期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
专利情报检索语言的层次结构模式
1
作者 郑奋 《情报学报》 CSSCI 北大核心 1989年第1期35-43,共9页
关键词 专利 检索语言 层次结构模式
下载PDF
基于Intranet的B/S结构高校办公系统的研究与设计 被引量:2
2
作者 师云秋 王锡钢 刘丹 《鞍山师范学院学报》 2004年第4期67-68,共2页
采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 。
关键词 办公自动化 INTRANET 层次结构(B/S)开发模式
下载PDF
论实验教学中常用的教学模式 被引量:4
3
作者 文军 《廊坊师范学院学报》 2002年第4期39-40,共2页
分析了实验教学中几种模式的结构与特点 ,应用教学模式要实现实验教学的高效。
关键词 实验教学 教学模式 物理教学 层次结构化教学模式 交互式教学模式 协同合作式教学模式
下载PDF
办公自动化系统软件的开发技术 被引量:9
4
作者 李平 张伟 王丹平 《北京联合大学学报》 CAS 2001年第2期67-71,共5页
随着通讯技术和计算机技术的发展 ,办公系统软件的开发技术也日趋于符合现代办公自动化的需求。采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 ,以WEB作为前台的三层次结构开发模式 ,来开发一个通用的... 随着通讯技术和计算机技术的发展 ,办公系统软件的开发技术也日趋于符合现代办公自动化的需求。采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 ,以WEB作为前台的三层次结构开发模式 ,来开发一个通用的现代办公系统 ,是当前办公系统软件开发较流行的先进技术。 展开更多
关键词 办公自动化 层次结构开发模式 接口 数据库 动态服务的网页 软件开发
下载PDF
施工组织设计的发展趋势 被引量:4
5
作者 王贵聪 《山西经济管理干部学院学报》 2003年第3期27-30,共4页
施工组织设计是组织施工和全面实现工程建设项目施工要求的纲领性文件。随着我国社会主义市场经济体制的发展和加入WTO后与国际大市场的接轨,从而给施工组织设计提出了一系列新的要求和新的课题。
关键词 施工组织设计 投标方案 工法 管理体制 国际接轨 变革发展 计算机资料库 结构层次模式
下载PDF
论Wallman对会计确认标准的创新
6
作者 张国柱 《重庆石油高等专科学校学报》 2001年第3期32-34,共3页
介绍了 Wallman 提出的会计确认标准的多层次结构模式,并将其与传统的会计确认模式作了比较分析。
关键词 Wallman 会计确认标准 局限性 创新 评价 层次结构模式
下载PDF
An MAC Layer Aware Pseudonym (MAP) Scheme for the Software Defined Internet of Vehicles 被引量:1
7
作者 Zishan Liu Li Zhu +2 位作者 Jianwu Li Guiyang Luo Lin Zhang 《China Communications》 SCIE CSCD 2018年第9期200-214,共15页
This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti... This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V. 展开更多
关键词 IoV software defined network(SDN) location privacy MAC protocol cross-layer design
下载PDF
Research on failure scenarios of domes based on form vulnerability 被引量:15
8
作者 YE JiHong LIU WenZheng PAN Rui 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期2834-2853,共20页
In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed ... In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed with characteristics as follows: Model 1 possesses overall uniform stiffness and is expected to collapse in the strength failure mode as some members become plastic; Model 2 possesses six man-made weak parts located on six radial main rib zones and is expected to collapse in the dynamic in- stability mode with all members still in the elastic stage; Model 3 strengthens the six weak zones of Model 2, and therefore, its stiffness is uniform. Model 3 is proposed to collapse in the strength failure mode when the members are still in the elastic stage By increasing the peak ground accelerations of seismic waves gradually, the shaking table tests were carried out until all three models collapsed (or locally collapsed). On the basis of form vulnerability theory, topological hierarchy models of the test models were established through a clustering process, and various failure scenarios, including overall collapse scenarios and partial collapse scenarios, were identified by unzipping corresponding hierarchical models. By comparison of the failure scenarios based on theoretical analysis and experiments, it was found that vulnerability theory could effectively reflect the weak- ness zones in topological relations of the structures from the perspective of internal causes. The intemal mechanisms of the distinct failure characteristics of reticulated shells subjected to seismic excitations were also revealed in this process. The well-formedness of structural clusters, Q, is closely related to the collapse modes, i.e., uniform changes of Q indicate a uniform distribution of overall structural stiffness, which indicates that strength failure is likely to happen; conversely, non-uniform changes of Q indicate that weak zones exist in the structure, and dynamic instability is likely to occur. 展开更多
关键词 single-layer latticed spherical shell form vulnerabifity collapse mode failure mechanism shaking table test
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部