期刊文献+
共找到273篇文章
< 1 2 14 >
每页显示 20 50 100
Some Implications of the Gessel Identity
1
作者 Claire Levaillant 《Applied Mathematics》 2023年第9期545-579,共35页
We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient p... We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient power, namely to the third power of the Fermat quotient. Using this result and the Gessel identity (2005) combined with our past work (2021), we are able to relate residues of some truncated convolutions of Bernoulli numbers with some Ernvall-Metsänkyla residues to residues of some full convolutions of the same kind. We also establish some congruences concerning other related weighted sums of powers of integers when these sums are weighted by some analogs of the Teichmüller characters. 展开更多
关键词 Convolutions Involving Bernoulli Numbers Truncated Convolutions Involving Bernoulli Numbers CONGRUENCEs Binomial and Multinomial Convolutions of Divided Bernoulli Numbers Multiple Harmonic sums Generalized Harmonic Numbers Miki identity Gessel identity sums of Powers of Integers Weighted by Powers of the Fermat Quotients Generalization of Kummer’s Congruences Generalizations of Friedmann-Tamarkine Lehmer Ernvall-Metsänkyla’s Congruences p-Adic Numbers Weighted sums of Powers of Integers
下载PDF
Cultural Identity and Translator's Style: Case Study of Translation of Tea Relevant Acts in Hong Lou Meng
2
作者 王冰 姜欣 《海外英语》 2011年第2X期148-149,共2页
From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator... From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator's styles and pinpointing cultural identity as essential factors influencing their styles. Hopefully, this could help to provide a new angle of view to make research on translator's style. Moreover, the thesis wishes that with analysis of tea culture in Hong Lou Meng the translation of tea relevant acts receive greater priority in the Chinese Classics Translation. 展开更多
关键词 cultural identity translator’s style Hong Lou MENG version
下载PDF
The quadratic-form identity for constructing Hamiltonian structures of the Guo hierarchy 被引量:3
3
作者 董焕河 张宁 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第9期1919-1926,共8页
The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained ... The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained by the quadraticform identity. The method can be used to produce the Hamiltonian structures of the other integrable couplings or multi-component hierarchies. 展开更多
关键词 Hamiltonian structure Guo's hierarchy quadratic-form identity
下载PDF
Identity Issue and Mysterious Images in the Bonesetter's Daughter
4
作者 张砚 《海外英语》 2013年第11X期226-227,共2页
This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. ... This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. And it also looks into the identity issue of Chinese American women from postcolonial perspective. 展开更多
关键词 identity IssUE Amy TAN IMAGE Bonesetter ’s Daughte
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
5
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 计算机网络 网络安全 防火墙 网络检测系统
下载PDF
The Three Principles of Institutional Safeguards for Women's Participation in Legislation in China
6
作者 刘睿 JIANG Yu(Translated) 《The Journal of Human Rights》 2024年第2期325-346,共22页
The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship id... The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship identity theory as responsibilities,”proposes the“citizenship identity theory as subjectivity.”Observing the current practice of women’s participation in legislation in China,two institutional safeguard principles can be summarized:the“minimum proportion”and the“influence evaluation.”However,each of these principles has its inherent limitations.Therefore,it is necessary to supplement them with the principle of“subjective participation”in a reflective manner.This principle requires women to participate substantively in the legislative process as subjects,express women’s needs and demands,input women’s perspectives and experiences,and reconstruct the distribution of rights and responsibilities in the existing legislation.The three principles complement each other and work together to comprehensively constitute the institutional structure of women’s participation in legislation,thereby promoting the reproduction of corresponding action structures. 展开更多
关键词 citizenship identity theory FEMINIsM women’s rights participation in legislation sUBJECTIVITY
下载PDF
Translator's Identity in the English Translation of Wenxin Diaolong
7
作者 Su Lingyun Hu Zuoyou 《学术界》 CSSCI 北大核心 2017年第2期282-290,共9页
In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese orig... In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese origin.Their multiple identity as a reader,author,creator and cultural communicator differs much from each other,which produces important influences upon the selection of the strategy of translation.Owen prefers foreignizing translation while Yang favors domesticating translation.The English translation of Wenxin Diaolong provides much value for the research on the translation of Chinese classic literature. 展开更多
关键词 英语翻译 传播者 创造者 起源 中国 读者 归化
下载PDF
The Enclosed Personal Space and Female Identity Construction in A. S. Byatt's Possession
8
作者 叶柳影 《海外英语》 2018年第18期206-209,共4页
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten... From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction. 展开更多
关键词 A. s. BYATT POssEssION space FEMALE identity HARMONIOUs CO-EXIsTENCE
下载PDF
Negative Evaluation and Author’s Identity Construction in Chinese and English Academic Book Reviews
9
作者 钱俊峰 《海外英语》 2019年第10期275-278,共4页
Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recent... Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recently,identity construction has been a hot research issue in various fields of social science.However,few studies have ever been conducted on how book reviewers construct various identities with the use of evaluation strategies.As such,this thesis tries to investigate how the negative evaluation,the most direct face-threatening evaluation,are linked closely to author’ s identity construction in Chinese and English book reviews,how the Chinese and English book reviewers make salient their appropriate identities with the skillful use of discourse strategies so as to avoid possible face-threatening.The present study collects fifteen Chinese and fifteen English academic book reviews as research data.An analysis of the data indicates that while there are similarities,there are also distinctive differences in the use of negative evaluation strategies and author’ s identity construction in Chinese and English book reviews.Specifically,with the use of negative evaluation,four important identities are constructed,namely,the author’ s identities as an authoritative writer,a polite and friendly evaluator,a responsible opinion holder and a kind academic ally. 展开更多
关键词 BOOK REVIEWs NEGATIVE evaluation strategies author’s identity identity construction
下载PDF
Constructing Writer Identity in Developing Second Language Writer's Academic Writing
10
作者 杨蕴文 《海外英语》 2014年第9X期20-22,28,共4页
Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,... Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,the construction of writer identity in developing writers’academic writing practice will be explored through a review of some relevant literature research and gain insights for the development of writer apprentices and writing instruction. 展开更多
关键词 writer’s identity ACADEMIC writing CONsTRUCTING se
下载PDF
Unification of Gravitational and Electromagnetic Fields in Curved Space-Time Using Gauge Symmetry of Bianchi Identities 被引量:2
11
作者 Young Hwan Yun Kiho Jang 《Journal of High Energy Physics, Gravitation and Cosmology》 2021年第3期1202-1212,共11页
This paper deals with the generalization of the linear theory of the unification of gravitational and electromagnetic fields using 4-dimensional gauge symmetry in order to solve the contradictions from the Kaluza-Klei... This paper deals with the generalization of the linear theory of the unification of gravitational and electromagnetic fields using 4-dimensional gauge symmetry in order to solve the contradictions from the Kaluza-Klein theory’s unification of the gravitational and electromagnetic fields. The unification of gravitational and electromagnetic fields in curved space-time starts from the Bianchi identity, which is well known as a mathematical generalization of the gravitational equation, and by using the existing gauge symmetry condition, equations for the gravitational and electromagnetic fields can be obtained. In particular, the homogeneous Maxwell’s equation can be obtained from the first Bianchi identity, and the inhomogeneous Maxwell’s equation can be obtained from the second Bianchi identity by using Killing’s equation condition of the curved space-time. This paper demonstrates that gravitational and electromagnetic fields can be derived from one equation without contradiction even in curved space-time, thus proving that the 4-dimensional metric tensor using the gauge used for this unification is more complete. In addition, geodesic equations can also be derived in the form of coordinate transformation, showing that they are consistent with the existing equations, and as a result, they are consistent with the existing physical equations. 展开更多
关键词 Bianchi identity Killing’s Equation Maxwell’s Equation GRAVITY Kaluza-Klein Theory Unification Gauge symmetry RELATIVITY
下载PDF
Algorithms and Identities for(q, h)-Bernstein Polynomials and(q, h)-Bézier Curves–A Non-Blossoming Approach
12
作者 Ilija Jegdic Jungsook Larson Plamen Simeonov 《Analysis in Theory and Applications》 CSCD 2016年第4期373-386,共14页
We establish several fundamental identities, including recurrence relations, degree elevation formulas, partition of unity and Marsden identity, for quantum Bernstein bases and quantum Bezier curves. We also develop t... We establish several fundamental identities, including recurrence relations, degree elevation formulas, partition of unity and Marsden identity, for quantum Bernstein bases and quantum Bezier curves. We also develop two term recurrence relations for quantum Bernstein bases and recursive evaluation algorithms for quantum Bezier curves. Our proofs use standard mathematical induction and other elementary techniques. 展开更多
关键词 Bernstein polynomials Bezier curves Marsden's identity recursive evaluation.
下载PDF
GENERALIZED BIANCHI'S IDENTITIES FOR VARIANT CONSTRAINED SYSTEM
13
作者 李子平 《Acta Mathematica Scientia》 SCIE CSCD 1992年第3期241-247,共7页
In this paper the generalized Bianchi's identities for the variant constrained system (GBIVOS)w ith non-invariant action integral and constraint conditions was derived, and the strong and weak conservation laws fo... In this paper the generalized Bianchi's identities for the variant constrained system (GBIVOS)w ith non-invariant action integral and constraint conditions was derived, and the strong and weak conservation laws for such system was deduced. The preliminary applications of the GBIVCS to the case for some models of field theories was given. The Dirac constraint of such system was discussed. 展开更多
关键词 GENERALIZED BIANCHI’s identITIEs FOR VARIANT CONsTRAINED sYsTEM der
下载PDF
Scheduling Multiple Orders per Job with Multiple Constraints on Identical Parallel Machines 被引量:1
14
作者 王腾 周炳海 《Journal of Donghua University(English Edition)》 EI CAS 2013年第6期466-471,共6页
With a comprehensive consideration of multiple product types,past-sequence-dependent(p-s-d) setup times,and deterioration effects constraints in processes of wafer fabrication systems,a novel scheduling model of multi... With a comprehensive consideration of multiple product types,past-sequence-dependent(p-s-d) setup times,and deterioration effects constraints in processes of wafer fabrication systems,a novel scheduling model of multiple orders per job(MOJ)on identical parallel machines was developed and an immune genetic algorithm(IGA) was applied to solving the scheduling problem.A scheduling problem domain was described.A non-linear mathematical programming model was also set up with an objective function of minimizing total weighted earliness-tardiness penalties of the system.On the basis of the mathematical model,IGA was put forward.Based on the genetic algorithm(GA),the proposed algorithm(IGA) can generate feasible solutions and ensure the diversity of antibodies.In the process of immunization programming,to guarantee the algorithm's convergence performance,the modified rule of apparent tardiness cost with setups(ATCS) was presented.Finally,simulation experiments were designed,and the results indicated that the algorithm had good adaptability when the values of the constraints' characteristic parameters were changed and it verified the validity of the algorithm. 展开更多
关键词 调度模型 订单 免疫遗传算法 多约束 平行机 同型 数学规划模型 制造系统
下载PDF
A Novel Fusion System Based on Iris and Ear Biometrics for E-exams
15
作者 S.A.Shaban Hosnia M.M.Ahmed D.L.Elsheweikh 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3295-3315,共21页
With the rapid spread of the coronavirus epidemic all over the world,educational and other institutions are heading towards digitization.In the era of digitization,identifying educational e-platform users using ear an... With the rapid spread of the coronavirus epidemic all over the world,educational and other institutions are heading towards digitization.In the era of digitization,identifying educational e-platform users using ear and iris based multi-modal biometric systems constitutes an urgent and interesting research topic to pre-serve enterprise security,particularly with wearing a face mask as a precaution against the new coronavirus epidemic.This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations(E-exams)during the COVID-19 pandemic.The proposed system comprises four steps.Thefirst step is image preprocessing,which includes enhancing,segmenting,and extracting the regions of interest.The second step is feature extraction,where the Haralick texture and shape methods are used to extract the features of ear images,whereas Tamura texture and color histogram methods are used to extract the features of iris images.The third step is feature fusion,where the extracted features of the ear and iris images are combined into one sequential fused vector.The fourth step is the matching,which is executed using the City Block Dis-tance(CTB)for student identification.Thefindings of the study indicate that the system’s recognition accuracy is 97%,with a 2%False Acceptance Rate(FAR),a 4%False Rejection Rate(FRR),a 94%Correct Recognition Rate(CRR),and a 96%Genuine Acceptance Rate(GAR).In addition,the proposed recognition sys-tem achieved higher accuracy than other related systems. 展开更多
关键词 City block distance(CTB) Covid-19 ear biometric e-exams feature-level fusion iris biometric multimodal biometric student’s identity
下载PDF
贝斯方法与Dempster-Shafer证据理论的讨论 被引量:21
16
作者 涂嘉文 徐守时 《红外与激光工程》 EI CSCD 北大核心 2001年第2期139-142,共4页
目前 ,实时C3 I系统中主要应用的判决级属性估计方法有贝斯方法和Dempster Shafer证据理论。在获得目标参数数据之后 ,通过对多个参数数据的融合获得所要识别的属性。文中介绍了贝斯方法和Dempster Shafer证据理论的基本原理和融合过程 ... 目前 ,实时C3 I系统中主要应用的判决级属性估计方法有贝斯方法和Dempster Shafer证据理论。在获得目标参数数据之后 ,通过对多个参数数据的融合获得所要识别的属性。文中介绍了贝斯方法和Dempster Shafer证据理论的基本原理和融合过程 ,将两者进行比较并给出一个实例。最后展望了属性估计方法的发展。 展开更多
关键词 属性估计 贝斯方法 D-s证据理论 C^3I系统
下载PDF
基于ASP.NET的B/S架构下的项目管理系统的网络安全模式设计 被引量:62
17
作者 张文涛 常红星 《计算机科学》 CSCD 北大核心 2008年第2期101-103,108,共4页
本文介绍了基于ASP.NET平台B/S架构的项目管理系统网络安全的设计,分析了ASP.NET的三层网络结构的安全机制,给出了通过身份验证、权限控制、数据加密、存储过程访问数据库等手段实现系统的安全性的技术细节。
关键词 AsP.NET B/s架构 身份验证 权限 存储过程
下载PDF
新型S/KEY认证方案的分析与设计 被引量:6
18
作者 谢志强 郭军 杨静 《计算机工程》 CAS CSCD 北大核心 2009年第5期175-176,193,共3页
分析传统S/KEY型一次性口令认证系统的缺陷,提出一种新型的S/KEY认证方案,实现客户端与服务器的双向认证,可进行会话密钥协商,且每次认证产生不同的会话密钥。该方案可有效抵御重放攻击、小数攻击、破坏协议攻击和冒充攻击,对中间人攻... 分析传统S/KEY型一次性口令认证系统的缺陷,提出一种新型的S/KEY认证方案,实现客户端与服务器的双向认证,可进行会话密钥协商,且每次认证产生不同的会话密钥。该方案可有效抵御重放攻击、小数攻击、破坏协议攻击和冒充攻击,对中间人攻击也有较强的防御作用。 展开更多
关键词 一次性口令 身份认证 s/KEY认证
下载PDF
s-对数凸函数的Hermite-Hadamard型积分不等式 被引量:11
19
作者 席博彦 祁锋 《数学物理学报(A辑)》 CSCD 北大核心 2015年第3期515-524,共10页
该文定义了"s-对数凸函数"的概念,并给出了可微s-对数凸函数的若干个HermiteHadamard型积分不等式,作为应用给出了平均数的几个不等式.
关键词 积分不等式 积分等式 Hermite-Hadamard积分不等式 凸函数 s-对数凸函数
下载PDF
基于B/S结构的教务管理系统中的数字签名 被引量:7
20
作者 刘涛 侯正风 《安徽机电学院学报》 CAS 2002年第4期44-47,共4页
随着Internet/Intranet技术和教育事业的发展,教务管理系统正在由C/S结构的运行模式转为B/S结构的运行模式.在基于B/S模式下的教务管理信息系统中,为了防止非法用户录入或者修改学生的成绩,本文阐述了如何采用数字签名机制来进行用户身... 随着Internet/Intranet技术和教育事业的发展,教务管理系统正在由C/S结构的运行模式转为B/S结构的运行模式.在基于B/S模式下的教务管理信息系统中,为了防止非法用户录入或者修改学生的成绩,本文阐述了如何采用数字签名机制来进行用户身份认证,从而保证成绩的真实性和系统的安全性.通过对学生、教师、教学管理员、课程、课件及密钥等的管理以及数字签名在系统中的实现,使系统成为一个高效、完善、安全易用的管理信息系统. 展开更多
关键词 数字签名 身份认证 公开密钥密码体制 RsA算法 C/s结构 B/s结构 教务管理系统
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部