期刊文献+
共找到243篇文章
< 1 2 13 >
每页显示 20 50 100
The Model of“Post,Course,Competition,Certificate”Integrated Education for Electronic Information Engineering Technology Major in Higher Vocational Colleges
1
作者 Qinqin Jing Yun Liu Xinyu Zheng 《Journal of Contemporary Educational Research》 2024年第5期223-229,共7页
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin... The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges. 展开更多
关键词 Higher vocational education Electronic information engineering technology major “Post course competition certificate Integrated education model
下载PDF
Blockchain-Based Certificate Authentication System with Enabling Correction
2
作者 Md. Mijanur Rahman Md. Tanzinul Kabir Tonmoy +1 位作者 Saifur Rahman Shihab Riya Farhana 《Journal of Computer and Communications》 2023年第3期73-82,共10页
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ... Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society. 展开更多
关键词 Blockchain certificate Authentication certificate Correction Secure Certification Eliminate Forging
下载PDF
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
3
作者 Lei Yan Maode Ma +3 位作者 Dandan Li Xiaohong Huang Yan Ma Kun Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期2137-2162,共26页
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic... The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods. 展开更多
关键词 Trust model certificate SDN Crossfire attack bayesian trust system forgetting curve IOT
下载PDF
Evolutionary game-based optimization of green certificate-carbon emission right-electricity joint market for thermal-wind-photovoltaic power system
4
作者 Ran Wang Yanhe Li Bingtuan Gao 《Global Energy Interconnection》 EI CAS CSCD 2023年第1期92-102,共11页
With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-mark... With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission. 展开更多
关键词 Electricity market Carbon emission right Green certificate Evolutionary game
下载PDF
Deletion and Recovery Scheme of Electronic Health Records Based onMedical Certificate Blockchain
5
作者 Baowei Wang Neng Wang +2 位作者 Yuxiao Zhang Zenghui Xu Junhao Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第7期849-859,共11页
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat... The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme. 展开更多
关键词 Electronic health records cross-chain medical certificate blockchain data deletion and recovery
下载PDF
A cooperative model of photovoltaic and electricity-to-hydrogen including green certificate trading under the conditional value at risk
6
作者 Haobo Rong Honghai Kuang 《Global Energy Interconnection》 EI CSCD 2023年第4期403-417,共15页
Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)a... Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC. 展开更多
关键词 Green certificates Electric-to-hydrogen Cooperative method Decentralized optimization Renewable energy-absorbing task
下载PDF
Connotation and Construction of "1+X" Certificate System in Higher Vocational Colleges : Taking Hetian Vocational and Technical College as an Example
7
作者 Tuerhong AIZEMAITI Huiqin LIU +2 位作者 Hao LIU Mingming WANG Lanke HUANG 《Asian Agricultural Research》 2023年第9期56-59,共4页
This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the im... This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang. 展开更多
关键词 "1+X"certificate system Pilot situation Problems Strategies
下载PDF
Countermeasures of“Post-Course Competition Certificate”Mode to Promote Innovation and Reform of BIM Course in Vocational Colleges
8
作者 Yuqing Yang Shan Zhao 《Journal of Contemporary Educational Research》 2023年第10期33-39,共7页
The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts... The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality. 展开更多
关键词 Post-course competition certificate Vocational colleges and universities BIM course
下载PDF
Exploring the Reform of"Teachers,Teaching Materials,and Teaching Methods"Based on the M1+XM Certificate
9
作者 Fang Zhou Jingjing Sun 《Journal of Contemporary Educational Research》 2021年第10期57-60,共4页
In order to promote the reform of vocational education,the state has issued the National Vocational Education Reform Implementation Plan,in which the reform of"Teachers,Teaching Materials,and Teaching Methods&quo... In order to promote the reform of vocational education,the state has issued the National Vocational Education Reform Implementation Plan,in which the reform of"Teachers,Teaching Materials,and Teaching Methods"as well as the"1+X"certificate have been the most prominent topics for discussion.Facing new opportunities for vocational education development,popularizing the blend of"1+x"courses and certificates,strengthening the integration of production and education,as well as enhancing professional soft skills are urgent issues to solved.This article combines the"1+X"certificate of civil engineering professional construction drawings and analyzes the necessity of promoting the"1+X"professional skill level as well as the combination of certificate and curriculum construction in deepening the reform of"Teachers,Teaching Materials,and Teaching Methods."Several suggestions have been put forward for the reform of"Teachers,Teaching Materials,and Teaching Methods"which would be helpful for the practical exploration in the reform of"three teaching methods." 展开更多
关键词 T+X"certificate Reform of"Teachers Teaching Materials and Teaching Methods" Fusion of class and certificate
下载PDF
Dynamic Vector Space Secret Sharing Based on Certificates 被引量:1
10
作者 XU Chunxiang LI Jiajia LIU Dongsu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1253-1256,共4页
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert... A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements. 展开更多
关键词 vector space secret sharing dynamic secret sharing certificate
下载PDF
A Review of Rural Policy-favored Petty Loan Forest Property Certificate Mortgage 被引量:1
11
作者 Li ZHOU Yuhui LI 《Asian Agricultural Research》 2014年第8期8-11,17,共5页
Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setti... Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode. 展开更多
关键词 FOREST PROPERTY certificate Small LOAN MORTGAGE Fu
下载PDF
PROVISIONS OF THE CUSTOMS OF THE PEOPLE’S REPUBLIC OF CHINA ON EXTERNAL AUDIT AND CERTIFICATE OF EXTERNAL AUDIT ISSUED RECENTLY BY THE GENERAL ADMINISTRATION OF CUSTOMS OF THE PEOPLE’S REPUBLIC OF CHINA 被引量:1
12
《大经贸》 北大核心 1997年第6期93-93,共1页
In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of Exte... In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of External Audit of the Customs (hereinafterreferred to as Certificate) as of June 5, 1997. The Certificate has ablack leather outer covering and is inlaid inside with a pierced andguilded customs emblem, which consists of the red national em-blem in its upper part, and a key and a truncheon encircled by earsof wheat in its lower part. Put in a leather covering, the Certificateis a card sealed up with plastics, on which there is a bareheadedcolour photo of the holder in the Customs uniform and with a 展开更多
关键词 Pro PROVISIONS OF THE CUSTOMS OF THE PEOPLE S REPUBLIC OF CHINA S REPUBLIC OF CHINA ON EXTERNAL AUDIT AND certificate OF EXTERNAL AUDIT ISSUED RECENTLY BY THE GENERAL ADMINISTRATION OF CUSTOMS OF THE PEOPLE
下载PDF
Feasibility Study of Enforcing Immunization Certificate Check Before Primary School or Kindergarten Enrollment in Guizhou Province, China
13
作者 LI SHENG SHU-YAN ZUO +8 位作者 JING XIE YA-LI QI YI-BING TONG GUANG-PENG TANG JUN ZHOU DA-YONG ZHANG CHANG-BING LONG WEN DU ZI-JIAN FENG 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2007年第5期357-365,共9页
Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducte... Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducted. The multi-stage and cluster sampling approach was adopted for the quantitative part of the study. A questionnaire was designed and 996 children and their keepers were interviewed. Principals, doctors or teachers of the primary schools, directors and child care nurses of kindergarten, and staff of immunization agencies were invited to take part in 12 focus group discussions; meanwhile, face-to-face individual in-depth interviews with 16 officials of the Health, Education and Governmental Departments at various levels were conducted. Results The total number of subjects was 996. 16.7% of the children in the study completed all the procedures of the National Immunization Programme. 34.3% of them had immunization certificates while the remainder 44.7% registered in immunization agencies. Factors, including the migrant children, doubt about vaccine efficiency, mother’s occupation and educational background, knowledge of the National Immunization Programme on targeted vaccines, played an important role in obtaining or not immunization certificates. 95% of the keepers interviewed thought the immunization certificates were useful; 94.8% of them considered the check was critical while only 3.6% of them thought it unnecessary. The first reason from those who found it unnecessary was that they feared that repeated immunization might affect their children’s health. The second reason was the cost of immunization, which some of them could not afford to pay. However, the Health Department expressed a favorable attitude to the checking scheme. Though the Education Department agreed that the scheme was essential, they worried that it would affect the enrollment rate.Conclusion In spite of the difficulty in administering immunization certificate check, the effort would be rewarding for raising the immunization coverage rate among the children in Guizhou Province. 展开更多
关键词 Immunization certificate check Impacting factors Sampling research Quantitative study Qualitative study Enrollment rate
下载PDF
A Photo Certificate-A Framework for Generating Visualized Public Key Certificates
14
作者 Wei-Bin Lee Chien-Chen Huang Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2011年第4期339-344,共6页
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani... In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. 展开更多
关键词 AUTHENTICATION certificate public key infrastructure two-layer verifications WATERMARKING X.509.
下载PDF
PROFESSOR HUANG BINGERI,THE ACADEMICIAN OF CAS,WON THE SPECIAL HONORARY CERTIFICATE ISSUED BY IGU
15
《Journal of Geographical Sciences》 SCIE CSCD 1997年第4期109-110,共2页
关键词 PROFESSOR HUANG BINGERI THE ACADEMICIAN OF CAS WON THE SPECIAL HONORARY certificate ISSUED BY IGU CAS
下载PDF
ZTE Wins CC Certificate from Dutch Firm
16
作者 ZTE Corporation 《ZTE Communications》 2011年第2期F0003-F0003,共1页
ZTE Corporation, a publicly-listed global provider of telecommunications equipment and network solutions, has become the first Chinese telecom company to be issued with a CC (Common Criteria for IT security evaluatio... ZTE Corporation, a publicly-listed global provider of telecommunications equipment and network solutions, has become the first Chinese telecom company to be issued with a CC (Common Criteria for IT security evaluation) security certificate. 展开更多
关键词 ZTE Wins CC certificate from Dutch Firm CC
下载PDF
China Import and Export Commodity Quality Certificate Centre (CQC)
17
《China's Foreign Trade》 1997年第10期32-32,共1页
The CQC is an independent and impartial quality certificate organization with third party status established by the State Import and Export Commodity Inspection Administration (SCIA) in accordance with the Law of Comm... The CQC is an independent and impartial quality certificate organization with third party status established by the State Import and Export Commodity Inspection Administration (SCIA) in accordance with the Law of Commodity Inspection and granted its duties and obligations by the State Council.The main aspects of its duties and obligations include: implementing the certification of import commodity safety and quality; the certification of the quality control system and the 展开更多
关键词 CQC WORK China Import and Export Commodity Quality certificate Centre
下载PDF
JV WINS QUALITY CERTIFICATE
18
《China Oil & Gas》 CAS 1999年第2期138-138,共1页
关键词 WINS JV WINS QUALITY certificate
下载PDF
Research on System of Enterprises’ Information Management Based on Attribute Certificate
19
作者 张湘华 《电脑知识与技术》 2009年第12X期10590-10591,共2页
In order to accommodate the complex network data of large scale companies,this thesis analyses PMI,strategy and role hierar-chical model.On such a basis,the thesis proposes an applicable plan for access control of ent... In order to accommodate the complex network data of large scale companies,this thesis analyses PMI,strategy and role hierar-chical model.On such a basis,the thesis proposes an applicable plan for access control of enterprises’ information system based on attribute certificate. 展开更多
关键词 PKI PMI ACCESS control ATTRIBUTE certificate
下载PDF
Notification Services for the Server-Based Certificate Validation Protocol
20
作者 Johannes BUCHMANN Vangelis KARATSIOLIS 《International Journal of Communications, Network and System Sciences》 2009年第5期378-384,共7页
The Server-Based Certificate Validation Protocol allows PKI clients to delegate to a server the construction or validation of certification paths. The protocol’s specification focuses on the communication between the... The Server-Based Certificate Validation Protocol allows PKI clients to delegate to a server the construction or validation of certification paths. The protocol’s specification focuses on the communication between the server and the client and its security. It does not discuss how the servers can efficiently locate the necessary PKI resources like certificate or certificate revocation lists. In this paper we concentrate on this topic. We present a simple and effective method to facilitate locating and using various PKI resources by the servers, without modifying the protocol. We use the extension mechanism of the protocol for notifying the servers about PKI repositories, certificates, and revocations. We specify the tasks of the servers and certificate issu-ers and define the messages that are exchanged between them. A proof of concept is given by implementing an SCVP server, a client, and the proposed method in Java. 展开更多
关键词 SCVP Certification Path Certification Path Construction Certification Path Validation X.509 certificate
下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部