期刊文献+
共找到531篇文章
< 1 2 27 >
每页显示 20 50 100
How mobile messaging apps users share information on WeChat: The role of demographic variables 被引量:1
1
作者 Shengli DENG Yanqing LIN 《Chinese Journal of Library and Information Science》 2015年第4期32-49,共18页
Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire surve... Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat. 展开更多
关键词 Demographic variable Information sharing wechat Mobile messaging apps College student
下载PDF
基于C/S架构和物联网技术的可移动医疗设备共享调配系统的设计与应用 被引量:1
2
作者 王杰 薛博宇 +2 位作者 徐云华 张琛 顾伟 《中国医疗设备》 2024年第1期85-91,共7页
目的 设计一个可移动医疗设备高效管理与临床科室共享调配相结合的医疗设备共享管理平台,实现可移动医疗设备使用的全过程管理。方法 基于C/S架构,利用物联网技术优化整合现有医疗设备大数据资源,结合医院需求,构建可移动医疗设备共享... 目的 设计一个可移动医疗设备高效管理与临床科室共享调配相结合的医疗设备共享管理平台,实现可移动医疗设备使用的全过程管理。方法 基于C/S架构,利用物联网技术优化整合现有医疗设备大数据资源,结合医院需求,构建可移动医疗设备共享调配系统,实现医疗设备共享管理、预约借用、统计分析等核心功能。通过比较系统上线前后呼吸机调配次数、平均调配时间、呼吸机使用率、单台呼吸机日均收入4个指标,分析系统应用效果。结果 系统上线后,呼吸机调配次数明显增加、平均调配时间明显降低,呼吸机使用率、单台呼吸机日均收入明显升高,且差异均有统计学意义(P﹤0.05),表明系统对提高呼吸机调配效率与使用效率有促进作用。结论 可移动医疗设备共享调配系统优化了医院设备管理流程,实现了医疗资源的统一调配,有效满足临床紧急抢救时医疗设备调配使用的相关需求,提高了医疗设备周转率以及设备管理人员的工作效率,有助于医院节约人员成本、降低采购费用,为医院管理者制定相关决策提供数据支撑。 展开更多
关键词 可移动医疗设备 物联网 C/s架构 设备共享 管理系统
下载PDF
BOREL'S DIRECTIONS AND SHARED VALUES 被引量:1
3
作者 张庆彩 《Acta Mathematica Scientia》 SCIE CSCD 2013年第2期471-483,共13页
In this article, we study the problems of Borel's directions of meromorphic func- tions concerning shared values and prove that if two meromorphie functions of infinite order share three distinct values, their Borel... In this article, we study the problems of Borel's directions of meromorphic func- tions concerning shared values and prove that if two meromorphie functions of infinite order share three distinct values, their Borel's directions are same. 展开更多
关键词 Meromorphic function Borel's direction shared value angular domain
下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
4
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU shamir’s secret sharing public key
下载PDF
秘密共享:高阶掩码S盒和有限域安全乘法设计
5
作者 唐啸霖 冯燕 +1 位作者 李明达 李志强 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第8期3400-3409,共10页
在信息时代,信息安全是最不能忽视的重要问题,对密码设备的攻击和防护是该领域的研究热点。近年来,多种对密码设备的攻击已为人所知,其目的都是为了获取设备中的密钥,在众多攻击中,功耗侧信道攻击是最受关注的攻击技术之一。掩码技术是... 在信息时代,信息安全是最不能忽视的重要问题,对密码设备的攻击和防护是该领域的研究热点。近年来,多种对密码设备的攻击已为人所知,其目的都是为了获取设备中的密钥,在众多攻击中,功耗侧信道攻击是最受关注的攻击技术之一。掩码技术是对抗功耗侧信道攻击的有效方法,然而随着攻击手段的不断进步,1阶掩码的防护已经不足以应对2阶及以上的功耗分析攻击,因此对高阶掩码的研究具有重要的意义。为了提升加密电路抗攻击能力,该文基于秘密共享的思想,对分组密码算法的S盒变换实施了高阶掩码防护——共享型掩码,并基于Ishai等人在Crypto 2003上发表的安全方案(ISW框架)提出了有限域安全乘法的通用设计方法。通过实验表明,该文提出的共享型掩码方案不影响加密算法的功能,同时能抵御1阶和2阶相关功耗分析攻击。 展开更多
关键词 分组密码算法 s盒变换 共享型掩码 有限域乘法
下载PDF
Is Individually-Targeted Food Assistance Shared among Family Members?
6
作者 Jonathan V. Woodward David C. Ribar 《Food and Nutrition Sciences》 2012年第6期747-759,共13页
The Supplemental Nutrition Assistance Program (SNAP), the National School Lunch Program (NSLP), the School Breakfast Program (SBP), and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC)... The Supplemental Nutrition Assistance Program (SNAP), the National School Lunch Program (NSLP), the School Breakfast Program (SBP), and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) share a common goal of helping people with limited financial means obtain better diets than they could otherwise afford, but the programs differ in terms of the groups that they target and the types of assistance they provide. While the programs appear to increase food consumption among households generally and among their intended beneficiaries, we know much less about whether they help other people. This investigation uses 2002-2003 data from the second Child Development Supplement of the Panel Study of Income Dynamics to examine the relationship between households’ participation in the SNAP, SBP, NLSP, and WIC and individual 10 - 17 year-old children’s consumption of particular food items. Our analyses indicate that WIC participation by others in the household is associated with a 22 percent increase in breakfast consumption of milk and a 16 percent increase in breakfast consumption of cereal for the children in our sample, while WIC is associated with a 13 percent decrease in toast consumption. Participation in school meals is also associated with increased consumption of some foods, particularly juice, fruit, and sweet snacks. Household SNAP participation is estimated to have positive associations with some foods but negative associations with others. 展开更多
关键词 FOOD AssIsTANCE Children’s and Youth’s FOOD Consumption sharing
下载PDF
Electromechanical instrument collaborative sharing system based on A/S mode
7
作者 张英 《Journal of Chongqing University》 CAS 2006年第4期200-204,共5页
In this paper, we put forward a collaborative mode based on A/S mode to solve existing problems in the process of developing electromechanical instrument collaborative sharing system (EICSS). The mode architecture, wo... In this paper, we put forward a collaborative mode based on A/S mode to solve existing problems in the process of developing electromechanical instrument collaborative sharing system (EICSS). The mode architecture, working pattern and development flow of this system were described. The prototype system developed was applied to Lambda 900 Spectrometer in Chongqing University to realize electromechanical instrument networked sharing, and demonstrated desirable expansibility and felxibility to satisfy diverse demands of customers. 展开更多
关键词 computer supported collaborative work electromechanical instrument collaborative sharing system A/s mode
下载PDF
Actual implementation of spectrum-sharing systems in rayleigh fading channels~
8
作者 裴二荣 Wang Sheng Zhang Zhizhong 《High Technology Letters》 EI CAS 2012年第2期145-150,共6页
In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary ... In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results. 展开更多
关键词 cognitive radio spectrum sharing power allocation seller's market trading mechanism CONVEXOPTIMIZATION
下载PDF
The Effect of Dividends and Earnings per Share on the Stock Market Value by Moderating Bank Size
9
作者 Sanaa Maswadeh Thaer Ahmad Abutaber Mustafa Saeed Alathamneh 《Journal of Modern Accounting and Auditing》 2018年第8期408-415,共8页
The aim of this study was to investigate the effect of dividend distributions and earnings per share by moderating bank size as measured by its total assets on the stock market value of banks operating in Jordan durin... The aim of this study was to investigate the effect of dividend distributions and earnings per share by moderating bank size as measured by its total assets on the stock market value of banks operating in Jordan during the period between 2011 and 2016.The hypotheses of the study were tested based on multiple and hierarchical regression method.The most important result of the study is that the earnings per share is the strongest variable that helps in predicting the stock market value of the bank shares,in addition to the significant effect of bank size as measured by its total assets. 展开更多
关键词 DIVIDEND EARNINGs per sHARE sTOCK market value bank’s size BANKs operating in Jordan
下载PDF
SPECTRUM SHARING IN ITERATED PRISONER'S DILEMMA GAME BASED ON EVOLUTIONARY STRATEGIES FOR COGNITIVE RADIOS
10
作者 Tian Feng Yang Zhen 《Journal of Electronics(China)》 2009年第5期588-599,共12页
We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radio... We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radios (CRs). In one-shot game, selfish and rational CRs greedily full spread their own spectrum space in order to maximize their own rates, which leads to Nash Equilibrium (N.E.). But with long term interaction, i.e., Iterated Prisoner's Dilemma (IPD), CRs can come to cooperate and acquire the social optimal point by using different evolutionary strategies such as Tit For Tat (TFT), Generous TFT (GTFT), etc. Also we compare the performances of the different evolutionary strategies in noise-free and noisy environments for two-player games. Finally, N-player IPD (N-IPD) is simulated to verify our conclusions that TFT is a good strategy for spectrum sharing in CRs. 展开更多
关键词 Cognitive Radio (CR) Iterated Prisoner's Dilemma (IPD) spectrum sharing Evolutionary strategies Gaussian interference channel
下载PDF
Let's Share!
11
《疯狂英语(初中天地)》 北大核心 2005年第5期63-63,共1页
黑龙江巩佳梦:我非常喜欢16期里那篇《猫狗情怀》,这让我想起与小白(我的爱猫)在一起时的快乐时光--我写作业的时候,它总是躺在我双腿上睡觉,冬天还会钻到我被窝里缩在我身边。不幸的是,它的生命已经走到了尽头。
关键词 黑龙江 Let’s share
下载PDF
ZTE Base Station Market Shares Climb to World's Top 4 Position
12
作者 ZTE Corporation 《ZTE Communications》 2010年第2期F0003-F0003,共1页
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrast... ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrastructure and Subscribers Report on the global wireless communication equipment market in 2009. According to the report, major changes have occurred in the shares of the global wireless communication market. 展开更多
关键词 ZTE Base station Market shares Climb to World’s Top 4 Position Base World GsM
下载PDF
Does a deviation between the rights and obligations of the board and controlling shareholders affect firm value?
13
作者 HUANG Chuan-chuan 《Journal of Modern Accounting and Auditing》 2009年第5期1-18,共18页
This study examines the association between firm value and ownership structure, when board and controlling stockholders' voting rights deviate from obligations. The measurement of the corporate governance variables i... This study examines the association between firm value and ownership structure, when board and controlling stockholders' voting rights deviate from obligations. The measurement of the corporate governance variables is different from prior research. The author further investigates whether monitoring mechanisms can alleviate the agency problem due to percentage of outside directors. The empirical results show that the higher board voting rights-obligations is deviated, which means the weaker relation with the firm value. The author also finds the monitoring from outside directors can reduce the agency problems from board's deviation and thus can improve firm value. But the results of the controlling stockholders' deviation are mixed or insignificant. This research has implications for Taiwan's regulators who are striving to improve the information, transparency, and corporate governance of board and controlling shareholders' voting rights-obligations deviation. 展开更多
关键词 corporate governance share collateralization voting rights-obligations deviation director's monitoring mechanisms firm value
下载PDF
The Formation, Value and Realization of Xi Jinping's Thought on Building a Community with a Shared Future for Mankind
14
作者 Guo Hailong Wang Xi Huang Yan 《Contemporary Social Sciences》 2017年第6期127-135,共9页
A community with a shared future for mankind refers to equal, all-win, safe and inclusive human collective organizations between countries. Xi Jinping's thought on building a community with a shared future for man... A community with a shared future for mankind refers to equal, all-win, safe and inclusive human collective organizations between countries. Xi Jinping's thought on building a community with a shared future for mankind is deeply rooted in the excellent traditional Chinese culture, and is the "Chinese diagnosis" made, and "Chinese plans" proposed, for world problems. It provides the realistic possibility to advocate for and construct a community with a shared future for mankind for development, peace and security of the world and global governance. We should adhere to the principles of step-bystep implementation, equality and mutual assistance, respect for differences, eco-friendly development and inclusiveness, to achieve a community with a shared future for mankind. 展开更多
关键词 Xi Jinping a community with a shared future for mankind global governance China’s voice China’s approach
下载PDF
Security Analysis of Secret Image Sharing
15
作者 Xuehu Yan Yuliang Lu +3 位作者 Lintao Liu Song Wan Wanmeng Ding Hanlin Liu 《国际计算机前沿大会会议论文集》 2017年第1期75-78,共4页
Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image... Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics. 展开更多
关键词 sECRET IMAGE sharing shamir’s polynomial-based sECRET IMAGE sharing Visual CRYPTOGRAPHY security analysis Linear CONGRUENCE
下载PDF
Measuring Labor's Share of Income in China: 1993-2008
16
作者 吕光明 《China Economist》 2012年第4期117-125,共9页
Accurately measuring labor's share of income is of great importance for China 'S national policies, particularly its labor compensation policies during the 12th Five Year Plan period. This paper first analyses the m... Accurately measuring labor's share of income is of great importance for China 'S national policies, particularly its labor compensation policies during the 12th Five Year Plan period. This paper first analyses the measurement problems of labor's share of income from the perspectives of definition and data and their influences on the accuracy of the measurement results. Then it sums up and appraises several adjustment methods for existing measurement problems. Finally, the author estimates the operating surplus of private, unincorporated enterprises (OSPUE) in China using data from Urban household survey (UHS), Rural household survey (RHS) and population survey, and further makes a correction to labor's share of income in China from 1993 to 2008 with data from flow of funds accounts. Finally, the author conducted trend analysis and international comparisons using the results obtained from the first part of the paper. 展开更多
关键词 labor's share of income measurement problem CORRECTION
下载PDF
A General(k,n)Threshold Secret Image Sharing Construction Based on Matrix Theory
17
作者 Wanmeng Ding Kesheng Liu +1 位作者 Xuehu Yan Lintao Liu 《国际计算机前沿大会会议论文集》 2017年第1期82-84,共3页
Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such... Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such as lossless recovery,rather than the principle of Shamir’s polynomial-based SS scheme.In this paper,we introduce matrix theory to analyze Shamir’s polynomial-based scheme as well as propose a general(k,n)threshold SIS construction based on matrix theory.Besides,it is proved that Shamir’s polynomial-based SS scheme is a special case of our construction method.Both experimental results and analyses are given to demonstrate the effectiveness of the proposed construction method. 展开更多
关键词 sECRET image sharing shamir’s POLYNOMIAL VANDERMONDE MATRIX MATRIX theory·Linear space THREsHOLD CONsTRUCTION
下载PDF
Religious Believers Share the Fruit of China’s Reforms——The story of a rural district in Shanxi Province
18
作者 CHEN FUSHAN 《The Journal of Human Rights》 2009年第1期18-19,共2页
At Jiancaoping District, a rural part of Taiyuan, the capital city of Shanxi Province, north China, more than 8% of the residents are religious, believing in Catholicism, Christianity, Islam, Buddhism, as well as Chin... At Jiancaoping District, a rural part of Taiyuan, the capital city of Shanxi Province, north China, more than 8% of the residents are religious, believing in Catholicism, Christianity, Islam, Buddhism, as well as China's indigenous religion, Taoism. In other words, all the five religions in China have believers here. In particular, there are 16 villages with altogether 10,000 Catholics living in compact communties. It so happens that most religious people live in mountainous or hilly areas in the district, where adverse natural conditions once rendered them poor. 展开更多
关键词 Religious Believers share the Fruit of China The story of a rural district in shanxi Province s Reforms
下载PDF
Simulink与Windows程序间实时交互的研究 被引量:11
19
作者 管文良 康凤举 +1 位作者 唐凯 吴宇 《计算机仿真》 CSCD 2006年第3期5-7,136,共4页
该文通过对实时交互仿真的研究,提出了一种实现Simulink仿真模型与外部Windows程序仿真模型实时交互的方法。该方法通过在S-函数的样板中加入使用共享内存的程序代码完成收发数据;然后编写能读写共享内存的外部程序进行数据读写;同时利... 该文通过对实时交互仿真的研究,提出了一种实现Simulink仿真模型与外部Windows程序仿真模型实时交互的方法。该方法通过在S-函数的样板中加入使用共享内存的程序代码完成收发数据;然后编写能读写共享内存的外部程序进行数据读写;同时利用Windows消息机制协调仿真同步并实现仿真的实时性。基于上述方法,实现了Simulink仿真模型与外部Windows程序仿真模型的实时数据交互。仿真结果表明该方法能实现实时并获得较好的准确性,为实现Simulink仿真模型的重用及与其它仿真模型的实时交互提供了新的解决方案。 展开更多
关键词 系统函数 共享内存 实时交互
下载PDF
S-组合Petri网的活性分析与实现 被引量:24
20
作者 杜玉越 李孝忠 《计算机学报》 EI CSCD 北大核心 1998年第8期747-752,共6页
设∑1=(N1,M1),∑2=(N2,M2)是两个Petri网,且不含有冻结标志,Ni=(Si,Ti;Fi),i=1,2,T1∩T2=Φ,S1∩S2≠Φ,本文定义了∑1,∑2的S-组合Petri网∑s,通过引入Petri网互逆位置序偶的概念,深入研究了义的活性,给出了∑... 设∑1=(N1,M1),∑2=(N2,M2)是两个Petri网,且不含有冻结标志,Ni=(Si,Ti;Fi),i=1,2,T1∩T2=Φ,S1∩S2≠Φ,本文定义了∑1,∑2的S-组合Petri网∑s,通过引入Petri网互逆位置序偶的概念,深入研究了义的活性,给出了∑s有界活的几个判定条件.若∑1,∑2是两个活的Petri网,最后提出了一种实现S-组合Petri网活性的控制装置. 展开更多
关键词 PETRI网 s-组合 活性控制 活性分析 计算机网络
下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部