期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
苏东坡的警世之言
1
作者 王建华 《国防》 1991年第8期29-29,共1页
近读宋代文学家苏东坡的散文名作《教战守策》,吟诵之余,掩卷沉思,感触颇深。作者所处的北宋时代,边境战争连绵不断,疆土日蹙,国力渐衰,而君主群臣却耽于安乐。苏轼怀着强烈的忧国忧民心情撰写此文,力主教民习武,以为战守之备。他主张,... 近读宋代文学家苏东坡的散文名作《教战守策》,吟诵之余,掩卷沉思,感触颇深。作者所处的北宋时代,边境战争连绵不断,疆土日蹙,国力渐衰,而君主群臣却耽于安乐。苏轼怀着强烈的忧国忧民心情撰写此文,力主教民习武,以为战守之备。他主张,为了国家的安全,必须对广大民众加强战备教育,进行军事训练和体质锻炼。 展开更多
关键词 教战守策 宋代文学 掩卷沉思 战备教育 群臣 知安 民族强盛 给你 这个世界
下载PDF
《教战守策》的思想性与写作技巧
2
作者 章涤心 《杭州教育学院学报》 CAS 1992年第3期94-96,共3页
本文主要从了《教战守策》
关键词 教战守策 王公贵人 知安 腐败无能 先王 平民百姓 役民 制科 文有 货财
下载PDF
The Study on Tourist Destination Tourism Image Perception and Evaluation in Xi'an City 被引量:2
3
作者 王东红 李开宇 +2 位作者 郝凤娇 孙鹏 姚蓉 《Agricultural Science & Technology》 CAS 2013年第9期1285-1288,1343,共5页
[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionna... [Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction. 展开更多
关键词 Tourism destination Image perception Structural method Non-structural method Xi'an
下载PDF
读了这些对联,你会更爱读书
4
《教育家》 2016年第28期26-27,共2页
平时翻书见有名人书室楹联,便随手抄录,日积月累,遂成数百条。这些对联或抒发情感,或戏弄人生,或针砭时事,或表达雅兴。从这些对联中可以探视出历代学者名人的心情和嗜好,是中国读书人的一种具体的文化表现。郑板桥——清代,扬州八怪之... 平时翻书见有名人书室楹联,便随手抄录,日积月累,遂成数百条。这些对联或抒发情感,或戏弄人生,或针砭时事,或表达雅兴。从这些对联中可以探视出历代学者名人的心情和嗜好,是中国读书人的一种具体的文化表现。郑板桥——清代,扬州八怪之一室雅何须大花香不在多自题书屋联。此联是为别峰书屋所题写的木刻联。书屋位于镇江焦山别峰庵中,门头上有"郑板桥读书处"横额,门楹上存有郑氏手书此联。联语言简意深,看似一幅写景联,实则包含着一定的哲理在内,耐人寻味。 展开更多
关键词 言简意深 别峰 扬州八怪 联语 历代学者 郑板桥 书室 知安 何绍基 道光时期
下载PDF
滔滔雄辩 不为空言——谈谈苏轼议论文的风格
5
作者 黄海鹏 《黄冈师范学院学报》 1984年第2期2-7,共6页
苏轼的议论文,虽说不都是艺术品,但在当时确实影响颇大。陆游在《老学庵笔记》中曾有过这样的记载:“苏文熟,吃羊肉;苏文生,吃菜羹。”可见当时的一般学子,是把他的散文奉为一代时文的楷模的。苏轼的议论文,有两个最突出的特点:
关键词 学庵 上皇帝书 贾谊宅 姿态横生 有为而作 教战守策 北人学没 贾生 日喻说 知安
下载PDF
法中国际
6
《收藏与投资》 2014年第10期1-5,7,9,11,共8页
建立、法国布列塔尼大区与中国之间的高端联系推介布列塔尼大区及其特色产品,文化在中法各领域专业人士之间搭建沟通的桥梁,推动开展互惠互利的合作体育文化项目,商品进出口,推广传播,经济,友好城市,校际交流,文化演出,高端旅游……法... 建立、法国布列塔尼大区与中国之间的高端联系推介布列塔尼大区及其特色产品,文化在中法各领域专业人士之间搭建沟通的桥梁,推动开展互惠互利的合作体育文化项目,商品进出口,推广传播,经济,友好城市,校际交流,文化演出,高端旅游……法中国际作为法国布列塔尼大区和中国之间沟通的桥梁,将于2014年10月23日至26日参加在上海举行的臻品会,推广法国布列塔尼大区及其优秀的品牌展台编号:1310我们将出席题为《高端产品及旅游》的论坛有意者请向在场的法中国际代表进行咨询。 展开更多
关键词 布列塔尼 校际交流 日至 联系方式 大黎 知安
下载PDF
《教战守策》的中心论点何在
7
作者 江觉非 《中学语文(大语文论坛)(下旬)》 1989年第7期30-30,共1页
《教战守策》的中心论点何在?人教社出版的高级中学语文第六册《教学参考书》说: 《教战守策》一开篇就避开一切冗词套语,单刀直入,斩钉截铁下断语:“当今生民之患”“在于知安而不知危,能逸而不能劳。此其患不见于今,而将见于他日。今... 《教战守策》的中心论点何在?人教社出版的高级中学语文第六册《教学参考书》说: 《教战守策》一开篇就避开一切冗词套语,单刀直入,斩钉截铁下断语:“当今生民之患”“在于知安而不知危,能逸而不能劳。此其患不见于今,而将见于他日。今不为之计,其后将有所不可救者。”这才是文章的中心论点。这个中心论点的核心是一个“患”字,中心论点的全部由三层意思组成,第一层,为患之因(知安而不知危,能逸而不能劳),第二层,为患之形(不见于今日,是隐患);第三层,防患之策(“为之计”就是献策,“策”就是“教战守”)。三层中第一层是关键,第二层。 展开更多
关键词 教战守策 中心论点 三层意思 知安 教学参考书 此其 人教社 中第 裴春 全义
下载PDF
《金匮要略》百合病病名及治疗方法分析 被引量:14
8
作者 史莎莎 周永学 《中医临床研究》 2019年第2期9-11,共3页
百合对于百合病来说既是主药又是病名,以药来命名病症的方法在历代医者那里都有不同的见地。从百合的寒热属性及药效方面对其命名进行分析,使得百合病的病因病机从另一个方面得以明确。百合病热扰心神,使得神志异常,精神不安,必须利用... 百合对于百合病来说既是主药又是病名,以药来命名病症的方法在历代医者那里都有不同的见地。从百合的寒热属性及药效方面对其命名进行分析,使得百合病的病因病机从另一个方面得以明确。百合病热扰心神,使得神志异常,精神不安,必须利用脉证与一般的神经官能症做区别,使之能够正确的对百合病做出诊断。在百合病的治疗方面,要充分了解已经用过的治法。在前法治疗之后,若主症未变,可依照百合病正治之法,用百合地黄汤进行治疗,若在主症之外出现变证,则要根据不同的误治法采用不同的方药治疗,不当的汗下吐法,张仲景分别给出了适用方,以期达到最佳的治疗效果。不管是对病名的研究解析还是治疗的方法分析,这些对于临床的应用研究都具有重要的探索意义。 展开更多
关键词 《金匮要略》 百合病 清热
下载PDF
The General Design and Technology Innovations of CAP1400 被引量:32
9
作者 Mingguang Zheng Jinquan Yan +3 位作者 Jun Shenttu Lin Tian Xujia Wang Zhongming Qiu 《Engineering》 SCIE EI 2016年第1期97-102,共6页
The pressurized water reactor CAP1400 is one of the sixteen National Science and Technology Major Projects. Developed from China's nuclear R&D system and manufacturing capability, as well as APIO00 technology introd... The pressurized water reactor CAP1400 is one of the sixteen National Science and Technology Major Projects. Developed from China's nuclear R&D system and manufacturing capability, as well as APIO00 technology introduction and assimilation, CAP1400 is an advanced large passive nuclear power plant with independent intellectual property rights. By discussing the top design principle, main performance objectives, general parameters, safety design, and important improvements in safety, economy, and oth- er advanced features, this paper reveals the technology innovation and competitiveness of CAP1400 as an internationally promising Gen-IIl PWR model. Moreover, the R&D of CAP1400 has greatly promoted China's domestic nuclear power industry from the Gen-II to the Gen-III level. 展开更多
关键词 CAPI400 Advanced passive technology General designLocalizationTechnology INNOVATION
下载PDF
APPLICATION OF HUMAN COGNITIVE MODEL FOR TIME DEPENDENT OPERATOR BEHAVIOR IN CHINESE NPP
10
作者 黄祥瑞 高佳 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1998年第1期31-35,共5页
This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of ca... This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered. 展开更多
关键词 reliability analysis cognitive model human error behavior probabilistic safety assessment human machine interaction
下载PDF
SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION 被引量:2
11
作者 Guo Yanqing Kong Xiangwei You Xingang 《Journal of Electronics(China)》 2009年第2期285-288,共4页
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,deve... The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography. 展开更多
关键词 Secure steganography Integer Programming(IP) Binary Particle Swarm Optimization(BPSO)
下载PDF
A Method for Transferring an Unknown Quantum State and Its Application 被引量:1
12
作者 YAN Feng-Li HUO Hai-Rui 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第4期629-632,共4页
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she ... We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed. 展开更多
关键词 transferring unknown quantum state secure direct communication controlled-not operation
下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
13
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
下载PDF
Healthcare Risk Management and Patient Safety in Turkish Hospital
14
作者 Aysegul Yildirim Kaptanoglu Emre isci Serpil Kaplan Yalcinkaya 《Chinese Business Review》 2012年第8期760-766,共7页
Patient safety is an important component of risk management in hospitals. The aim of the study is to measure physician and nurse awareness about four selected patient safety indicators by authors and events reported a... Patient safety is an important component of risk management in hospitals. The aim of the study is to measure physician and nurse awareness about four selected patient safety indicators by authors and events reported about these relevant indicators in the hospital. The study uses standardized four patientsafety indicators like "needle sticks, cut wounds, dressing allergy, infections indicators". Cross section study was conducted through three month period in 2011-2012 based on voluntary response to the questionnaire that intend to measure knowledge about four health indicators. Studypopulations consisted of accessible sample of 146 different specialty physicians and 108 nurses present on duty during survey period. The association between the patient safety indicators and events reported about indicators in questionswere analyzed. Meanpatient safety knowledge questionnaire scores of health staff (nurse and physician) for needle sticks, cut wounds, dressing allergy, infections indicators were 47.13(11.8), 39.04(14.5), 38.02(10.5), 39.72(9.7), respectively. Significant statistical differences were also found between the frequency of events reported according to department and patient safety indicators (F = 8.34; p 〈 0.05) Measuring patient safety culture via safety indicators is essential in improving patient safety. This matter is perfectly influence the financial management of the hospital. 展开更多
关键词 patient safety risk management hospital management safety indicators
下载PDF
Consumers and Food Safety: Trust and Understanding of Lebanese Standards
15
《Journal of Food Science and Engineering》 2011年第5期390-394,共5页
The recent succession of food crisis and the rise of food scare have endangered the relationship of trust between the consumers and the primary food production parties: raisers, growers, industrial partners, distribu... The recent succession of food crisis and the rise of food scare have endangered the relationship of trust between the consumers and the primary food production parties: raisers, growers, industrial partners, distributors, public institutions, as well as the secondary food production parties: consumer groups and medias. Facing a potentially risky product, the consumer in his collect of risk diminishing information, should be able to trust something or someone. But in order to trust a risk diminishing element, he must first trust its emitter. In order to enhance consumer perception towards Lebanese food safety, we began a survey on a sample of a population randomly selected. The study found significant difference among education levels concerning attitude towards food safety and knowledge. No significant effect of demographic profile and sex on food handling practices was found. These findings increase concerns about consumer safety knowledge and practices. It is advised that a national survey should be conducted, followed by a properly designed food safety public health campaign, to enhance household food safety awareness. 展开更多
关键词 Food consumption perceived risk trust oriented towards partners trust in the risk diminishing element.
下载PDF
A network security situation awareness method based on layered attack graph
16
作者 ZHU Yu-hui SONG Li-peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第2期182-190,共9页
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div... The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods. 展开更多
关键词 network security situation awareness(NSSA) layered attack graph(LAG) state explosion community detection
下载PDF
The Relationship Between Psychosocial Working Conditions and Perceived Safety Climate for Engine Room Officers in the Swedish Merchant Fleet
17
作者 LeifW. Rydstedt Monica Lundh 《Sociology Study》 2012年第1期42-48,共7页
The purpose of this study was to analyze the relationship between psychosocial working conditions and perceived safety climate onboard the Swedish merchant fleet. Data was collected by a cross-sectional survey. The sa... The purpose of this study was to analyze the relationship between psychosocial working conditions and perceived safety climate onboard the Swedish merchant fleet. Data was collected by a cross-sectional survey. The sample consisted of 640 Swedish employed engine room officers. A strong relationship was found between the psychosocial working conditions and perceived safety climate onboard (RZ = .204; P 〈 .001). While role conflict and role ambiguity showed a negative association, social support associated positively with safety climate onboard, lob demands and control showed no relation to safety climate. The conclusion is that the safety climate onboard is strongly associated with social and relational factors. 展开更多
关键词 Safety climate role stress job strain
下载PDF
Security-Oriented Transmission Based on Cooperative Relays in Cognitive Radio
18
作者 王莉 马鑫 +2 位作者 马跃 滕颖蕾 张勇 《China Communications》 SCIE CSCD 2013年第8期27-35,共9页
In this paper,we propose a securityoriented transmission scheme with the help of multiple relays in Cognitive Radio(CR).To maximise the Secrecy Capacity(SC)of the source-destination link in CR,both beamforming and coo... In this paper,we propose a securityoriented transmission scheme with the help of multiple relays in Cognitive Radio(CR).To maximise the Secrecy Capacity(SC)of the source-destination link in CR,both beamforming and cooperative jamming technologies are used to improve the performance of the Secondary User(SU)and protect the Primary User(PU).The effectiveness of the proposed scheme is demonstrated using extensive simulation.Both theoretical analyses and simulation results reveal that the proposed scheme contributes to the secure transmission of the SU with acceptable attenuation of the Signal-to-Noise Ratio(SNR)at the PU receiver,and the upper bound of the SC at the SU receiver is able to exploit the power allocation strategy. 展开更多
关键词 CR SC power allocation acceptable SNR attenuation level
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
19
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
Situational Awareness Technology in Network Security
20
作者 YeZheng-wang 《International Journal of Technology Management》 2014年第4期42-44,共3页
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri... With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures. 展开更多
关键词 NETWORK SAFETY situational awareness INVASION APPLICATION
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部