作者 周巧燕 卫潇洋 《中文科技期刊数据库(全文版)社会科学》 2019年第2期350-351,共2页
文物是不可再生的文化资源,文物购销经营活动不仅关系到馆藏文物的保护,还关系到古墓葬的保护,并与文物的出境管理措施密切相关,如果不实行严格控制,势必造成文物损坏或流失。文物商店是依法设立的从事文物购销经营活动的企业。《文物... 文物是不可再生的文化资源,文物购销经营活动不仅关系到馆藏文物的保护,还关系到古墓葬的保护,并与文物的出境管理措施密切相关,如果不实行严格控制,势必造成文物损坏或流失。文物商店是依法设立的从事文物购销经营活动的企业。《文物保护法》第五十三条规定,文物商店应当由国务院文物行政部门或者省、自治区、直辖市人民政府文物行政部门批准设立。 展开更多
关键词 略议 有文物商店 现状及发展方向
下载PDF
《石經大學略議》和王時槐的“主意”思想
4
作者 周丰堇 《儒家典籍与思想研究》 2019年第1期245-263,共19页
王時槐深受《石經大學》的影響。他通過《石經大學略議》發揮了'意根''誠意'和'慎獨'的思想,系統論述了其本體論、主意論和工夫論。在本體論上,性是終極本體,而意與獨皆是性之生幾;在主意論上,意是溝通體用有... 王時槐深受《石經大學》的影響。他通過《石經大學略議》發揮了'意根''誠意'和'慎獨'的思想,系統論述了其本體論、主意論和工夫論。在本體論上,性是終極本體,而意與獨皆是性之生幾;在主意論上,意是溝通體用有無的樞機;在工夫論上,誠意和慎獨是攝用歸體的工夫。 展开更多
关键词 《石經大學議》 誠意 慎獨
原文传递
浅析增材制造技术——3D打印
5
作者 陈玉莲 吴敏娇 《科技风》 2019年第26期26-26,共1页
围绕3D打印,从技术层面上概要介绍了其发展历史,分析了其优劣和应用。主要包括3D打印的历史、原理、流程、特点和应用等方面,为广大新手和爱好者揭开3D打印的神秘面纱。
关键词 3D打印 略议 格式
下载PDF
中国古代海盐生产考 被引量:16
6
作者 白广美 《盐业史研究》 1988年第1期49-63,共15页
一、引言 食盐(氯化钠)是人类生活的必需品,是 人体组织中不可缺少的要素,是体内重要无机 盐一钠盐的主要来源。正常成人体内钠总量一 般约为每公斤体重1克,一个60公斤体重的成 人体内钠总量约60克左右。食盐的用途直接或 间接渗透于国... 一、引言 食盐(氯化钠)是人类生活的必需品,是 人体组织中不可缺少的要素,是体内重要无机 盐一钠盐的主要来源。正常成人体内钠总量一 般约为每公斤体重1克,一个60公斤体重的成 人体内钠总量约60克左右。食盐的用途直接或 间接渗透于国民经济的各个部门。现代每人平 均每年直接或间接消耗食盐有几十斤。食盐又 是基本化学工业的主要原料,如在氯碱工业 中,利用直流电电解食盐的饱和溶液制取烧碱 (氢氧化钠)、氯气和氢气,在电化工业中, 电解熔融的食盐制取碱金属钠等。 展开更多
关键词 海盐生产 煎盐 每公斤体重 金属钠 盐业史研究 盐法 淮北盐区 收盐 食货志 石莲
下载PDF
Agent based automated trust negotiation model 被引量:1
7
作者 李开 卢正鼎 +1 位作者 李瑞轩 唐卓 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期469-473,共5页
To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human interven... To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM. 展开更多
关键词 automated trust negotiation AGENT CREDENTIAL access control policy negotiation protocol
下载PDF
清代食盐的生产方法 被引量:1
8
作者 陈锋 《人文论丛》 CSSCI 2012年第1期162-181,共20页
清代的盐产区,内地划分为11区,即:奉天、长芦、山东、两淮、浙江、福建、广东、云南、四川、河东、陕甘[1]。《清史稿·食货志四·盐法》概称为:'蒙古、新疆多产盐地,而内地十一区,尤有裨国计。十一区者,曰长芦,曰奉天,曰山... 清代的盐产区,内地划分为11区,即:奉天、长芦、山东、两淮、浙江、福建、广东、云南、四川、河东、陕甘[1]。《清史稿·食货志四·盐法》概称为:'蒙古、新疆多产盐地,而内地十一区,尤有裨国计。十一区者,曰长芦,曰奉天,曰山东,曰两淮,曰浙江,曰福建,曰广东,曰四川,曰云南,曰河东,曰陕甘。' 展开更多
关键词 清盐法志 盐法 《四川盐法志》
下载PDF
清代中期中国盐业的资本主义萌芽 被引量:2
9
作者 简锐 《盐业史研究》 1992年第1期8-15,共8页
我国盐业生产的官营体制,自明中叶开始松弛以来,大约经历了二、三百年的时间,到清代中期(乾隆至道光二十年,即1736—1840年),在11个大的产盐区中,四川井盐、河东池盐和两淮海盐出现了资本主义萌芽。前两者以工场手工业为形式,后者则以... 我国盐业生产的官营体制,自明中叶开始松弛以来,大约经历了二、三百年的时间,到清代中期(乾隆至道光二十年,即1736—1840年),在11个大的产盐区中,四川井盐、河东池盐和两淮海盐出现了资本主义萌芽。前两者以工场手工业为形式,后者则以包买商为形式。 展开更多
关键词 清代中期 资本主义萌芽 四川井盐 中国盐业 盐区 官营 包买商 盐法 盐丁 乾嘉时期
下载PDF
清代四川盐业史资料考释 被引量:2
10
作者 鲁子健 《盐业史研究》 1988年第4期73-79,共7页
一、盐业生产统计 (一)清代前期四川盐业恢复发展情况统计 清治六年至嘉庆二十年(1649~1815)
关键词 清代前期 乾隆朝 盐法 盐政大臣 同治年间 康熙六年 黄廷桂 井课 潼川 康熙二十四年
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
11
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
上党地寒应强饮两河民病要分忧——论北宋边塞诗的医国情怀
12
作者 丁沂璐 《河南科技大学学报(社会科学版)》 2022年第3期43-48,97,共7页
北宋诗人是集官僚、文士、学者于一身的复合型人才,其边塞诗承载着深挚的医国情怀与清晰的价值判断。北宋边塞诗常以医病喻医国,将救弊与治病相提并论,彰显出诗家救弊安边的治世初心与医国救病的思维方式。这种迫切的医国情怀,在内忧外... 北宋诗人是集官僚、文士、学者于一身的复合型人才,其边塞诗承载着深挚的医国情怀与清晰的价值判断。北宋边塞诗常以医病喻医国,将救弊与治病相提并论,彰显出诗家救弊安边的治世初心与医国救病的思维方式。这种迫切的医国情怀,在内忧外患中无限晕染,在寓目时艰中发为悲歌,借助爱民救国、议边研略、感恩报德等主题次第展开,将主忧臣辱与忠君谋国的高贵品质有机系连。 展开更多
关键词 北宋边塞诗 医国情怀 爱民救国 边研 感恩报德
下载PDF
DECLARATIVE HYBRID ROUTING PROTOCOLS IN AD HOC NETWORKS
13
作者 Gao Xiang Li Zhongyuan Wang Min 《Journal of Electronics(China)》 2013年第4期341-351,共11页
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, w... This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads. 展开更多
关键词 Declarative network Bayesian estimation Hybrid routing protocol Adaptive strategy Mobile Ad hoc NETwork (MANET)
下载PDF
Third China-EU Financial Dialogue Held in Brussels
14
《China's Foreign Trade》 2007年第14期27-27,共1页
China and the European Union (EU) held the Third China- EU Financial Dialogue, aimingat beefing up exchanges in financial policies.
关键词 Third China-EU Financial Dialogue Brussels financial policies the fourth meeting BeiJing
下载PDF
Cooperative Layer-2 Based Routing Approach for Hybrid Wireless Mesh Networks
15
作者 Alicia Trivino Alfonso Ariza +1 位作者 Eduardo Casilari Juan C.Cano 《China Communications》 SCIE CSCD 2013年第8期88-99,共12页
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ... In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay. 展开更多
关键词 hybrid mesh networks mobile ad hoc network hybrid routing protocols Layer-2 routing Layer-2 forwarding
下载PDF
Physical literacy in the field of physical education——A challenge and a possibility 被引量:10
16
作者 Suzanne Lundvall 《Journal of Sport and Health Science》 SCIE 2015年第2期113-118,共6页
Publications of articles with physical literacy as a topic have increased dramatically since the beginning of 2000 s. The aim of this paper is to,through an explorative literature overview with an inductive approach, ... Publications of articles with physical literacy as a topic have increased dramatically since the beginning of 2000 s. The aim of this paper is to,through an explorative literature overview with an inductive approach, analyze frequent, and significant themes in published peer reviewed articles,with a focus on physical literacy. The database EBSCO has been used with the identifiers “physical literacy” and “physical literacy and evidence”.Furthermore ICSSPE Bulletin's special issue on physical literacy has been included in the overview. The findings have resulted in three key themes: assumptions of the concept physical literacy and its educative role, sports development and physical literacy, and assessment and physical literacy. Future studies are needed to examine if the advocated pedagogical strategies based on the concept physical literacy have led to a reorganized and revitalized school subject. There is also an existing critique towards making physical literacy an idealistic neutral concept or synonym with fundamental movement skills or sports talent identification. The role of higher education emerges as crucial for the next step of the development of the scientific framework as this involves how physical literacy will be socially configured, nurtured, and embodied in practice.Copyright ó 2015, Shanghai University of Sport. Production and hosting by Elsevier B.V. All rights reserved. 展开更多
关键词 Educational practice IMPLICATION Literature overview Physical literacy Scientific frame work
下载PDF
Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation
17
作者 孙莹 温巧燕 朱甫臣 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期89-92,共4页
The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption... The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one. 展开更多
关键词 two-level systems quantum secret sharing quantum information
下载PDF
E-commerce security policy analysis
18
作者 Maarina 《International Journal of Technology Management》 2014年第11期46-47,共2页
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed... In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology. 展开更多
关键词 e-commerce security authentication system SSLX agreement SET protocol
下载PDF
On the Multi-media Assisted Interpreting Teaching Strategies
19
作者 Ming Lei Yong Zhu 《International English Education Research》 2014年第9期47-50,共4页
This paper discusses the strengths of using the intemet and building corpus in interpretation teaching. The authors propose multi-media assisted interpretation teaching strategies such as building a small -sized contr... This paper discusses the strengths of using the intemet and building corpus in interpretation teaching. The authors propose multi-media assisted interpretation teaching strategies such as building a small -sized controlled internal interpretation corpus, encouraging students to search information via the internet, and conducting teacher-student, student-student communication at all levels via E-mall, BBS, skype-in-English, audio/video conference and etc. 展开更多
关键词 interpreting teaching multi-media technology CORPUS INTEMET
下载PDF
Discussion on the ARP Protocol and Network Security Policy
20
《International English Education Research》 2014年第1期35-38,共4页
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two c... Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the AR P Find virus source and virus removal methods, and finally putting forward effective measures to guard against AR P virus. 展开更多
关键词 Address resolution ARP spoofing attacks Cache table IP / MAC binding
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部