期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
私子之爱与占有心理
1
作者 徐岫茹 《父母必读》 北大核心 1993年第10期18-19,共2页
父母抚育教养孩子是为了什么?也许人们能讲出一篇大道理,诸如为国家培养人材等等。但事实上,不少家庭中仍难以清除"养儿防老"、"光宗耀祖"的观念;当私有观念渗入家庭教育中,常常酿成一幕幕不堪设想的悲剧。20岁的... 父母抚育教养孩子是为了什么?也许人们能讲出一篇大道理,诸如为国家培养人材等等。但事实上,不少家庭中仍难以清除"养儿防老"、"光宗耀祖"的观念;当私有观念渗入家庭教育中,常常酿成一幕幕不堪设想的悲剧。20岁的晓勇已经10天没有回家了,母亲知道他在哪里,但他死活也不肯与妈妈见面。父母想尽了办法,甚至惊动了派出所仍旧无济于事。在万般无奈时。 展开更多
关键词 私子 家庭教育 养儿防老 三代人 千里之外 退休工资 不知道 令人 父母必读 光宗
原文传递
修改与写作——同通讯员谈心之六
2
作者 黎昂 《新闻爱好者》 1989年第10期19-44,共2页
谁写新闻、通讯或其他类型的文章,恐怕都有个反复修改的过程吧!稿件送审一关,又往往修改一次;寄到编辑部,编辑还要修改,直改到发表为止。从这个意义上讲,可以说,没有修改就没有作品问世。许多学者对修改文章的重要都有所认识。如“作文... 谁写新闻、通讯或其他类型的文章,恐怕都有个反复修改的过程吧!稿件送审一关,又往往修改一次;寄到编辑部,编辑还要修改,直改到发表为止。从这个意义上讲,可以说,没有修改就没有作品问世。许多学者对修改文章的重要都有所认识。如“作文如食胡桃、宣栗,剥三层皮方有佳味。作而不改。 展开更多
关键词 修改自己 欧阳公 就是你 佳篇 荆山玉 私子 武王 无姑 终篇 反对党八股
下载PDF
爱在心灵信箱
3
作者 徐小泓 《福建论坛(社科教育版)》 2005年第3期25-26,共2页
时间如过隙白驹。教室外面的阳台,我和学生一起种下的菊花开了又谢,谢了又开,转眼已是三茬。就如同这些菊花,从三年前的扦插小枝到现在的灿烂笑靥,我——一名普通的新课程实验班老师,和我的学生一起,在新课程的土壤中共同成长,共同见证... 时间如过隙白驹。教室外面的阳台,我和学生一起种下的菊花开了又谢,谢了又开,转眼已是三茬。就如同这些菊花,从三年前的扦插小枝到现在的灿烂笑靥,我——一名普通的新课程实验班老师,和我的学生一起,在新课程的土壤中共同成长,共同见证这一段记忆深刻的路程。其中,就有这么一位学生,这么一段故事在我的脑海里挥之不去。记忆如菊香盈盈……她叫林琳,这学期刚从漳州转学回来。她不善言语,经常穿粉色外衣和黑色的裤子。要不是课堂上有她专注的双眼,还真不知道她的存在;课后她总是在教室里默默地收拾文具。 展开更多
关键词 种下的 新课程实验 小枝 林琳 告诉我 不知道 幸福的家庭 劳动委员 私子 师生沟通
下载PDF
揭穿“小数点鬼秤”
4
作者 习娇 《数学小灵通(启蒙版)(学龄前)》 2016年第5期22-23,共2页
一天,我陪妈妈到农贸市场买木耳。木耳每千克96元,妈妈称了150克,结账时电子秤显示的金颊是15元钱,妈妈没多想就准备付钱。可我站在一旁越想越感觉不对劲,就用妈妈手机上的计算器算了一下96×0.15=14.4(元),摊主多算了15-14.4=0.... 一天,我陪妈妈到农贸市场买木耳。木耳每千克96元,妈妈称了150克,结账时电子秤显示的金颊是15元钱,妈妈没多想就准备付钱。可我站在一旁越想越感觉不对劲,就用妈妈手机上的计算器算了一下96×0.15=14.4(元),摊主多算了15-14.4=0.6(元)。可是秤上显示的就是15元钱,为什么不相符呢?我突然想起,称重时摊主输入的单价并不是96,而是0.96。我问摊主这是为什么?摊主说:"单价除以100,总价再乘上100,等式依然成立,没什么影响。"我一听感觉有道理,也就没放在心上。 展开更多
关键词 私子 轮人 一泉 五入 作弊方式 主一 角钱 元时
下载PDF
Quantum Privacy Amplification for a Sequence of Single Qubits 被引量:6
5
作者 DENG Fu-Guo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第3X期443-446,共4页
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are perform... We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained. The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced. The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters. 展开更多
关键词 quantum privacy amplification quantum secure direct communication
下载PDF
Privacy-Preserving Prepayment Based Power Request and Trading in Smart Grid 被引量:2
6
作者 Shaohua Li Xiang Zhang +2 位作者 Kaiping Xue Lijie Zhou Hao Yue 《China Communications》 SCIE CSCD 2018年第4期14-27,共14页
Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most... Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most cost-effective and reliable solution for smoothing the demand curve. However, many existing schemes, based on users' demand request in each period, require users to consume their requested electricity exactly, which sometimes causes inconvenience and losses to the utility, because customers cannot always be able to consume the accurate electricity demand due to various personal reasons. In this paper, we tackle this problem in a novel approach. Instead of charging after consumption, we adopt the prepayment mechanism to implement power request. Furthermore, we propose a trading market running by the control center to cope with the users' dynamic demand. It is noteworthy that both users' original demand and trading records are protected against potential adversaries including the curious control center. Through the numerical simulation, we demonstrate that our scheme is highly efficient in both computation and communication. 展开更多
关键词 Demand response power request smart grid PREPAYMENT privacy preserving.
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
7
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
8
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
有关于柚子的三个恋爱片段
9
作者 韩冰 《东西南北(大学生版)》 2005年第8期73-76,共4页
一柚子,本是一类苦涩的植物。只不过,时尔,它在妩媚中带有醉人的妖气,平和中带有莫名的沧桑。柚子也是一个女孩。现在,她躺在冰冷的床上,药物在发作,刺激到大脑的某根神经,往昔历历在目。泪水从眼角滑落……网络情缘之果有一颗是属于柚... 一柚子,本是一类苦涩的植物。只不过,时尔,它在妩媚中带有醉人的妖气,平和中带有莫名的沧桑。柚子也是一个女孩。现在,她躺在冰冷的床上,药物在发作,刺激到大脑的某根神经,往昔历历在目。泪水从眼角滑落……网络情缘之果有一颗是属于柚子的。 展开更多
关键词 聊天室 指环王 古龙水 平安夜 前半生 原创音乐 第二年 夜未央 私子
原文传递
入住近1年,装修没啥事儿,赞!
10
作者 那静 《建材与装修情报》 2009年第1期50-51,共2页
装修质量到底好不好,啥时候能知道?完工验收时特顺利,心里这个美!可是1年后你再看,什么毛病都出来了,敢情这玩意儿也有"潜伏期"。业主经小姐也人住快1年了,说起自家的装修还是一个字"赞"!她是个爽快人,关于找一个... 装修质量到底好不好,啥时候能知道?完工验收时特顺利,心里这个美!可是1年后你再看,什么毛病都出来了,敢情这玩意儿也有"潜伏期"。业主经小姐也人住快1年了,说起自家的装修还是一个字"赞"!她是个爽快人,关于找一个靠谱的装修公司和装修过程,有不少经验,要是不说出来,都觉得对不起还在装修中苦苦煎熬的兄弟姐妹们。 展开更多
关键词 装修质量 走胎 吸油烟机 我自己 包用 私子 谢榭 候札 放张 设计稿
原文传递
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
11
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state PRIVATE
原文传递
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
12
作者 Yan Chang Wen-Do Zhang +7 位作者 Shi-Bin Zhang Hai-Chun Wang Li-Li Yan Gui-Hua Han Zhi-Wei Sheng Yuan-Yuan Huang Wang Suo Jin-Xin Xiong 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第12期621-628,共8页
A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but c... A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information(each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups(each group has N private information)in one execution or just N private information. 展开更多
关键词 quantum private comparison of equality five-particle cluster state semi-honest third party
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部